Analysis

  • max time kernel
    141s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    19-12-2024 02:33

General

  • Target

    34b764f92f6aa319f62bf730e82f02a914cda5c7d7fa665c20a8f2c5430acc4a.exe

  • Size

    2.9MB

  • MD5

    17773f6ab422d27012d0f813eec77035

  • SHA1

    e148f243044c22dd5374d41d4d9c5ae066c454cf

  • SHA256

    34b764f92f6aa319f62bf730e82f02a914cda5c7d7fa665c20a8f2c5430acc4a

  • SHA512

    6e0f75cea50dd43eb019fa5eb66d7e92262b2a7fdc12ab872afbd6339c069856427ce0e7cfd86fcbf17943d7c180a15ce12a9799561330173f485cafaa4ace88

  • SSDEEP

    49152:j5i0B6cfbpQIZyuOO26+iiaSwVgQJwXBUdlOauf7w:jb6cflfSiXNOtRUxuT

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

Extracted

Family

cryptbot

C2

http://home.fivetk5vt.top/hLfzXsaqNtoEGyaUtOMJ1734

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • CryptBot

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Cryptbot family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Enumerates VirtualBox registry keys 2 TTPs 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 12 IoCs
  • XMRig Miner payload 10 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 24 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 35 IoCs
  • Identifies Wine through registry keys 2 TTPs 12 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 55 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 33 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 50 IoCs
  • Suspicious use of FindShellTrayWindow 15 IoCs
  • Suspicious use of SendNotifyMessage 13 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Views/modifies file attributes 1 TTPs 3 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1052
      • C:\Users\Admin\AppData\Local\Temp\34b764f92f6aa319f62bf730e82f02a914cda5c7d7fa665c20a8f2c5430acc4a.exe
        "C:\Users\Admin\AppData\Local\Temp\34b764f92f6aa319f62bf730e82f02a914cda5c7d7fa665c20a8f2c5430acc4a.exe"
        2⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Identifies Wine through registry keys
        • Loads dropped DLL
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:2952
        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
          "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2664
          • C:\Users\Admin\AppData\Local\Temp\1017019001\VR6f3vF.exe
            "C:\Users\Admin\AppData\Local\Temp\1017019001\VR6f3vF.exe"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:860
          • C:\Users\Admin\AppData\Local\Temp\1017024001\kf5cl0F.exe
            "C:\Users\Admin\AppData\Local\Temp\1017024001\kf5cl0F.exe"
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2472
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "powershell.exe" Add-MpPreference -ExclusionPath "C:\htauevswij"
              5⤵
              • Command and Scripting Interpreter: PowerShell
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2452
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData"
              5⤵
              • Command and Scripting Interpreter: PowerShell
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2084
          • C:\Users\Admin\AppData\Local\Temp\1017027001\ANEDNjf.exe
            "C:\Users\Admin\AppData\Local\Temp\1017027001\ANEDNjf.exe"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Modifies system certificate store
            • Suspicious behavior: EnumeratesProcesses
            PID:1008
          • C:\Users\Admin\AppData\Local\Temp\1017267001\09071d804c.exe
            "C:\Users\Admin\AppData\Local\Temp\1017267001\09071d804c.exe"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:2552
          • C:\Users\Admin\AppData\Local\Temp\1017268001\f729101a34.exe
            "C:\Users\Admin\AppData\Local\Temp\1017268001\f729101a34.exe"
            4⤵
            • Enumerates VirtualBox registry keys
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:3000
          • C:\Users\Admin\AppData\Local\Temp\1017269001\058af63d8b.exe
            "C:\Users\Admin\AppData\Local\Temp\1017269001\058af63d8b.exe"
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2180
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "powershell.exe" Add-MpPreference -ExclusionPath "C:\rgzirlmojj"
              5⤵
              • Command and Scripting Interpreter: PowerShell
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1420
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData"
              5⤵
              • Command and Scripting Interpreter: PowerShell
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1448
          • C:\Users\Admin\AppData\Local\Temp\1017270001\14156ccc49.exe
            "C:\Users\Admin\AppData\Local\Temp\1017270001\14156ccc49.exe"
            4⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2720
          • C:\Users\Admin\AppData\Local\Temp\1017271001\f0c6cdc8f3.exe
            "C:\Users\Admin\AppData\Local\Temp\1017271001\f0c6cdc8f3.exe"
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2716
            • C:\Windows\system32\cmd.exe
              cmd /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"
              5⤵
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:816
              • C:\Windows\system32\mode.com
                mode 65,10
                6⤵
                  PID:1884
                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                  7z.exe e file.zip -p24291711423417250691697322505 -oextracted
                  6⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1828
                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                  7z.exe e extracted/file_7.zip -oextracted
                  6⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1504
                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                  7z.exe e extracted/file_6.zip -oextracted
                  6⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2208
                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                  7z.exe e extracted/file_5.zip -oextracted
                  6⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2836
                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                  7z.exe e extracted/file_4.zip -oextracted
                  6⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2292
                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                  7z.exe e extracted/file_3.zip -oextracted
                  6⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1564
                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                  7z.exe e extracted/file_2.zip -oextracted
                  6⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2440
                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                  7z.exe e extracted/file_1.zip -oextracted
                  6⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of AdjustPrivilegeToken
                  PID:544
                • C:\Windows\system32\attrib.exe
                  attrib +H "in.exe"
                  6⤵
                  • Views/modifies file attributes
                  PID:896
                • C:\Users\Admin\AppData\Local\Temp\main\in.exe
                  "in.exe"
                  6⤵
                  • Executes dropped EXE
                  PID:1584
                  • C:\Windows\system32\attrib.exe
                    attrib +H +S C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                    7⤵
                    • Views/modifies file attributes
                    PID:340
                  • C:\Windows\system32\attrib.exe
                    attrib +H C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                    7⤵
                    • Views/modifies file attributes
                    PID:1448
                  • C:\Windows\system32\schtasks.exe
                    schtasks /f /CREATE /TN "Intel_PTT_EK_Recertification" /TR "C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe" /SC MINUTE
                    7⤵
                    • Scheduled Task/Job: Scheduled Task
                    PID:1116
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    powershell ping 127.0.0.1; del in.exe
                    7⤵
                    • System Network Configuration Discovery: Internet Connection Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1688
                    • C:\Windows\system32\PING.EXE
                      "C:\Windows\system32\PING.EXE" 127.0.0.1
                      8⤵
                      • System Network Configuration Discovery: Internet Connection Discovery
                      • Runs ping.exe
                      PID:2936
            • C:\Users\Admin\AppData\Local\Temp\1017272001\6dff75f80f.exe
              "C:\Users\Admin\AppData\Local\Temp\1017272001\6dff75f80f.exe"
              4⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:112
              • C:\Users\Admin\AppData\Local\Temp\1017272001\6dff75f80f.exe
                "C:\Users\Admin\AppData\Local\Temp\1017272001\6dff75f80f.exe"
                5⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:2552
            • C:\Users\Admin\AppData\Local\Temp\1017273001\2c782e8a8f.exe
              "C:\Users\Admin\AppData\Local\Temp\1017273001\2c782e8a8f.exe"
              4⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2644
              • C:\Users\Admin\AppData\Local\Temp\1017273001\2c782e8a8f.exe
                "C:\Users\Admin\AppData\Local\Temp\1017273001\2c782e8a8f.exe"
                5⤵
                • Executes dropped EXE
                PID:1688
              • C:\Users\Admin\AppData\Local\Temp\1017273001\2c782e8a8f.exe
                "C:\Users\Admin\AppData\Local\Temp\1017273001\2c782e8a8f.exe"
                5⤵
                • Executes dropped EXE
                PID:2824
              • C:\Users\Admin\AppData\Local\Temp\1017273001\2c782e8a8f.exe
                "C:\Users\Admin\AppData\Local\Temp\1017273001\2c782e8a8f.exe"
                5⤵
                • Executes dropped EXE
                PID:2760
              • C:\Users\Admin\AppData\Local\Temp\1017273001\2c782e8a8f.exe
                "C:\Users\Admin\AppData\Local\Temp\1017273001\2c782e8a8f.exe"
                5⤵
                • Executes dropped EXE
                PID:1436
              • C:\Users\Admin\AppData\Local\Temp\1017273001\2c782e8a8f.exe
                "C:\Users\Admin\AppData\Local\Temp\1017273001\2c782e8a8f.exe"
                5⤵
                • Executes dropped EXE
                PID:2276
            • C:\Users\Admin\AppData\Local\Temp\1017274001\39752ea687.exe
              "C:\Users\Admin\AppData\Local\Temp\1017274001\39752ea687.exe"
              4⤵
              • Enumerates VirtualBox registry keys
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:1940
            • C:\Users\Admin\AppData\Local\Temp\1017275001\0010d9a04c.exe
              "C:\Users\Admin\AppData\Local\Temp\1017275001\0010d9a04c.exe"
              4⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:1528
            • C:\Users\Admin\AppData\Local\Temp\1017276001\bdd91fbc6a.exe
              "C:\Users\Admin\AppData\Local\Temp\1017276001\bdd91fbc6a.exe"
              4⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:1200
            • C:\Users\Admin\AppData\Local\Temp\1017277001\1318109a07.exe
              "C:\Users\Admin\AppData\Local\Temp\1017277001\1318109a07.exe"
              4⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              PID:2728
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM firefox.exe /T
                5⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:2776
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM chrome.exe /T
                5⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:3044
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM msedge.exe /T
                5⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:2900
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM opera.exe /T
                5⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:2888
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM brave.exe /T
                5⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:1004
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                5⤵
                  PID:2908
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                    6⤵
                    • Checks processor information in registry
                    • Modifies registry class
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SendNotifyMessage
                    PID:1720
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1720.0.713271826\1099863245" -parentBuildID 20221007134813 -prefsHandle 1224 -prefMapHandle 1216 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {bb3cb0b4-9da9-4618-b9a0-25e609605afb} 1720 "\\.\pipe\gecko-crash-server-pipe.1720" 1288 122f4458 gpu
                      7⤵
                        PID:2104
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1720.1.524730424\1419609379" -parentBuildID 20221007134813 -prefsHandle 1492 -prefMapHandle 1488 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {dc850675-469c-4863-aa42-f6d3cee006ca} 1720 "\\.\pipe\gecko-crash-server-pipe.1720" 1504 e73c58 socket
                        7⤵
                          PID:1508
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1720.2.1093764820\498506320" -childID 1 -isForBrowser -prefsHandle 2112 -prefMapHandle 2108 -prefsLen 21811 -prefMapSize 233444 -jsInitHandle 896 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e7f584f9-796e-4239-aba8-cade58f75c81} 1720 "\\.\pipe\gecko-crash-server-pipe.1720" 2124 1adb3a58 tab
                          7⤵
                            PID:2556
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1720.3.1657199426\1923224909" -childID 2 -isForBrowser -prefsHandle 2920 -prefMapHandle 2916 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 896 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9e1f533a-4da9-48a6-bfd0-696800fe84c3} 1720 "\\.\pipe\gecko-crash-server-pipe.1720" 2932 1bc5a058 tab
                            7⤵
                              PID:2792
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1720.4.985122339\574983869" -childID 3 -isForBrowser -prefsHandle 3756 -prefMapHandle 3752 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 896 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {39ccffc9-e6f6-4d0f-a529-bed31a51de78} 1720 "\\.\pipe\gecko-crash-server-pipe.1720" 3768 1e82de58 tab
                              7⤵
                                PID:3052
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1720.5.1168494585\892211844" -childID 4 -isForBrowser -prefsHandle 3884 -prefMapHandle 3888 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 896 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b2a23bde-5904-4393-b77b-874e8ec7e7b6} 1720 "\\.\pipe\gecko-crash-server-pipe.1720" 3872 1f645e58 tab
                                7⤵
                                  PID:3028
                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1720.6.874338993\1066566179" -childID 5 -isForBrowser -prefsHandle 3872 -prefMapHandle 3980 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 896 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a385ba00-0b0f-4b7d-8e8b-6bc2a9c31b86} 1720 "\\.\pipe\gecko-crash-server-pipe.1720" 4172 2105ad58 tab
                                  7⤵
                                    PID:2560
                            • C:\Users\Admin\AppData\Local\Temp\1017278001\d387a4d53f.exe
                              "C:\Users\Admin\AppData\Local\Temp\1017278001\d387a4d53f.exe"
                              4⤵
                              • Modifies Windows Defender Real-time Protection settings
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Windows security modification
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2728
                            • C:\Users\Admin\AppData\Local\Temp\1017279001\657680aa6a.exe
                              "C:\Users\Admin\AppData\Local\Temp\1017279001\657680aa6a.exe"
                              4⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Suspicious use of SetThreadContext
                              • System Location Discovery: System Language Discovery
                              PID:3224
                              • C:\Users\Admin\AppData\Local\Temp\1017279001\657680aa6a.exe
                                "C:\Users\Admin\AppData\Local\Temp\1017279001\657680aa6a.exe"
                                5⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                • Suspicious behavior: EnumeratesProcesses
                                PID:3264
                            • C:\Users\Admin\AppData\Local\Temp\1017280001\eb17f04b71.exe
                              "C:\Users\Admin\AppData\Local\Temp\1017280001\eb17f04b71.exe"
                              4⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              PID:3464
                        • C:\Windows\SysWOW64\dialer.exe
                          "C:\Windows\system32\dialer.exe"
                          2⤵
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          PID:2368
                      • C:\Windows\system32\taskeng.exe
                        taskeng.exe {7EF5FC43-35BC-48D7-AF2C-8C6CB93C8FDA} S-1-5-21-1163522206-1469769407-485553996-1000:PJCSDMRP\Admin:Interactive:[1]
                        1⤵
                        • Loads dropped DLL
                        PID:2288
                        • C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                          C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                          2⤵
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          • Suspicious behavior: EnumeratesProcesses
                          PID:1568
                          • C:\Windows\explorer.exe
                            explorer.exe
                            3⤵
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1772
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            powershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe
                            3⤵
                            • Drops file in System32 directory
                            • System Network Configuration Discovery: Internet Connection Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2000
                            • C:\Windows\system32\PING.EXE
                              "C:\Windows\system32\PING.EXE" 127.1.10.1
                              4⤵
                              • System Network Configuration Discovery: Internet Connection Discovery
                              • Runs ping.exe
                              PID:2376

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\z3l10m6w.default-release\activity-stream.discovery_stream.json.tmp

                        Filesize

                        31KB

                        MD5

                        7c35f2ce458132901c26f7565d35f87e

                        SHA1

                        7a4d44f980a0db5fc3d1d090adc211ec4100cb4e

                        SHA256

                        664e9caddec9691fc6a575ca845fc3480d9a9e8480a87994fb39ec8ea1f221b7

                        SHA512

                        d0ac89ac85c9182a77f7c1dca53fe15a56bb783940c9dcd8c893370ef310bb53915a44143dca488865f10a1b4257aba02824952cfbedcd1888c34e5e2d8f2e7e

                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\z3l10m6w.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                        Filesize

                        15KB

                        MD5

                        96c542dec016d9ec1ecc4dddfcbaac66

                        SHA1

                        6199f7648bb744efa58acf7b96fee85d938389e4

                        SHA256

                        7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                        SHA512

                        cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                      • C:\Users\Admin\AppData\Local\Temp\1017019001\VR6f3vF.exe

                        Filesize

                        1.8MB

                        MD5

                        ff279f4e5b1c6fbda804d2437c2dbdc8

                        SHA1

                        2feb3762c877a5ae3ca60eeebc37003ad0844245

                        SHA256

                        e115298ab160da9c7a998e4ae0b72333f64b207da165134ca45eb997a000d378

                        SHA512

                        c7a8bbcb122b2c7b57c8b678c5eed075ee5e7c355afbf86238282d2d3458019da1a8523520e1a1c631cd01b555f7df340545fd1e44ad678dc97c40b23428f967

                      • C:\Users\Admin\AppData\Local\Temp\1017024001\kf5cl0F.exe

                        Filesize

                        21KB

                        MD5

                        14becdf1e2402e9aa6c2be0e6167041e

                        SHA1

                        72cbbae6878f5e06060a0038b25ede93b445f0df

                        SHA256

                        7a769963165063758f15f6e0cece25c9d13072f67fa0d3c25a03a5104fe0783a

                        SHA512

                        16b837615505f352e134afd9d8655c9cabfa5bfcfbee2c0c34f2d7d9588aa71f875e4e5feb8cdf0f7bacc00f7c1ca8dabd3b3d92afc99abf705c05c78e298b4a

                      • C:\Users\Admin\AppData\Local\Temp\1017027001\ANEDNjf.exe

                        Filesize

                        1.8MB

                        MD5

                        25fb9c54265bbacc7a055174479f0b70

                        SHA1

                        4af069a2ec874703a7e29023d23a1ada491b584e

                        SHA256

                        552f8be2c6b2208a89c728f68488930c661b3a06c35a20d133ef7d3c63a86b9c

                        SHA512

                        7dfd9e0f3fa2d68a6ce8c952e3b755559db73bb7a06c95ad6ed8ac16dedb49be8b8337afc07c9c682f0c4be9db291a551286353e2e2b624223487dc1c8b54668

                      • C:\Users\Admin\AppData\Local\Temp\1017268001\f729101a34.exe

                        Filesize

                        4.3MB

                        MD5

                        d6cfec5f8c250d92d751030c95d46aec

                        SHA1

                        70439cf2611f97c84af487c44b88703d004a2bca

                        SHA256

                        0200c5657794ccc0916aae772004b7f72a793b77dc807b51b2f88e597813f611

                        SHA512

                        a939f9af174d37e3d32d0794b1f14110deffd7847b884a79b5fd300bcc7c30ce285f6dbbc41ad6ab5bd237bb6353efb7ddee903a8ec155a10840dec8c25d9bbb

                      • C:\Users\Admin\AppData\Local\Temp\1017270001\14156ccc49.exe

                        Filesize

                        1.9MB

                        MD5

                        d6070b7d0ec34e67a998dbe217c6c746

                        SHA1

                        64e771f2bcb20e9ccc89c8b4a9cf1b36e431d491

                        SHA256

                        10b27d9cb387fa4ac371de8767d5204925ca4da9c490ea8e2491b1a60c49fd85

                        SHA512

                        52bc768f8654cef43e62abfdba30878313aea5893d80759c633d84ce01c701b05e6f24c995f3a2568ab16ca69e6c1223b7e39c74c509fd6607bfa5e9418784f3

                      • C:\Users\Admin\AppData\Local\Temp\1017271001\f0c6cdc8f3.exe

                        Filesize

                        4.2MB

                        MD5

                        3a425626cbd40345f5b8dddd6b2b9efa

                        SHA1

                        7b50e108e293e54c15dce816552356f424eea97a

                        SHA256

                        ba9212d2d5cd6df5eb7933fb37c1b72a648974c1730bf5c32439987558f8e8b1

                        SHA512

                        a7538c6b7e17c35f053721308b8d6dc53a90e79930ff4ed5cffecaa97f4d0fbc5f9e8b59f1383d8f0699c8d4f1331f226af71d40325022d10b885606a72fe668

                      • C:\Users\Admin\AppData\Local\Temp\1017272001\6dff75f80f.exe

                        Filesize

                        747KB

                        MD5

                        8a9cb17c0224a01bd34b46495983c50a

                        SHA1

                        00296ea6a56f6e10a0f1450a20c5fb329b8856c1

                        SHA256

                        3d51b9523b387859bc0d94246dfb216cfa82f9d650c8d11be11ed67f70e7440b

                        SHA512

                        1472e4670f469c43227b965984ecc223a526f6284363d8e08a3b5b55e602ccce62df4bc49939ee5bd7df7b0c26e20da896b084eccab767f8728e6bf14d71c840

                      • C:\Users\Admin\AppData\Local\Temp\1017273001\2c782e8a8f.exe

                        Filesize

                        3.1MB

                        MD5

                        c00a67d527ef38dc6f49d0ad7f13b393

                        SHA1

                        7b8f2de130ab5e4e59c3c2f4a071bda831ac219d

                        SHA256

                        12226ccae8c807641241ba5178d853aad38984eefb0c0c4d65abc4da3f9787c3

                        SHA512

                        9286d267b167cba01e55e68c8c5582f903bed0dd8bc4135eb528ef6814e60e7d4dda2b3611e13efb56aa993635fbab218b0885daf5daea6043061d8384af40ca

                      • C:\Users\Admin\AppData\Local\Temp\1017274001\39752ea687.exe

                        Filesize

                        4.3MB

                        MD5

                        aa1d9bfcb4fee4ff65cf6209fbc83204

                        SHA1

                        3334182b3bf48e928683a9c0a87d25ea57e8d70b

                        SHA256

                        dc645ba585c2d41ec553cefd46bd3dab212882cb07097905f9ed071e8882b161

                        SHA512

                        aec316f0ea02349b57a5e75a972edf70b8aea705a7c74f67452a5840834fca0cf70c3d099ca003bab73a25186e6f03298ea68440a03216fb40ece74b82f71d68

                      • C:\Users\Admin\AppData\Local\Temp\1017275001\0010d9a04c.exe

                        Filesize

                        1.8MB

                        MD5

                        e4df8d6d78a56d3e55389122ad4462f1

                        SHA1

                        52285e11ba9da28304f4c50fc1b426289da7e96c

                        SHA256

                        db1b86e4c5f75b2bd9ddaf1b3a259fbd27145dcd3e666278b0e16cc973f1ce21

                        SHA512

                        6649dcdae7235930f0656c9e03e37e2c9e080e54417659c8861452e79dde18446d1d7e9e28a33fab4e7562d3d987f12a9ad2aafae298b9ae5db0829fd0859bbb

                      • C:\Users\Admin\AppData\Local\Temp\1017276001\bdd91fbc6a.exe

                        Filesize

                        2.8MB

                        MD5

                        dfc4ac821d77ac74e88a8d6806f3b381

                        SHA1

                        328c4646185f83623b64acc275314337cb8507af

                        SHA256

                        f1fa0545bde183d84cb9b24d6635ffb5ab98bd398659e92adcbb5dc90064531d

                        SHA512

                        5aee1cf473a623a0b6c659a337d1960e395d67c94fc54a230b9b70936f2ad2bf983547f9c76e13ff20c37fb34dd8185cd8e5d96979f91f9749626e6fa902a2fe

                      • C:\Users\Admin\AppData\Local\Temp\1017277001\1318109a07.exe

                        Filesize

                        950KB

                        MD5

                        5e10cd3b6e6e8d90290cb0249243b486

                        SHA1

                        143c4cd03751b271722ee2a62011326fc84b6b15

                        SHA256

                        a32634a27aa716060ee631f6ccb3c6f2ea71f94838b124024bb22e5fc5330650

                        SHA512

                        c8a2779a5a5c1b050434ab8c75975aa1ef1ea3a5383a54a401d69dcbdbc0fa12026d5ec8fccd5f975ed47db8bcfff77be683a02dfb989ef5dae88be698d911b1

                      • C:\Users\Admin\AppData\Local\Temp\1017278001\d387a4d53f.exe

                        Filesize

                        1.7MB

                        MD5

                        5ee16489ab5a0d6cf49a20e9fdae3681

                        SHA1

                        b531e0dd6cf1ec02f0bebf334e0a8ca286a12cf3

                        SHA256

                        85e590af5f8e19dd85fd3471dcffb1ea1fa0f6cc3084ef50c6b44f02244e1075

                        SHA512

                        e923a07668fc965eed5adc066cb1991ce8517bd633348da37f7ae32c46624ef29d3d9d8145bbcad9b2112304387a8b348fe37deb700c384b0185595f64a48bfe

                      • C:\Users\Admin\AppData\Local\Temp\1017279001\657680aa6a.exe

                        Filesize

                        758KB

                        MD5

                        afd936e441bf5cbdb858e96833cc6ed3

                        SHA1

                        3491edd8c7caf9ae169e21fb58bccd29d95aefef

                        SHA256

                        c6491d7a6d70c7c51baca7436464667b4894e4989fa7c5e05068dde4699e1cbf

                        SHA512

                        928c15a1eda602b2a66a53734f3f563ab9626882104e30ee2bf5106cfd6e08ec54f96e3063f1ab89bf13be2c8822a8419f5d8ee0a3583a4c479785226051a325

                      • C:\Users\Admin\AppData\Local\Temp\CabA44D.tmp

                        Filesize

                        70KB

                        MD5

                        49aebf8cbd62d92ac215b2923fb1b9f5

                        SHA1

                        1723be06719828dda65ad804298d0431f6aff976

                        SHA256

                        b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                        SHA512

                        bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                      • C:\Users\Admin\AppData\Local\Temp\TarA4AD.tmp

                        Filesize

                        181KB

                        MD5

                        4ea6026cf93ec6338144661bf1202cd1

                        SHA1

                        a1dec9044f750ad887935a01430bf49322fbdcb7

                        SHA256

                        8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                        SHA512

                        6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                      • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

                        Filesize

                        1.6MB

                        MD5

                        72491c7b87a7c2dd350b727444f13bb4

                        SHA1

                        1e9338d56db7ded386878eab7bb44b8934ab1bc7

                        SHA256

                        34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

                        SHA512

                        583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

                      • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_3.zip

                        Filesize

                        1.7MB

                        MD5

                        5eb39ba3698c99891a6b6eb036cfb653

                        SHA1

                        d2f1cdd59669f006a2f1aa9214aeed48bc88c06e

                        SHA256

                        e77f5e03ae140dda27d73e1ffe43f7911e006a108cf51cbd0e05d73aa92da7c2

                        SHA512

                        6c4ca20e88d49256ed9cabec0d1f2b00dfcf3d1603b5c95d158d4438c9f1e58495f8dfa200dbe7f49b5b0dd57886517eb3b98c4190484548720dad4b3db6069e

                      • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_4.zip

                        Filesize

                        1.7MB

                        MD5

                        7187cc2643affab4ca29d92251c96dee

                        SHA1

                        ab0a4de90a14551834e12bb2c8c6b9ee517acaf4

                        SHA256

                        c7e92a1af295307fb92ad534e05fba879a7cf6716f93aefca0ebfcb8cee7a830

                        SHA512

                        27985d317a5c844871ffb2527d04aa50ef7442b2f00d69d5ab6bbb85cd7be1d7057ffd3151d0896f05603677c2f7361ed021eac921e012d74da049ef6949e3a3

                      • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_5.zip

                        Filesize

                        1.7MB

                        MD5

                        b7d1e04629bec112923446fda5391731

                        SHA1

                        814055286f963ddaa5bf3019821cb8a565b56cb8

                        SHA256

                        4da77d4ee30ad0cd56cd620f4e9dc4016244ace015c5b4b43f8f37dd8e3a8789

                        SHA512

                        79fc3606b0fe6a1e31a2ecacc96623caf236bf2be692dadab6ea8ffa4af4231d782094a63b76631068364ac9b6a872b02f1e080636eba40ed019c2949a8e28db

                      • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_6.zip

                        Filesize

                        1.7MB

                        MD5

                        0dc4014facf82aa027904c1be1d403c1

                        SHA1

                        5e6d6c020bfc2e6f24f3d237946b0103fe9b1831

                        SHA256

                        a29ddd29958c64e0af1a848409e97401307277bb6f11777b1cfb0404a6226de7

                        SHA512

                        cbeead189918657cc81e844ed9673ee8f743aed29ad9948e90afdfbecacc9c764fbdbfb92e8c8ceb5ae47cee52e833e386a304db0572c7130d1a54fd9c2cc028

                      • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_7.zip

                        Filesize

                        3.3MB

                        MD5

                        cea368fc334a9aec1ecff4b15612e5b0

                        SHA1

                        493d23f72731bb570d904014ffdacbba2334ce26

                        SHA256

                        07e38cad68b0cdbea62f55f9bc6ee80545c2e1a39983baa222e8af788f028541

                        SHA512

                        bed35a1cc56f32e0109ea5a02578489682a990b5cefa58d7cf778815254af9849e731031e824adba07c86c8425df58a1967ac84ce004c62e316a2e51a75c8748

                      • C:\Users\Admin\AppData\Local\Temp\main\file.bin

                        Filesize

                        3.3MB

                        MD5

                        045b0a3d5be6f10ddf19ae6d92dfdd70

                        SHA1

                        0387715b6681d7097d372cd0005b664f76c933c7

                        SHA256

                        94b392e94fa47d1b9b7ae6a29527727268cc2e3484e818c23608f8835bc1104d

                        SHA512

                        58255a755531791b888ffd9b663cc678c63d5caa932260e9546b1b10a8d54208334725c14529116b067bcf5a5e02da85e015a3bed80092b7698a43dab0168c7b

                      • C:\Users\Admin\AppData\Local\Temp\main\main.bat

                        Filesize

                        440B

                        MD5

                        3626532127e3066df98e34c3d56a1869

                        SHA1

                        5fa7102f02615afde4efd4ed091744e842c63f78

                        SHA256

                        2a0e18ef585db0802269b8c1ddccb95ce4c0bac747e207ee6131dee989788bca

                        SHA512

                        dcce66d6e24d5a4a352874144871cd73c327e04c1b50764399457d8d70a9515f5bc0a650232763bf34d4830bab70ee4539646e7625cfe5336a870e311043b2bd

                      • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                        Filesize

                        442KB

                        MD5

                        85430baed3398695717b0263807cf97c

                        SHA1

                        fffbee923cea216f50fce5d54219a188a5100f41

                        SHA256

                        a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e

                        SHA512

                        06511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1

                      • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                        Filesize

                        8.0MB

                        MD5

                        a01c5ecd6108350ae23d2cddf0e77c17

                        SHA1

                        c6ac28a2cd979f1f9a75d56271821d5ff665e2b6

                        SHA256

                        345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42

                        SHA512

                        b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72

                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

                        Filesize

                        7KB

                        MD5

                        82fdb951405d8d4297a4246183bfcd25

                        SHA1

                        7df9d21c110b152de5b1aa88002dffad35639073

                        SHA256

                        3aa6323b4458ef58e60c6fbb75eebc6c60e37b612123dfcebdfa12372d93ee7a

                        SHA512

                        8ddbb4eddd84890adbbed090483700480a1dfc593fef9126cccf7ab442fae7a2ccb6c229d65c9e5391a23ec702957e5dc6fe95888d7a40d64bbe0cee88c4d184

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\datareporting\glean\db\data.safe.bin

                        Filesize

                        9KB

                        MD5

                        11ea51c7937b2a1b22c3f032459a8a17

                        SHA1

                        c1d2f61f958ab1db6b8c0e6bea9faa174e9a341b

                        SHA256

                        06921f31903e5ee0eba72e16b9c8ab3504998f6d8b943948f225c9a29556b117

                        SHA512

                        3db817d252d8583f270007dd1c975dad3cf0ef016ac0f362e1c902cd667923ea40aee50954bf8cc70d29e158493237cb112a35b5dd1c8afb213eedd36fafc730

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\datareporting\glean\pending_pings\71e6a15b-de82-4eb2-9d90-4ea1e8325c91

                        Filesize

                        733B

                        MD5

                        03e6b1f25f1886a5f80cf80a7229e1c2

                        SHA1

                        89a123109a0db00a6c29e9fca5455aa7e9794275

                        SHA256

                        73e5d578175af9e532f170a7b5b286a588812d32e02ac255382c217f43345978

                        SHA512

                        3d8a8faf61d05e1d982e772d7a3bf2a4d952505d80ba9938cd089eeebd1b2a6fbf536de6e12dd2ccfcaaa2db9a842dc01662b2ee4968b0ecd4c03be37bfeda8e

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll

                        Filesize

                        997KB

                        MD5

                        fe3355639648c417e8307c6d051e3e37

                        SHA1

                        f54602d4b4778da21bc97c7238fc66aa68c8ee34

                        SHA256

                        1ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e

                        SHA512

                        8f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info

                        Filesize

                        116B

                        MD5

                        3d33cdc0b3d281e67dd52e14435dd04f

                        SHA1

                        4db88689282fd4f9e9e6ab95fcbb23df6e6485db

                        SHA256

                        f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b

                        SHA512

                        a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt

                        Filesize

                        479B

                        MD5

                        49ddb419d96dceb9069018535fb2e2fc

                        SHA1

                        62aa6fea895a8b68d468a015f6e6ab400d7a7ca6

                        SHA256

                        2af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539

                        SHA512

                        48386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json

                        Filesize

                        372B

                        MD5

                        8be33af717bb1b67fbd61c3f4b807e9e

                        SHA1

                        7cf17656d174d951957ff36810e874a134dd49e0

                        SHA256

                        e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd

                        SHA512

                        6125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll

                        Filesize

                        11.8MB

                        MD5

                        33bf7b0439480effb9fb212efce87b13

                        SHA1

                        cee50f2745edc6dc291887b6075ca64d716f495a

                        SHA256

                        8ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e

                        SHA512

                        d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib

                        Filesize

                        1KB

                        MD5

                        688bed3676d2104e7f17ae1cd2c59404

                        SHA1

                        952b2cdf783ac72fcb98338723e9afd38d47ad8e

                        SHA256

                        33899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237

                        SHA512

                        7a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig

                        Filesize

                        1KB

                        MD5

                        937326fead5fd401f6cca9118bd9ade9

                        SHA1

                        4526a57d4ae14ed29b37632c72aef3c408189d91

                        SHA256

                        68a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81

                        SHA512

                        b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\prefs-1.js

                        Filesize

                        6KB

                        MD5

                        d1f446a9c394953b9d0c2fa7faf4a505

                        SHA1

                        0e38df559d13d691a745c1d9fd484a92dc1b15ab

                        SHA256

                        7f8c782e2945e40003f087cc1d4a2538895e44b8c1daa092f90df47f1c000c81

                        SHA512

                        103f48a5f5838dc3ebe4cf854a1201be37eb3f16be31c6e9af556098e2accf461c83bed11218371c8198885c283b6539b2161953673963bb56f6125ac24b3dd1

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\prefs-1.js

                        Filesize

                        7KB

                        MD5

                        a82e3e9d329dd4dbcde18eb078f798d1

                        SHA1

                        8bd5d0c947af26f5afdae60f2b5d11aa60cd5a79

                        SHA256

                        2645537ce7b8be66d3a2ed2dd8d3663c34ed82e35b1785161c28e3b10f1fdc7a

                        SHA512

                        c09cd24f7370cf824bc3f308f2f44ce09f53f90ebca249dc3230720e40fc04da4d1700c91a23e0df7928aceb228bd5fe1c40490a4ecfac8bf0f3861dd0ee6aa0

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\prefs-1.js

                        Filesize

                        7KB

                        MD5

                        0c0db2f5ef6b5f09a0fc1ee33e696402

                        SHA1

                        a93345837549e8916d1f87cb5f5fc9f260a7bdd4

                        SHA256

                        72126466cf398ed333595d5386324cc611d61fbdbc5fd6f8a540eb8ebcd1363a

                        SHA512

                        719748ba76d70f10029a14193c5931b31bd31e1ec8d617c25cfcfffa6a93f67283da744df00f0eb018ac0e5c081a88e676e4a86e536134b7b270a951a20d9c7e

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\prefs.js

                        Filesize

                        6KB

                        MD5

                        d0a8f6260b168610074b518a21f79b97

                        SHA1

                        ac9d15bf6134e9542ae36c9ad474a799b7231c74

                        SHA256

                        7c0d558b54fe3b644e27615bc08a418587309462291ab725cf67633c6d26550e

                        SHA512

                        a8e9ad232556d4e8bd3e234fe3edf0ed75860fd0a9a832b54fc08e104fda21315692082b1941f42735446e319b6eeeef11a62810e36db36ce46e81db9be62ec0

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\sessionstore-backups\recovery.jsonlz4

                        Filesize

                        4KB

                        MD5

                        aabb05ab2a9037def26c4efe28c752c1

                        SHA1

                        934cef6ce33a9841b74eb2f1d1699327b57aeeb3

                        SHA256

                        6613ffe1db62ce45a207f72b4807894ac35bdfe79e73bf68130bfcb197e55abc

                        SHA512

                        4f7b3f0643f8c5332de8eaa09bada4d0b1ee0cb76ce8df16b6bf1039b35a7275fb6437a432ca0e39be59210d5e8af82240485cc7e56f3867b078e1d5314f5505

                      • \Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                        Filesize

                        2.9MB

                        MD5

                        17773f6ab422d27012d0f813eec77035

                        SHA1

                        e148f243044c22dd5374d41d4d9c5ae066c454cf

                        SHA256

                        34b764f92f6aa319f62bf730e82f02a914cda5c7d7fa665c20a8f2c5430acc4a

                        SHA512

                        6e0f75cea50dd43eb019fa5eb66d7e92262b2a7fdc12ab872afbd6339c069856427ce0e7cfd86fcbf17943d7c180a15ce12a9799561330173f485cafaa4ace88

                      • \Users\Admin\AppData\Local\Temp\main\7z.exe

                        Filesize

                        458KB

                        MD5

                        619f7135621b50fd1900ff24aade1524

                        SHA1

                        6c7ea8bbd435163ae3945cbef30ef6b9872a4591

                        SHA256

                        344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

                        SHA512

                        2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

                      • memory/860-42-0x0000000000920000-0x0000000000DC6000-memory.dmp

                        Filesize

                        4.6MB

                      • memory/860-124-0x0000000000920000-0x0000000000DC6000-memory.dmp

                        Filesize

                        4.6MB

                      • memory/1008-85-0x00000000003A0000-0x000000000084B000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/1008-149-0x00000000003A0000-0x000000000084B000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/1008-147-0x00000000003A0000-0x000000000084B000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/1008-150-0x00000000003A0000-0x000000000084B000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/1200-434-0x00000000001D0000-0x00000000006D2000-memory.dmp

                        Filesize

                        5.0MB

                      • memory/1528-410-0x0000000000030000-0x00000000004EF000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/1568-409-0x000000013F1C0000-0x000000013F650000-memory.dmp

                        Filesize

                        4.6MB

                      • memory/1584-327-0x000000013F190000-0x000000013F620000-memory.dmp

                        Filesize

                        4.6MB

                      • memory/1688-333-0x0000000000560000-0x0000000000568000-memory.dmp

                        Filesize

                        32KB

                      • memory/1688-332-0x000000001B7D0000-0x000000001BAB2000-memory.dmp

                        Filesize

                        2.9MB

                      • memory/1772-402-0x0000000140000000-0x0000000140770000-memory.dmp

                        Filesize

                        7.4MB

                      • memory/1772-430-0x0000000140000000-0x0000000140770000-memory.dmp

                        Filesize

                        7.4MB

                      • memory/1772-400-0x0000000140000000-0x0000000140770000-memory.dmp

                        Filesize

                        7.4MB

                      • memory/1772-403-0x0000000140000000-0x0000000140770000-memory.dmp

                        Filesize

                        7.4MB

                      • memory/1772-406-0x0000000140000000-0x0000000140770000-memory.dmp

                        Filesize

                        7.4MB

                      • memory/1772-407-0x0000000140000000-0x0000000140770000-memory.dmp

                        Filesize

                        7.4MB

                      • memory/1772-433-0x0000000140000000-0x0000000140770000-memory.dmp

                        Filesize

                        7.4MB

                      • memory/1772-405-0x0000000140000000-0x0000000140770000-memory.dmp

                        Filesize

                        7.4MB

                      • memory/1772-404-0x0000000140000000-0x0000000140770000-memory.dmp

                        Filesize

                        7.4MB

                      • memory/1772-401-0x0000000140000000-0x0000000140770000-memory.dmp

                        Filesize

                        7.4MB

                      • memory/1772-431-0x00000000001B0000-0x00000000001D0000-memory.dmp

                        Filesize

                        128KB

                      • memory/1772-432-0x0000000140000000-0x0000000140770000-memory.dmp

                        Filesize

                        7.4MB

                      • memory/1940-398-0x0000000000B70000-0x00000000016D1000-memory.dmp

                        Filesize

                        11.4MB

                      • memory/1940-399-0x0000000000B70000-0x00000000016D1000-memory.dmp

                        Filesize

                        11.4MB

                      • memory/2000-415-0x000000001B5D0000-0x000000001B8B2000-memory.dmp

                        Filesize

                        2.9MB

                      • memory/2000-416-0x0000000002810000-0x0000000002818000-memory.dmp

                        Filesize

                        32KB

                      • memory/2180-189-0x0000000000CF0000-0x0000000000CFC000-memory.dmp

                        Filesize

                        48KB

                      • memory/2368-229-0x0000000000080000-0x000000000008A000-memory.dmp

                        Filesize

                        40KB

                      • memory/2368-233-0x0000000077B90000-0x0000000077D39000-memory.dmp

                        Filesize

                        1.7MB

                      • memory/2368-235-0x0000000077150000-0x0000000077197000-memory.dmp

                        Filesize

                        284KB

                      • memory/2368-232-0x0000000001EE0000-0x00000000022E0000-memory.dmp

                        Filesize

                        4.0MB

                      • memory/2472-59-0x0000000000D00000-0x0000000000D0C000-memory.dmp

                        Filesize

                        48KB

                      • memory/2552-200-0x0000000000DD0000-0x0000000001276000-memory.dmp

                        Filesize

                        4.6MB

                      • memory/2552-347-0x0000000000400000-0x0000000000455000-memory.dmp

                        Filesize

                        340KB

                      • memory/2552-351-0x0000000000400000-0x0000000000455000-memory.dmp

                        Filesize

                        340KB

                      • memory/2552-143-0x0000000000DD0000-0x0000000001276000-memory.dmp

                        Filesize

                        4.6MB

                      • memory/2552-154-0x0000000000DD0000-0x0000000001276000-memory.dmp

                        Filesize

                        4.6MB

                      • memory/2552-153-0x0000000000DD0000-0x0000000001276000-memory.dmp

                        Filesize

                        4.6MB

                      • memory/2552-353-0x0000000000400000-0x0000000000455000-memory.dmp

                        Filesize

                        340KB

                      • memory/2552-355-0x0000000000400000-0x0000000000455000-memory.dmp

                        Filesize

                        340KB

                      • memory/2552-349-0x0000000000400000-0x0000000000455000-memory.dmp

                        Filesize

                        340KB

                      • memory/2552-358-0x0000000000400000-0x0000000000455000-memory.dmp

                        Filesize

                        340KB

                      • memory/2552-359-0x0000000000400000-0x0000000000455000-memory.dmp

                        Filesize

                        340KB

                      • memory/2552-357-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

                        Filesize

                        4KB

                      • memory/2644-435-0x0000000005940000-0x0000000005A96000-memory.dmp

                        Filesize

                        1.3MB

                      • memory/2644-372-0x0000000000360000-0x0000000000688000-memory.dmp

                        Filesize

                        3.2MB

                      • memory/2644-436-0x0000000000690000-0x00000000006B2000-memory.dmp

                        Filesize

                        136KB

                      • memory/2664-171-0x00000000068D0000-0x00000000074B5000-memory.dmp

                        Filesize

                        11.9MB

                      • memory/2664-141-0x00000000068D0000-0x0000000006D76000-memory.dmp

                        Filesize

                        4.6MB

                      • memory/2664-360-0x0000000000100000-0x0000000000423000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2664-373-0x0000000000100000-0x0000000000423000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2664-148-0x00000000068D0000-0x0000000006D7B000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/2664-385-0x0000000000100000-0x0000000000423000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2664-146-0x0000000000100000-0x0000000000423000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2664-397-0x0000000000100000-0x0000000000423000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2664-152-0x00000000068D0000-0x0000000006D76000-memory.dmp

                        Filesize

                        4.6MB

                      • memory/2664-17-0x0000000000100000-0x0000000000423000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2664-173-0x00000000068D0000-0x00000000074B5000-memory.dmp

                        Filesize

                        11.9MB

                      • memory/2664-18-0x0000000000101000-0x000000000012F000-memory.dmp

                        Filesize

                        184KB

                      • memory/2664-174-0x0000000000100000-0x0000000000423000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2664-289-0x0000000000100000-0x0000000000423000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2664-145-0x00000000068D0000-0x0000000006D7B000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/2664-217-0x00000000068D0000-0x00000000074B5000-memory.dmp

                        Filesize

                        11.9MB

                      • memory/2664-218-0x00000000068D0000-0x0000000006D92000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/2664-19-0x0000000000100000-0x0000000000423000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2664-220-0x00000000068D0000-0x0000000006D92000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/2664-44-0x0000000000100000-0x0000000000423000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2664-21-0x0000000000100000-0x0000000000423000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2664-221-0x00000000068D0000-0x00000000074B5000-memory.dmp

                        Filesize

                        11.9MB

                      • memory/2664-239-0x00000000068D0000-0x0000000006D92000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/2664-30-0x0000000000100000-0x0000000000423000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2664-237-0x0000000000100000-0x0000000000423000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2664-38-0x00000000068D0000-0x0000000006D76000-memory.dmp

                        Filesize

                        4.6MB

                      • memory/2664-39-0x00000000068D0000-0x0000000006D76000-memory.dmp

                        Filesize

                        4.6MB

                      • memory/2664-142-0x00000000068D0000-0x0000000006D76000-memory.dmp

                        Filesize

                        4.6MB

                      • memory/2664-151-0x00000000068D0000-0x0000000006D76000-memory.dmp

                        Filesize

                        4.6MB

                      • memory/2664-605-0x0000000000100000-0x0000000000423000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2664-123-0x00000000068D0000-0x0000000006D76000-memory.dmp

                        Filesize

                        4.6MB

                      • memory/2664-448-0x0000000000100000-0x0000000000423000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2664-84-0x00000000068D0000-0x0000000006D7B000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/2664-87-0x00000000068D0000-0x0000000006D7B000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/2664-86-0x00000000068D0000-0x0000000006D76000-memory.dmp

                        Filesize

                        4.6MB

                      • memory/2664-60-0x0000000000100000-0x0000000000423000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2664-41-0x0000000000100000-0x0000000000423000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2720-230-0x0000000000EA0000-0x0000000001362000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/2720-222-0x0000000004C20000-0x0000000005020000-memory.dmp

                        Filesize

                        4.0MB

                      • memory/2720-223-0x0000000004C20000-0x0000000005020000-memory.dmp

                        Filesize

                        4.0MB

                      • memory/2720-224-0x0000000077B90000-0x0000000077D39000-memory.dmp

                        Filesize

                        1.7MB

                      • memory/2720-226-0x0000000077150000-0x0000000077197000-memory.dmp

                        Filesize

                        284KB

                      • memory/2728-597-0x0000000000ED0000-0x000000000133E000-memory.dmp

                        Filesize

                        4.4MB

                      • memory/2728-598-0x0000000000ED0000-0x000000000133E000-memory.dmp

                        Filesize

                        4.4MB

                      • memory/2952-16-0x0000000006BF0000-0x0000000006F13000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2952-0-0x0000000000BD0000-0x0000000000EF3000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2952-15-0x0000000000BD0000-0x0000000000EF3000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2952-5-0x0000000000BD0000-0x0000000000EF3000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2952-3-0x0000000000BD0000-0x0000000000EF3000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2952-2-0x0000000000BD1000-0x0000000000BFF000-memory.dmp

                        Filesize

                        184KB

                      • memory/2952-1-0x0000000077D80000-0x0000000077D82000-memory.dmp

                        Filesize

                        8KB

                      • memory/3000-236-0x0000000000BE0000-0x00000000017C5000-memory.dmp

                        Filesize

                        11.9MB

                      • memory/3000-238-0x0000000000BE0000-0x00000000017C5000-memory.dmp

                        Filesize

                        11.9MB

                      • memory/3000-219-0x0000000000BE0000-0x00000000017C5000-memory.dmp

                        Filesize

                        11.9MB

                      • memory/3000-172-0x0000000000BE0000-0x00000000017C5000-memory.dmp

                        Filesize

                        11.9MB

                      • memory/3264-621-0x0000000000400000-0x0000000000456000-memory.dmp

                        Filesize

                        344KB

                      • memory/3264-619-0x0000000000400000-0x0000000000456000-memory.dmp

                        Filesize

                        344KB