Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-12-2024 14:02

General

  • Target

    3302ec0eeea7570311e532f23044556ab6666939da2cac83b9468640c2ceb3ea.exe

  • Size

    6.9MB

  • MD5

    f974778589747a2ef328a709e38c7c28

  • SHA1

    3fe77f6420cbcc4e20239a2b845cbc74853d693b

  • SHA256

    3302ec0eeea7570311e532f23044556ab6666939da2cac83b9468640c2ceb3ea

  • SHA512

    117b43a4cdee473b71280dbc770fd5fc109060c266db8ab4188155ad15c6ca20515cff033316e9af31f61f424fda417d7b4d326ec8019c2a25f7a92b284da837

  • SSDEEP

    196608:6DSetPkGFlJZc5+HArQ/hgyRGCASIyclhn1V:6DSirc5YRRtTnsnL

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

C2

https://sordid-snaked.cyou/api

https://awake-weaves.cyou/api

https://wrathful-jammy.cyou/api

https://debonairnukk.xyz/api

https://diffuculttan.xyz/api

https://effecterectz.xyz/api

https://deafeninggeh.biz/api

https://immureprech.biz/api

https://tacitglibbr.biz/api

https://shineugler.biz/api

https://impend-differ.biz/api

https://print-vexer.biz/api

https://dare-curbys.biz/api

https://covery-mover.biz/api

https://formy-spill.biz/api

https://dwell-exclaim.biz/api

https://zinc-sneark.biz/api

https://se-blurry.biz/api

https://drive-connect.cyou/api

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

lumma

C2

https://tacitglibbr.biz/api

https://deafeninggeh.biz/api

https://shineugler.biz/api

https://drive-connect.cyou/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 21 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 16 IoCs
  • XMRig Miner payload 13 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 32 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Drops startup file 1 IoCs
  • Executes dropped EXE 41 IoCs
  • Identifies Wine through registry keys 2 TTPs 16 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 8 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 5 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 16 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 36 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 6 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 10 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Runs ping.exe 1 TTPs 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 48 IoCs
  • Suspicious use of FindShellTrayWindow 34 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Views/modifies file attributes 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3302ec0eeea7570311e532f23044556ab6666939da2cac83b9468640c2ceb3ea.exe
    "C:\Users\Admin\AppData\Local\Temp\3302ec0eeea7570311e532f23044556ab6666939da2cac83b9468640c2ceb3ea.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3544
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Z8y98.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Z8y98.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1444
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r4v15.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r4v15.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4856
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1o78t1.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1o78t1.exe
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:1144
          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
            "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Adds Run key to start application
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:3860
            • C:\Users\Admin\AppData\Local\Temp\1015564001\ShtrayEasy35.exe
              "C:\Users\Admin\AppData\Local\Temp\1015564001\ShtrayEasy35.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:2204
              • C:\Users\Admin\AppData\Local\Temp\C6XHWelH\UFLQJwGJvpU4GvL8.exe
                C:\Users\Admin\AppData\Local\Temp\C6XHWelH\UFLQJwGJvpU4GvL8.exe 2204
                7⤵
                • Drops startup file
                • Executes dropped EXE
                • Adds Run key to start application
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:2328
                • C:\Users\Admin\AppData\Local\Temp\mEOVyibG\liEXJUsm5yUjUwlL.exe
                  C:\Users\Admin\AppData\Local\Temp\mEOVyibG\liEXJUsm5yUjUwlL.exe 0
                  8⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of WriteProcessMemory
                  PID:3780
                  • C:\Users\Admin\AppData\Local\Temp\SHVMPJEBNX4KHGST9VE2XN7DBEVQHP.exe
                    "C:\Users\Admin\AppData\Local\Temp\SHVMPJEBNX4KHGST9VE2XN7DBEVQHP.exe"
                    9⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of WriteProcessMemory
                    PID:2344
                    • C:\Users\Admin\AppData\Local\Temp\fC3cbNgM\EiXNNETrXZ6lHsNd.exe
                      C:\Users\Admin\AppData\Local\Temp\fC3cbNgM\EiXNNETrXZ6lHsNd.exe 2344
                      10⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      PID:452
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 452 -s 748
                        11⤵
                        • Program crash
                        PID:10612
                    • C:\Users\Admin\AppData\Local\Temp\XgOTOXzeFKfV6o5H.exe
                      C:\Users\Admin\AppData\Local\Temp\XgOTOXzeFKfV6o5H.exe 2344
                      10⤵
                      • Deletes itself
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      PID:12688
            • C:\Users\Admin\AppData\Local\Temp\1015617001\495e4db535.exe
              "C:\Users\Admin\AppData\Local\Temp\1015617001\495e4db535.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:4208
            • C:\Users\Admin\AppData\Local\Temp\1015618001\23c24ff4ca.exe
              "C:\Users\Admin\AppData\Local\Temp\1015618001\23c24ff4ca.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:1780
              • C:\Users\Admin\AppData\Local\Temp\KJ4SZG3K3DBTDL5YPD1OZXO1BNER3.exe
                "C:\Users\Admin\AppData\Local\Temp\KJ4SZG3K3DBTDL5YPD1OZXO1BNER3.exe"
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Windows security modification
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                • Suspicious use of AdjustPrivilegeToken
                PID:3404
              • C:\Users\Admin\AppData\Local\Temp\8V54V7ONBDT715W7HKIN4SAHBDM.exe
                "C:\Users\Admin\AppData\Local\Temp\8V54V7ONBDT715W7HKIN4SAHBDM.exe"
                7⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                PID:472
            • C:\Users\Admin\AppData\Local\Temp\1015619001\c26ea8e6a6.exe
              "C:\Users\Admin\AppData\Local\Temp\1015619001\c26ea8e6a6.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              PID:3656
            • C:\Users\Admin\AppData\Local\Temp\1015620001\fb6343a8a6.exe
              "C:\Users\Admin\AppData\Local\Temp\1015620001\fb6343a8a6.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of WriteProcessMemory
              PID:2872
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM firefox.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:4868
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM chrome.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:2784
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM msedge.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:10644
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM opera.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:10724
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM brave.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:10780
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                7⤵
                  PID:10844
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                    8⤵
                    • Checks processor information in registry
                    • Modifies registry class
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SendNotifyMessage
                    • Suspicious use of SetWindowsHookEx
                    PID:10856
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2024 -parentBuildID 20240401114208 -prefsHandle 1940 -prefMapHandle 1932 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {3d42bcf6-7dab-4ac2-a077-dde2bd49c260} 10856 "\\.\pipe\gecko-crash-server-pipe.10856" gpu
                      9⤵
                        PID:11032
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2504 -parentBuildID 20240401114208 -prefsHandle 2484 -prefMapHandle 2480 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {92453085-70dc-4aad-8e71-e01e8b44cab8} 10856 "\\.\pipe\gecko-crash-server-pipe.10856" socket
                        9⤵
                          PID:11096
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3156 -childID 1 -isForBrowser -prefsHandle 3148 -prefMapHandle 3144 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e6e4fea0-a053-4bdc-a820-bed5976ffee1} 10856 "\\.\pipe\gecko-crash-server-pipe.10856" tab
                          9⤵
                            PID:10432
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3728 -childID 2 -isForBrowser -prefsHandle 3720 -prefMapHandle 3084 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ef3e09b6-2b8f-4835-97fd-218c9e204005} 10856 "\\.\pipe\gecko-crash-server-pipe.10856" tab
                            9⤵
                              PID:10772
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4460 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 2692 -prefMapHandle 4448 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9e87f670-307d-4316-a50d-0cca1c45b750} 10856 "\\.\pipe\gecko-crash-server-pipe.10856" utility
                              9⤵
                              • Checks processor information in registry
                              PID:12924
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5316 -childID 3 -isForBrowser -prefsHandle 5308 -prefMapHandle 5304 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3654a6df-02f1-4af4-a4c2-900a3b64fd3f} 10856 "\\.\pipe\gecko-crash-server-pipe.10856" tab
                              9⤵
                                PID:11460
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5460 -childID 4 -isForBrowser -prefsHandle 5540 -prefMapHandle 5536 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7538a797-1d31-4bca-97bc-4f7f2b9ec5ed} 10856 "\\.\pipe\gecko-crash-server-pipe.10856" tab
                                9⤵
                                  PID:10604
                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5792 -childID 5 -isForBrowser -prefsHandle 5656 -prefMapHandle 5664 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9c15dcf2-29c1-4c96-9d7e-549f5796899c} 10856 "\\.\pipe\gecko-crash-server-pipe.10856" tab
                                  9⤵
                                    PID:10660
                            • C:\Users\Admin\AppData\Local\Temp\1015621001\3af2717f93.exe
                              "C:\Users\Admin\AppData\Local\Temp\1015621001\3af2717f93.exe"
                              6⤵
                              • Modifies Windows Defender Real-time Protection settings
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Windows security modification
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of AdjustPrivilegeToken
                              PID:12116
                            • C:\Users\Admin\AppData\Local\Temp\1015622001\a6729715a1.exe
                              "C:\Users\Admin\AppData\Local\Temp\1015622001\a6729715a1.exe"
                              6⤵
                              • Checks computer location settings
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              PID:12452
                              • C:\Windows\system32\cmd.exe
                                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"
                                7⤵
                                  PID:12760
                                  • C:\Windows\system32\mode.com
                                    mode 65,10
                                    8⤵
                                      PID:13236
                                    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                      7z.exe e file.zip -p24291711423417250691697322505 -oextracted
                                      8⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:13288
                                    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                      7z.exe e extracted/file_7.zip -oextracted
                                      8⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:12872
                                    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                      7z.exe e extracted/file_6.zip -oextracted
                                      8⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:472
                                    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                      7z.exe e extracted/file_5.zip -oextracted
                                      8⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:10812
                                    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                      7z.exe e extracted/file_4.zip -oextracted
                                      8⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:2868
                                    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                      7z.exe e extracted/file_3.zip -oextracted
                                      8⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:11080
                                    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                      7z.exe e extracted/file_2.zip -oextracted
                                      8⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:11108
                                    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                      7z.exe e extracted/file_1.zip -oextracted
                                      8⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:10444
                                    • C:\Windows\system32\attrib.exe
                                      attrib +H "in.exe"
                                      8⤵
                                      • Views/modifies file attributes
                                      PID:2588
                                    • C:\Users\Admin\AppData\Local\Temp\main\in.exe
                                      "in.exe"
                                      8⤵
                                      • Executes dropped EXE
                                      PID:2600
                                      • C:\Windows\SYSTEM32\attrib.exe
                                        attrib +H +S C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                                        9⤵
                                        • Views/modifies file attributes
                                        PID:11300
                                      • C:\Windows\SYSTEM32\attrib.exe
                                        attrib +H C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                                        9⤵
                                        • Views/modifies file attributes
                                        PID:10552
                                      • C:\Windows\SYSTEM32\schtasks.exe
                                        schtasks /f /CREATE /TN "Intel_PTT_EK_Recertification" /TR "C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe" /SC MINUTE
                                        9⤵
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:11276
                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        powershell ping 127.0.0.1; del in.exe
                                        9⤵
                                        • System Network Configuration Discovery: Internet Connection Discovery
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:11284
                                        • C:\Windows\system32\PING.EXE
                                          "C:\Windows\system32\PING.EXE" 127.0.0.1
                                          10⤵
                                          • System Network Configuration Discovery: Internet Connection Discovery
                                          • Runs ping.exe
                                          PID:11660
                                • C:\Users\Admin\AppData\Local\Temp\1015623001\4a0b9a32c6.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1015623001\4a0b9a32c6.exe"
                                  6⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetThreadContext
                                  • System Location Discovery: System Language Discovery
                                  PID:12584
                                  • C:\Users\Admin\AppData\Local\Temp\1015623001\4a0b9a32c6.exe
                                    "C:\Users\Admin\AppData\Local\Temp\1015623001\4a0b9a32c6.exe"
                                    7⤵
                                    • Executes dropped EXE
                                    PID:12896
                                  • C:\Users\Admin\AppData\Local\Temp\1015623001\4a0b9a32c6.exe
                                    "C:\Users\Admin\AppData\Local\Temp\1015623001\4a0b9a32c6.exe"
                                    7⤵
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    PID:12904
                                • C:\Users\Admin\AppData\Local\Temp\1015624001\e9f0f461ff.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1015624001\e9f0f461ff.exe"
                                  6⤵
                                  • Checks computer location settings
                                  • Executes dropped EXE
                                  • System Location Discovery: System Language Discovery
                                  • Checks processor information in registry
                                  PID:12852
                                  • C:\Windows\SysWOW64\cmd.exe
                                    "C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\1015624001\e9f0f461ff.exe" & rd /s /q "C:\ProgramData\EC2DB1DJMYMY" & exit
                                    7⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:11980
                                    • C:\Windows\SysWOW64\timeout.exe
                                      timeout /t 10
                                      8⤵
                                      • System Location Discovery: System Language Discovery
                                      • Delays execution with timeout.exe
                                      PID:12012
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -u -p 12852 -s 2148
                                    7⤵
                                    • Program crash
                                    PID:12000
                            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2J7818.exe
                              C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2J7818.exe
                              4⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of WriteProcessMemory
                              PID:1684
                              • C:\Users\Admin\AppData\Local\Temp\JJPC1C6PLJK24WANJZN717B49.exe
                                "C:\Users\Admin\AppData\Local\Temp\JJPC1C6PLJK24WANJZN717B49.exe"
                                5⤵
                                • Modifies Windows Defender Real-time Protection settings
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                • Windows security modification
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • System Location Discovery: System Language Discovery
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:4304
                              • C:\Users\Admin\AppData\Local\Temp\V0OV0NUTPRH31WSNXWUMGI.exe
                                "C:\Users\Admin\AppData\Local\Temp\V0OV0NUTPRH31WSNXWUMGI.exe"
                                5⤵
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • System Location Discovery: System Language Discovery
                                PID:4932
                          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3n89t.exe
                            C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3n89t.exe
                            3⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • System Location Discovery: System Language Discovery
                            PID:3872
                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4J492s.exe
                          C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4J492s.exe
                          2⤵
                          • Modifies Windows Defender Real-time Protection settings
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Windows security modification
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2740
                      • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                        C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                        1⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • Suspicious behavior: EnumeratesProcesses
                        PID:1724
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 452 -ip 452
                        1⤵
                          PID:10476
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 12852 -ip 12852
                          1⤵
                            PID:11908
                          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                            C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                            1⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            PID:10596
                          • C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                            C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                            1⤵
                            • Executes dropped EXE
                            • Suspicious use of SetThreadContext
                            PID:11648
                            • C:\Windows\explorer.exe
                              explorer.exe
                              2⤵
                              • Suspicious use of AdjustPrivilegeToken
                              PID:11668
                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              powershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe
                              2⤵
                              • System Network Configuration Discovery: Internet Connection Discovery
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1840
                              • C:\Windows\system32\PING.EXE
                                "C:\Windows\system32\PING.EXE" 127.1.10.1
                                3⤵
                                • System Network Configuration Discovery: Internet Connection Discovery
                                • Runs ping.exe
                                PID:828
                          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                            C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                            1⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            PID:11652
                          • C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                            C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                            1⤵
                            • Executes dropped EXE
                            • Suspicious use of SetThreadContext
                            PID:10068
                            • C:\Windows\explorer.exe
                              explorer.exe
                              2⤵
                              • Suspicious use of AdjustPrivilegeToken
                              PID:11488
                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              powershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe
                              2⤵
                              • System Network Configuration Discovery: Internet Connection Discovery
                              • Suspicious use of AdjustPrivilegeToken
                              PID:12036
                              • C:\Windows\system32\PING.EXE
                                "C:\Windows\system32\PING.EXE" 127.1.10.1
                                3⤵
                                • System Network Configuration Discovery: Internet Connection Discovery
                                • Runs ping.exe
                                PID:10168

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8B2B9A00839EED1DFDCCC3BFC2F5DF12

                            Filesize

                            1KB

                            MD5

                            67e486b2f148a3fca863728242b6273e

                            SHA1

                            452a84c183d7ea5b7c015b597e94af8eef66d44a

                            SHA256

                            facaf1c3a4bf232abce19a2d534e495b0d3adc7dbe3797d336249aa6f70adcfb

                            SHA512

                            d3a37da3bb10a9736dc03e8b2b49baceef5d73c026e2077b8ebc1b786f2c9b2f807e0aa13a5866cf3b3cafd2bc506242ef139c423eaffb050bbb87773e53881e

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B46811C17859FFB409CF0E904A4AA8F8

                            Filesize

                            436B

                            MD5

                            971c514f84bba0785f80aa1c23edfd79

                            SHA1

                            732acea710a87530c6b08ecdf32a110d254a54c8

                            SHA256

                            f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895

                            SHA512

                            43dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12

                            Filesize

                            174B

                            MD5

                            f1ba1ac932b5dbc89ddd04033034e562

                            SHA1

                            2bd36afde36e0dbd40403e9752cdf58454e86ec3

                            SHA256

                            a4ebd689198d3b17e3aa9544bb713df60b9e1a4be63103405b16550939236c50

                            SHA512

                            2d05496529f4a0b0c108d994bb06101e058c0ce18fba5001a96ab07c1de76e0ccd261152ae722269ae5feedb64caa1d78c4d2277c6ef6aad22f2cfbf4f6e303c

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8

                            Filesize

                            170B

                            MD5

                            d69e1dcd67edc51a94798cf64f7beb3d

                            SHA1

                            9db9f5b4b55ef43dd91116196ad3b93bfd5d5741

                            SHA256

                            65785d757defac3d457a78383bb2ab6b638197cac662c403302fdfe5e32ba3ca

                            SHA512

                            45f99f9622361f8c68c4875aadba79b84b49bd5e529876101867e22cd4b6f016829d94b1fab6513a9e0cf873ede9c57f6dcd9ce75273ab165e69b2ef7641c557

                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n4zftpal.default-release\activity-stream.discovery_stream.json

                            Filesize

                            22KB

                            MD5

                            c3ac4c1dc635056e0c49d79ae02dcf43

                            SHA1

                            ba6610f31601e6cb2675aeb9d5e10be57db41733

                            SHA256

                            3bd2196371d4a773172d738c03ee6ae8e4fc9083571045f727e908031e1ba351

                            SHA512

                            a8fdf1b97770f76c2e0735c18e041e0a2c482aebfa5b4f497ecd87bf239a56205f847fbea2262f3554d479387f4f43abe49304b8310a3f71d8c31ca37588b428

                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n4zftpal.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984

                            Filesize

                            13KB

                            MD5

                            63c43365075a9976b37ee2852af4b290

                            SHA1

                            0f68df5dabad3bcedc80e272262a38fcbca984c4

                            SHA256

                            c4ff37d46092f9232cb67be47af75f711118ebc1f8c4f784394253a09b11e38f

                            SHA512

                            50811b2abea35606ba7d5f8e87ff4cb6ed7121d5e3e7f40bb97b11dee500f73e90a001388b2991a88c1b5c07b67e5b1a4c3327b4c652457ba38fb29202deda81

                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n4zftpal.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                            Filesize

                            15KB

                            MD5

                            96c542dec016d9ec1ecc4dddfcbaac66

                            SHA1

                            6199f7648bb744efa58acf7b96fee85d938389e4

                            SHA256

                            7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                            SHA512

                            cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                          • C:\Users\Admin\AppData\Local\Temp\1015564001\ShtrayEasy35.exe

                            Filesize

                            256KB

                            MD5

                            c37a981bc24c4aba6454da4eecb7acbe

                            SHA1

                            2bffdf27d0d4f7c810e323c1671a87ed2d6b644f

                            SHA256

                            d6fc121d54e4cdf3a1b6b0505c4f691f16d91fdd421bf96c04388b1c6f19e361

                            SHA512

                            2f44b5218b323bc2bad3ee37426b5bbcbb089b1a561e5f2f48fd455fed0a395b50a6cbb3783bf06e25b144b3f77078629ab1d86fb2c8df1a532230c81a3b2ab8

                          • C:\Users\Admin\AppData\Local\Temp\1015617001\495e4db535.exe

                            Filesize

                            1.7MB

                            MD5

                            6c1d0dabe1ec5e928f27b3223f25c26b

                            SHA1

                            e25ab704a6e9b3e4c30a6c1f7043598a13856ad9

                            SHA256

                            92228a0012605351cf08df9a2ad4b93fa552d7a75991f81fb80f1ae854a0e57d

                            SHA512

                            3a3f7af4f6018fcbd8c6f2871270504731cf269134453c9a146351c3e4a5c89165ecccafb3655d8b39c1ff1ec68f06e1851c0abd66d47602e1f0f8e36d4acfe9

                          • C:\Users\Admin\AppData\Local\Temp\1015620001\fb6343a8a6.exe

                            Filesize

                            950KB

                            MD5

                            e4b7b9834254d78ee177bcac96f5a0eb

                            SHA1

                            047ef4beb2347140b219c4ad4db41f4debd29b01

                            SHA256

                            fbf669d01335967227d4979a9fec8c24018d67d57683f2984494f10eb39c29fc

                            SHA512

                            e7430cc2bab262c01b9193c6b88da52287ea17b2b1cf03d83032331a8e6d281431fe1be8a5ceb72cee50a0b00a76930ca0789dfce419a848631b2e0d6d23bd25

                          • C:\Users\Admin\AppData\Local\Temp\1015622001\a6729715a1.exe

                            Filesize

                            4.2MB

                            MD5

                            3a425626cbd40345f5b8dddd6b2b9efa

                            SHA1

                            7b50e108e293e54c15dce816552356f424eea97a

                            SHA256

                            ba9212d2d5cd6df5eb7933fb37c1b72a648974c1730bf5c32439987558f8e8b1

                            SHA512

                            a7538c6b7e17c35f053721308b8d6dc53a90e79930ff4ed5cffecaa97f4d0fbc5f9e8b59f1383d8f0699c8d4f1331f226af71d40325022d10b885606a72fe668

                          • C:\Users\Admin\AppData\Local\Temp\1015623001\4a0b9a32c6.exe

                            Filesize

                            710KB

                            MD5

                            28e568616a7b792cac1726deb77d9039

                            SHA1

                            39890a418fb391b823ed5084533e2e24dff021e1

                            SHA256

                            9597798f7789adc29fbe97707b1bd8ca913c4d5861b0ad4fdd6b913af7c7a8e2

                            SHA512

                            85048799e6d2756f1d6af77f34e6a1f454c48f2f43042927845931b7ecff2e5de45f864627a3d4aa061252401225bbb6c2caa8532320ccbe401e97c9c79ac8e5

                          • C:\Users\Admin\AppData\Local\Temp\1015624001\e9f0f461ff.exe

                            Filesize

                            384KB

                            MD5

                            dfd5f78a711fa92337010ecc028470b4

                            SHA1

                            1a389091178f2be8ce486cd860de16263f8e902e

                            SHA256

                            da96f2eb74e60de791961ef3800c36a5e12202fe97ae5d2fcfc1fe404bc13c0d

                            SHA512

                            a3673074919039a2dc854b0f91d1e1a69724056594e33559741f53594e0f6e61e3d99ec664d541b17f09ffdebc2de1b042eec19ca8477fac86359c703f8c9656

                          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Z8y98.exe

                            Filesize

                            5.3MB

                            MD5

                            eaee8396a356f0b5451e5ed9a9c42e52

                            SHA1

                            7db745545808447506eac9cd8b240ee1d11918e5

                            SHA256

                            a405002637d395b8310a6fb7dadb37a5aa402792e0fe955ab6529a687cc27baf

                            SHA512

                            246e877f4a31f077741590417f9dc81b97fb5dcf87980b18de06fd5fdfb8384bb1e1e6dcb8f71d105fa5964fc134126a3a3f753d03d3ca3a6164a16df0b47ba0

                          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r4v15.exe

                            Filesize

                            3.5MB

                            MD5

                            b049cde1516af27f99c7970c147d1fc5

                            SHA1

                            ff15d4648bb7ded9e610945da70ca907d3755362

                            SHA256

                            a33dde991d90f3114392bdd4ea9228af75141130c3b2673930921e1bdad3fd70

                            SHA512

                            613ace0eee4fa2c4385576674c3fff353fe6feb7495df29e5873423ff29c4642fa5ce3cc32bc3c8f1ebadcd6f7c9be94e11d33a936f3df83bfd6f8e23568cd39

                          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1o78t1.exe

                            Filesize

                            2.8MB

                            MD5

                            6216a7ad7073a9cea8a90b4efc457679

                            SHA1

                            412fbcbb1a7f69b9bb0c4b32adb4e8b1821610fd

                            SHA256

                            4f0aa066d0cb2ccf1926d2c1c015c432bc5a9cdd000d40cd465d084b6bc6d491

                            SHA512

                            0fa022216422578c250b57a9478b6418767885333b81073245cd0c6dc5eeba7f8b2a59ca125f5ecb7b3dd9ab08d8dc46f1097b04428705d9ef9319a3432749bb

                          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2J7818.exe

                            Filesize

                            1.8MB

                            MD5

                            464d61c29bed4e05852037a57a483269

                            SHA1

                            12970180fd4942d5f568f30df68e6039d28e689a

                            SHA256

                            84fec6bb89d5c805fadaf72f4fdb3eab391c4c7f5a1188b4b7d33adc7f2fd67f

                            SHA512

                            a12dcd7c819097a197403f0aff49474bc85b362cff0b1a4ce12ea948342427fa3bc1e6dd9d83e4476cb90e024af75d01d030011892133b6dbaa08b2dc1421c7e

                          • C:\Users\Admin\AppData\Local\Temp\JJPC1C6PLJK24WANJZN717B49.exe

                            Filesize

                            2.6MB

                            MD5

                            9fb12abecfe763f8581713a45d503a27

                            SHA1

                            6bf26d3d6e20599caf7403ced63fee3de4d8eda9

                            SHA256

                            d45f0cd1f3e3f22bda911af1df1733ffee50894180a55a75f5035d0d1e308d09

                            SHA512

                            6eb2400d2665a6fbbb46b94fa46860774271aaf83af48f83be1ada35f6e0115ff4b2b581932f70fa498505784f9569c92471d15ecede25fe12227c485d025e4a

                          • C:\Users\Admin\AppData\Local\Temp\V0OV0NUTPRH31WSNXWUMGI.exe

                            Filesize

                            1.7MB

                            MD5

                            2fc6ddd1e828cb0c9f8e9312f4ad7054

                            SHA1

                            a1757f24ac7264fb98a43f08c65c668f64e3551a

                            SHA256

                            c327398b6888d4e2b63884a343226e59b9899420419f29cf82d14085058be1ad

                            SHA512

                            1940313198ca63dc18f546451b9ace2d42b99473ad2e0ab66ed4da40247b853ade45119fb183bf5a8942c622732b42c91a22b92430d5b962929a536fe5844d40

                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_motmblk0.axv.ps1

                            Filesize

                            60B

                            MD5

                            d17fe0a3f47be24a6453e9ef58c94641

                            SHA1

                            6ab83620379fc69f80c0242105ddffd7d98d5d9d

                            SHA256

                            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                            SHA512

                            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                          • C:\Users\Admin\AppData\Local\Temp\mEOVyibG\liEXJUsm5yUjUwlL.exe

                            Filesize

                            1.1MB

                            MD5

                            b298555bb0abd747844310c6ca6db8cb

                            SHA1

                            a4e667d337c0063fc1e960cf96e76b4e2b710bee

                            SHA256

                            be1d891bc086dad79cd7c8fb5db190277871764ec2acf2211c876752cd39b222

                            SHA512

                            d2d857083ba04a9bef436b23f5598a786a1099aa816bb42377ececcb784af08b281d5c93081a5964f6ec8ae9286b6e0be607d0736293dfdf6c479e9c69de7069

                          • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

                            Filesize

                            1.6MB

                            MD5

                            72491c7b87a7c2dd350b727444f13bb4

                            SHA1

                            1e9338d56db7ded386878eab7bb44b8934ab1bc7

                            SHA256

                            34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

                            SHA512

                            583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

                          • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

                            Filesize

                            458KB

                            MD5

                            619f7135621b50fd1900ff24aade1524

                            SHA1

                            6c7ea8bbd435163ae3945cbef30ef6b9872a4591

                            SHA256

                            344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

                            SHA512

                            2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

                          • C:\Users\Admin\AppData\Local\Temp\main\file.bin

                            Filesize

                            3.3MB

                            MD5

                            045b0a3d5be6f10ddf19ae6d92dfdd70

                            SHA1

                            0387715b6681d7097d372cd0005b664f76c933c7

                            SHA256

                            94b392e94fa47d1b9b7ae6a29527727268cc2e3484e818c23608f8835bc1104d

                            SHA512

                            58255a755531791b888ffd9b663cc678c63d5caa932260e9546b1b10a8d54208334725c14529116b067bcf5a5e02da85e015a3bed80092b7698a43dab0168c7b

                          • C:\Users\Admin\AppData\Local\Temp\main\main.bat

                            Filesize

                            440B

                            MD5

                            3626532127e3066df98e34c3d56a1869

                            SHA1

                            5fa7102f02615afde4efd4ed091744e842c63f78

                            SHA256

                            2a0e18ef585db0802269b8c1ddccb95ce4c0bac747e207ee6131dee989788bca

                            SHA512

                            dcce66d6e24d5a4a352874144871cd73c327e04c1b50764399457d8d70a9515f5bc0a650232763bf34d4830bab70ee4539646e7625cfe5336a870e311043b2bd

                          • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                            Filesize

                            479KB

                            MD5

                            09372174e83dbbf696ee732fd2e875bb

                            SHA1

                            ba360186ba650a769f9303f48b7200fb5eaccee1

                            SHA256

                            c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                            SHA512

                            b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                          • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                            Filesize

                            13.8MB

                            MD5

                            0a8747a2ac9ac08ae9508f36c6d75692

                            SHA1

                            b287a96fd6cc12433adb42193dfe06111c38eaf0

                            SHA256

                            32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                            SHA512

                            59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GoogleChrome.lnk

                            Filesize

                            1KB

                            MD5

                            dda377e33e94fbe66c09794ffe25c37a

                            SHA1

                            25e58e9d3b8de0fffd8a0db7dbd1c22fbc767111

                            SHA256

                            43aec3e6203699578d48e90a3f9d2540edb2d20223d918e2f4644f4470b7e4a6

                            SHA512

                            442d9b09d28cf5ae7babf567d0cf2378c46e0a744da95209ac112123b487ae418422ec0f23b640d76c5e5c7ad2229e41885a152a1908f53e1512d0d012698e89

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\AlternateServices.bin

                            Filesize

                            8KB

                            MD5

                            ad0baadd021df250e997101b6b0633ce

                            SHA1

                            6a70b817225dc91bdf10793fc03fe9715582f112

                            SHA256

                            0d3e5011a53c2facec12a160fb8058226434299846ad7c915967aa2879f761a7

                            SHA512

                            721421a293d9946f3fdd6149d4465c23f98db1a28571b3bfe6604e39edba7b643f6dd8d42b7193c011d5689125cf24f1fc3ea9309e01d88c513c92d3c0e295f1

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\AlternateServices.bin

                            Filesize

                            10KB

                            MD5

                            924aae1cd788f7d0583958ceea4a07d1

                            SHA1

                            3036c856f95c0645fa867e1a4a4db387e59cda61

                            SHA256

                            a3fd4bdcde99cb5c07c334f310bb6fe8768ec7a7997d9a5d62e84a0db77d7190

                            SHA512

                            bdf378d501ed3076e0370698d536c6f01efa3644adb2c16f468f253108f025169899bb0f5f1625b04bdca5350ebb872edf7b99b5db8a7631d3f8045b27f8f299

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.bin

                            Filesize

                            23KB

                            MD5

                            5aaf977405a17b4b94a17cba4fb38cb4

                            SHA1

                            74a49815db4115fca8e28da5cc4632e36b4359fc

                            SHA256

                            8b5b6c0167a389af4990a5a1582723fc3b987e1518e5332165a0fd87142ae3c0

                            SHA512

                            67c3d252fa9f98ee0783600f20621aa1b9650cd6f9dd9352c04b059411dc91b6a8df9799d376f5fbbf763e1d2b0bb2d348f18c0b33db9b07ba0566831a4d910a

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.bin

                            Filesize

                            6KB

                            MD5

                            ca95e49a4d3aa3baa678fe3a4837b6a2

                            SHA1

                            8dd7203912170abbf540b85249af7529a8df5c51

                            SHA256

                            f7ac3c96b3f84a6597f16b6ab12380b7c37d8ac3e7f408fee7535275988ed478

                            SHA512

                            410f0d84da89cd62eded5efae7757d5b083e1261d19cbb3a32c666595a7fe7a939c58db2f803aee5c11bc4638eef81a5f14a94ae7b014719a36431effd2d7d91

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.bin

                            Filesize

                            5KB

                            MD5

                            e4e5779c26380ec5302862d161adac57

                            SHA1

                            dac5e70b78d4a30c7951395debd2bf96f13dad76

                            SHA256

                            5be6d00291a1523fe8a43b65c26429ad08dd72f4465a8e7d376149d75674a39c

                            SHA512

                            676377cd8503c629b740852c3c28c46e1e83977389fd85d76159759b76c8048f9255da3554fe8f304f5f1455a26edfd8aca1632da586a4d27bc7358b8c0f4446

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.bin

                            Filesize

                            14KB

                            MD5

                            68b41ed1bdd59925425b7d1c07f9b219

                            SHA1

                            31eaea7417bc23f2f0f200574e2b35650320b2b5

                            SHA256

                            5f922007d5217ceb4aa092ca81d03b0e31c2502e0c1a79a5bef1c5eaa5e41f40

                            SHA512

                            401dda84fd0f97806231844e7cbebcd47c6e76500fc62ea5171441900b8ec862f9b7c1fca38c07321dbc44cd2d6deab4c0223f4dddb9134a1178244b13e75670

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.tmp

                            Filesize

                            5KB

                            MD5

                            2e8c465e3f9f415b1a045463bc385bfc

                            SHA1

                            19b9eab87e644bb7ddae45f19fa45fff5112c051

                            SHA256

                            1a895657bfbd8fa166a97bff95c56924eb6a210d86507caf25b190bc9f177505

                            SHA512

                            64e6b412acf8e48c02efc35a2a78008e34ec4c8f28ae401c6f080e769d766ab33e3245b5d3cd1933aa7853790a06e47cbcb1d6eba688c068228348fa47a19720

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.tmp

                            Filesize

                            6KB

                            MD5

                            b06dfaf1b212ab5ed92719da56e7857d

                            SHA1

                            bfce81de60e36d12990ad294c498d9e4b704e635

                            SHA256

                            d581d27d95da34c1bb02561cc7e75fab0fc12b6fd07f6c4e1fc65c60aa5d6a92

                            SHA512

                            402088092ddc5e72a21b42afe06d233dbe0add425d421ce0352d256c6e4c6a0cbd3a655893265573acaa6e4d13b0e082216e8486af8e44c95a948cc3e48ea394

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.tmp

                            Filesize

                            15KB

                            MD5

                            023ff3fbebe17d7db0080513699f02a1

                            SHA1

                            6f810295e4bd785a0d136e568d8b978588fa25d1

                            SHA256

                            06d4236d83503fad4b206880074e9f9a9e052e71797323a72bc64cefeead7937

                            SHA512

                            966d7f91d63ba6d925f4af3f229216e0747be26bcbf425ebecfcbdb2430a7ce08696ffa50132b6e16c4bdd701b6f11257eb4cba36507e7520679f9486a41f14e

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.tmp

                            Filesize

                            15KB

                            MD5

                            6d942260e7b0dea5274e53ab0a8897e1

                            SHA1

                            8ebac9ab86053273e02ad488d7a4142bd8d6853e

                            SHA256

                            5c899b1407298b4ee268a4702f2376c41d729ff7929ca0a5638e36eb1a803642

                            SHA512

                            eb3fa6846be31687b36ab5062c0692557e749d32259bffc2000759c55a8de1bb2ed553eadf4c461eb3c2f21a8c16f00ae58fdc922776723f2a9cf09b70834019

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\pending_pings\5ee6b0ae-cecf-4ba4-a3c2-f0257c316c69

                            Filesize

                            671B

                            MD5

                            04f087e73ea914aa2f9f85c2561cca29

                            SHA1

                            37d3a5a603c1b9ea8794d69064f018cf726295c1

                            SHA256

                            5690b5a9493f7b5374d8173262eaafed21fb38c74b030a35caa3313d9a44ad12

                            SHA512

                            61ed254ff033f88f679553701a57c88f96519459223b53a44ae53c8ac408b47669550162ad3a33f40d8b548b1a2b1033916275782942aac40f0616f2da5f528c

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\pending_pings\f71254ca-32cd-43a3-978e-3d49e3533355

                            Filesize

                            26KB

                            MD5

                            0f651fac0c235fe7925f087930cb7c77

                            SHA1

                            9a958b0d1367a4afbbf77bf0d57d8aec988f2e47

                            SHA256

                            021183ad78e7b97d7de9e3df5e841be7264d483f962ef242a85f8e0b4ac19a3c

                            SHA512

                            d0b39da36097cc3759e3e8c1d5b119e8d9b7068bcc596ca8c5a4c480a6a8a4cc42626eabda6acbb33441a79e43c0259f5f36b09c05852a931e0ccd53b33cdbf5

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\pending_pings\fb942f88-5daf-496c-83b4-777e4ffabf2d

                            Filesize

                            982B

                            MD5

                            a9f023d36b73fbac152160f853ea4bbd

                            SHA1

                            2485fd2ec654a30a4e5dba89709f11df254680be

                            SHA256

                            4927c69b7d1ae155d0fc7192b4920d70b451f9cd1a52c9f55a3c8616c246702f

                            SHA512

                            ffeff60739a97e73e7cec2f461ffbc2fbd2b054b3655aa85d1599d16cf6715bb106a24f5eb4c9750de5db34480bc26f6d6b8a26c02a3eadcb3492b19ca8119da

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                            Filesize

                            1.1MB

                            MD5

                            842039753bf41fa5e11b3a1383061a87

                            SHA1

                            3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                            SHA256

                            d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                            SHA512

                            d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                            Filesize

                            116B

                            MD5

                            2a461e9eb87fd1955cea740a3444ee7a

                            SHA1

                            b10755914c713f5a4677494dbe8a686ed458c3c5

                            SHA256

                            4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                            SHA512

                            34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                            Filesize

                            372B

                            MD5

                            bf957ad58b55f64219ab3f793e374316

                            SHA1

                            a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                            SHA256

                            bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                            SHA512

                            79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                            Filesize

                            17.8MB

                            MD5

                            daf7ef3acccab478aaa7d6dc1c60f865

                            SHA1

                            f8246162b97ce4a945feced27b6ea114366ff2ad

                            SHA256

                            bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                            SHA512

                            5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\prefs-1.js

                            Filesize

                            12KB

                            MD5

                            b167938a58752486db2ab672010317c9

                            SHA1

                            0cbc88c34e52f02cdbc715ac4f0d8fbb1627c90f

                            SHA256

                            684d150e1cf7ac5db76ef7353501c63de1ed76e319d23cfd422a08ce0bb49797

                            SHA512

                            f7974ba72a911ef03ab007c3dee19bb3709c0ac3d995d521833c55bf62924f32aa698f4181faa4be9b7ec9df81f23a33fa715e9572c12d7d92d02b6c59a651fa

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\prefs-1.js

                            Filesize

                            15KB

                            MD5

                            9a1865a84063c88b83dd948d9a5e5882

                            SHA1

                            d7526a7a17d2c085dcadad2303d7c18337e03c03

                            SHA256

                            e69c2bd71c4c3122950c07af345a5a3f999424ed54fa55347ad2c665debfbc47

                            SHA512

                            ebbd16d4604fb5b00df1ceb5837a6be6685fd4b0fd814d6af80233fee64b9787d7829201567c96b2490cba9656e8304b73d0872ee66a223c40df41a07fdb4dc5

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\prefs-1.js

                            Filesize

                            10KB

                            MD5

                            10e772aeb1f06d10779e7f413779d5cf

                            SHA1

                            4c06123bf4ef6d318a4878c6435604d0ff4e0a26

                            SHA256

                            beff3d63d972354ad133c80dc99fccf15298346c6dbe547c9f4accc3d3626bd6

                            SHA512

                            630c05421f423e52b0ba98b2024ad6a827dcdbf2fad778cefda2f4344dadf38d1076260702e0a0cba948135d8debc5f2cab7989c2079a6c026269c68f904d689

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\prefs.js

                            Filesize

                            10KB

                            MD5

                            909160a22d054a0bca99bb117542972d

                            SHA1

                            f2bfcd70583ee3d1d6fa4618b761746cc10548ef

                            SHA256

                            fd4a6f8c8be5768782bd9cd6ecd3a90a562dd80a820d4ced3f233855fec71d21

                            SHA512

                            9ee0d3e884f77c22de29a89728ff7137724aa91b4c7144edcf301a6e1f6ff8547ca75de46eb732e3a0f319ac35c29d9a2fe8d654c5a0a0399cc4a3990bbfe4df

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\security_state\data.safe.bin

                            Filesize

                            2.9MB

                            MD5

                            7b1535f692d401d0f5cca7ba1ff94b95

                            SHA1

                            d18207a3afcccd5eb9c3dd63f815b4151153a543

                            SHA256

                            de7272ff340d92273c4802f29145d39a58610b25fefc4339c75493109298eac9

                            SHA512

                            70fbcdd6ffb03310892734b8ad75b71f062c7a065c8a08ec911575ac9b8e4f559c817cf7292b43e422121a52838bd7a2c6da0bf9ca6e3bcb8e758442af1f9f57

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                            Filesize

                            1.5MB

                            MD5

                            3385596340917bade7c8a39ec5b94745

                            SHA1

                            16999b80db4eada4d1ca6facf051424fb8a2328b

                            SHA256

                            118feabd614eca900a622f24755864d07a3d9e1fe0e51af2b15ed12feb518c0d

                            SHA512

                            875a4a02a06a339b5eb67681e86d63ac9c120150832a57eb0fc5aa13741b45a00f48a5a9165aec933ab2ac20a54df3fb97a1d42959f90939c728d58d47e46aa3

                          • memory/472-212-0x0000000000800000-0x0000000000EAB000-memory.dmp

                            Filesize

                            6.7MB

                          • memory/472-217-0x0000000000800000-0x0000000000EAB000-memory.dmp

                            Filesize

                            6.7MB

                          • memory/1144-34-0x0000000000C90000-0x0000000000F9F000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/1144-21-0x0000000000C90000-0x0000000000F9F000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/1684-103-0x00000000005A0000-0x0000000000A2F000-memory.dmp

                            Filesize

                            4.6MB

                          • memory/1684-39-0x00000000005A0000-0x0000000000A2F000-memory.dmp

                            Filesize

                            4.6MB

                          • memory/1684-101-0x00000000005A0000-0x0000000000A2F000-memory.dmp

                            Filesize

                            4.6MB

                          • memory/1684-138-0x00000000005A0000-0x0000000000A2F000-memory.dmp

                            Filesize

                            4.6MB

                          • memory/1724-41-0x0000000000050000-0x000000000035F000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/1724-43-0x0000000000050000-0x000000000035F000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/1780-215-0x0000000000CA0000-0x000000000112F000-memory.dmp

                            Filesize

                            4.6MB

                          • memory/1780-201-0x0000000000CA0000-0x000000000112F000-memory.dmp

                            Filesize

                            4.6MB

                          • memory/1780-124-0x0000000000CA0000-0x000000000112F000-memory.dmp

                            Filesize

                            4.6MB

                          • memory/1780-175-0x0000000000CA0000-0x000000000112F000-memory.dmp

                            Filesize

                            4.6MB

                          • memory/2600-1096-0x00007FF66CDB0000-0x00007FF66D240000-memory.dmp

                            Filesize

                            4.6MB

                          • memory/2740-963-0x0000000000DC0000-0x0000000001060000-memory.dmp

                            Filesize

                            2.6MB

                          • memory/2740-197-0x0000000000DC0000-0x0000000001060000-memory.dmp

                            Filesize

                            2.6MB

                          • memory/2740-976-0x0000000000DC0000-0x0000000001060000-memory.dmp

                            Filesize

                            2.6MB

                          • memory/2740-176-0x0000000000DC0000-0x0000000001060000-memory.dmp

                            Filesize

                            2.6MB

                          • memory/2740-196-0x0000000000DC0000-0x0000000001060000-memory.dmp

                            Filesize

                            2.6MB

                          • memory/3404-207-0x0000000000E70000-0x0000000001110000-memory.dmp

                            Filesize

                            2.6MB

                          • memory/3404-978-0x0000000000E70000-0x0000000001110000-memory.dmp

                            Filesize

                            2.6MB

                          • memory/3404-208-0x0000000000E70000-0x0000000001110000-memory.dmp

                            Filesize

                            2.6MB

                          • memory/3404-1005-0x0000000000E70000-0x0000000001110000-memory.dmp

                            Filesize

                            2.6MB

                          • memory/3404-203-0x0000000000E70000-0x0000000001110000-memory.dmp

                            Filesize

                            2.6MB

                          • memory/3656-167-0x0000000000530000-0x0000000000BDB000-memory.dmp

                            Filesize

                            6.7MB

                          • memory/3656-168-0x0000000000530000-0x0000000000BDB000-memory.dmp

                            Filesize

                            6.7MB

                          • memory/3780-130-0x0000000000260000-0x0000000000387000-memory.dmp

                            Filesize

                            1.2MB

                          • memory/3860-99-0x0000000000050000-0x000000000035F000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/3860-3861-0x0000000000050000-0x000000000035F000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/3860-1055-0x0000000000050000-0x000000000035F000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/3860-3640-0x0000000000050000-0x000000000035F000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/3860-35-0x0000000000050000-0x000000000035F000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/3860-3822-0x0000000000050000-0x000000000035F000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/3860-3828-0x0000000000050000-0x000000000035F000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/3860-3830-0x0000000000050000-0x000000000035F000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/3860-3831-0x0000000000050000-0x000000000035F000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/3860-2591-0x0000000000050000-0x000000000035F000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/3860-169-0x0000000000050000-0x000000000035F000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/3860-907-0x0000000000050000-0x000000000035F000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/3860-3832-0x0000000000050000-0x000000000035F000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/3860-102-0x0000000000050000-0x000000000035F000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/3860-3860-0x0000000000050000-0x000000000035F000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/3860-1242-0x0000000000050000-0x000000000035F000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/3872-171-0x0000000000530000-0x0000000000BDB000-memory.dmp

                            Filesize

                            6.7MB

                          • memory/3872-148-0x0000000000530000-0x0000000000BDB000-memory.dmp

                            Filesize

                            6.7MB

                          • memory/4208-100-0x00000000003E0000-0x000000000086B000-memory.dmp

                            Filesize

                            4.5MB

                          • memory/4208-149-0x00000000003E0000-0x000000000086B000-memory.dmp

                            Filesize

                            4.5MB

                          • memory/4304-170-0x0000000000370000-0x0000000000610000-memory.dmp

                            Filesize

                            2.6MB

                          • memory/4304-125-0x0000000000370000-0x0000000000610000-memory.dmp

                            Filesize

                            2.6MB

                          • memory/4304-126-0x0000000000370000-0x0000000000610000-memory.dmp

                            Filesize

                            2.6MB

                          • memory/4304-206-0x0000000000370000-0x0000000000610000-memory.dmp

                            Filesize

                            2.6MB

                          • memory/4304-108-0x0000000000370000-0x0000000000610000-memory.dmp

                            Filesize

                            2.6MB

                          • memory/4932-137-0x0000000000300000-0x00000000009AB000-memory.dmp

                            Filesize

                            6.7MB

                          • memory/4932-151-0x0000000000300000-0x00000000009AB000-memory.dmp

                            Filesize

                            6.7MB

                          • memory/10068-3848-0x00007FF691A50000-0x00007FF691EE0000-memory.dmp

                            Filesize

                            4.6MB

                          • memory/10596-2644-0x0000000000050000-0x000000000035F000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/10596-2600-0x0000000000050000-0x000000000035F000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/11284-1102-0x000001C9A8720000-0x000001C9A8742000-memory.dmp

                            Filesize

                            136KB

                          • memory/11488-3847-0x0000000140000000-0x0000000140770000-memory.dmp

                            Filesize

                            7.4MB

                          • memory/11488-3849-0x0000000140000000-0x0000000140770000-memory.dmp

                            Filesize

                            7.4MB

                          • memory/11488-3845-0x0000000140000000-0x0000000140770000-memory.dmp

                            Filesize

                            7.4MB

                          • memory/11648-2882-0x00007FF691A50000-0x00007FF691EE0000-memory.dmp

                            Filesize

                            4.6MB

                          • memory/11648-2711-0x00007FF691A50000-0x00007FF691EE0000-memory.dmp

                            Filesize

                            4.6MB

                          • memory/11652-3833-0x0000000000050000-0x000000000035F000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/11652-3837-0x0000000000050000-0x000000000035F000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/11668-2831-0x0000000002C50000-0x0000000002C70000-memory.dmp

                            Filesize

                            128KB

                          • memory/11668-2729-0x0000000140000000-0x0000000140770000-memory.dmp

                            Filesize

                            7.4MB

                          • memory/11668-2822-0x0000000140000000-0x0000000140770000-memory.dmp

                            Filesize

                            7.4MB

                          • memory/11668-2832-0x0000000140000000-0x0000000140770000-memory.dmp

                            Filesize

                            7.4MB

                          • memory/11668-2855-0x0000000140000000-0x0000000140770000-memory.dmp

                            Filesize

                            7.4MB

                          • memory/11668-2766-0x0000000140000000-0x0000000140770000-memory.dmp

                            Filesize

                            7.4MB

                          • memory/11668-2761-0x0000000140000000-0x0000000140770000-memory.dmp

                            Filesize

                            7.4MB

                          • memory/11668-2757-0x0000000140000000-0x0000000140770000-memory.dmp

                            Filesize

                            7.4MB

                          • memory/11668-2746-0x0000000140000000-0x0000000140770000-memory.dmp

                            Filesize

                            7.4MB

                          • memory/11668-2738-0x0000000140000000-0x0000000140770000-memory.dmp

                            Filesize

                            7.4MB

                          • memory/11668-2721-0x0000000140000000-0x0000000140770000-memory.dmp

                            Filesize

                            7.4MB

                          • memory/11668-2767-0x0000000140000000-0x0000000140770000-memory.dmp

                            Filesize

                            7.4MB

                          • memory/12116-1067-0x0000000000C90000-0x0000000000F30000-memory.dmp

                            Filesize

                            2.6MB

                          • memory/12116-1064-0x0000000000C90000-0x0000000000F30000-memory.dmp

                            Filesize

                            2.6MB

                          • memory/12116-967-0x0000000000C90000-0x0000000000F30000-memory.dmp

                            Filesize

                            2.6MB

                          • memory/12116-966-0x0000000000C90000-0x0000000000F30000-memory.dmp

                            Filesize

                            2.6MB

                          • memory/12116-964-0x0000000000C90000-0x0000000000F30000-memory.dmp

                            Filesize

                            2.6MB

                          • memory/12852-1119-0x0000000000400000-0x000000000064B000-memory.dmp

                            Filesize

                            2.3MB

                          • memory/12904-1059-0x0000000000400000-0x0000000000457000-memory.dmp

                            Filesize

                            348KB

                          • memory/12904-1061-0x0000000000400000-0x0000000000457000-memory.dmp

                            Filesize

                            348KB

                          • memory/12904-1057-0x0000000000400000-0x0000000000457000-memory.dmp

                            Filesize

                            348KB