Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-12-2024 02:01

General

  • Target

    003b43813ec5522429efc587a873871a2d6fc14c4c9c6008a7d27bce0920db19.exe

  • Size

    2.9MB

  • MD5

    4072633a022e6587009b5ca189ff4613

  • SHA1

    d54d3cf0878186b3b8230f1f0b8188bf1bcd738e

  • SHA256

    003b43813ec5522429efc587a873871a2d6fc14c4c9c6008a7d27bce0920db19

  • SHA512

    136ebcb816217cecb81f5b521b7102d54eb17f4f0685ab003e7013cbff75e7074ee93a086f847c5a0f9f0c3f2eb8c5c5706b07fe119182c86d2007699a98f700

  • SSDEEP

    49152:1gK4zTjzmIGvbESuW1QoEi9YJlYAWA9XMv3MaDUyHAHE:p4zTGBvoSuW1Qof9lAWA9Xw3Ma4E

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

Extracted

Family

amadey

Version

4.41

Botnet

fed3aa

C2

http://185.215.113.16

Attributes
  • install_dir

    44111dbc49

  • install_file

    axplong.exe

  • strings_key

    8d0ad6945b1a30a186ec2d30be6db0b5

  • url_paths

    /Jo89Ku7d/index.php

rc4.plain

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

lumma

C2

https://atten-supporse.biz/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • Enumerates VirtualBox registry keys 2 TTPs 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 19 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 38 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 43 IoCs
  • Identifies Wine through registry keys 2 TTPs 19 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 64 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 19 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 42 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 51 IoCs
  • Suspicious use of FindShellTrayWindow 16 IoCs
  • Suspicious use of SendNotifyMessage 13 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Views/modifies file attributes 1 TTPs 3 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1204
      • C:\Users\Admin\AppData\Local\Temp\003b43813ec5522429efc587a873871a2d6fc14c4c9c6008a7d27bce0920db19.exe
        "C:\Users\Admin\AppData\Local\Temp\003b43813ec5522429efc587a873871a2d6fc14c4c9c6008a7d27bce0920db19.exe"
        2⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Identifies Wine through registry keys
        • Loads dropped DLL
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:1152
        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
          "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1480
          • C:\Users\Admin\AppData\Local\Temp\1016920001\Cq6Id6x.exe
            "C:\Users\Admin\AppData\Local\Temp\1016920001\Cq6Id6x.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1472
            • C:\Users\Admin\AppData\Local\Temp\1016920001\Cq6Id6x.exe
              "C:\Users\Admin\AppData\Local\Temp\1016920001\Cq6Id6x.exe"
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:2024
          • C:\Users\Admin\AppData\Local\Temp\1016945001\x0qQ2DH.exe
            "C:\Users\Admin\AppData\Local\Temp\1016945001\x0qQ2DH.exe"
            4⤵
            • Executes dropped EXE
            PID:2792
          • C:\Users\Admin\AppData\Local\Temp\1016974001\0e226bd323.exe
            "C:\Users\Admin\AppData\Local\Temp\1016974001\0e226bd323.exe"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Loads dropped DLL
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of WriteProcessMemory
            PID:1596
            • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
              "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
              5⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Loads dropped DLL
              • Adds Run key to start application
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:2092
              • C:\Users\Admin\AppData\Local\Temp\1007054001\trunk.exe
                "C:\Users\Admin\AppData\Local\Temp\1007054001\trunk.exe"
                6⤵
                • Executes dropped EXE
                • Loads dropped DLL
                PID:2364
                • C:\Users\Admin\AppData\Local\Temp\onefile_2364_133790473988366000\trunk.exe
                  C:\Users\Admin\AppData\Local\Temp\1007054001\trunk.exe
                  7⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  PID:2156
              • C:\Users\Admin\AppData\Local\Temp\1007328001\a856f1b71a.exe
                "C:\Users\Admin\AppData\Local\Temp\1007328001\a856f1b71a.exe"
                6⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:348
              • C:\Users\Admin\AppData\Local\Temp\1007329001\3f1879c26c.exe
                "C:\Users\Admin\AppData\Local\Temp\1007329001\3f1879c26c.exe"
                6⤵
                • Suspicious use of NtCreateUserProcessOtherParentProcess
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:2376
              • C:\Users\Admin\AppData\Local\Temp\1007330001\7b6ad6f8df.exe
                "C:\Users\Admin\AppData\Local\Temp\1007330001\7b6ad6f8df.exe"
                6⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • Suspicious behavior: EnumeratesProcesses
                PID:2788
              • C:\Users\Admin\AppData\Local\Temp\1007331001\9dae9cf84d.exe
                "C:\Users\Admin\AppData\Local\Temp\1007331001\9dae9cf84d.exe"
                6⤵
                • Enumerates VirtualBox registry keys
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:908
          • C:\Users\Admin\AppData\Local\Temp\1017019001\VR6f3vF.exe
            "C:\Users\Admin\AppData\Local\Temp\1017019001\VR6f3vF.exe"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Modifies system certificate store
            • Suspicious behavior: EnumeratesProcesses
            PID:2512
          • C:\Users\Admin\AppData\Local\Temp\1017024001\kf5cl0F.exe
            "C:\Users\Admin\AppData\Local\Temp\1017024001\kf5cl0F.exe"
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1484
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "powershell.exe" Add-MpPreference -ExclusionPath "C:\tdxnqtpvuj"
              5⤵
              • Command and Scripting Interpreter: PowerShell
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:832
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData"
              5⤵
              • Command and Scripting Interpreter: PowerShell
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2044
          • C:\Users\Admin\AppData\Local\Temp\1017027001\ANEDNjf.exe
            "C:\Users\Admin\AppData\Local\Temp\1017027001\ANEDNjf.exe"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:2252
          • C:\Users\Admin\AppData\Local\Temp\1017253001\9afe874acc.exe
            "C:\Users\Admin\AppData\Local\Temp\1017253001\9afe874acc.exe"
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:884
            • C:\Windows\system32\cmd.exe
              cmd /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"
              5⤵
              • Loads dropped DLL
              PID:2964
              • C:\Windows\system32\mode.com
                mode 65,10
                6⤵
                  PID:2528
                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                  7z.exe e file.zip -p24291711423417250691697322505 -oextracted
                  6⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of AdjustPrivilegeToken
                  PID:348
                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                  7z.exe e extracted/file_7.zip -oextracted
                  6⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2584
                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                  7z.exe e extracted/file_6.zip -oextracted
                  6⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1988
                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                  7z.exe e extracted/file_5.zip -oextracted
                  6⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1816
                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                  7z.exe e extracted/file_4.zip -oextracted
                  6⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2460
                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                  7z.exe e extracted/file_3.zip -oextracted
                  6⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2940
                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                  7z.exe e extracted/file_2.zip -oextracted
                  6⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1856
                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                  7z.exe e extracted/file_1.zip -oextracted
                  6⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1548
                • C:\Windows\system32\attrib.exe
                  attrib +H "in.exe"
                  6⤵
                  • Views/modifies file attributes
                  PID:988
                • C:\Users\Admin\AppData\Local\Temp\main\in.exe
                  "in.exe"
                  6⤵
                  • Executes dropped EXE
                  PID:292
                  • C:\Windows\system32\attrib.exe
                    attrib +H +S C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                    7⤵
                    • Views/modifies file attributes
                    PID:1812
                  • C:\Windows\system32\attrib.exe
                    attrib +H C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                    7⤵
                    • Views/modifies file attributes
                    PID:2692
                  • C:\Windows\system32\schtasks.exe
                    schtasks /f /CREATE /TN "Intel_PTT_EK_Recertification" /TR "C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe" /SC MINUTE
                    7⤵
                    • Scheduled Task/Job: Scheduled Task
                    PID:1800
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    powershell ping 127.0.0.1; del in.exe
                    7⤵
                    • System Network Configuration Discovery: Internet Connection Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1768
                    • C:\Windows\system32\PING.EXE
                      "C:\Windows\system32\PING.EXE" 127.0.0.1
                      8⤵
                      • System Network Configuration Discovery: Internet Connection Discovery
                      • Runs ping.exe
                      PID:2096
            • C:\Users\Admin\AppData\Local\Temp\1017254001\a856f1b71a.exe
              "C:\Users\Admin\AppData\Local\Temp\1017254001\a856f1b71a.exe"
              4⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:1752
            • C:\Users\Admin\AppData\Local\Temp\1017255001\1fad36abe8.exe
              "C:\Users\Admin\AppData\Local\Temp\1017255001\1fad36abe8.exe"
              4⤵
              • Enumerates VirtualBox registry keys
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:2720
            • C:\Users\Admin\AppData\Local\Temp\1017256001\6eba6a0338.exe
              "C:\Users\Admin\AppData\Local\Temp\1017256001\6eba6a0338.exe"
              4⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2536
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                "powershell.exe" Add-MpPreference -ExclusionPath "C:\rwkgrpypk"
                5⤵
                • Command and Scripting Interpreter: PowerShell
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2704
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                "powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData"
                5⤵
                • Command and Scripting Interpreter: PowerShell
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1440
            • C:\Users\Admin\AppData\Local\Temp\1017257001\651fc2de75.exe
              "C:\Users\Admin\AppData\Local\Temp\1017257001\651fc2de75.exe"
              4⤵
              • Suspicious use of NtCreateUserProcessOtherParentProcess
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:2356
            • C:\Users\Admin\AppData\Local\Temp\1017258001\a761802d89.exe
              "C:\Users\Admin\AppData\Local\Temp\1017258001\a761802d89.exe"
              4⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:1256
              • C:\Users\Admin\AppData\Local\Temp\1017258001\a761802d89.exe
                "C:\Users\Admin\AppData\Local\Temp\1017258001\a761802d89.exe"
                5⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:2796
            • C:\Users\Admin\AppData\Local\Temp\1017259001\27a5b43396.exe
              "C:\Users\Admin\AppData\Local\Temp\1017259001\27a5b43396.exe"
              4⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              PID:2696
              • C:\Users\Admin\AppData\Local\Temp\1017259001\27a5b43396.exe
                "C:\Users\Admin\AppData\Local\Temp\1017259001\27a5b43396.exe"
                5⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:1528
            • C:\Users\Admin\AppData\Local\Temp\1017260001\a5b9dd0dd1.exe
              "C:\Users\Admin\AppData\Local\Temp\1017260001\a5b9dd0dd1.exe"
              4⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious behavior: EnumeratesProcesses
              PID:2492
            • C:\Users\Admin\AppData\Local\Temp\1017261001\e4fb9eea06.exe
              "C:\Users\Admin\AppData\Local\Temp\1017261001\e4fb9eea06.exe"
              4⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:1824
              • C:\Users\Admin\AppData\Local\Temp\1017261001\e4fb9eea06.exe
                "C:\Users\Admin\AppData\Local\Temp\1017261001\e4fb9eea06.exe"
                5⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:2888
            • C:\Users\Admin\AppData\Local\Temp\1017262001\824f8c16e9.exe
              "C:\Users\Admin\AppData\Local\Temp\1017262001\824f8c16e9.exe"
              4⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Loads dropped DLL
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:1632
              • C:\Users\Admin\AppData\Local\Temp\PO2C3NYUHJQ7HY67EG12.exe
                "C:\Users\Admin\AppData\Local\Temp\PO2C3NYUHJQ7HY67EG12.exe"
                5⤵
                • Modifies Windows Defender Real-time Protection settings
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Windows security modification
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2904
              • C:\Users\Admin\AppData\Local\Temp\DG5RN2UWKEJWUNOTE6XP1L2W77LNY1.exe
                "C:\Users\Admin\AppData\Local\Temp\DG5RN2UWKEJWUNOTE6XP1L2W77LNY1.exe"
                5⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                PID:3620
            • C:\Users\Admin\AppData\Local\Temp\1017263001\8b8584343f.exe
              "C:\Users\Admin\AppData\Local\Temp\1017263001\8b8584343f.exe"
              4⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:2088
            • C:\Users\Admin\AppData\Local\Temp\1017264001\9871d34fd3.exe
              "C:\Users\Admin\AppData\Local\Temp\1017264001\9871d34fd3.exe"
              4⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              PID:2500
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM firefox.exe /T
                5⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:1264
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM chrome.exe /T
                5⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:2128
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM msedge.exe /T
                5⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:1324
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM opera.exe /T
                5⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:1472
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM brave.exe /T
                5⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:2224
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                5⤵
                  PID:2452
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                    6⤵
                    • Checks processor information in registry
                    • Modifies registry class
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SendNotifyMessage
                    PID:1784
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1784.0.66264690\965159946" -parentBuildID 20221007134813 -prefsHandle 1224 -prefMapHandle 1216 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {162d4c3e-0d74-4e61-9278-170fd2d227eb} 1784 "\\.\pipe\gecko-crash-server-pipe.1784" 1316 11fbfb58 gpu
                      7⤵
                        PID:3004
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1784.1.1708111260\1553636016" -parentBuildID 20221007134813 -prefsHandle 1492 -prefMapHandle 1488 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e8b0cd62-6249-40ea-99ac-2c3cd1411f9f} 1784 "\\.\pipe\gecko-crash-server-pipe.1784" 1504 d74558 socket
                        7⤵
                          PID:1316
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1784.2.706235865\1112714375" -childID 1 -isForBrowser -prefsHandle 2064 -prefMapHandle 2060 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 856 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {dbee3027-03cd-4985-b9f7-4ba7d19418bb} 1784 "\\.\pipe\gecko-crash-server-pipe.1784" 2076 11f5c158 tab
                          7⤵
                            PID:2812
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1784.3.979643921\1016595414" -childID 2 -isForBrowser -prefsHandle 2896 -prefMapHandle 2892 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 856 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {f73c94e5-ae48-4379-a360-2191c9d69c80} 1784 "\\.\pipe\gecko-crash-server-pipe.1784" 2908 1b444658 tab
                            7⤵
                              PID:2224
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1784.4.1390985464\47445369" -childID 3 -isForBrowser -prefsHandle 3604 -prefMapHandle 1096 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 856 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {f34ecfb0-9bb3-46f2-ba9c-4064ed18c06b} 1784 "\\.\pipe\gecko-crash-server-pipe.1784" 3608 d65258 tab
                              7⤵
                                PID:3496
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1784.5.90491410\1325868" -childID 4 -isForBrowser -prefsHandle 3724 -prefMapHandle 3728 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 856 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {671a0782-ead0-48cc-8fe0-29399a478741} 1784 "\\.\pipe\gecko-crash-server-pipe.1784" 3716 1cc5f758 tab
                                7⤵
                                  PID:3504
                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1784.6.1190422576\1648350324" -childID 5 -isForBrowser -prefsHandle 3888 -prefMapHandle 3892 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 856 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {97dc4fa9-3fa1-4fc6-80d0-5531dbfcf73b} 1784 "\\.\pipe\gecko-crash-server-pipe.1784" 3880 1cc5e858 tab
                                  7⤵
                                    PID:3512
                            • C:\Users\Admin\AppData\Local\Temp\1017266001\16b3378aab.exe
                              "C:\Users\Admin\AppData\Local\Temp\1017266001\16b3378aab.exe"
                              4⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • System Location Discovery: System Language Discovery
                              PID:3316
                        • C:\Windows\SysWOW64\dialer.exe
                          "C:\Windows\system32\dialer.exe"
                          2⤵
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          PID:1036
                        • C:\Windows\SysWOW64\dialer.exe
                          "C:\Windows\system32\dialer.exe"
                          2⤵
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          PID:2040
                      • C:\Windows\system32\taskeng.exe
                        taskeng.exe {F20ADECA-9CB0-45A2-BD99-8C18475CC679} S-1-5-21-3290804112-2823094203-3137964600-1000:VORHPBAB\Admin:Interactive:[1]
                        1⤵
                        • Loads dropped DLL
                        PID:2236
                        • C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                          C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                          2⤵
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          • Suspicious behavior: EnumeratesProcesses
                          PID:2196
                          • C:\Windows\explorer.exe
                            explorer.exe
                            3⤵
                            • Suspicious use of AdjustPrivilegeToken
                            PID:636
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            powershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe
                            3⤵
                            • Drops file in System32 directory
                            • System Network Configuration Discovery: Internet Connection Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2764
                            • C:\Windows\system32\PING.EXE
                              "C:\Windows\system32\PING.EXE" 127.1.10.1
                              4⤵
                              • System Network Configuration Discovery: Internet Connection Discovery
                              • Runs ping.exe
                              PID:2788

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\activity-stream.discovery_stream.json.tmp

                        Filesize

                        31KB

                        MD5

                        3521433771d20001beaf6c06c3fc90f2

                        SHA1

                        475466ade3b8b1c29a0785cca38e61bbe3825a49

                        SHA256

                        23830602119421a793d9a8d3a0624c1b8f10d6525fd06e3d3614754f233b12f9

                        SHA512

                        4cd3819e96a5a7db35e09b839ebaf768ac299fe89b29a3d45fb47fe9f4ee579d4ca4c935e9b2f98a967a001629078e7bc933ead124dd43c5e3458038ddfd31df

                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\cache2\entries\37373F56CBD822F5FCF64BA01E1320A0924D8460

                        Filesize

                        24KB

                        MD5

                        3a088f6169829f7555ef27b932ebdc98

                        SHA1

                        7c33abc97371715844008c3b4e08610ed235129a

                        SHA256

                        b75e80859e9f1ffb8a9289930d415ddfcf24466881444e420fbfe392291a34d9

                        SHA512

                        482b69cfbc16374518d9b4d1e992211add925601ee619480a33b3db143c6bbbeaa8c0b2ef89c1b4479e66e0dc8fd3709639dde893a60d12bdcbf8de2da2efa5b

                      • C:\Users\Admin\AppData\Local\Temp\1007054001\trunk.exe

                        Filesize

                        10.2MB

                        MD5

                        d3b39a6b63c3822be6f8af9b3813bbad

                        SHA1

                        00b020e5a1c05442612f2cec7950c2814b59b1b6

                        SHA256

                        786f1331a0618485b31ba763911b14fcec691bf9897bee8f42680076092b7a2f

                        SHA512

                        a5c7504b29798fdabf610cf65716ec1d7745956f470d86de12a52b3c8731f858764fdf78647e50b3111622e7e65f05f82cd258b98c1a0f45ef7fdc088647d4ff

                      • C:\Users\Admin\AppData\Local\Temp\1007328001\a856f1b71a.exe

                        Filesize

                        2.8MB

                        MD5

                        79d73f0973da38285b0e0a83fa7ef5d0

                        SHA1

                        18692d3c66779517481c1868e39a8ed62f3af7fd

                        SHA256

                        554bde2e706bad2908fc0534a58e7cfa7e099edc754a46717f738616da146131

                        SHA512

                        471ba9cd38f5126e79a52baa70e5bb169dd09b7b05b7a56da8dc6da28c0a6e579d2962b575ac4ca83695d8a60a07457d974e2d79d4e7506cb4769a7ff87ca270

                      • C:\Users\Admin\AppData\Local\Temp\1007329001\3f1879c26c.exe

                        Filesize

                        1.9MB

                        MD5

                        d6070b7d0ec34e67a998dbe217c6c746

                        SHA1

                        64e771f2bcb20e9ccc89c8b4a9cf1b36e431d491

                        SHA256

                        10b27d9cb387fa4ac371de8767d5204925ca4da9c490ea8e2491b1a60c49fd85

                        SHA512

                        52bc768f8654cef43e62abfdba30878313aea5893d80759c633d84ce01c701b05e6f24c995f3a2568ab16ca69e6c1223b7e39c74c509fd6607bfa5e9418784f3

                      • C:\Users\Admin\AppData\Local\Temp\1007330001\7b6ad6f8df.exe

                        Filesize

                        2.9MB

                        MD5

                        90c7e768e9ccc60d7259f30b23571419

                        SHA1

                        06aa4afabe34974704b73757888f6605711115dc

                        SHA256

                        fa51ea713353ed850b8b06c9ea95fd37ab6c07668711aaec94d97c5e8cf2eceb

                        SHA512

                        0861209fb9b11a1da355b6e0a1cb9e69840e8aae638ad744638c37039f037da2f1781ac556bdf988a2f269f84bda8348d4cceb1a8aef8e7b5bcf8b70910c0033

                      • C:\Users\Admin\AppData\Local\Temp\1007331001\9dae9cf84d.exe

                        Filesize

                        4.3MB

                        MD5

                        aa1d9bfcb4fee4ff65cf6209fbc83204

                        SHA1

                        3334182b3bf48e928683a9c0a87d25ea57e8d70b

                        SHA256

                        dc645ba585c2d41ec553cefd46bd3dab212882cb07097905f9ed071e8882b161

                        SHA512

                        aec316f0ea02349b57a5e75a972edf70b8aea705a7c74f67452a5840834fca0cf70c3d099ca003bab73a25186e6f03298ea68440a03216fb40ece74b82f71d68

                      • C:\Users\Admin\AppData\Local\Temp\1016920001\Cq6Id6x.exe

                        Filesize

                        3.1MB

                        MD5

                        f9b9f98592292b5cbf59c7a60e9ebaee

                        SHA1

                        59cc872fd0a11b259cc5b70893f35e9b5a7c8cbb

                        SHA256

                        5688e9e0becc622c573af2a1af4ee0676ef3907e38a9258a7801b46b7ad64665

                        SHA512

                        f27e4a96173aeb064f47d44ff445b1e15f6d4f39a4ad711c019bb29692caea56eb910970d22bc13ac5c57a256d71e77b12aa60c8405335a239781c57cb0eaf8e

                      • C:\Users\Admin\AppData\Local\Temp\1016945001\x0qQ2DH.exe

                        Filesize

                        17.6MB

                        MD5

                        3c224e3fc892719dc1e302378e533579

                        SHA1

                        0a65062e1426a95bfeca355398b6fdc4912fb6b1

                        SHA256

                        64cc7f7906fe1ebf0b6977892abd9aa36f5e525cb241964c3986ee9e1a18312d

                        SHA512

                        554a26e9654eccce831e4adcee49d5e2507956935e562b134a86f332d867debfcd1f64fdb88fccb2e1eee810975d565dbc6ea1376516817ee38765e4bd733a49

                      • C:\Users\Admin\AppData\Local\Temp\1016974001\0e226bd323.exe

                        Filesize

                        2.8MB

                        MD5

                        2f60050effd03559ebc5a3ef6fdc5d03

                        SHA1

                        cc924f25728e2e9b8509f6ed547686a3e29f94be

                        SHA256

                        999e0fc991ee2027fa0aa7b92fe8b6612a0eec5bbd9fa169c036862aed2ce3f7

                        SHA512

                        348ec438b1d775b3d3ec51142be39538c47f004c081a1745d5f13544f37f272fc7eca05bc8c6553925e2ea3ed4d44d988597d9bdf52a85548f6e09ae04ac57db

                      • C:\Users\Admin\AppData\Local\Temp\1017019001\VR6f3vF.exe

                        Filesize

                        1.8MB

                        MD5

                        ff279f4e5b1c6fbda804d2437c2dbdc8

                        SHA1

                        2feb3762c877a5ae3ca60eeebc37003ad0844245

                        SHA256

                        e115298ab160da9c7a998e4ae0b72333f64b207da165134ca45eb997a000d378

                        SHA512

                        c7a8bbcb122b2c7b57c8b678c5eed075ee5e7c355afbf86238282d2d3458019da1a8523520e1a1c631cd01b555f7df340545fd1e44ad678dc97c40b23428f967

                      • C:\Users\Admin\AppData\Local\Temp\1017024001\kf5cl0F.exe

                        Filesize

                        21KB

                        MD5

                        14becdf1e2402e9aa6c2be0e6167041e

                        SHA1

                        72cbbae6878f5e06060a0038b25ede93b445f0df

                        SHA256

                        7a769963165063758f15f6e0cece25c9d13072f67fa0d3c25a03a5104fe0783a

                        SHA512

                        16b837615505f352e134afd9d8655c9cabfa5bfcfbee2c0c34f2d7d9588aa71f875e4e5feb8cdf0f7bacc00f7c1ca8dabd3b3d92afc99abf705c05c78e298b4a

                      • C:\Users\Admin\AppData\Local\Temp\1017027001\ANEDNjf.exe

                        Filesize

                        1.8MB

                        MD5

                        25fb9c54265bbacc7a055174479f0b70

                        SHA1

                        4af069a2ec874703a7e29023d23a1ada491b584e

                        SHA256

                        552f8be2c6b2208a89c728f68488930c661b3a06c35a20d133ef7d3c63a86b9c

                        SHA512

                        7dfd9e0f3fa2d68a6ce8c952e3b755559db73bb7a06c95ad6ed8ac16dedb49be8b8337afc07c9c682f0c4be9db291a551286353e2e2b624223487dc1c8b54668

                      • C:\Users\Admin\AppData\Local\Temp\1017253001\9afe874acc.exe

                        Filesize

                        4.2MB

                        MD5

                        3a425626cbd40345f5b8dddd6b2b9efa

                        SHA1

                        7b50e108e293e54c15dce816552356f424eea97a

                        SHA256

                        ba9212d2d5cd6df5eb7933fb37c1b72a648974c1730bf5c32439987558f8e8b1

                        SHA512

                        a7538c6b7e17c35f053721308b8d6dc53a90e79930ff4ed5cffecaa97f4d0fbc5f9e8b59f1383d8f0699c8d4f1331f226af71d40325022d10b885606a72fe668

                      • C:\Users\Admin\AppData\Local\Temp\1017255001\1fad36abe8.exe

                        Filesize

                        4.3MB

                        MD5

                        d6cfec5f8c250d92d751030c95d46aec

                        SHA1

                        70439cf2611f97c84af487c44b88703d004a2bca

                        SHA256

                        0200c5657794ccc0916aae772004b7f72a793b77dc807b51b2f88e597813f611

                        SHA512

                        a939f9af174d37e3d32d0794b1f14110deffd7847b884a79b5fd300bcc7c30ce285f6dbbc41ad6ab5bd237bb6353efb7ddee903a8ec155a10840dec8c25d9bbb

                      • C:\Users\Admin\AppData\Local\Temp\1017258001\a761802d89.exe

                        Filesize

                        747KB

                        MD5

                        8a9cb17c0224a01bd34b46495983c50a

                        SHA1

                        00296ea6a56f6e10a0f1450a20c5fb329b8856c1

                        SHA256

                        3d51b9523b387859bc0d94246dfb216cfa82f9d650c8d11be11ed67f70e7440b

                        SHA512

                        1472e4670f469c43227b965984ecc223a526f6284363d8e08a3b5b55e602ccce62df4bc49939ee5bd7df7b0c26e20da896b084eccab767f8728e6bf14d71c840

                      • C:\Users\Admin\AppData\Local\Temp\1017259001\27a5b43396.exe

                        Filesize

                        3.1MB

                        MD5

                        c00a67d527ef38dc6f49d0ad7f13b393

                        SHA1

                        7b8f2de130ab5e4e59c3c2f4a071bda831ac219d

                        SHA256

                        12226ccae8c807641241ba5178d853aad38984eefb0c0c4d65abc4da3f9787c3

                        SHA512

                        9286d267b167cba01e55e68c8c5582f903bed0dd8bc4135eb528ef6814e60e7d4dda2b3611e13efb56aa993635fbab218b0885daf5daea6043061d8384af40ca

                      • C:\Users\Admin\AppData\Local\Temp\1017261001\e4fb9eea06.exe

                        Filesize

                        758KB

                        MD5

                        afd936e441bf5cbdb858e96833cc6ed3

                        SHA1

                        3491edd8c7caf9ae169e21fb58bccd29d95aefef

                        SHA256

                        c6491d7a6d70c7c51baca7436464667b4894e4989fa7c5e05068dde4699e1cbf

                        SHA512

                        928c15a1eda602b2a66a53734f3f563ab9626882104e30ee2bf5106cfd6e08ec54f96e3063f1ab89bf13be2c8822a8419f5d8ee0a3583a4c479785226051a325

                      • C:\Users\Admin\AppData\Local\Temp\1017262001\824f8c16e9.exe

                        Filesize

                        1.7MB

                        MD5

                        a24f5d2fe8d5d6e3c811f6fedff8e605

                        SHA1

                        4995de2e17b464729ca860743af58574b6b3343b

                        SHA256

                        ccebeeae14eec854a62b3d8a896c44af46957208427324d5819fb828b0dd64f5

                        SHA512

                        feae70419ddc924760c7057d50267aa4a988c88371fe0b0d3cb48f86a6ed134443c39f7766c3e72d7f98cef3557bd30ac4749431dbdf7cafb0664009a147ec36

                      • C:\Users\Admin\AppData\Local\Temp\1017264001\9871d34fd3.exe

                        Filesize

                        950KB

                        MD5

                        5e10cd3b6e6e8d90290cb0249243b486

                        SHA1

                        143c4cd03751b271722ee2a62011326fc84b6b15

                        SHA256

                        a32634a27aa716060ee631f6ccb3c6f2ea71f94838b124024bb22e5fc5330650

                        SHA512

                        c8a2779a5a5c1b050434ab8c75975aa1ef1ea3a5383a54a401d69dcbdbc0fa12026d5ec8fccd5f975ed47db8bcfff77be683a02dfb989ef5dae88be698d911b1

                      • C:\Users\Admin\AppData\Local\Temp\1017265001\cacc55bc37.exe

                        Filesize

                        768KB

                        MD5

                        042229bd308823bd862af1aa2968040b

                        SHA1

                        ec71415caa666a6d30e9e3e7f4bc018c2824c595

                        SHA256

                        25ffd65db628c02833a42a279962e8a1890b970bb0e25e20e8612dc5593bdacc

                        SHA512

                        380dfd622c49f173bad0011dbec33c1bca22dd6425688c1ff4da26f8c0b39c8c38fd45c348d30be85d62eba05c14bed4cfabe6baa59c93764b80dec9d6336792

                      • C:\Users\Admin\AppData\Local\Temp\Cab7580.tmp

                        Filesize

                        70KB

                        MD5

                        49aebf8cbd62d92ac215b2923fb1b9f5

                        SHA1

                        1723be06719828dda65ad804298d0431f6aff976

                        SHA256

                        b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                        SHA512

                        bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                      • C:\Users\Admin\AppData\Local\Temp\PO2C3NYUHJQ7HY67EG12.exe

                        Filesize

                        1.7MB

                        MD5

                        9fa10b12df98b70bac10c3cfc4b108d5

                        SHA1

                        8f494dcb60956621f7b81f4417877ef3e561d2b2

                        SHA256

                        c4307f7258775135230102c97471573b42e038eb6b510b218794126b625a925d

                        SHA512

                        dd4686bd865b34709719011499f7fb5f3a24e41e44b66a35c4358c941fd4a8b839a3d9d1c8f28f659f3b41cccba4809da7bc98d83865ab86b8343230319b08cd

                      • C:\Users\Admin\AppData\Local\Temp\Tar7592.tmp

                        Filesize

                        181KB

                        MD5

                        4ea6026cf93ec6338144661bf1202cd1

                        SHA1

                        a1dec9044f750ad887935a01430bf49322fbdcb7

                        SHA256

                        8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                        SHA512

                        6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                      • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                        Filesize

                        2.9MB

                        MD5

                        4072633a022e6587009b5ca189ff4613

                        SHA1

                        d54d3cf0878186b3b8230f1f0b8188bf1bcd738e

                        SHA256

                        003b43813ec5522429efc587a873871a2d6fc14c4c9c6008a7d27bce0920db19

                        SHA512

                        136ebcb816217cecb81f5b521b7102d54eb17f4f0685ab003e7013cbff75e7074ee93a086f847c5a0f9f0c3f2eb8c5c5706b07fe119182c86d2007699a98f700

                      • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

                        Filesize

                        1.6MB

                        MD5

                        72491c7b87a7c2dd350b727444f13bb4

                        SHA1

                        1e9338d56db7ded386878eab7bb44b8934ab1bc7

                        SHA256

                        34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

                        SHA512

                        583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

                      • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_5.zip

                        Filesize

                        1.7MB

                        MD5

                        b7d1e04629bec112923446fda5391731

                        SHA1

                        814055286f963ddaa5bf3019821cb8a565b56cb8

                        SHA256

                        4da77d4ee30ad0cd56cd620f4e9dc4016244ace015c5b4b43f8f37dd8e3a8789

                        SHA512

                        79fc3606b0fe6a1e31a2ecacc96623caf236bf2be692dadab6ea8ffa4af4231d782094a63b76631068364ac9b6a872b02f1e080636eba40ed019c2949a8e28db

                      • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_6.zip

                        Filesize

                        1.7MB

                        MD5

                        0dc4014facf82aa027904c1be1d403c1

                        SHA1

                        5e6d6c020bfc2e6f24f3d237946b0103fe9b1831

                        SHA256

                        a29ddd29958c64e0af1a848409e97401307277bb6f11777b1cfb0404a6226de7

                        SHA512

                        cbeead189918657cc81e844ed9673ee8f743aed29ad9948e90afdfbecacc9c764fbdbfb92e8c8ceb5ae47cee52e833e386a304db0572c7130d1a54fd9c2cc028

                      • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_7.zip

                        Filesize

                        3.3MB

                        MD5

                        cea368fc334a9aec1ecff4b15612e5b0

                        SHA1

                        493d23f72731bb570d904014ffdacbba2334ce26

                        SHA256

                        07e38cad68b0cdbea62f55f9bc6ee80545c2e1a39983baa222e8af788f028541

                        SHA512

                        bed35a1cc56f32e0109ea5a02578489682a990b5cefa58d7cf778815254af9849e731031e824adba07c86c8425df58a1967ac84ce004c62e316a2e51a75c8748

                      • C:\Users\Admin\AppData\Local\Temp\main\file.bin

                        Filesize

                        3.3MB

                        MD5

                        045b0a3d5be6f10ddf19ae6d92dfdd70

                        SHA1

                        0387715b6681d7097d372cd0005b664f76c933c7

                        SHA256

                        94b392e94fa47d1b9b7ae6a29527727268cc2e3484e818c23608f8835bc1104d

                        SHA512

                        58255a755531791b888ffd9b663cc678c63d5caa932260e9546b1b10a8d54208334725c14529116b067bcf5a5e02da85e015a3bed80092b7698a43dab0168c7b

                      • C:\Users\Admin\AppData\Local\Temp\main\main.bat

                        Filesize

                        440B

                        MD5

                        3626532127e3066df98e34c3d56a1869

                        SHA1

                        5fa7102f02615afde4efd4ed091744e842c63f78

                        SHA256

                        2a0e18ef585db0802269b8c1ddccb95ce4c0bac747e207ee6131dee989788bca

                        SHA512

                        dcce66d6e24d5a4a352874144871cd73c327e04c1b50764399457d8d70a9515f5bc0a650232763bf34d4830bab70ee4539646e7625cfe5336a870e311043b2bd

                      • C:\Users\Admin\AppData\Local\Temp\onefile_2364_133790473988366000\python312.dll

                        Filesize

                        6.6MB

                        MD5

                        166cc2f997cba5fc011820e6b46e8ea7

                        SHA1

                        d6179213afea084f02566ea190202c752286ca1f

                        SHA256

                        c045b57348c21f5f810bae60654ae39490846b487378e917595f1f95438f9546

                        SHA512

                        49d9d4df3d7ef5737e947a56e48505a2212e05fdbcd7b83d689639728639b7fd3be39506d7cfcb7563576ebee879fd305370fdb203909ed9b522b894dd87aacb

                      • C:\Users\Admin\AppData\Local\Temp\onefile_2364_133790473988366000\trunk.exe

                        Filesize

                        18.0MB

                        MD5

                        86ddf66d8651d0baa1cc13d6f8c18dc1

                        SHA1

                        ee15109134300e555085811f4060048e245269f9

                        SHA256

                        ee045dffee8b48356106a2105803b73776b73bf7462d364b1f82540fcf72f4cf

                        SHA512

                        385fce7ded01cba93f842a1b698b78e3eb1d73833c282669ebe6bea22ec6c4957b179325614f17ecb7c7357051fb7381e011cf2ebc0f5ca2f24414f0e23a0c6c

                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

                        Filesize

                        7KB

                        MD5

                        fca80db30d281bda4dc53d33eb14e7c7

                        SHA1

                        f4f397c58d959fd9244e90a75924bcae2f31ed34

                        SHA256

                        78b1f5b74c12a09b7baf09c4ef85bf18eb5ad7e0e698e371a539da8ec5cc485e

                        SHA512

                        81ed20533478dd7a61e09ec94dca4433b8ceed2d7bf2b765e433218759750eef7584d5c3528fc8053608a342bb219693e583284b016a070802ebf5604a404c66

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\datareporting\glean\db\data.safe.bin

                        Filesize

                        9KB

                        MD5

                        9669ea2c4792042991847a8ba492bf8c

                        SHA1

                        a67529536cd451ea94942c792f8b90796adbf3b2

                        SHA256

                        18c168942c5849766f07eee5494bf94437df3d8ed0fe4b610dbb50b7c6b4202b

                        SHA512

                        e23ded681e1bd89fc43167392494068e70d85f6dd0dd1bbf2be33bf9aefa832e0159a313aa8c3ef883f4f5666037e23fb905647fa1a48a4847b8b1f874dedc85

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\datareporting\glean\pending_pings\e2f29f3d-9cc3-4ded-87d5-83a4ce02fea4

                        Filesize

                        733B

                        MD5

                        53cecad184d3d46fd0d1372eef9fceba

                        SHA1

                        f9afdb31976cbbfdf887040ee54223030f584ddc

                        SHA256

                        01866b58f92683a5c21966708cd16c62007906483049ed7a588949747dbce6d0

                        SHA512

                        d6a343798d3f537a1595cb8d4f156b165e8eba99ea24f48e5034e5516c39444f313c941271a179eea13eda2955310df0d929a442aba5c173353a47f39f99fff4

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\prefs-1.js

                        Filesize

                        6KB

                        MD5

                        8a8d7b817827f014154d63fc75be54a0

                        SHA1

                        006a0c0a583ec39222d3ddb116d1892ea5228f90

                        SHA256

                        7b8b907cc1bc1b14a1efb44b582ff4f98fd3c66f233fde0558e660e28530b099

                        SHA512

                        6daa216e4f709542473ae0b68028442bcb403606c0ee89537dee534a31715e351caa0a372f405309756337f7b5dd12b300bc860f37b90cc6642745540ad30b60

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\prefs.js

                        Filesize

                        6KB

                        MD5

                        f9d42e569f6f73fca24aeadc3350874c

                        SHA1

                        742b6d4aa0134cf401ee98233597c8a060f0064f

                        SHA256

                        fa022782a0b81db81bc5dc8675d5c391188aaa59836cf194e00a29119da9ea71

                        SHA512

                        0f9d366ba8116025ebb7f8c07169c2fa87168ab4b3452c73221117bf6d06a54e7f278af80530d6abd399a7a988073ad7262ed9994724fc0746464e7e99450177

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\sessionstore-backups\recovery.jsonlz4

                        Filesize

                        4KB

                        MD5

                        9957fe593345be51e83bff3d896a1963

                        SHA1

                        b531142bb569179248d25edd7b1b7fb98d42d2b3

                        SHA256

                        05790d5d3460086ed013595063e76c1a22ac74c8db22badffc4b0de26191ff76

                        SHA512

                        9482186bdcc0ce0669aa11148019bbbec33e4032f65165f7f5a93962e6f7c030504284e639045001e707f33b4317176bf74abdf3d5289752d9f8535d7ca34c6a

                      • \Users\Admin\AppData\Local\Temp\main\7z.exe

                        Filesize

                        458KB

                        MD5

                        619f7135621b50fd1900ff24aade1524

                        SHA1

                        6c7ea8bbd435163ae3945cbef30ef6b9872a4591

                        SHA256

                        344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

                        SHA512

                        2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

                      • memory/292-450-0x000000013FEF0000-0x0000000140380000-memory.dmp

                        Filesize

                        4.6MB

                      • memory/292-448-0x000000013FEF0000-0x0000000140380000-memory.dmp

                        Filesize

                        4.6MB

                      • memory/348-476-0x0000000001050000-0x000000000154D000-memory.dmp

                        Filesize

                        5.0MB

                      • memory/348-474-0x0000000001050000-0x000000000154D000-memory.dmp

                        Filesize

                        5.0MB

                      • memory/1036-515-0x0000000077A40000-0x0000000077BE9000-memory.dmp

                        Filesize

                        1.7MB

                      • memory/1036-517-0x0000000077640000-0x0000000077687000-memory.dmp

                        Filesize

                        284KB

                      • memory/1036-511-0x0000000000080000-0x000000000008A000-memory.dmp

                        Filesize

                        40KB

                      • memory/1036-514-0x0000000001D20000-0x0000000002120000-memory.dmp

                        Filesize

                        4.0MB

                      • memory/1152-1-0x0000000077C30000-0x0000000077C32000-memory.dmp

                        Filesize

                        8KB

                      • memory/1152-2-0x00000000010E1000-0x000000000110F000-memory.dmp

                        Filesize

                        184KB

                      • memory/1152-3-0x00000000010E0000-0x00000000013FB000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/1152-5-0x00000000010E0000-0x00000000013FB000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/1152-14-0x00000000010E0000-0x00000000013FB000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/1152-0-0x00000000010E0000-0x00000000013FB000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/1472-37-0x0000000000CB0000-0x0000000000FD0000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/1472-54-0x0000000005720000-0x0000000005876000-memory.dmp

                        Filesize

                        1.3MB

                      • memory/1472-55-0x0000000000B20000-0x0000000000B42000-memory.dmp

                        Filesize

                        136KB

                      • memory/1480-209-0x00000000066B0000-0x0000000006B5B000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/1480-22-0x0000000000C10000-0x0000000000F2B000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/1480-216-0x00000000066B0000-0x0000000006B5B000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/1480-217-0x00000000066B0000-0x0000000006B5B000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/1480-457-0x00000000066B0000-0x0000000006B56000-memory.dmp

                        Filesize

                        4.6MB

                      • memory/1480-518-0x0000000000C10000-0x0000000000F2B000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/1480-122-0x0000000006090000-0x000000000639A000-memory.dmp

                        Filesize

                        3.0MB

                      • memory/1480-162-0x00000000066B0000-0x0000000006B56000-memory.dmp

                        Filesize

                        4.6MB

                      • memory/1480-124-0x0000000006090000-0x000000000639A000-memory.dmp

                        Filesize

                        3.0MB

                      • memory/1480-210-0x00000000066B0000-0x0000000006B5B000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/1480-142-0x0000000000C10000-0x0000000000F2B000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/1480-51-0x0000000000C10000-0x0000000000F2B000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/1480-39-0x0000000000C10000-0x0000000000F2B000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/1480-38-0x0000000000C10000-0x0000000000F2B000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/1480-193-0x00000000066B0000-0x0000000006B56000-memory.dmp

                        Filesize

                        4.6MB

                      • memory/1480-215-0x0000000000C10000-0x0000000000F2B000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/1480-21-0x0000000000C10000-0x0000000000F2B000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/1480-20-0x0000000000C10000-0x0000000000F2B000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/1480-192-0x00000000066B0000-0x0000000006B56000-memory.dmp

                        Filesize

                        4.6MB

                      • memory/1480-18-0x0000000000C10000-0x0000000000F2B000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/1480-17-0x0000000000C11000-0x0000000000C3F000-memory.dmp

                        Filesize

                        184KB

                      • memory/1480-16-0x0000000000C10000-0x0000000000F2B000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/1480-191-0x0000000000C10000-0x0000000000F2B000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/1480-428-0x00000000066B0000-0x0000000006B56000-memory.dmp

                        Filesize

                        4.6MB

                      • memory/1480-444-0x0000000000C10000-0x0000000000F2B000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/1480-143-0x0000000006090000-0x000000000639A000-memory.dmp

                        Filesize

                        3.0MB

                      • memory/1480-160-0x0000000006090000-0x000000000639A000-memory.dmp

                        Filesize

                        3.0MB

                      • memory/1480-159-0x00000000066B0000-0x0000000006B56000-memory.dmp

                        Filesize

                        4.6MB

                      • memory/1484-179-0x0000000000D50000-0x0000000000D5C000-memory.dmp

                        Filesize

                        48KB

                      • memory/1596-139-0x00000000000F0000-0x00000000003FA000-memory.dmp

                        Filesize

                        3.0MB

                      • memory/1596-123-0x00000000000F0000-0x00000000003FA000-memory.dmp

                        Filesize

                        3.0MB

                      • memory/1752-471-0x0000000000B60000-0x0000000001006000-memory.dmp

                        Filesize

                        4.6MB

                      • memory/1752-431-0x0000000000B60000-0x0000000001006000-memory.dmp

                        Filesize

                        4.6MB

                      • memory/1768-455-0x000000001B6E0000-0x000000001B9C2000-memory.dmp

                        Filesize

                        2.9MB

                      • memory/1768-456-0x0000000002860000-0x0000000002868000-memory.dmp

                        Filesize

                        32KB

                      • memory/2024-59-0x0000000000400000-0x0000000000456000-memory.dmp

                        Filesize

                        344KB

                      • memory/2024-70-0x0000000000400000-0x0000000000456000-memory.dmp

                        Filesize

                        344KB

                      • memory/2024-68-0x0000000000400000-0x0000000000456000-memory.dmp

                        Filesize

                        344KB

                      • memory/2024-67-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                        Filesize

                        4KB

                      • memory/2024-57-0x0000000000400000-0x0000000000456000-memory.dmp

                        Filesize

                        344KB

                      • memory/2024-65-0x0000000000400000-0x0000000000456000-memory.dmp

                        Filesize

                        344KB

                      • memory/2024-63-0x0000000000400000-0x0000000000456000-memory.dmp

                        Filesize

                        344KB

                      • memory/2024-61-0x0000000000400000-0x0000000000456000-memory.dmp

                        Filesize

                        344KB

                      • memory/2040-562-0x0000000077640000-0x0000000077687000-memory.dmp

                        Filesize

                        284KB

                      • memory/2040-560-0x0000000077A40000-0x0000000077BE9000-memory.dmp

                        Filesize

                        1.7MB

                      • memory/2040-556-0x00000000000C0000-0x00000000000CA000-memory.dmp

                        Filesize

                        40KB

                      • memory/2040-559-0x0000000001D20000-0x0000000002120000-memory.dmp

                        Filesize

                        4.0MB

                      • memory/2092-564-0x0000000006660000-0x0000000006B5D000-memory.dmp

                        Filesize

                        5.0MB

                      • memory/2092-180-0x0000000001160000-0x000000000146A000-memory.dmp

                        Filesize

                        3.0MB

                      • memory/2092-190-0x0000000001160000-0x000000000146A000-memory.dmp

                        Filesize

                        3.0MB

                      • memory/2092-140-0x0000000001160000-0x000000000146A000-memory.dmp

                        Filesize

                        3.0MB

                      • memory/2092-473-0x0000000006660000-0x0000000006B5D000-memory.dmp

                        Filesize

                        5.0MB

                      • memory/2092-214-0x0000000001160000-0x000000000146A000-memory.dmp

                        Filesize

                        3.0MB

                      • memory/2092-500-0x0000000001160000-0x000000000146A000-memory.dmp

                        Filesize

                        3.0MB

                      • memory/2092-563-0x0000000006660000-0x0000000006B5D000-memory.dmp

                        Filesize

                        5.0MB

                      • memory/2092-432-0x0000000001160000-0x000000000146A000-memory.dmp

                        Filesize

                        3.0MB

                      • memory/2092-472-0x0000000006660000-0x0000000006B5D000-memory.dmp

                        Filesize

                        5.0MB

                      • memory/2156-341-0x000000013F6A0000-0x00000001408E7000-memory.dmp

                        Filesize

                        18.3MB

                      • memory/2252-219-0x00000000000D0000-0x000000000057B000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/2252-218-0x00000000000D0000-0x000000000057B000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/2252-212-0x00000000000D0000-0x000000000057B000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/2252-235-0x00000000000D0000-0x000000000057B000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/2356-558-0x0000000001030000-0x00000000014F2000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/2356-553-0x0000000077A40000-0x0000000077BE9000-memory.dmp

                        Filesize

                        1.7MB

                      • memory/2356-555-0x0000000077640000-0x0000000077687000-memory.dmp

                        Filesize

                        284KB

                      • memory/2356-552-0x0000000004CD0000-0x00000000050D0000-memory.dmp

                        Filesize

                        4.0MB

                      • memory/2364-409-0x000000013FEE0000-0x0000000140947000-memory.dmp

                        Filesize

                        10.4MB

                      • memory/2376-507-0x0000000004E70000-0x0000000005270000-memory.dmp

                        Filesize

                        4.0MB

                      • memory/2376-513-0x00000000002C0000-0x0000000000782000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/2376-506-0x0000000004E70000-0x0000000005270000-memory.dmp

                        Filesize

                        4.0MB

                      • memory/2376-508-0x0000000077A40000-0x0000000077BE9000-memory.dmp

                        Filesize

                        1.7MB

                      • memory/2376-510-0x0000000077640000-0x0000000077687000-memory.dmp

                        Filesize

                        284KB

                      • memory/2512-163-0x0000000000230000-0x00000000006D6000-memory.dmp

                        Filesize

                        4.6MB

                      • memory/2512-182-0x0000000000230000-0x00000000006D6000-memory.dmp

                        Filesize

                        4.6MB

                      • memory/2536-530-0x0000000000A30000-0x0000000000A3C000-memory.dmp

                        Filesize

                        48KB

                      • memory/2696-629-0x00000000008C0000-0x0000000000BE8000-memory.dmp

                        Filesize

                        3.2MB

                      • memory/2696-915-0x00000000005B0000-0x00000000005D2000-memory.dmp

                        Filesize

                        136KB

                      • memory/2764-685-0x0000000001E80000-0x0000000001E88000-memory.dmp

                        Filesize

                        32KB

                      • memory/2764-684-0x000000001B780000-0x000000001BA62000-memory.dmp

                        Filesize

                        2.9MB

                      • memory/2788-589-0x0000000000930000-0x0000000000C4B000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2792-71-0x0000000001110000-0x00000000022A6000-memory.dmp

                        Filesize

                        17.6MB

                      • memory/2796-592-0x0000000000400000-0x0000000000455000-memory.dmp

                        Filesize

                        340KB

                      • memory/2796-594-0x0000000000400000-0x0000000000455000-memory.dmp

                        Filesize

                        340KB

                      • memory/2796-590-0x0000000000400000-0x0000000000455000-memory.dmp

                        Filesize

                        340KB

                      • memory/2904-733-0x00000000011F0000-0x0000000001648000-memory.dmp

                        Filesize

                        4.3MB

                      • memory/2904-734-0x00000000011F0000-0x0000000001648000-memory.dmp

                        Filesize

                        4.3MB

                      • memory/2964-478-0x000000013FEF0000-0x0000000140380000-memory.dmp

                        Filesize

                        4.6MB

                      • memory/2964-477-0x000000013FEF0000-0x0000000140380000-memory.dmp

                        Filesize

                        4.6MB

                      • memory/2964-446-0x000000013FEF0000-0x0000000140380000-memory.dmp

                        Filesize

                        4.6MB

                      • memory/2964-447-0x000000013FEF0000-0x0000000140380000-memory.dmp

                        Filesize

                        4.6MB