Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    13-12-2024 06:50

General

  • Target

    file.exe

  • Size

    3.0MB

  • MD5

    e9ad6f2ce6fbb0c701672c884ba36d57

  • SHA1

    aa99f81639a5527a815b826b4bca310630da6e50

  • SHA256

    1a1d816348d61e30a0ac09f31e641c6c569b36b75eb13beefcdf5ba1f84f2d1f

  • SHA512

    21059dea2f666396057a86ab58cac8b0aa04218b84b9860d1082ea8e5fe5387e0acd0cf402d33fe401d6a8c431a2b593d46965609d41f5207d16f920ce966153

  • SSDEEP

    49152:PvH00/X3Zzpbf9m4uiKC/8We1lD9gYNvjfTLkPa/0xOp:PMEZzpxm4uiK48Wez1zTCCRp

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

C2

https://impend-differ.biz/api

https://print-vexer.biz/api

https://dare-curbys.biz/api

https://covery-mover.biz/api

https://formy-spill.biz/api

https://dwell-exclaim.biz/api

https://zinc-sneark.biz/api

https://se-blurry.biz/api

https://drive-connect.cyou/api

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

lumma

C2

https://drive-connect.cyou/api

https://covery-mover.biz/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
  • XMRig Miner payload 10 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 10 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 27 IoCs
  • Identifies Wine through registry keys 2 TTPs 5 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 43 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 31 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 12 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 21 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 31 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 7 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 15 IoCs
  • Suspicious use of SendNotifyMessage 13 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Views/modifies file attributes 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1968
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2260
      • C:\Users\Admin\AppData\Local\Temp\1014430001\dwVrTdy.exe
        "C:\Users\Admin\AppData\Local\Temp\1014430001\dwVrTdy.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops file in Program Files directory
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:672
        • C:\Program Files\Windows Media Player\graph\graph.exe
          "C:\Program Files\Windows Media Player\graph\graph.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:2268
      • C:\Users\Admin\AppData\Local\Temp\1014431001\AzVRM7c.exe
        "C:\Users\Admin\AppData\Local\Temp\1014431001\AzVRM7c.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1436
        • C:\Program Files\Windows Media Player\graph\graph.exe
          "C:\Program Files\Windows Media Player\graph\graph.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:552
      • C:\Users\Admin\AppData\Local\Temp\1014432001\t5abhIx.exe
        "C:\Users\Admin\AppData\Local\Temp\1014432001\t5abhIx.exe"
        3⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        PID:1776
      • C:\Users\Admin\AppData\Local\Temp\1014564001\9JTVo50.exe
        "C:\Users\Admin\AppData\Local\Temp\1014564001\9JTVo50.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2160
      • C:\Users\Admin\AppData\Local\Temp\1014611001\WkfyDiO.exe
        "C:\Users\Admin\AppData\Local\Temp\1014611001\WkfyDiO.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2088
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp19B8.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp19B8.tmp.bat
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2344
          • C:\Windows\system32\chcp.com
            chcp 65001
            5⤵
              PID:2796
            • C:\Windows\system32\tasklist.exe
              Tasklist /fi "PID eq 2088"
              5⤵
              • Enumerates processes with tasklist
              • Suspicious use of AdjustPrivilegeToken
              PID:2824
            • C:\Windows\system32\find.exe
              find ":"
              5⤵
                PID:2664
              • C:\Windows\system32\timeout.exe
                Timeout /T 1 /Nobreak
                5⤵
                • Delays execution with timeout.exe
                PID:1840
              • C:\Windows\system32\tasklist.exe
                Tasklist /fi "PID eq 2088"
                5⤵
                • Enumerates processes with tasklist
                • Suspicious use of AdjustPrivilegeToken
                PID:1556
              • C:\Windows\system32\find.exe
                find ":"
                5⤵
                  PID:2704
                • C:\Windows\system32\timeout.exe
                  Timeout /T 1 /Nobreak
                  5⤵
                  • Delays execution with timeout.exe
                  PID:264
                • C:\Windows\system32\tasklist.exe
                  Tasklist /fi "PID eq 2088"
                  5⤵
                  • Enumerates processes with tasklist
                  • Suspicious use of AdjustPrivilegeToken
                  PID:772
                • C:\Windows\system32\find.exe
                  find ":"
                  5⤵
                    PID:904
                  • C:\Windows\system32\timeout.exe
                    Timeout /T 1 /Nobreak
                    5⤵
                    • Delays execution with timeout.exe
                    PID:1660
                  • C:\Windows\system32\tasklist.exe
                    Tasklist /fi "PID eq 2088"
                    5⤵
                    • Enumerates processes with tasklist
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2112
                  • C:\Windows\system32\find.exe
                    find ":"
                    5⤵
                      PID:1148
                    • C:\Windows\system32\timeout.exe
                      Timeout /T 1 /Nobreak
                      5⤵
                      • Delays execution with timeout.exe
                      PID:840
                    • C:\Windows\system32\tasklist.exe
                      Tasklist /fi "PID eq 2088"
                      5⤵
                      • Enumerates processes with tasklist
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2408
                    • C:\Windows\system32\find.exe
                      find ":"
                      5⤵
                        PID:2244
                      • C:\Windows\system32\timeout.exe
                        Timeout /T 1 /Nobreak
                        5⤵
                        • Delays execution with timeout.exe
                        PID:2536
                      • C:\Windows\system32\tasklist.exe
                        Tasklist /fi "PID eq 2088"
                        5⤵
                        • Enumerates processes with tasklist
                        • Suspicious use of AdjustPrivilegeToken
                        PID:448
                      • C:\Windows\system32\find.exe
                        find ":"
                        5⤵
                          PID:1084
                        • C:\Windows\system32\timeout.exe
                          Timeout /T 1 /Nobreak
                          5⤵
                          • Delays execution with timeout.exe
                          PID:600
                        • C:\Windows\system32\tasklist.exe
                          Tasklist /fi "PID eq 2088"
                          5⤵
                          • Enumerates processes with tasklist
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2024
                        • C:\Windows\system32\find.exe
                          find ":"
                          5⤵
                            PID:1564
                          • C:\Windows\system32\timeout.exe
                            Timeout /T 1 /Nobreak
                            5⤵
                            • Delays execution with timeout.exe
                            PID:1852
                          • C:\Windows\system32\tasklist.exe
                            Tasklist /fi "PID eq 2088"
                            5⤵
                            • Enumerates processes with tasklist
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2136
                          • C:\Windows\system32\find.exe
                            find ":"
                            5⤵
                              PID:1464
                            • C:\Windows\system32\timeout.exe
                              Timeout /T 1 /Nobreak
                              5⤵
                              • Delays execution with timeout.exe
                              PID:2392
                            • C:\Windows\system32\tasklist.exe
                              Tasklist /fi "PID eq 2088"
                              5⤵
                              • Enumerates processes with tasklist
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1972
                            • C:\Windows\system32\find.exe
                              find ":"
                              5⤵
                                PID:2132
                              • C:\Windows\system32\timeout.exe
                                Timeout /T 1 /Nobreak
                                5⤵
                                • Delays execution with timeout.exe
                                PID:848
                              • C:\Windows\system32\tasklist.exe
                                Tasklist /fi "PID eq 2088"
                                5⤵
                                • Enumerates processes with tasklist
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1776
                              • C:\Windows\system32\find.exe
                                find ":"
                                5⤵
                                  PID:3056
                                • C:\Windows\system32\timeout.exe
                                  Timeout /T 1 /Nobreak
                                  5⤵
                                  • Delays execution with timeout.exe
                                  PID:2548
                                • C:\Windows\system32\tasklist.exe
                                  Tasklist /fi "PID eq 2088"
                                  5⤵
                                  • Enumerates processes with tasklist
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2836
                                • C:\Windows\system32\find.exe
                                  find ":"
                                  5⤵
                                    PID:2036
                                  • C:\Windows\system32\timeout.exe
                                    Timeout /T 1 /Nobreak
                                    5⤵
                                    • Delays execution with timeout.exe
                                    PID:2388
                                  • C:\Windows\system32\tasklist.exe
                                    Tasklist /fi "PID eq 2088"
                                    5⤵
                                    • Enumerates processes with tasklist
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:2096
                                  • C:\Windows\system32\find.exe
                                    find ":"
                                    5⤵
                                      PID:2564
                                    • C:\Windows\system32\timeout.exe
                                      Timeout /T 1 /Nobreak
                                      5⤵
                                      • Delays execution with timeout.exe
                                      PID:1416
                                    • C:\Windows\system32\tasklist.exe
                                      Tasklist /fi "PID eq 2088"
                                      5⤵
                                      • Enumerates processes with tasklist
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:2140
                                    • C:\Windows\system32\find.exe
                                      find ":"
                                      5⤵
                                        PID:2384
                                      • C:\Windows\system32\timeout.exe
                                        Timeout /T 1 /Nobreak
                                        5⤵
                                        • Delays execution with timeout.exe
                                        PID:2088
                                      • C:\Windows\system32\tasklist.exe
                                        Tasklist /fi "PID eq 2088"
                                        5⤵
                                        • Enumerates processes with tasklist
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:328
                                      • C:\Windows\system32\find.exe
                                        find ":"
                                        5⤵
                                          PID:332
                                        • C:\Windows\system32\timeout.exe
                                          Timeout /T 1 /Nobreak
                                          5⤵
                                          • Delays execution with timeout.exe
                                          PID:2244
                                        • C:\Windows\system32\tasklist.exe
                                          Tasklist /fi "PID eq 2088"
                                          5⤵
                                          • Enumerates processes with tasklist
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:112
                                        • C:\Windows\system32\find.exe
                                          find ":"
                                          5⤵
                                            PID:1600
                                          • C:\Windows\system32\timeout.exe
                                            Timeout /T 1 /Nobreak
                                            5⤵
                                            • Delays execution with timeout.exe
                                            PID:1980
                                          • C:\Windows\system32\tasklist.exe
                                            Tasklist /fi "PID eq 2088"
                                            5⤵
                                            • Enumerates processes with tasklist
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:2300
                                          • C:\Windows\system32\find.exe
                                            find ":"
                                            5⤵
                                              PID:2976
                                            • C:\Windows\system32\timeout.exe
                                              Timeout /T 1 /Nobreak
                                              5⤵
                                              • Delays execution with timeout.exe
                                              PID:1964
                                            • C:\Windows\system32\tasklist.exe
                                              Tasklist /fi "PID eq 2088"
                                              5⤵
                                              • Enumerates processes with tasklist
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:2352
                                            • C:\Windows\system32\find.exe
                                              find ":"
                                              5⤵
                                                PID:1188
                                              • C:\Windows\system32\timeout.exe
                                                Timeout /T 1 /Nobreak
                                                5⤵
                                                • Delays execution with timeout.exe
                                                PID:1236
                                              • C:\Windows\system32\tasklist.exe
                                                Tasklist /fi "PID eq 2088"
                                                5⤵
                                                • Enumerates processes with tasklist
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:2448
                                              • C:\Windows\system32\find.exe
                                                find ":"
                                                5⤵
                                                  PID:2116
                                                • C:\Windows\system32\timeout.exe
                                                  Timeout /T 1 /Nobreak
                                                  5⤵
                                                  • Delays execution with timeout.exe
                                                  PID:1084
                                                • C:\Windows\system32\tasklist.exe
                                                  Tasklist /fi "PID eq 2088"
                                                  5⤵
                                                  • Enumerates processes with tasklist
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:2744
                                                • C:\Windows\system32\find.exe
                                                  find ":"
                                                  5⤵
                                                    PID:1712
                                                  • C:\Windows\system32\timeout.exe
                                                    Timeout /T 1 /Nobreak
                                                    5⤵
                                                    • Delays execution with timeout.exe
                                                    PID:3240
                                                  • C:\Windows\system32\tasklist.exe
                                                    Tasklist /fi "PID eq 2088"
                                                    5⤵
                                                    • Enumerates processes with tasklist
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:3672
                                                  • C:\Windows\system32\find.exe
                                                    find ":"
                                                    5⤵
                                                      PID:3680
                                                    • C:\Windows\system32\timeout.exe
                                                      Timeout /T 1 /Nobreak
                                                      5⤵
                                                      • Delays execution with timeout.exe
                                                      PID:3708
                                                    • C:\Windows\system32\tasklist.exe
                                                      Tasklist /fi "PID eq 2088"
                                                      5⤵
                                                      • Enumerates processes with tasklist
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:3860
                                                    • C:\Windows\system32\find.exe
                                                      find ":"
                                                      5⤵
                                                        PID:3868
                                                      • C:\Windows\system32\timeout.exe
                                                        Timeout /T 1 /Nobreak
                                                        5⤵
                                                        • Delays execution with timeout.exe
                                                        PID:3912
                                                      • C:\Windows\system32\tasklist.exe
                                                        Tasklist /fi "PID eq 2088"
                                                        5⤵
                                                        • Enumerates processes with tasklist
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:3964
                                                      • C:\Windows\system32\find.exe
                                                        find ":"
                                                        5⤵
                                                          PID:3972
                                                        • C:\Windows\system32\timeout.exe
                                                          Timeout /T 1 /Nobreak
                                                          5⤵
                                                          • Delays execution with timeout.exe
                                                          PID:4000
                                                        • C:\Windows\system32\tasklist.exe
                                                          Tasklist /fi "PID eq 2088"
                                                          5⤵
                                                          • Enumerates processes with tasklist
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:4008
                                                        • C:\Windows\system32\find.exe
                                                          find ":"
                                                          5⤵
                                                            PID:4016
                                                          • C:\Windows\system32\timeout.exe
                                                            Timeout /T 1 /Nobreak
                                                            5⤵
                                                            • Delays execution with timeout.exe
                                                            PID:4044
                                                          • C:\Windows\system32\tasklist.exe
                                                            Tasklist /fi "PID eq 2088"
                                                            5⤵
                                                            • Enumerates processes with tasklist
                                                            PID:4076
                                                          • C:\Windows\system32\find.exe
                                                            find ":"
                                                            5⤵
                                                              PID:4084
                                                            • C:\Windows\system32\timeout.exe
                                                              Timeout /T 1 /Nobreak
                                                              5⤵
                                                              • Delays execution with timeout.exe
                                                              PID:2132
                                                            • C:\Windows\system32\tasklist.exe
                                                              Tasklist /fi "PID eq 2088"
                                                              5⤵
                                                              • Enumerates processes with tasklist
                                                              PID:3612
                                                            • C:\Windows\system32\find.exe
                                                              find ":"
                                                              5⤵
                                                                PID:3620
                                                              • C:\Windows\system32\timeout.exe
                                                                Timeout /T 1 /Nobreak
                                                                5⤵
                                                                • Delays execution with timeout.exe
                                                                PID:3700
                                                              • C:\Windows\system32\tasklist.exe
                                                                Tasklist /fi "PID eq 2088"
                                                                5⤵
                                                                • Enumerates processes with tasklist
                                                                PID:3688
                                                              • C:\Windows\system32\find.exe
                                                                find ":"
                                                                5⤵
                                                                  PID:3684
                                                                • C:\Windows\system32\timeout.exe
                                                                  Timeout /T 1 /Nobreak
                                                                  5⤵
                                                                  • Delays execution with timeout.exe
                                                                  PID:3764
                                                                • C:\Windows\system32\tasklist.exe
                                                                  Tasklist /fi "PID eq 2088"
                                                                  5⤵
                                                                  • Enumerates processes with tasklist
                                                                  PID:2728
                                                                • C:\Windows\system32\find.exe
                                                                  find ":"
                                                                  5⤵
                                                                    PID:1652
                                                                  • C:\Windows\system32\timeout.exe
                                                                    Timeout /T 1 /Nobreak
                                                                    5⤵
                                                                    • Delays execution with timeout.exe
                                                                    PID:3076
                                                                  • C:\Windows\system32\tasklist.exe
                                                                    Tasklist /fi "PID eq 2088"
                                                                    5⤵
                                                                    • Enumerates processes with tasklist
                                                                    PID:3276
                                                                  • C:\Windows\system32\find.exe
                                                                    find ":"
                                                                    5⤵
                                                                      PID:3328
                                                                    • C:\Windows\system32\timeout.exe
                                                                      Timeout /T 1 /Nobreak
                                                                      5⤵
                                                                      • Delays execution with timeout.exe
                                                                      PID:3144
                                                                    • C:\Windows\system32\tasklist.exe
                                                                      Tasklist /fi "PID eq 2088"
                                                                      5⤵
                                                                      • Enumerates processes with tasklist
                                                                      PID:2916
                                                                    • C:\Windows\system32\find.exe
                                                                      find ":"
                                                                      5⤵
                                                                        PID:3904
                                                                      • C:\Windows\system32\timeout.exe
                                                                        Timeout /T 1 /Nobreak
                                                                        5⤵
                                                                        • Delays execution with timeout.exe
                                                                        PID:3868
                                                                      • C:\Windows\system32\tasklist.exe
                                                                        Tasklist /fi "PID eq 2088"
                                                                        5⤵
                                                                        • Enumerates processes with tasklist
                                                                        PID:3960
                                                                      • C:\Windows\system32\find.exe
                                                                        find ":"
                                                                        5⤵
                                                                          PID:3912
                                                                        • C:\Windows\system32\timeout.exe
                                                                          Timeout /T 1 /Nobreak
                                                                          5⤵
                                                                          • Delays execution with timeout.exe
                                                                          PID:3964
                                                                        • C:\Windows\system32\tasklist.exe
                                                                          Tasklist /fi "PID eq 2088"
                                                                          5⤵
                                                                          • Enumerates processes with tasklist
                                                                          PID:2088
                                                                        • C:\Windows\system32\find.exe
                                                                          find ":"
                                                                          5⤵
                                                                            PID:1724
                                                                      • C:\Users\Admin\AppData\Local\Temp\1014686001\4f15345803.exe
                                                                        "C:\Users\Admin\AppData\Local\Temp\1014686001\4f15345803.exe"
                                                                        3⤵
                                                                        • Executes dropped EXE
                                                                        • System Location Discovery: System Language Discovery
                                                                        PID:2948
                                                                      • C:\Users\Admin\AppData\Local\Temp\1014687001\5fd130191f.exe
                                                                        "C:\Users\Admin\AppData\Local\Temp\1014687001\5fd130191f.exe"
                                                                        3⤵
                                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                        • Checks BIOS information in registry
                                                                        • Executes dropped EXE
                                                                        • Identifies Wine through registry keys
                                                                        • Loads dropped DLL
                                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                        • System Location Discovery: System Language Discovery
                                                                        PID:352
                                                                      • C:\Users\Admin\AppData\Local\Temp\1014688001\59b0d70023.exe
                                                                        "C:\Users\Admin\AppData\Local\Temp\1014688001\59b0d70023.exe"
                                                                        3⤵
                                                                        • Executes dropped EXE
                                                                        • System Location Discovery: System Language Discovery
                                                                        PID:2164
                                                                        • C:\Windows\system32\cmd.exe
                                                                          cmd /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"
                                                                          4⤵
                                                                          • Loads dropped DLL
                                                                          PID:2780
                                                                          • C:\Windows\system32\mode.com
                                                                            mode 65,10
                                                                            5⤵
                                                                              PID:2672
                                                                            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                                                              7z.exe e file.zip -p24291711423417250691697322505 -oextracted
                                                                              5⤵
                                                                              • Executes dropped EXE
                                                                              • Loads dropped DLL
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:2704
                                                                            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                                                              7z.exe e extracted/file_7.zip -oextracted
                                                                              5⤵
                                                                              • Executes dropped EXE
                                                                              • Loads dropped DLL
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:1660
                                                                            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                                                              7z.exe e extracted/file_6.zip -oextracted
                                                                              5⤵
                                                                              • Executes dropped EXE
                                                                              • Loads dropped DLL
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:1172
                                                                            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                                                              7z.exe e extracted/file_5.zip -oextracted
                                                                              5⤵
                                                                              • Executes dropped EXE
                                                                              • Loads dropped DLL
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:2460
                                                                            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                                                              7z.exe e extracted/file_4.zip -oextracted
                                                                              5⤵
                                                                              • Executes dropped EXE
                                                                              • Loads dropped DLL
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:3000
                                                                            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                                                              7z.exe e extracted/file_3.zip -oextracted
                                                                              5⤵
                                                                              • Executes dropped EXE
                                                                              • Loads dropped DLL
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:2640
                                                                            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                                                              7z.exe e extracted/file_2.zip -oextracted
                                                                              5⤵
                                                                              • Executes dropped EXE
                                                                              • Loads dropped DLL
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:1476
                                                                            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                                                              7z.exe e extracted/file_1.zip -oextracted
                                                                              5⤵
                                                                              • Executes dropped EXE
                                                                              • Loads dropped DLL
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:944
                                                                            • C:\Windows\system32\attrib.exe
                                                                              attrib +H "in.exe"
                                                                              5⤵
                                                                              • Views/modifies file attributes
                                                                              PID:1544
                                                                            • C:\Users\Admin\AppData\Local\Temp\main\in.exe
                                                                              "in.exe"
                                                                              5⤵
                                                                              • Executes dropped EXE
                                                                              PID:628
                                                                              • C:\Windows\system32\attrib.exe
                                                                                attrib +H +S C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                                                                                6⤵
                                                                                • Views/modifies file attributes
                                                                                PID:1856
                                                                              • C:\Windows\system32\attrib.exe
                                                                                attrib +H C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                                                                                6⤵
                                                                                • Views/modifies file attributes
                                                                                PID:1908
                                                                              • C:\Windows\system32\schtasks.exe
                                                                                schtasks /f /CREATE /TN "Intel_PTT_EK_Recertification" /TR "C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe" /SC MINUTE
                                                                                6⤵
                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                PID:1472
                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                powershell ping 127.0.0.1; del in.exe
                                                                                6⤵
                                                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                PID:1852
                                                                                • C:\Windows\system32\PING.EXE
                                                                                  "C:\Windows\system32\PING.EXE" 127.0.0.1
                                                                                  7⤵
                                                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                                                  • Runs ping.exe
                                                                                  PID:2172
                                                                        • C:\Users\Admin\AppData\Local\Temp\1014689001\f99a9aa62b.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\1014689001\f99a9aa62b.exe"
                                                                          3⤵
                                                                          • Executes dropped EXE
                                                                          • System Location Discovery: System Language Discovery
                                                                          • Suspicious use of FindShellTrayWindow
                                                                          • Suspicious use of SendNotifyMessage
                                                                          PID:2908
                                                                          • C:\Windows\SysWOW64\taskkill.exe
                                                                            taskkill /F /IM firefox.exe /T
                                                                            4⤵
                                                                            • System Location Discovery: System Language Discovery
                                                                            • Kills process with taskkill
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:1520
                                                                          • C:\Windows\SysWOW64\taskkill.exe
                                                                            taskkill /F /IM chrome.exe /T
                                                                            4⤵
                                                                            • System Location Discovery: System Language Discovery
                                                                            • Kills process with taskkill
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:2092
                                                                          • C:\Windows\SysWOW64\taskkill.exe
                                                                            taskkill /F /IM msedge.exe /T
                                                                            4⤵
                                                                            • System Location Discovery: System Language Discovery
                                                                            • Kills process with taskkill
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:2872
                                                                          • C:\Windows\SysWOW64\taskkill.exe
                                                                            taskkill /F /IM opera.exe /T
                                                                            4⤵
                                                                            • System Location Discovery: System Language Discovery
                                                                            • Kills process with taskkill
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:1556
                                                                          • C:\Windows\SysWOW64\taskkill.exe
                                                                            taskkill /F /IM brave.exe /T
                                                                            4⤵
                                                                            • System Location Discovery: System Language Discovery
                                                                            • Kills process with taskkill
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:2736
                                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                                                            4⤵
                                                                              PID:2944
                                                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                                                                5⤵
                                                                                • Checks processor information in registry
                                                                                • Modifies registry class
                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                • Suspicious use of FindShellTrayWindow
                                                                                • Suspicious use of SendNotifyMessage
                                                                                PID:2112
                                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2112.0.1097249148\2021862513" -parentBuildID 20221007134813 -prefsHandle 1200 -prefMapHandle 1180 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b6f0498f-8517-40c1-8742-86c3df747bdb} 2112 "\\.\pipe\gecko-crash-server-pipe.2112" 1304 46d2b58 gpu
                                                                                  6⤵
                                                                                    PID:1276
                                                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2112.1.1666363168\303389109" -parentBuildID 20221007134813 -prefsHandle 1464 -prefMapHandle 1460 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2cedd0db-21c3-4c5d-bafa-b5eee128615f} 2112 "\\.\pipe\gecko-crash-server-pipe.2112" 1492 d73358 socket
                                                                                    6⤵
                                                                                      PID:1544
                                                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2112.2.159480950\834827003" -childID 1 -isForBrowser -prefsHandle 2100 -prefMapHandle 2096 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 860 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {924585c8-31e7-4869-a677-2f7c4b72fe2a} 2112 "\\.\pipe\gecko-crash-server-pipe.2112" 2112 19ca1a58 tab
                                                                                      6⤵
                                                                                        PID:2476
                                                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2112.3.294944026\649108995" -childID 2 -isForBrowser -prefsHandle 2912 -prefMapHandle 2908 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 860 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {538736d4-c485-4af9-80c8-032d18b3b45d} 2112 "\\.\pipe\gecko-crash-server-pipe.2112" 2924 d2e758 tab
                                                                                        6⤵
                                                                                          PID:2296
                                                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2112.4.648053375\702489153" -childID 3 -isForBrowser -prefsHandle 3684 -prefMapHandle 3660 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 860 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {bd12ccaa-acff-41d2-b83f-e6d75cdc952d} 2112 "\\.\pipe\gecko-crash-server-pipe.2112" 3340 1e7a2558 tab
                                                                                          6⤵
                                                                                            PID:3152
                                                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2112.5.70088557\1147366894" -childID 4 -isForBrowser -prefsHandle 3760 -prefMapHandle 3764 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 860 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {57533fe4-3020-4004-a53c-500008625771} 2112 "\\.\pipe\gecko-crash-server-pipe.2112" 3752 1ef49858 tab
                                                                                            6⤵
                                                                                              PID:3160
                                                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2112.6.1618959015\575877747" -childID 5 -isForBrowser -prefsHandle 3924 -prefMapHandle 3928 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 860 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {fd486660-3ac3-42a9-aa08-aedfbbdaebca} 2112 "\\.\pipe\gecko-crash-server-pipe.2112" 3912 1ef46e58 tab
                                                                                              6⤵
                                                                                                PID:3176
                                                                                        • C:\Users\Admin\AppData\Local\Temp\1014690001\4ed99222a7.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\1014690001\4ed99222a7.exe"
                                                                                          3⤵
                                                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                          • Checks BIOS information in registry
                                                                                          • Executes dropped EXE
                                                                                          • Identifies Wine through registry keys
                                                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          PID:2944
                                                                                        • C:\Users\Admin\AppData\Local\Temp\1014691001\99255f97ac.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\1014691001\99255f97ac.exe"
                                                                                          3⤵
                                                                                          • Modifies Windows Defender Real-time Protection settings
                                                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                          • Checks BIOS information in registry
                                                                                          • Executes dropped EXE
                                                                                          • Identifies Wine through registry keys
                                                                                          • Windows security modification
                                                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          PID:2644
                                                                                        • C:\Users\Admin\AppData\Local\Temp\1014692001\d295eff927.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\1014692001\d295eff927.exe"
                                                                                          3⤵
                                                                                          • Executes dropped EXE
                                                                                          • Loads dropped DLL
                                                                                          • Suspicious use of SetThreadContext
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          PID:3124
                                                                                          • C:\Users\Admin\AppData\Local\Temp\1014692001\d295eff927.exe
                                                                                            "C:\Users\Admin\AppData\Local\Temp\1014692001\d295eff927.exe"
                                                                                            4⤵
                                                                                            • Executes dropped EXE
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            • Modifies system certificate store
                                                                                            PID:3792
                                                                                        • C:\Users\Admin\AppData\Local\Temp\1014693001\d1d0270410.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\1014693001\d1d0270410.exe"
                                                                                          3⤵
                                                                                          • Executes dropped EXE
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          • Checks processor information in registry
                                                                                          • Modifies system certificate store
                                                                                          PID:4004
                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                            "C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\1014693001\d1d0270410.exe" & rd /s /q "C:\ProgramData\0R1N7YUAS0ZU" & exit
                                                                                            4⤵
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            PID:3904
                                                                                            • C:\Windows\SysWOW64\timeout.exe
                                                                                              timeout /t 10
                                                                                              5⤵
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              • Delays execution with timeout.exe
                                                                                              PID:1504
                                                                                    • C:\Windows\system32\taskeng.exe
                                                                                      taskeng.exe {AB324B82-68F7-4E8D-8309-0A1AB23C35E0} S-1-5-21-1163522206-1469769407-485553996-1000:PJCSDMRP\Admin:Interactive:[1]
                                                                                      1⤵
                                                                                      • Loads dropped DLL
                                                                                      PID:1680
                                                                                      • C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                                                                                        C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                                                                                        2⤵
                                                                                        • Executes dropped EXE
                                                                                        • Suspicious use of SetThreadContext
                                                                                        PID:916
                                                                                        • C:\Windows\explorer.exe
                                                                                          explorer.exe
                                                                                          3⤵
                                                                                            PID:3680
                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                            powershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe
                                                                                            3⤵
                                                                                            • Drops file in System32 directory
                                                                                            • System Network Configuration Discovery: Internet Connection Discovery
                                                                                            PID:3768
                                                                                            • C:\Windows\system32\PING.EXE
                                                                                              "C:\Windows\system32\PING.EXE" 127.1.10.1
                                                                                              4⤵
                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                              • Runs ping.exe
                                                                                              PID:3344

                                                                                      Network

                                                                                      MITRE ATT&CK Enterprise v15

                                                                                      Replay Monitor

                                                                                      Loading Replay Monitor...

                                                                                      Downloads

                                                                                      • C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5f

                                                                                        Filesize

                                                                                        153KB

                                                                                        MD5

                                                                                        f89267b24ecf471c16add613cec34473

                                                                                        SHA1

                                                                                        c3aad9d69a3848cedb8912e237b06d21e1e9974f

                                                                                        SHA256

                                                                                        21f12abb6de14e72d085bc0bd90d630956c399433e85275c4c144cd9818cbf92

                                                                                        SHA512

                                                                                        c29176c7e1d58dd4e1deafcbd72956b8c27e923fb79d511ee244c91777d3b3e41d0c3977a8a9fbe094bac371253481dde5b58abf4f2df989f303e5d262e1ce4d

                                                                                      • C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5fzip

                                                                                        Filesize

                                                                                        120KB

                                                                                        MD5

                                                                                        53e54ac43786c11e0dde9db8f4eb27ab

                                                                                        SHA1

                                                                                        9c5768d5ee037e90da77f174ef9401970060520e

                                                                                        SHA256

                                                                                        2f606d24809902af1bb9cb59c16a2c82960d95bff923ea26f6a42076772f1db8

                                                                                        SHA512

                                                                                        cd1f6d5f4d8cd19226151b6674124ab1e10950af5a049e8c082531867d71bfae9d7bc65641171fd55d203e4fba9756c80d11906d85a30b35ee4e8991adb21950

                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\05DDC6AA91765AACACDB0A5F96DF8199

                                                                                        Filesize

                                                                                        854B

                                                                                        MD5

                                                                                        e935bc5762068caf3e24a2683b1b8a88

                                                                                        SHA1

                                                                                        82b70eb774c0756837fe8d7acbfeec05ecbf5463

                                                                                        SHA256

                                                                                        a8accfcfeb51bd73df23b91f4d89ff1a9eb7438ef5b12e8afda1a6ff1769e89d

                                                                                        SHA512

                                                                                        bed4f6f5357b37662623f1f8afed1a3ebf3810630b2206a0292052a2e754af9dcfe34ee15c289e3d797a8f33330e47c14cbefbc702f74028557ace29bf855f9e

                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

                                                                                        Filesize

                                                                                        717B

                                                                                        MD5

                                                                                        822467b728b7a66b081c91795373789a

                                                                                        SHA1

                                                                                        d8f2f02e1eef62485a9feffd59ce837511749865

                                                                                        SHA256

                                                                                        af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9

                                                                                        SHA512

                                                                                        bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6

                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

                                                                                        Filesize

                                                                                        1KB

                                                                                        MD5

                                                                                        b08b3f48ce49fbdf52a9b3251155f967

                                                                                        SHA1

                                                                                        6e3d5e840ffb4a5b89aba3f4e311d368a8062e61

                                                                                        SHA256

                                                                                        4a7630a71d7ae873f5af598afdcde694b1fed764b7ffdb78b90de68bcc8da173

                                                                                        SHA512

                                                                                        57eb36cfeca12f6cc4c0bba6ebdf5601909e2686d2f5ebda747792feebb6b4177d2201eef6bcce57231253c42517cf9dd501846f142c2d3a572118f49b35c14e

                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6DA548C7E5915679F87E910D6581DEF1_19CA6F55DA8A3B0AB12F649B745C90D5

                                                                                        Filesize

                                                                                        471B

                                                                                        MD5

                                                                                        f82d5aca5ed5100b9c82259f5c97bd5f

                                                                                        SHA1

                                                                                        c5fe6c4d597a84244e0330d53887d7865bc8d430

                                                                                        SHA256

                                                                                        8484447947db2ae840af4235ae99c704d8048091b0a71f098d18d755759d7178

                                                                                        SHA512

                                                                                        5a9f1b0cba4a1c6974a1d3929c4cf4d6c2b11041bc61cdeac68f8f5915bc19bf56e589b1a8739c8ff3cd4a6e7912405b35bd7f6dbd5ce66dfd465163d638ef47

                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C02877841121CC45139CB51404116B25_6F7C58D8F5DC37AD0C4A3BEB81BE1660

                                                                                        Filesize

                                                                                        472B

                                                                                        MD5

                                                                                        6e21d4c7d76f1411934abcec47aa4f6f

                                                                                        SHA1

                                                                                        6b1ca4ee9524085a35c2f4f99d1603b4a31829e9

                                                                                        SHA256

                                                                                        a77a50019d85cd5c6ce6592dfa4b8dcc63399f279e15c06288d13e2dde338e13

                                                                                        SHA512

                                                                                        ad2bdb52d35f926ae93710e5a3c7775787fb1b2c1a2802f502b70954b1b41c5aafb24ef6d98bebce19bad0fe6a8f29b1f169b55fa49bc5592fa196a42d8c2868

                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\D73CE810F817D372CC78C5824C36E338

                                                                                        Filesize

                                                                                        504B

                                                                                        MD5

                                                                                        7534282617c6278db5ebc9da5b2c673b

                                                                                        SHA1

                                                                                        4d804a0a0e7c4f0ab1791e9c68c58833d7fc7811

                                                                                        SHA256

                                                                                        2904a768575e22df734148cd01c687a5dd23a6d2b378ad3a972f6e7f38fa77cc

                                                                                        SHA512

                                                                                        c45746c38c1e8f0d694a05ef0785070b4f7e3df34a264a3693983d555232bc7b61e78e24187fce8e093448d1724f1226afc3baf262860ad75f076bf57f5929a0

                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

                                                                                        Filesize

                                                                                        1KB

                                                                                        MD5

                                                                                        a266bb7dcc38a562631361bbf61dd11b

                                                                                        SHA1

                                                                                        3b1efd3a66ea28b16697394703a72ca340a05bd5

                                                                                        SHA256

                                                                                        df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

                                                                                        SHA512

                                                                                        0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199

                                                                                        Filesize

                                                                                        170B

                                                                                        MD5

                                                                                        257708d812f794393a4e0bba61407e76

                                                                                        SHA1

                                                                                        830d3832677c7ad898691539c3a07d061a53431d

                                                                                        SHA256

                                                                                        f047bdbf70e30fa241dcaec096ca13a9f5d26ae1056efb992445c63112637f71

                                                                                        SHA512

                                                                                        06cb22f32ba134f70c283c087419f3f24ff33702f6cc85c3ed8701135353ae6fdad346a897ff5ee3f76064d0fef4b002a43ae0f4c84d0e25df931e6458666032

                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

                                                                                        Filesize

                                                                                        192B

                                                                                        MD5

                                                                                        63c8b831b05e8d36d3f49c201899a5ad

                                                                                        SHA1

                                                                                        382ae134f2705c3cc8513ddad25a8a71318ffc90

                                                                                        SHA256

                                                                                        2f93ca32ce7617e097c71eba50048d4d322be27fc0544a6eb8d0e731cac8d222

                                                                                        SHA512

                                                                                        e240d3ccb53badf8e1ac4c819f75f51ce57f0895728004f1ea5a25cc4dbf35d698ea5fbdb82eee06698ba106ba343db1982fd61fd997392ab97920e1d316fb7e

                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

                                                                                        Filesize

                                                                                        410B

                                                                                        MD5

                                                                                        f49d807be5f6e2371f00a1212d49a67f

                                                                                        SHA1

                                                                                        98e4d5b1a82a5b172b73dcd8a270be384a13b011

                                                                                        SHA256

                                                                                        77149d6fbe3457ef63e64f0bfab4ad42b90db3116495b278c5697f1d0b45645c

                                                                                        SHA512

                                                                                        64d3c5f9bbe9ab286d841c54d187a3fa7994ecaa5906d0669279e6f9d976315e9f0e3ff30465de84c9d6eaf2c796ba6cba1e6b7c76a4e2016a397e9da196523c

                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6DA548C7E5915679F87E910D6581DEF1_19CA6F55DA8A3B0AB12F649B745C90D5

                                                                                        Filesize

                                                                                        402B

                                                                                        MD5

                                                                                        283833e807b75b5d13eaa3205fe43521

                                                                                        SHA1

                                                                                        8e227b727b83159af0294346837bcb589bd0bc60

                                                                                        SHA256

                                                                                        3f37201248b82c5cd1d7fe6cb718e51ac8166c4d57b549078657afac06a69cd3

                                                                                        SHA512

                                                                                        4b1ad0b8add13e7233fa8a2b966f4ba8f89770ad5f47f26829f9e61c8a95fd8f93b9d61f0897212da283c34a23f7b392d55bed0e1254e7ea208fb2155cc858cb

                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C02877841121CC45139CB51404116B25_6F7C58D8F5DC37AD0C4A3BEB81BE1660

                                                                                        Filesize

                                                                                        398B

                                                                                        MD5

                                                                                        ea38baa55cfcfa1d8cb766344d211b33

                                                                                        SHA1

                                                                                        f28c3de4429397bc36cd2e1c74c73e81aad3bfd0

                                                                                        SHA256

                                                                                        c4ac3662bb41f1fc6367235e8d512c863c7671ade2bd68aca566d796f93656c0

                                                                                        SHA512

                                                                                        c0380c32c59ad6fb89e8e0b6db6288ff55f7f755d851d4a70faf543d5f91754826eafa26d07843e02628dab81b0264c0b969e0f708473fd63b872546d9dd1072

                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\D73CE810F817D372CC78C5824C36E338

                                                                                        Filesize

                                                                                        550B

                                                                                        MD5

                                                                                        37e748c58b27e99f45af499099d313b1

                                                                                        SHA1

                                                                                        fec3419986f727ff158067e1ade8837030d698ca

                                                                                        SHA256

                                                                                        52d9acf90925a5c3a113609aeda68d6113ffb8b23cd7c716136fead74e7390bd

                                                                                        SHA512

                                                                                        600b8db20149530a004ead2e5b1835bb3eb36c41d6fb0fbfd98771b94536a8bb8f400bc18a3c1a8b923d4c289a1662413e33ddc67ef4b2af10d2a3a296d8125a

                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

                                                                                        Filesize

                                                                                        242B

                                                                                        MD5

                                                                                        5fb5d93dc0de79974068c2d4701296a6

                                                                                        SHA1

                                                                                        eeb4db7eac9566f8255fc2258233cd7e257ffc89

                                                                                        SHA256

                                                                                        aa299a291b86cf97dcca39e90b982835d0e5e913702f1fd92bbae69aecbd1e22

                                                                                        SHA512

                                                                                        3861c7177ec65464de7b946d22562394e9e525202f0313289d9c2ecb9a38ef6e1371d6a4d82cbdce6ebf3e26c029cb54161e1f2568677b876b67305287cc8d92

                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\L6J4GCMD\download[1].htm

                                                                                        Filesize

                                                                                        1B

                                                                                        MD5

                                                                                        cfcd208495d565ef66e7dff9f98764da

                                                                                        SHA1

                                                                                        b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                                                        SHA256

                                                                                        5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                                                        SHA512

                                                                                        31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                                                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\z3l10m6w.default-release\activity-stream.discovery_stream.json.tmp

                                                                                        Filesize

                                                                                        32KB

                                                                                        MD5

                                                                                        e475133809d8a7bf631472fea5a20654

                                                                                        SHA1

                                                                                        a2fdda416973a8546333df4a1b353262cb84b311

                                                                                        SHA256

                                                                                        99a7280258ffe6fa1fb5445eb4ac99a61dee036c9f17d53c22ae1c15f93a4d78

                                                                                        SHA512

                                                                                        a7eae968065058313c52e4f8a0b19ec20856574fb43827730d97082adf7849ddc8009211a3016a71d46bbd7c2fccd4fe26fed5a38e6d09e456feef61f317c67c

                                                                                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\z3l10m6w.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                                                                                        Filesize

                                                                                        15KB

                                                                                        MD5

                                                                                        96c542dec016d9ec1ecc4dddfcbaac66

                                                                                        SHA1

                                                                                        6199f7648bb744efa58acf7b96fee85d938389e4

                                                                                        SHA256

                                                                                        7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                                                                                        SHA512

                                                                                        cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                                                                                      • C:\Users\Admin\AppData\Local\Temp\1014430001\dwVrTdy.exe

                                                                                        Filesize

                                                                                        591KB

                                                                                        MD5

                                                                                        3567cb15156760b2f111512ffdbc1451

                                                                                        SHA1

                                                                                        2fdb1f235fc5a9a32477dab4220ece5fda1539d4

                                                                                        SHA256

                                                                                        0285d3a6c1ca2e3a993491c44e9cf2d33dbec0fb85fdbf48989a4e3b14b37630

                                                                                        SHA512

                                                                                        e7a31b016417218387a4702e525d33dd4fe496557539b2ab173cec0cb92052c750cfc4b3e7f02f3c66ac23f19a0c8a4eb6c9d2b590a5e9faeb525e517bc877ba

                                                                                      • C:\Users\Admin\AppData\Local\Temp\1014564001\9JTVo50.exe

                                                                                        Filesize

                                                                                        2.5MB

                                                                                        MD5

                                                                                        2a78ce9f3872f5e591d643459cabe476

                                                                                        SHA1

                                                                                        9ac947dfc71a868bc9c2eb2bd78dfb433067682e

                                                                                        SHA256

                                                                                        21a2ac44acd7a640735870eebfd04b8dc57bc66877cb5be3b929299e86a43dae

                                                                                        SHA512

                                                                                        03e2cd8161a1394ee535a2ea7d197791ab715d69a02ffab98121ec5ac8150d2b17a9a32a59307042c4bbeffad7425b55efa047651de6ed39277dba80711454f9

                                                                                      • C:\Users\Admin\AppData\Local\Temp\1014611001\WkfyDiO.exe

                                                                                        Filesize

                                                                                        5.6MB

                                                                                        MD5

                                                                                        be95bb9b4d8738550ccf07b8f2309c53

                                                                                        SHA1

                                                                                        c0028d907c46f474b342e343d79d94e1331ea019

                                                                                        SHA256

                                                                                        efd5e8f0852e326a68d4d5cd42d20182ce518fa0b919bb44eeb5450f8830153e

                                                                                        SHA512

                                                                                        317eafe32b8046ea3a1193334362f5caed7e18f47e8ed5b85b6de2e0405869e645ea10483017250ec25f63200cef848267340ae2d7133bbf8dffbc5dffbd666f

                                                                                      • C:\Users\Admin\AppData\Local\Temp\1014687001\5fd130191f.exe

                                                                                        Filesize

                                                                                        1.8MB

                                                                                        MD5

                                                                                        602574ce5a6eea6388a2d30a490ddfa9

                                                                                        SHA1

                                                                                        efe09508381076205f1b23a03b1baea6d36eaa95

                                                                                        SHA256

                                                                                        9edabdb564b79176743506ba6466765f5193ab2ce29f7bcbbb7f1a694ed54768

                                                                                        SHA512

                                                                                        2425affe7ddb06e8beaaf9ebd430a6fef7b0789fe8a74251cd689da8f7722189a492b0047278933adbeb8bc8e77aafee8a360a0102f932b8ca9838525222fa00

                                                                                      • C:\Users\Admin\AppData\Local\Temp\1014688001\59b0d70023.exe

                                                                                        Filesize

                                                                                        4.2MB

                                                                                        MD5

                                                                                        3a425626cbd40345f5b8dddd6b2b9efa

                                                                                        SHA1

                                                                                        7b50e108e293e54c15dce816552356f424eea97a

                                                                                        SHA256

                                                                                        ba9212d2d5cd6df5eb7933fb37c1b72a648974c1730bf5c32439987558f8e8b1

                                                                                        SHA512

                                                                                        a7538c6b7e17c35f053721308b8d6dc53a90e79930ff4ed5cffecaa97f4d0fbc5f9e8b59f1383d8f0699c8d4f1331f226af71d40325022d10b885606a72fe668

                                                                                      • C:\Users\Admin\AppData\Local\Temp\1014689001\f99a9aa62b.exe

                                                                                        Filesize

                                                                                        949KB

                                                                                        MD5

                                                                                        2fc0741f6f4a989e9b55081f90df178a

                                                                                        SHA1

                                                                                        f565869e959f86c4b35f1f1e929a26a0428e8e9d

                                                                                        SHA256

                                                                                        1f1f5ef3819b45c11862020855fd81065af664fee5fef3ade41e137919b825a6

                                                                                        SHA512

                                                                                        6596810859e2448830eb3b12273bbdc54479f529f268f5802e8585f4f7f83b5477839273d71cf6a5a8be48fe70b089613270b69e6cad7bfdc7bb3fee7b1af012

                                                                                      • C:\Users\Admin\AppData\Local\Temp\1014690001\4ed99222a7.exe

                                                                                        Filesize

                                                                                        1.8MB

                                                                                        MD5

                                                                                        b14cf4c1b9dea30bba1c414bde4b5d4d

                                                                                        SHA1

                                                                                        6cff93e02737fc94bcd75e807333eae253ebed87

                                                                                        SHA256

                                                                                        851aca60eebf0e1738adc81a52ef213b0aec834c715ad11896a00dd96ea03f3c

                                                                                        SHA512

                                                                                        f7cded15c3fcab972906c268a655d9adf33f144e3e50d04ef47c8b5a0f31aa9e48427487c2e02cfc241546bfc0a82e52efbed753b04b44ba333d10a015aa3b50

                                                                                      • C:\Users\Admin\AppData\Local\Temp\1014691001\99255f97ac.exe

                                                                                        Filesize

                                                                                        2.6MB

                                                                                        MD5

                                                                                        3c38e31dae752231e4bf19d6e3939817

                                                                                        SHA1

                                                                                        b48bba26115f87493f8cb44c1e11e046c97b0390

                                                                                        SHA256

                                                                                        146eb1b538a0e5ada3c1f6e23db2e053326279248157dbf99b1900ee7aa38a8a

                                                                                        SHA512

                                                                                        16d5d15589e550cacf9f787864512aa29e686f29b788ee8e294b987c58228f4a06a5733f6aa394e385a35fecf1f9affb96628a9a4b3f7c763ba1e8d734bb5854

                                                                                      • C:\Users\Admin\AppData\Local\Temp\1014692001\d295eff927.exe

                                                                                        Filesize

                                                                                        710KB

                                                                                        MD5

                                                                                        28e568616a7b792cac1726deb77d9039

                                                                                        SHA1

                                                                                        39890a418fb391b823ed5084533e2e24dff021e1

                                                                                        SHA256

                                                                                        9597798f7789adc29fbe97707b1bd8ca913c4d5861b0ad4fdd6b913af7c7a8e2

                                                                                        SHA512

                                                                                        85048799e6d2756f1d6af77f34e6a1f454c48f2f43042927845931b7ecff2e5de45f864627a3d4aa061252401225bbb6c2caa8532320ccbe401e97c9c79ac8e5

                                                                                      • C:\Users\Admin\AppData\Local\Temp\1014693001\d1d0270410.exe

                                                                                        Filesize

                                                                                        384KB

                                                                                        MD5

                                                                                        dfd5f78a711fa92337010ecc028470b4

                                                                                        SHA1

                                                                                        1a389091178f2be8ce486cd860de16263f8e902e

                                                                                        SHA256

                                                                                        da96f2eb74e60de791961ef3800c36a5e12202fe97ae5d2fcfc1fe404bc13c0d

                                                                                        SHA512

                                                                                        a3673074919039a2dc854b0f91d1e1a69724056594e33559741f53594e0f6e61e3d99ec664d541b17f09ffdebc2de1b042eec19ca8477fac86359c703f8c9656

                                                                                      • C:\Users\Admin\AppData\Local\Temp\CabD3F2.tmp

                                                                                        Filesize

                                                                                        70KB

                                                                                        MD5

                                                                                        49aebf8cbd62d92ac215b2923fb1b9f5

                                                                                        SHA1

                                                                                        1723be06719828dda65ad804298d0431f6aff976

                                                                                        SHA256

                                                                                        b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                                                                        SHA512

                                                                                        bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                                                                                      • C:\Users\Admin\AppData\Local\Temp\TarDECC.tmp

                                                                                        Filesize

                                                                                        181KB

                                                                                        MD5

                                                                                        4ea6026cf93ec6338144661bf1202cd1

                                                                                        SHA1

                                                                                        a1dec9044f750ad887935a01430bf49322fbdcb7

                                                                                        SHA256

                                                                                        8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                                                                                        SHA512

                                                                                        6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                                                                                      • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

                                                                                        Filesize

                                                                                        1.6MB

                                                                                        MD5

                                                                                        72491c7b87a7c2dd350b727444f13bb4

                                                                                        SHA1

                                                                                        1e9338d56db7ded386878eab7bb44b8934ab1bc7

                                                                                        SHA256

                                                                                        34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

                                                                                        SHA512

                                                                                        583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

                                                                                      • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_4.zip

                                                                                        Filesize

                                                                                        1.7MB

                                                                                        MD5

                                                                                        7187cc2643affab4ca29d92251c96dee

                                                                                        SHA1

                                                                                        ab0a4de90a14551834e12bb2c8c6b9ee517acaf4

                                                                                        SHA256

                                                                                        c7e92a1af295307fb92ad534e05fba879a7cf6716f93aefca0ebfcb8cee7a830

                                                                                        SHA512

                                                                                        27985d317a5c844871ffb2527d04aa50ef7442b2f00d69d5ab6bbb85cd7be1d7057ffd3151d0896f05603677c2f7361ed021eac921e012d74da049ef6949e3a3

                                                                                      • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_5.zip

                                                                                        Filesize

                                                                                        1.7MB

                                                                                        MD5

                                                                                        b7d1e04629bec112923446fda5391731

                                                                                        SHA1

                                                                                        814055286f963ddaa5bf3019821cb8a565b56cb8

                                                                                        SHA256

                                                                                        4da77d4ee30ad0cd56cd620f4e9dc4016244ace015c5b4b43f8f37dd8e3a8789

                                                                                        SHA512

                                                                                        79fc3606b0fe6a1e31a2ecacc96623caf236bf2be692dadab6ea8ffa4af4231d782094a63b76631068364ac9b6a872b02f1e080636eba40ed019c2949a8e28db

                                                                                      • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_6.zip

                                                                                        Filesize

                                                                                        1.7MB

                                                                                        MD5

                                                                                        0dc4014facf82aa027904c1be1d403c1

                                                                                        SHA1

                                                                                        5e6d6c020bfc2e6f24f3d237946b0103fe9b1831

                                                                                        SHA256

                                                                                        a29ddd29958c64e0af1a848409e97401307277bb6f11777b1cfb0404a6226de7

                                                                                        SHA512

                                                                                        cbeead189918657cc81e844ed9673ee8f743aed29ad9948e90afdfbecacc9c764fbdbfb92e8c8ceb5ae47cee52e833e386a304db0572c7130d1a54fd9c2cc028

                                                                                      • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_7.zip

                                                                                        Filesize

                                                                                        3.3MB

                                                                                        MD5

                                                                                        cea368fc334a9aec1ecff4b15612e5b0

                                                                                        SHA1

                                                                                        493d23f72731bb570d904014ffdacbba2334ce26

                                                                                        SHA256

                                                                                        07e38cad68b0cdbea62f55f9bc6ee80545c2e1a39983baa222e8af788f028541

                                                                                        SHA512

                                                                                        bed35a1cc56f32e0109ea5a02578489682a990b5cefa58d7cf778815254af9849e731031e824adba07c86c8425df58a1967ac84ce004c62e316a2e51a75c8748

                                                                                      • C:\Users\Admin\AppData\Local\Temp\main\file.bin

                                                                                        Filesize

                                                                                        3.3MB

                                                                                        MD5

                                                                                        045b0a3d5be6f10ddf19ae6d92dfdd70

                                                                                        SHA1

                                                                                        0387715b6681d7097d372cd0005b664f76c933c7

                                                                                        SHA256

                                                                                        94b392e94fa47d1b9b7ae6a29527727268cc2e3484e818c23608f8835bc1104d

                                                                                        SHA512

                                                                                        58255a755531791b888ffd9b663cc678c63d5caa932260e9546b1b10a8d54208334725c14529116b067bcf5a5e02da85e015a3bed80092b7698a43dab0168c7b

                                                                                      • C:\Users\Admin\AppData\Local\Temp\main\main.bat

                                                                                        Filesize

                                                                                        440B

                                                                                        MD5

                                                                                        3626532127e3066df98e34c3d56a1869

                                                                                        SHA1

                                                                                        5fa7102f02615afde4efd4ed091744e842c63f78

                                                                                        SHA256

                                                                                        2a0e18ef585db0802269b8c1ddccb95ce4c0bac747e207ee6131dee989788bca

                                                                                        SHA512

                                                                                        dcce66d6e24d5a4a352874144871cd73c327e04c1b50764399457d8d70a9515f5bc0a650232763bf34d4830bab70ee4539646e7625cfe5336a870e311043b2bd

                                                                                      • C:\Users\Admin\AppData\Local\Temp\tmp19B8.tmp.bat

                                                                                        Filesize

                                                                                        297B

                                                                                        MD5

                                                                                        c8dcb510b4c6afd97c7fc09ec63a916d

                                                                                        SHA1

                                                                                        9573801d6d1bb738782d89f4a33bf00b06c36104

                                                                                        SHA256

                                                                                        65d90ff5ee7283aa248a7cae50b7ada7da0060d231648d7f2d9c0122c16873e2

                                                                                        SHA512

                                                                                        71d8c965002548dd367062bc5b197b15730fa142b0c339f0470bf3bf5b98579d271fb550fc2bf127ea8a9b97090cbb1ce2a5139f0bc15a232ea792b4867c230e

                                                                                      • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                                                        Filesize

                                                                                        442KB

                                                                                        MD5

                                                                                        85430baed3398695717b0263807cf97c

                                                                                        SHA1

                                                                                        fffbee923cea216f50fce5d54219a188a5100f41

                                                                                        SHA256

                                                                                        a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e

                                                                                        SHA512

                                                                                        06511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1

                                                                                      • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                                                                        Filesize

                                                                                        8.0MB

                                                                                        MD5

                                                                                        a01c5ecd6108350ae23d2cddf0e77c17

                                                                                        SHA1

                                                                                        c6ac28a2cd979f1f9a75d56271821d5ff665e2b6

                                                                                        SHA256

                                                                                        345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42

                                                                                        SHA512

                                                                                        b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72

                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\datareporting\glean\db\data.safe.bin

                                                                                        Filesize

                                                                                        2KB

                                                                                        MD5

                                                                                        45c6c238097c505c47dd97dd5cf6ce5d

                                                                                        SHA1

                                                                                        53b40e60aadf1e0f152ea44e7883a004048f77ae

                                                                                        SHA256

                                                                                        a3dec2a10c3063368c389bc4eb10f71a6705e69d5a0b37af8f5c607c5877e420

                                                                                        SHA512

                                                                                        3efdcd8df111e738add34ea8321bccafd3f4efa160a705bd5379eca5bd86205c7cd4bbb68d860c469d1d6e57ec845db83ffbd6a7799e2f4f36a444e08255f4fe

                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\datareporting\glean\pending_pings\286da205-7730-4c61-b308-ab310821cbab

                                                                                        Filesize

                                                                                        745B

                                                                                        MD5

                                                                                        f7d28b41340dc367eeedab0d116cb28b

                                                                                        SHA1

                                                                                        847935a3fc286673426473399ef42ed7f5b96fae

                                                                                        SHA256

                                                                                        0133e2b71713370e26fcb06c0cc60b672ab80528e6276fb74bcf79e87dbaf235

                                                                                        SHA512

                                                                                        0287b61f3ad3ec506633fb687e0fbf0e36441f98dabec41e3f01090cad67baf1b93b26aa29e3f00dec19524cf8e524b95b831fe79bb19719f27492b3958de5f9

                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\datareporting\glean\pending_pings\4ecd22c3-0b3e-4f3f-b7e3-99cc9fac89ab

                                                                                        Filesize

                                                                                        11KB

                                                                                        MD5

                                                                                        350895a229c5379e57757ef6f8c88407

                                                                                        SHA1

                                                                                        4ef4783b4398c0619821d6b8aac25bcbf1f7cda0

                                                                                        SHA256

                                                                                        c8fb7b1f8c4a9eb712515fdbdb9180ab5f19cacc14b4dd53aa132f40c07ac843

                                                                                        SHA512

                                                                                        c5560ae25d3497677f7b3fec388d62462b2e54c74b00c994c4b9037c899c56ce4c9984bfb5c3f4fdcffdae2f361fbfa140ed7d5ca2f5d12e2e94934eea35d004

                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll

                                                                                        Filesize

                                                                                        997KB

                                                                                        MD5

                                                                                        fe3355639648c417e8307c6d051e3e37

                                                                                        SHA1

                                                                                        f54602d4b4778da21bc97c7238fc66aa68c8ee34

                                                                                        SHA256

                                                                                        1ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e

                                                                                        SHA512

                                                                                        8f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c

                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info

                                                                                        Filesize

                                                                                        116B

                                                                                        MD5

                                                                                        3d33cdc0b3d281e67dd52e14435dd04f

                                                                                        SHA1

                                                                                        4db88689282fd4f9e9e6ab95fcbb23df6e6485db

                                                                                        SHA256

                                                                                        f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b

                                                                                        SHA512

                                                                                        a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1

                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt

                                                                                        Filesize

                                                                                        479B

                                                                                        MD5

                                                                                        49ddb419d96dceb9069018535fb2e2fc

                                                                                        SHA1

                                                                                        62aa6fea895a8b68d468a015f6e6ab400d7a7ca6

                                                                                        SHA256

                                                                                        2af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539

                                                                                        SHA512

                                                                                        48386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2

                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json

                                                                                        Filesize

                                                                                        372B

                                                                                        MD5

                                                                                        8be33af717bb1b67fbd61c3f4b807e9e

                                                                                        SHA1

                                                                                        7cf17656d174d951957ff36810e874a134dd49e0

                                                                                        SHA256

                                                                                        e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd

                                                                                        SHA512

                                                                                        6125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7

                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll

                                                                                        Filesize

                                                                                        11.8MB

                                                                                        MD5

                                                                                        33bf7b0439480effb9fb212efce87b13

                                                                                        SHA1

                                                                                        cee50f2745edc6dc291887b6075ca64d716f495a

                                                                                        SHA256

                                                                                        8ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e

                                                                                        SHA512

                                                                                        d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275

                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib

                                                                                        Filesize

                                                                                        1KB

                                                                                        MD5

                                                                                        688bed3676d2104e7f17ae1cd2c59404

                                                                                        SHA1

                                                                                        952b2cdf783ac72fcb98338723e9afd38d47ad8e

                                                                                        SHA256

                                                                                        33899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237

                                                                                        SHA512

                                                                                        7a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776

                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig

                                                                                        Filesize

                                                                                        1KB

                                                                                        MD5

                                                                                        937326fead5fd401f6cca9118bd9ade9

                                                                                        SHA1

                                                                                        4526a57d4ae14ed29b37632c72aef3c408189d91

                                                                                        SHA256

                                                                                        68a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81

                                                                                        SHA512

                                                                                        b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2

                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\prefs-1.js

                                                                                        Filesize

                                                                                        7KB

                                                                                        MD5

                                                                                        568910b4e560cbd1a52b8f31edf869bc

                                                                                        SHA1

                                                                                        4b7c3cb133d04c54c3d2a140c865cc3f371a4afa

                                                                                        SHA256

                                                                                        b433cc311cb078ed1b6075fbdf7c57923cbfe817d2ad4517fa421682ea477116

                                                                                        SHA512

                                                                                        57140d0148519159e862be90fae8fad5d221a247f435bfe3617c2de94fb46120643279a7d1e616a575e1a9787c1887370da5e5ec104e5a2c47394a50a86e3df5

                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\prefs-1.js

                                                                                        Filesize

                                                                                        7KB

                                                                                        MD5

                                                                                        2b3b65e5d0d08e8b40328a4fac0cff04

                                                                                        SHA1

                                                                                        ea3ae04e2cac0ae36383665ba01a8fde4e1dbf74

                                                                                        SHA256

                                                                                        4af3f545e1cf3f1d9825f99723b1f7424b8ecadacf8bde6d4a7b409ab90d6bef

                                                                                        SHA512

                                                                                        083b27642de5f0f1d8629cc3b7f9a86444474ce858f62b2c8143ed2c32e00564795a01460f02e820c2fa16fae6aa08913e5df5035324b788c534b2f6467e4e71

                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\prefs.js

                                                                                        Filesize

                                                                                        6KB

                                                                                        MD5

                                                                                        12bb513b7b1318f93d7116fa45c8b374

                                                                                        SHA1

                                                                                        79c15c930db6b1770632edcf12180dd1a187cc8d

                                                                                        SHA256

                                                                                        274eb4099e6f216aa125698cd9519bc0beb2c06fda8139ccca70b9e9464fa83d

                                                                                        SHA512

                                                                                        49fa3b4e86a7beae753326931fec1b8e5cdd0d2be853f153d8a6f5d1e33e0f843ae76964d7a2312424e971f03a2a6e33637dc4f8c81351151c4fdf2a59185466

                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\prefs.js

                                                                                        Filesize

                                                                                        6KB

                                                                                        MD5

                                                                                        19050335c5dc7512fdc66dbcf046d879

                                                                                        SHA1

                                                                                        8415462ef0026e5a2752a3e52d1ab4faadf725aa

                                                                                        SHA256

                                                                                        4029b254272b1f7f2b5c6f9c17e7713b4e275cd664fdf277aa20095466c56170

                                                                                        SHA512

                                                                                        3393829b4da9f121bbc8ec74c37c33fd0c10313dbd04ca4dd9b86f584e840559cb7a7287bf39e4d1649289e14dd958602afead70b9607b26055f25470492df85

                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\sessionstore-backups\recovery.jsonlz4

                                                                                        Filesize

                                                                                        4KB

                                                                                        MD5

                                                                                        8def1599d6965e1e8f02febbc8b8e8f2

                                                                                        SHA1

                                                                                        2f0577a3bec8797f5bfad4c184535959aa65e974

                                                                                        SHA256

                                                                                        a9f2a7bd822c7ec081551f8a3a829e10e38997c34a39c5547ef6b25939519f09

                                                                                        SHA512

                                                                                        2d7ec3e3fd4ecd14a449334507a2d5049246b0f42a6527bbcb6bef9ea6b83abcab6dc5fecbd9cc9df01025014de5fd9b396090115926a801c7a60783ac7a445e

                                                                                      • \Program Files\Windows Media Player\graph\graph.exe

                                                                                        Filesize

                                                                                        245KB

                                                                                        MD5

                                                                                        7d254439af7b1caaa765420bea7fbd3f

                                                                                        SHA1

                                                                                        7bd1d979de4a86cb0d8c2ad9e1945bd351339ad0

                                                                                        SHA256

                                                                                        d6e7ceb5b05634efbd06c3e28233e92f1bd362a36473688fbaf952504b76d394

                                                                                        SHA512

                                                                                        c3164b2f09dc914066201562be6483f61d3c368675ac5d3466c2d5b754813b8b23fd09af86b1f15ab8cc91be8a52b3488323e7a65198e5b104f9c635ec5ed5cc

                                                                                      • \Users\Admin\AppData\Local\Temp\Costura\A54E036D2DCD19384E8EA53862E0DD8F\64\sqlite.interop.dll

                                                                                        Filesize

                                                                                        1.7MB

                                                                                        MD5

                                                                                        65ccd6ecb99899083d43f7c24eb8f869

                                                                                        SHA1

                                                                                        27037a9470cc5ed177c0b6688495f3a51996a023

                                                                                        SHA256

                                                                                        aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4

                                                                                        SHA512

                                                                                        533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d

                                                                                      • \Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                                                                                        Filesize

                                                                                        3.0MB

                                                                                        MD5

                                                                                        e9ad6f2ce6fbb0c701672c884ba36d57

                                                                                        SHA1

                                                                                        aa99f81639a5527a815b826b4bca310630da6e50

                                                                                        SHA256

                                                                                        1a1d816348d61e30a0ac09f31e641c6c569b36b75eb13beefcdf5ba1f84f2d1f

                                                                                        SHA512

                                                                                        21059dea2f666396057a86ab58cac8b0aa04218b84b9860d1082ea8e5fe5387e0acd0cf402d33fe401d6a8c431a2b593d46965609d41f5207d16f920ce966153

                                                                                      • \Users\Admin\AppData\Local\Temp\main\7z.exe

                                                                                        Filesize

                                                                                        458KB

                                                                                        MD5

                                                                                        619f7135621b50fd1900ff24aade1524

                                                                                        SHA1

                                                                                        6c7ea8bbd435163ae3945cbef30ef6b9872a4591

                                                                                        SHA256

                                                                                        344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

                                                                                        SHA512

                                                                                        2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

                                                                                      • memory/352-761-0x0000000000400000-0x0000000000C57000-memory.dmp

                                                                                        Filesize

                                                                                        8.3MB

                                                                                      • memory/352-281-0x0000000000400000-0x0000000000C57000-memory.dmp

                                                                                        Filesize

                                                                                        8.3MB

                                                                                      • memory/352-609-0x0000000000400000-0x0000000000C57000-memory.dmp

                                                                                        Filesize

                                                                                        8.3MB

                                                                                      • memory/352-510-0x0000000000400000-0x0000000000C57000-memory.dmp

                                                                                        Filesize

                                                                                        8.3MB

                                                                                      • memory/352-218-0x0000000000400000-0x0000000000C57000-memory.dmp

                                                                                        Filesize

                                                                                        8.3MB

                                                                                      • memory/352-223-0x0000000010000000-0x000000001001C000-memory.dmp

                                                                                        Filesize

                                                                                        112KB

                                                                                      • memory/352-275-0x0000000000400000-0x0000000000C57000-memory.dmp

                                                                                        Filesize

                                                                                        8.3MB

                                                                                      • memory/628-318-0x000000013FCC0000-0x0000000140150000-memory.dmp

                                                                                        Filesize

                                                                                        4.6MB

                                                                                      • memory/628-315-0x000000013FCC0000-0x0000000140150000-memory.dmp

                                                                                        Filesize

                                                                                        4.6MB

                                                                                      • memory/916-953-0x000000013F8F0000-0x000000013FD80000-memory.dmp

                                                                                        Filesize

                                                                                        4.6MB

                                                                                      • memory/916-963-0x000000013F8F0000-0x000000013FD80000-memory.dmp

                                                                                        Filesize

                                                                                        4.6MB

                                                                                      • memory/1680-952-0x000000013F8F0000-0x000000013FD80000-memory.dmp

                                                                                        Filesize

                                                                                        4.6MB

                                                                                      • memory/1680-979-0x000000013F8F0000-0x000000013FD80000-memory.dmp

                                                                                        Filesize

                                                                                        4.6MB

                                                                                      • memory/1852-323-0x000000001B730000-0x000000001BA12000-memory.dmp

                                                                                        Filesize

                                                                                        2.9MB

                                                                                      • memory/1852-324-0x0000000002290000-0x0000000002298000-memory.dmp

                                                                                        Filesize

                                                                                        32KB

                                                                                      • memory/1968-18-0x0000000000EC1000-0x0000000000F29000-memory.dmp

                                                                                        Filesize

                                                                                        416KB

                                                                                      • memory/1968-14-0x0000000006990000-0x0000000006C99000-memory.dmp

                                                                                        Filesize

                                                                                        3.0MB

                                                                                      • memory/1968-17-0x0000000000EC0000-0x00000000011C9000-memory.dmp

                                                                                        Filesize

                                                                                        3.0MB

                                                                                      • memory/1968-10-0x0000000000EC0000-0x00000000011C9000-memory.dmp

                                                                                        Filesize

                                                                                        3.0MB

                                                                                      • memory/1968-5-0x0000000000EC0000-0x00000000011C9000-memory.dmp

                                                                                        Filesize

                                                                                        3.0MB

                                                                                      • memory/1968-3-0x0000000000EC0000-0x00000000011C9000-memory.dmp

                                                                                        Filesize

                                                                                        3.0MB

                                                                                      • memory/1968-2-0x0000000000EC1000-0x0000000000F29000-memory.dmp

                                                                                        Filesize

                                                                                        416KB

                                                                                      • memory/1968-1-0x0000000077E90000-0x0000000077E92000-memory.dmp

                                                                                        Filesize

                                                                                        8KB

                                                                                      • memory/1968-0-0x0000000000EC0000-0x00000000011C9000-memory.dmp

                                                                                        Filesize

                                                                                        3.0MB

                                                                                      • memory/2088-169-0x0000000000FA0000-0x0000000001538000-memory.dmp

                                                                                        Filesize

                                                                                        5.6MB

                                                                                      • memory/2160-193-0x00000000000F0000-0x0000000000147000-memory.dmp

                                                                                        Filesize

                                                                                        348KB

                                                                                      • memory/2260-24-0x0000000000F90000-0x0000000001299000-memory.dmp

                                                                                        Filesize

                                                                                        3.0MB

                                                                                      • memory/2260-249-0x00000000066C0000-0x0000000006F17000-memory.dmp

                                                                                        Filesize

                                                                                        8.3MB

                                                                                      • memory/2260-155-0x0000000000F90000-0x0000000001299000-memory.dmp

                                                                                        Filesize

                                                                                        3.0MB

                                                                                      • memory/2260-37-0x0000000000F90000-0x0000000001299000-memory.dmp

                                                                                        Filesize

                                                                                        3.0MB

                                                                                      • memory/2260-542-0x00000000066C0000-0x0000000006970000-memory.dmp

                                                                                        Filesize

                                                                                        2.7MB

                                                                                      • memory/2260-600-0x0000000000F90000-0x0000000001299000-memory.dmp

                                                                                        Filesize

                                                                                        3.0MB

                                                                                      • memory/2260-170-0x0000000000F90000-0x0000000001299000-memory.dmp

                                                                                        Filesize

                                                                                        3.0MB

                                                                                      • memory/2260-986-0x0000000000F90000-0x0000000001299000-memory.dmp

                                                                                        Filesize

                                                                                        3.0MB

                                                                                      • memory/2260-199-0x0000000000F90000-0x0000000001299000-memory.dmp

                                                                                        Filesize

                                                                                        3.0MB

                                                                                      • memory/2260-550-0x00000000066C0000-0x0000000006D70000-memory.dmp

                                                                                        Filesize

                                                                                        6.7MB

                                                                                      • memory/2260-551-0x00000000066C0000-0x0000000006D70000-memory.dmp

                                                                                        Filesize

                                                                                        6.7MB

                                                                                      • memory/2260-451-0x00000000066C0000-0x0000000006D70000-memory.dmp

                                                                                        Filesize

                                                                                        6.7MB

                                                                                      • memory/2260-970-0x0000000000F90000-0x0000000001299000-memory.dmp

                                                                                        Filesize

                                                                                        3.0MB

                                                                                      • memory/2260-20-0x0000000000F91000-0x0000000000FF9000-memory.dmp

                                                                                        Filesize

                                                                                        416KB

                                                                                      • memory/2260-216-0x00000000066C0000-0x0000000006F17000-memory.dmp

                                                                                        Filesize

                                                                                        8.3MB

                                                                                      • memory/2260-21-0x0000000000F90000-0x0000000001299000-memory.dmp

                                                                                        Filesize

                                                                                        3.0MB

                                                                                      • memory/2260-22-0x0000000000F90000-0x0000000001299000-memory.dmp

                                                                                        Filesize

                                                                                        3.0MB

                                                                                      • memory/2260-951-0x0000000000F90000-0x0000000001299000-memory.dmp

                                                                                        Filesize

                                                                                        3.0MB

                                                                                      • memory/2260-949-0x0000000000F90000-0x0000000001299000-memory.dmp

                                                                                        Filesize

                                                                                        3.0MB

                                                                                      • memory/2260-38-0x0000000000F90000-0x0000000001299000-memory.dmp

                                                                                        Filesize

                                                                                        3.0MB

                                                                                      • memory/2260-493-0x0000000000F90000-0x0000000001299000-memory.dmp

                                                                                        Filesize

                                                                                        3.0MB

                                                                                      • memory/2260-217-0x00000000066C0000-0x0000000006F17000-memory.dmp

                                                                                        Filesize

                                                                                        8.3MB

                                                                                      • memory/2260-544-0x00000000066C0000-0x0000000006970000-memory.dmp

                                                                                        Filesize

                                                                                        2.7MB

                                                                                      • memory/2260-446-0x00000000066C0000-0x0000000006D70000-memory.dmp

                                                                                        Filesize

                                                                                        6.7MB

                                                                                      • memory/2260-649-0x00000000066C0000-0x0000000006970000-memory.dmp

                                                                                        Filesize

                                                                                        2.7MB

                                                                                      • memory/2260-241-0x00000000066C0000-0x0000000006F17000-memory.dmp

                                                                                        Filesize

                                                                                        8.3MB

                                                                                      • memory/2260-867-0x0000000000F90000-0x0000000001299000-memory.dmp

                                                                                        Filesize

                                                                                        3.0MB

                                                                                      • memory/2260-39-0x0000000000F91000-0x0000000000FF9000-memory.dmp

                                                                                        Filesize

                                                                                        416KB

                                                                                      • memory/2260-730-0x00000000066C0000-0x0000000006970000-memory.dmp

                                                                                        Filesize

                                                                                        2.7MB

                                                                                      • memory/2260-19-0x0000000000F90000-0x0000000001299000-memory.dmp

                                                                                        Filesize

                                                                                        3.0MB

                                                                                      • memory/2260-248-0x0000000000F90000-0x0000000001299000-memory.dmp

                                                                                        Filesize

                                                                                        3.0MB

                                                                                      • memory/2644-746-0x0000000000220000-0x00000000004D0000-memory.dmp

                                                                                        Filesize

                                                                                        2.7MB

                                                                                      • memory/2644-694-0x0000000000220000-0x00000000004D0000-memory.dmp

                                                                                        Filesize

                                                                                        2.7MB

                                                                                      • memory/2644-545-0x0000000000220000-0x00000000004D0000-memory.dmp

                                                                                        Filesize

                                                                                        2.7MB

                                                                                      • memory/2644-546-0x0000000000220000-0x00000000004D0000-memory.dmp

                                                                                        Filesize

                                                                                        2.7MB

                                                                                      • memory/2644-543-0x0000000000220000-0x00000000004D0000-memory.dmp

                                                                                        Filesize

                                                                                        2.7MB

                                                                                      • memory/2780-314-0x000000013FCC0000-0x0000000140150000-memory.dmp

                                                                                        Filesize

                                                                                        4.6MB

                                                                                      • memory/2780-511-0x000000013FCC0000-0x0000000140150000-memory.dmp

                                                                                        Filesize

                                                                                        4.6MB

                                                                                      • memory/2944-453-0x0000000000240000-0x00000000008F0000-memory.dmp

                                                                                        Filesize

                                                                                        6.7MB

                                                                                      • memory/2944-491-0x0000000000240000-0x00000000008F0000-memory.dmp

                                                                                        Filesize

                                                                                        6.7MB

                                                                                      • memory/2948-337-0x0000000000400000-0x0000000000457000-memory.dmp

                                                                                        Filesize

                                                                                        348KB

                                                                                      • memory/3680-961-0x0000000140000000-0x0000000140770000-memory.dmp

                                                                                        Filesize

                                                                                        7.4MB

                                                                                      • memory/3680-959-0x0000000140000000-0x0000000140770000-memory.dmp

                                                                                        Filesize

                                                                                        7.4MB

                                                                                      • memory/3680-978-0x0000000140000000-0x0000000140770000-memory.dmp

                                                                                        Filesize

                                                                                        7.4MB

                                                                                      • memory/3680-972-0x00000000000B0000-0x00000000000D0000-memory.dmp

                                                                                        Filesize

                                                                                        128KB

                                                                                      • memory/3680-973-0x0000000140000000-0x0000000140770000-memory.dmp

                                                                                        Filesize

                                                                                        7.4MB

                                                                                      • memory/3680-971-0x0000000140000000-0x0000000140770000-memory.dmp

                                                                                        Filesize

                                                                                        7.4MB

                                                                                      • memory/3680-956-0x0000000140000000-0x0000000140770000-memory.dmp

                                                                                        Filesize

                                                                                        7.4MB

                                                                                      • memory/3680-957-0x0000000140000000-0x0000000140770000-memory.dmp

                                                                                        Filesize

                                                                                        7.4MB

                                                                                      • memory/3680-960-0x0000000140000000-0x0000000140770000-memory.dmp

                                                                                        Filesize

                                                                                        7.4MB

                                                                                      • memory/3680-954-0x0000000140000000-0x0000000140770000-memory.dmp

                                                                                        Filesize

                                                                                        7.4MB

                                                                                      • memory/3680-955-0x0000000140000000-0x0000000140770000-memory.dmp

                                                                                        Filesize

                                                                                        7.4MB

                                                                                      • memory/3680-958-0x0000000140000000-0x0000000140770000-memory.dmp

                                                                                        Filesize

                                                                                        7.4MB

                                                                                      • memory/3768-969-0x0000000001FF0000-0x0000000001FF8000-memory.dmp

                                                                                        Filesize

                                                                                        32KB

                                                                                      • memory/3768-968-0x000000001B6F0000-0x000000001B9D2000-memory.dmp

                                                                                        Filesize

                                                                                        2.9MB

                                                                                      • memory/3792-565-0x0000000000400000-0x0000000000457000-memory.dmp

                                                                                        Filesize

                                                                                        348KB

                                                                                      • memory/3792-567-0x0000000000400000-0x0000000000457000-memory.dmp

                                                                                        Filesize

                                                                                        348KB

                                                                                      • memory/3792-570-0x0000000000400000-0x0000000000457000-memory.dmp

                                                                                        Filesize

                                                                                        348KB

                                                                                      • memory/3792-579-0x0000000000400000-0x0000000000457000-memory.dmp

                                                                                        Filesize

                                                                                        348KB

                                                                                      • memory/3792-571-0x0000000000400000-0x0000000000457000-memory.dmp

                                                                                        Filesize

                                                                                        348KB

                                                                                      • memory/3792-578-0x0000000000400000-0x0000000000457000-memory.dmp

                                                                                        Filesize

                                                                                        348KB

                                                                                      • memory/3792-577-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                                                                                        Filesize

                                                                                        4KB

                                                                                      • memory/3792-575-0x0000000000400000-0x0000000000457000-memory.dmp

                                                                                        Filesize

                                                                                        348KB

                                                                                      • memory/3792-573-0x0000000000400000-0x0000000000457000-memory.dmp

                                                                                        Filesize

                                                                                        348KB

                                                                                      • memory/3860-513-0x00000000FFEC0000-0x00000000FFEDE000-memory.dmp

                                                                                        Filesize

                                                                                        120KB

                                                                                      • memory/3860-512-0x00000000FFEC0000-0x00000000FFEDE000-memory.dmp

                                                                                        Filesize

                                                                                        120KB

                                                                                      • memory/4004-866-0x0000000000400000-0x000000000064B000-memory.dmp

                                                                                        Filesize

                                                                                        2.3MB