Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-12-2024 02:09

General

  • Target

    09bae49e2d08d3316490b621a37fa44ec46eb894133664fffb2b6202e7364c94.exe

  • Size

    2.8MB

  • MD5

    157e44350b06a516680ed7b7584c5e31

  • SHA1

    fc08a1bccbef19fc0c60be65c939ecd344c28d96

  • SHA256

    09bae49e2d08d3316490b621a37fa44ec46eb894133664fffb2b6202e7364c94

  • SHA512

    2b362a144aa0304cbaf890e6a2e63ba7f962f3772d4f74ae5c3af469466df6f5c3ed6c4bf409a5849cc6f1dce5e7cd56fd62ef1d692d4722035bc0c1c699beda

  • SSDEEP

    49152:OpbqeFpPw4cvv9mgxIGSapA/tQzph1LqNVwS+3ctv:Opb3bwhvv9mRapEuzp2NqSeU

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

Extracted

Family

amadey

Version

4.41

Botnet

fed3aa

C2

http://185.215.113.16

Attributes
  • install_dir

    44111dbc49

  • install_file

    axplong.exe

  • strings_key

    8d0ad6945b1a30a186ec2d30be6db0b5

  • url_paths

    /Jo89Ku7d/index.php

rc4.plain

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

cryptbot

C2

http://home.fivetk5vt.top/hLfzXsaqNtoEGyaUtOMJ1734

Extracted

Family

lumma

C2

https://shineugler.biz/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • CryptBot

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Cryptbot family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • Enumerates VirtualBox registry keys 2 TTPs 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 19 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file
  • Drops file in Drivers directory 3 IoCs
  • Checks BIOS information in registry 2 TTPs 38 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 8 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Credentials from Password Stores: Windows Credential Manager 1 TTPs

    Suspicious access to Credentials History.

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 52 IoCs
  • Identifies Wine through registry keys 2 TTPs 19 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 56 IoCs
  • Modifies system executable filetype association 2 TTPs 4 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 22 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 63 IoCs
  • Drops file in Windows directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 39 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 44 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Views/modifies file attributes 1 TTPs 3 IoCs

Processes

  • C:\Windows\system32\sihost.exe
    sihost.exe
    1⤵
      PID:2648
      • C:\Windows\SysWOW64\svchost.exe
        "C:\Windows\System32\svchost.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:2744
      • C:\Windows\SysWOW64\svchost.exe
        "C:\Windows\System32\svchost.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:5032
    • C:\Users\Admin\AppData\Local\Temp\09bae49e2d08d3316490b621a37fa44ec46eb894133664fffb2b6202e7364c94.exe
      "C:\Users\Admin\AppData\Local\Temp\09bae49e2d08d3316490b621a37fa44ec46eb894133664fffb2b6202e7364c94.exe"
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3896
      • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
        "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
        2⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks computer location settings
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:3160
        • C:\Users\Admin\AppData\Local\Temp\1016920001\Cq6Id6x.exe
          "C:\Users\Admin\AppData\Local\Temp\1016920001\Cq6Id6x.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4444
          • C:\Users\Admin\AppData\Local\Temp\1016920001\Cq6Id6x.exe
            "C:\Users\Admin\AppData\Local\Temp\1016920001\Cq6Id6x.exe"
            4⤵
            • Executes dropped EXE
            PID:4520
          • C:\Users\Admin\AppData\Local\Temp\1016920001\Cq6Id6x.exe
            "C:\Users\Admin\AppData\Local\Temp\1016920001\Cq6Id6x.exe"
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:4392
        • C:\Users\Admin\AppData\Local\Temp\1016945001\x0qQ2DH.exe
          "C:\Users\Admin\AppData\Local\Temp\1016945001\x0qQ2DH.exe"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Enumerates system info in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:972
          • C:\Users\Admin\AppData\Local\Temp\NordVPNSetup.exe
            "C:\Users\Admin\AppData\Local\Temp\NordVPNSetup.exe"
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2920
            • C:\Users\Admin\AppData\Local\Temp\is-33UVR.tmp\NordVPNSetup.tmp
              "C:\Users\Admin\AppData\Local\Temp\is-33UVR.tmp\NordVPNSetup.tmp" /SL5="$D0056,15409387,73728,C:\Users\Admin\AppData\Local\Temp\NordVPNSetup.exe"
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in Program Files directory
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of WriteProcessMemory
              PID:2296
              • C:\Windows\system32\rundll32.exe
                "rundll32.exe " SETUPAPI.DLL,InstallHinfSection DefaultInstall 132 C:\Program Files\VS Revo Group\Revo Uninstaller Pro\revoflt.inf
                6⤵
                • Drops file in Drivers directory
                • Adds Run key to start application
                PID:1548
                • C:\Windows\system32\runonce.exe
                  "C:\Windows\system32\runonce.exe" -r
                  7⤵
                  • Checks processor information in registry
                  PID:5008
                  • C:\Windows\System32\grpconv.exe
                    "C:\Windows\System32\grpconv.exe" -o
                    8⤵
                      PID:1036
                • C:\Windows\system32\regsvr32.exe
                  "regsvr32" "C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RUExt.dll" /s
                  6⤵
                  • Loads dropped DLL
                  • Modifies system executable filetype association
                  • Modifies registry class
                  PID:1168
                • C:\Program Files\VS Revo Group\Revo Uninstaller Pro\ruplp.exe
                  "C:\Program Files\VS Revo Group\Revo Uninstaller Pro\ruplp.exe" /regserver /NOREDIRECT
                  6⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Modifies registry class
                  PID:4784
                • C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RevoUninPro.exe
                  "C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RevoUninPro.exe" /bc
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:2720
                • C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RevoUninPro.exe
                  "C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RevoUninPro.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:1160
          • C:\Users\Admin\AppData\Local\Temp\1016974001\883b525fa1.exe
            "C:\Users\Admin\AppData\Local\Temp\1016974001\883b525fa1.exe"
            3⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:3168
            • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
              "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
              4⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Checks computer location settings
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Adds Run key to start application
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:4344
              • C:\Users\Admin\AppData\Local\Temp\1006664001\Out.exe
                "C:\Users\Admin\AppData\Local\Temp\1006664001\Out.exe"
                5⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:4976
                • C:\Users\Admin\AppData\Local\Temp\1006664001\Out.exe
                  "C:\Users\Admin\AppData\Local\Temp\1006664001\Out.exe"
                  6⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  PID:2396
              • C:\Users\Admin\AppData\Local\Temp\1007054001\trunk.exe
                "C:\Users\Admin\AppData\Local\Temp\1007054001\trunk.exe"
                5⤵
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:1232
                • C:\Users\Admin\AppData\Local\Temp\onefile_1232_133790478757522716\trunk.exe
                  C:\Users\Admin\AppData\Local\Temp\1007054001\trunk.exe
                  6⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4008
              • C:\Users\Admin\AppData\Local\Temp\1007328001\b9a28c5bec.exe
                "C:\Users\Admin\AppData\Local\Temp\1007328001\b9a28c5bec.exe"
                5⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:2104
              • C:\Users\Admin\AppData\Local\Temp\1007329001\e3b14d7638.exe
                "C:\Users\Admin\AppData\Local\Temp\1007329001\e3b14d7638.exe"
                5⤵
                • Suspicious use of NtCreateUserProcessOtherParentProcess
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:4688
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 4688 -s 536
                  6⤵
                  • Program crash
                  PID:3180
              • C:\Users\Admin\AppData\Local\Temp\1007330001\e33b6ffce7.exe
                "C:\Users\Admin\AppData\Local\Temp\1007330001\e33b6ffce7.exe"
                5⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                PID:3164
              • C:\Users\Admin\AppData\Local\Temp\1007331001\f5467b8760.exe
                "C:\Users\Admin\AppData\Local\Temp\1007331001\f5467b8760.exe"
                5⤵
                • Enumerates VirtualBox registry keys
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                PID:4872
          • C:\Users\Admin\AppData\Local\Temp\1017019001\VR6f3vF.exe
            "C:\Users\Admin\AppData\Local\Temp\1017019001\VR6f3vF.exe"
            3⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:1884
          • C:\Users\Admin\AppData\Local\Temp\1017024001\kf5cl0F.exe
            "C:\Users\Admin\AppData\Local\Temp\1017024001\kf5cl0F.exe"
            3⤵
            • Checks computer location settings
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3012
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "powershell.exe" Add-MpPreference -ExclusionPath "C:\yrqii"
              4⤵
              • Command and Scripting Interpreter: PowerShell
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:712
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData"
              4⤵
              • Command and Scripting Interpreter: PowerShell
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4212
            • C:\yrqii\b94436bd4d674c0f84526489dfa06b11.exe
              "C:\yrqii\b94436bd4d674c0f84526489dfa06b11.exe"
              4⤵
              • Executes dropped EXE
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of SetWindowsHookEx
              PID:976
          • C:\Users\Admin\AppData\Local\Temp\1017027001\ANEDNjf.exe
            "C:\Users\Admin\AppData\Local\Temp\1017027001\ANEDNjf.exe"
            3⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:4024
          • C:\Users\Admin\AppData\Local\Temp\1017253001\83bd6e6b5a.exe
            "C:\Users\Admin\AppData\Local\Temp\1017253001\83bd6e6b5a.exe"
            3⤵
            • Checks computer location settings
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:3120
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"
              4⤵
                PID:3676
                • C:\Windows\system32\mode.com
                  mode 65,10
                  5⤵
                    PID:1972
                  • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                    7z.exe e file.zip -p24291711423417250691697322505 -oextracted
                    5⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1756
                  • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                    7z.exe e extracted/file_7.zip -oextracted
                    5⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4704
                  • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                    7z.exe e extracted/file_6.zip -oextracted
                    5⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3880
                  • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                    7z.exe e extracted/file_5.zip -oextracted
                    5⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4600
                  • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                    7z.exe e extracted/file_4.zip -oextracted
                    5⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of AdjustPrivilegeToken
                    PID:5112
                  • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                    7z.exe e extracted/file_3.zip -oextracted
                    5⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3660
                  • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                    7z.exe e extracted/file_2.zip -oextracted
                    5⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3440
                  • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                    7z.exe e extracted/file_1.zip -oextracted
                    5⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4120
                  • C:\Windows\system32\attrib.exe
                    attrib +H "in.exe"
                    5⤵
                    • Views/modifies file attributes
                    PID:3360
                  • C:\Users\Admin\AppData\Local\Temp\main\in.exe
                    "in.exe"
                    5⤵
                    • Executes dropped EXE
                    PID:4036
                    • C:\Windows\SYSTEM32\attrib.exe
                      attrib +H +S C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                      6⤵
                      • Views/modifies file attributes
                      PID:5072
                    • C:\Windows\SYSTEM32\attrib.exe
                      attrib +H C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                      6⤵
                      • Views/modifies file attributes
                      PID:4388
                    • C:\Windows\SYSTEM32\schtasks.exe
                      schtasks /f /CREATE /TN "Intel_PTT_EK_Recertification" /TR "C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe" /SC MINUTE
                      6⤵
                      • Scheduled Task/Job: Scheduled Task
                      PID:2440
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      powershell ping 127.0.0.1; del in.exe
                      6⤵
                      • System Network Configuration Discovery: Internet Connection Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2552
                      • C:\Windows\system32\PING.EXE
                        "C:\Windows\system32\PING.EXE" 127.0.0.1
                        7⤵
                        • System Network Configuration Discovery: Internet Connection Discovery
                        • Runs ping.exe
                        PID:2720
              • C:\Users\Admin\AppData\Local\Temp\1017254001\e3b14d7638.exe
                "C:\Users\Admin\AppData\Local\Temp\1017254001\e3b14d7638.exe"
                3⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                PID:1424
              • C:\Users\Admin\AppData\Local\Temp\1017255001\167702a417.exe
                "C:\Users\Admin\AppData\Local\Temp\1017255001\167702a417.exe"
                3⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                PID:1560
              • C:\Users\Admin\AppData\Local\Temp\1017256001\62a602801c.exe
                "C:\Users\Admin\AppData\Local\Temp\1017256001\62a602801c.exe"
                3⤵
                • Checks computer location settings
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of AdjustPrivilegeToken
                PID:3136
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  "powershell.exe" Add-MpPreference -ExclusionPath "C:\sskxb"
                  4⤵
                  • Command and Scripting Interpreter: PowerShell
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1928
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  "powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData"
                  4⤵
                  • Command and Scripting Interpreter: PowerShell
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3592
                • C:\sskxb\dec60d98cd5d401298ea9666816a0269.exe
                  "C:\sskxb\dec60d98cd5d401298ea9666816a0269.exe"
                  4⤵
                  • Executes dropped EXE
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of SetWindowsHookEx
                  PID:2840
              • C:\Users\Admin\AppData\Local\Temp\1017257001\b31c402173.exe
                "C:\Users\Admin\AppData\Local\Temp\1017257001\b31c402173.exe"
                3⤵
                • Suspicious use of NtCreateUserProcessOtherParentProcess
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                PID:4024
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 4024 -s 464
                  4⤵
                  • Program crash
                  PID:2680
              • C:\Users\Admin\AppData\Local\Temp\1017258001\dca1c63251.exe
                "C:\Users\Admin\AppData\Local\Temp\1017258001\dca1c63251.exe"
                3⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                PID:3488
                • C:\Users\Admin\AppData\Local\Temp\1017258001\dca1c63251.exe
                  "C:\Users\Admin\AppData\Local\Temp\1017258001\dca1c63251.exe"
                  4⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:3216
              • C:\Users\Admin\AppData\Local\Temp\1017259001\9ac196ab8b.exe
                "C:\Users\Admin\AppData\Local\Temp\1017259001\9ac196ab8b.exe"
                3⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of AdjustPrivilegeToken
                PID:4408
              • C:\Users\Admin\AppData\Local\Temp\1017260001\38c3b0c8af.exe
                "C:\Users\Admin\AppData\Local\Temp\1017260001\38c3b0c8af.exe"
                3⤵
                • Enumerates VirtualBox registry keys
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                PID:3696
              • C:\Users\Admin\AppData\Local\Temp\1017261001\543b7c1799.exe
                "C:\Users\Admin\AppData\Local\Temp\1017261001\543b7c1799.exe"
                3⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                PID:2068
                • C:\Users\Admin\AppData\Local\Temp\1017261001\543b7c1799.exe
                  "C:\Users\Admin\AppData\Local\Temp\1017261001\543b7c1799.exe"
                  4⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:3096
          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
            C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
            1⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious behavior: EnumeratesProcesses
            PID:3332
          • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
            C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
            1⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious behavior: EnumeratesProcesses
            PID:792
          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
            C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
            1⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious behavior: EnumeratesProcesses
            PID:4340
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4688 -ip 4688
            1⤵
              PID:2104
            • C:\PROGRA~1\VSREVO~1\REVOUN~1\ruplp.exe
              C:\PROGRA~1\VSREVO~1\REVOUN~1\ruplp.exe -Embedding
              1⤵
              • Checks computer location settings
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:4908
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4024 -ip 4024
              1⤵
                PID:2932
              • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                1⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                PID:4688
              • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                1⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                PID:1948
              • C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                1⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                PID:3256
                • C:\Windows\explorer.exe
                  explorer.exe
                  2⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1920
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe
                  2⤵
                  • System Network Configuration Discovery: Internet Connection Discovery
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1924
                  • C:\Windows\system32\PING.EXE
                    "C:\Windows\system32\PING.EXE" 127.1.10.1
                    3⤵
                    • System Network Configuration Discovery: Internet Connection Discovery
                    • Runs ping.exe
                    PID:116

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RevoUninPro.exe

                Filesize

                24.2MB

                MD5

                c8c368988a2a4c2a953b7db4bca47961

                SHA1

                5acc29b51284146a9ff7b1587c3d89416e66acdf

                SHA256

                f680e0fe00a48f6e3d079c1572682d6664f476b119745d73cb852baba58cc683

                SHA512

                5fdef1f4e3b471910fe2b12f6f6aa8bfad3f2a9c80954843085c79139823a88e0c7d921b7c01dda56871800afc20de4739682c02e9fa6a94715c64207a671b30

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Cq6Id6x.exe.log

                Filesize

                617B

                MD5

                85306571e7ae6002dd2a0fb3042b7472

                SHA1

                c897ab7434b118a8ec1fe25205903f5ec8f71241

                SHA256

                40c98b01052cd95102701b71b4fbe0eda48537435898c413239f5f888a614253

                SHA512

                0e9853dab46fd5f6f9eea44377d3802e9cc2fff7ba2f9b45c7c8fc37b860ad9c3c4beb6e1572c87964e06144504210e29038cb03e00c7e7af6ad32e6e995c76a

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                Filesize

                2KB

                MD5

                968cb9309758126772781b83adb8a28f

                SHA1

                8da30e71accf186b2ba11da1797cf67f8f78b47c

                SHA256

                92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

                SHA512

                4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                Filesize

                18KB

                MD5

                61facac88c8408a4cc1474edfbb6c975

                SHA1

                a231cc59c7eb420d1e0a856b8c9621026a740896

                SHA256

                4eb8ba2a46515040641247a022d63eccf835fdea491d7aa7e32376c325a010a4

                SHA512

                d7c7a3ac4744c976aa2cccb83ea94b7f4d556445af147b0d41df6bab48f3abc2c1e9ed05fd923111d6dde38ec4b5d0ec6f32d275c140f5f317ff776327ffe787

              • C:\Users\Admin\AppData\Local\Temp\1006664001\Out.exe

                Filesize

                2.5MB

                MD5

                7ff947867bc70055adffa2164a741b01

                SHA1

                cff424168c2f6bcef107ebc9bd65590f3ead76ae

                SHA256

                b6d6628d2dc7dea808eef05180c27abe10a1af245d624aacdacccc52a1eb7b40

                SHA512

                da507d1847056d0dc2c122c45ecbea4901a81c06890bcdbffc2f18ad4b96f0ac2c2fa9ebde1a315828c74a97af653062a8c50ce70c9b6d6966c48871150747ee

              • C:\Users\Admin\AppData\Local\Temp\1007054001\trunk.exe

                Filesize

                10.2MB

                MD5

                d3b39a6b63c3822be6f8af9b3813bbad

                SHA1

                00b020e5a1c05442612f2cec7950c2814b59b1b6

                SHA256

                786f1331a0618485b31ba763911b14fcec691bf9897bee8f42680076092b7a2f

                SHA512

                a5c7504b29798fdabf610cf65716ec1d7745956f470d86de12a52b3c8731f858764fdf78647e50b3111622e7e65f05f82cd258b98c1a0f45ef7fdc088647d4ff

              • C:\Users\Admin\AppData\Local\Temp\1007328001\b9a28c5bec.exe

                Filesize

                2.8MB

                MD5

                dfc4ac821d77ac74e88a8d6806f3b381

                SHA1

                328c4646185f83623b64acc275314337cb8507af

                SHA256

                f1fa0545bde183d84cb9b24d6635ffb5ab98bd398659e92adcbb5dc90064531d

                SHA512

                5aee1cf473a623a0b6c659a337d1960e395d67c94fc54a230b9b70936f2ad2bf983547f9c76e13ff20c37fb34dd8185cd8e5d96979f91f9749626e6fa902a2fe

              • C:\Users\Admin\AppData\Local\Temp\1007329001\e3b14d7638.exe

                Filesize

                1.9MB

                MD5

                d6070b7d0ec34e67a998dbe217c6c746

                SHA1

                64e771f2bcb20e9ccc89c8b4a9cf1b36e431d491

                SHA256

                10b27d9cb387fa4ac371de8767d5204925ca4da9c490ea8e2491b1a60c49fd85

                SHA512

                52bc768f8654cef43e62abfdba30878313aea5893d80759c633d84ce01c701b05e6f24c995f3a2568ab16ca69e6c1223b7e39c74c509fd6607bfa5e9418784f3

              • C:\Users\Admin\AppData\Local\Temp\1007330001\e33b6ffce7.exe

                Filesize

                2.8MB

                MD5

                0afe3bc3b68ddb4ebb3878a01a8bcd9a

                SHA1

                aa25366b2677ee9e0029c3e12f9063742227fe1b

                SHA256

                f3e3c4115bd289a528c02aae90a563e6b5dd6009e125d1fb142bcc7218cf068d

                SHA512

                b8067a96567d3d73af408581a6b041758bcd77f8752d8a176a1253e978d832ced0e83f2775fb951f728ae06f11c6231171fe480ad454370116c47f45fbb52bab

              • C:\Users\Admin\AppData\Local\Temp\1007331001\f5467b8760.exe

                Filesize

                4.3MB

                MD5

                aa1d9bfcb4fee4ff65cf6209fbc83204

                SHA1

                3334182b3bf48e928683a9c0a87d25ea57e8d70b

                SHA256

                dc645ba585c2d41ec553cefd46bd3dab212882cb07097905f9ed071e8882b161

                SHA512

                aec316f0ea02349b57a5e75a972edf70b8aea705a7c74f67452a5840834fca0cf70c3d099ca003bab73a25186e6f03298ea68440a03216fb40ece74b82f71d68

              • C:\Users\Admin\AppData\Local\Temp\1016920001\Cq6Id6x.exe

                Filesize

                3.1MB

                MD5

                f9b9f98592292b5cbf59c7a60e9ebaee

                SHA1

                59cc872fd0a11b259cc5b70893f35e9b5a7c8cbb

                SHA256

                5688e9e0becc622c573af2a1af4ee0676ef3907e38a9258a7801b46b7ad64665

                SHA512

                f27e4a96173aeb064f47d44ff445b1e15f6d4f39a4ad711c019bb29692caea56eb910970d22bc13ac5c57a256d71e77b12aa60c8405335a239781c57cb0eaf8e

              • C:\Users\Admin\AppData\Local\Temp\1016945001\x0qQ2DH.exe

                Filesize

                17.6MB

                MD5

                3c224e3fc892719dc1e302378e533579

                SHA1

                0a65062e1426a95bfeca355398b6fdc4912fb6b1

                SHA256

                64cc7f7906fe1ebf0b6977892abd9aa36f5e525cb241964c3986ee9e1a18312d

                SHA512

                554a26e9654eccce831e4adcee49d5e2507956935e562b134a86f332d867debfcd1f64fdb88fccb2e1eee810975d565dbc6ea1376516817ee38765e4bd733a49

              • C:\Users\Admin\AppData\Local\Temp\1016974001\883b525fa1.exe

                Filesize

                2.8MB

                MD5

                016f86f0d66ebb15269ed87eb14429bc

                SHA1

                6c6a325414f3c7c17728461f02b078c27a999a27

                SHA256

                ba265a9b0c7cd5c04311a2c739fb40e0f01690bc82a4625c33e42f1388789589

                SHA512

                c3d6ae18c5ad276d2073e5d9b8389242b592f106b76c26e9b7d5f9510823e56ec530794583e10205e63e211ce118e91956498c11aba9744b4a9d85052c8e60a2

              • C:\Users\Admin\AppData\Local\Temp\1017019001\VR6f3vF.exe

                Filesize

                1.8MB

                MD5

                ff279f4e5b1c6fbda804d2437c2dbdc8

                SHA1

                2feb3762c877a5ae3ca60eeebc37003ad0844245

                SHA256

                e115298ab160da9c7a998e4ae0b72333f64b207da165134ca45eb997a000d378

                SHA512

                c7a8bbcb122b2c7b57c8b678c5eed075ee5e7c355afbf86238282d2d3458019da1a8523520e1a1c631cd01b555f7df340545fd1e44ad678dc97c40b23428f967

              • C:\Users\Admin\AppData\Local\Temp\1017024001\kf5cl0F.exe

                Filesize

                21KB

                MD5

                14becdf1e2402e9aa6c2be0e6167041e

                SHA1

                72cbbae6878f5e06060a0038b25ede93b445f0df

                SHA256

                7a769963165063758f15f6e0cece25c9d13072f67fa0d3c25a03a5104fe0783a

                SHA512

                16b837615505f352e134afd9d8655c9cabfa5bfcfbee2c0c34f2d7d9588aa71f875e4e5feb8cdf0f7bacc00f7c1ca8dabd3b3d92afc99abf705c05c78e298b4a

              • C:\Users\Admin\AppData\Local\Temp\1017027001\ANEDNjf.exe

                Filesize

                1.8MB

                MD5

                25fb9c54265bbacc7a055174479f0b70

                SHA1

                4af069a2ec874703a7e29023d23a1ada491b584e

                SHA256

                552f8be2c6b2208a89c728f68488930c661b3a06c35a20d133ef7d3c63a86b9c

                SHA512

                7dfd9e0f3fa2d68a6ce8c952e3b755559db73bb7a06c95ad6ed8ac16dedb49be8b8337afc07c9c682f0c4be9db291a551286353e2e2b624223487dc1c8b54668

              • C:\Users\Admin\AppData\Local\Temp\1017253001\83bd6e6b5a.exe

                Filesize

                4.2MB

                MD5

                3a425626cbd40345f5b8dddd6b2b9efa

                SHA1

                7b50e108e293e54c15dce816552356f424eea97a

                SHA256

                ba9212d2d5cd6df5eb7933fb37c1b72a648974c1730bf5c32439987558f8e8b1

                SHA512

                a7538c6b7e17c35f053721308b8d6dc53a90e79930ff4ed5cffecaa97f4d0fbc5f9e8b59f1383d8f0699c8d4f1331f226af71d40325022d10b885606a72fe668

              • C:\Users\Admin\AppData\Local\Temp\1017255001\167702a417.exe

                Filesize

                4.3MB

                MD5

                d6cfec5f8c250d92d751030c95d46aec

                SHA1

                70439cf2611f97c84af487c44b88703d004a2bca

                SHA256

                0200c5657794ccc0916aae772004b7f72a793b77dc807b51b2f88e597813f611

                SHA512

                a939f9af174d37e3d32d0794b1f14110deffd7847b884a79b5fd300bcc7c30ce285f6dbbc41ad6ab5bd237bb6353efb7ddee903a8ec155a10840dec8c25d9bbb

              • C:\Users\Admin\AppData\Local\Temp\1017258001\dca1c63251.exe

                Filesize

                747KB

                MD5

                8a9cb17c0224a01bd34b46495983c50a

                SHA1

                00296ea6a56f6e10a0f1450a20c5fb329b8856c1

                SHA256

                3d51b9523b387859bc0d94246dfb216cfa82f9d650c8d11be11ed67f70e7440b

                SHA512

                1472e4670f469c43227b965984ecc223a526f6284363d8e08a3b5b55e602ccce62df4bc49939ee5bd7df7b0c26e20da896b084eccab767f8728e6bf14d71c840

              • C:\Users\Admin\AppData\Local\Temp\1017259001\9ac196ab8b.exe

                Filesize

                3.1MB

                MD5

                c00a67d527ef38dc6f49d0ad7f13b393

                SHA1

                7b8f2de130ab5e4e59c3c2f4a071bda831ac219d

                SHA256

                12226ccae8c807641241ba5178d853aad38984eefb0c0c4d65abc4da3f9787c3

                SHA512

                9286d267b167cba01e55e68c8c5582f903bed0dd8bc4135eb528ef6814e60e7d4dda2b3611e13efb56aa993635fbab218b0885daf5daea6043061d8384af40ca

              • C:\Users\Admin\AppData\Local\Temp\1017261001\543b7c1799.exe

                Filesize

                758KB

                MD5

                afd936e441bf5cbdb858e96833cc6ed3

                SHA1

                3491edd8c7caf9ae169e21fb58bccd29d95aefef

                SHA256

                c6491d7a6d70c7c51baca7436464667b4894e4989fa7c5e05068dde4699e1cbf

                SHA512

                928c15a1eda602b2a66a53734f3f563ab9626882104e30ee2bf5106cfd6e08ec54f96e3063f1ab89bf13be2c8822a8419f5d8ee0a3583a4c479785226051a325

              • C:\Users\Admin\AppData\Local\Temp\NordVPNSetup.exe

                Filesize

                15.0MB

                MD5

                00fad648745710b9c4d16c4830416d80

                SHA1

                fafb219fe26e065cc11d4c12a4960447509b2a84

                SHA256

                e4561ffd0993938234d207ce56d5fe775c4ddb704f7be63003026d43eae0a337

                SHA512

                21e7b3965d1f54eb671b46e272161a426dd8a4151208b154c7fbf144725c38d593d513fb6f77cd1cef4df651266fc235a76023102b5fdc85cc8cc67da6ded847

              • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\VCRUNTIME140_1.dll

                Filesize

                48KB

                MD5

                f8dfa78045620cf8a732e67d1b1eb53d

                SHA1

                ff9a604d8c99405bfdbbf4295825d3fcbc792704

                SHA256

                a113f192195f245f17389e6ecbed8005990bcb2476ddad33f7c4c6c86327afe5

                SHA512

                ba7f8b7ab0deb7a7113124c28092b543e216ca08d1cf158d9f40a326fb69f4a2511a41a59ea8482a10c9ec4ec8ac69b70dfe9ca65e525097d93b819d498da371

              • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\_socket.pyd

                Filesize

                81KB

                MD5

                69801d1a0809c52db984602ca2653541

                SHA1

                0f6e77086f049a7c12880829de051dcbe3d66764

                SHA256

                67aca001d36f2fce6d88dbf46863f60c0b291395b6777c22b642198f98184ba3

                SHA512

                5fce77dd567c046feb5a13baf55fdd8112798818d852dfecc752dac87680ce0b89edfbfbdab32404cf471b70453a33f33488d3104cd82f4e0b94290e83eae7bb

              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_sg5p3app.rts.ps1

                Filesize

                60B

                MD5

                d17fe0a3f47be24a6453e9ef58c94641

                SHA1

                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                SHA256

                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                SHA512

                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

              • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                Filesize

                2.8MB

                MD5

                157e44350b06a516680ed7b7584c5e31

                SHA1

                fc08a1bccbef19fc0c60be65c939ecd344c28d96

                SHA256

                09bae49e2d08d3316490b621a37fa44ec46eb894133664fffb2b6202e7364c94

                SHA512

                2b362a144aa0304cbaf890e6a2e63ba7f962f3772d4f74ae5c3af469466df6f5c3ed6c4bf409a5849cc6f1dce5e7cd56fd62ef1d692d4722035bc0c1c699beda

              • C:\Users\Admin\AppData\Local\Temp\is-33UVR.tmp\NordVPNSetup.tmp

                Filesize

                920KB

                MD5

                ce14f23d9bfc00a3cc5ceb06a25030e7

                SHA1

                c63991558fb7c45555a1c4e53151bdb518b15eec

                SHA256

                5bd02d57433581efc6e14f6aefa4d1b5a52051f2ca269bde439b50658fa0bc39

                SHA512

                6497e85f1009b26fe68317a695467505e6f75270f07308ee7c321abe9b08b7ae563598b11b44629051759f321a39ec7595c0c6e48b9778146ee7f42096ff88ce

              • C:\Users\Admin\AppData\Local\Temp\is-F37IS.tmp\_isetup\_RegDLL.tmp

                Filesize

                4KB

                MD5

                0ee914c6f0bb93996c75941e1ad629c6

                SHA1

                12e2cb05506ee3e82046c41510f39a258a5e5549

                SHA256

                4dc09bac0613590f1fac8771d18af5be25a1e1cb8fdbf4031aa364f3057e74a2

                SHA512

                a899519e78125c69dc40f7e371310516cf8faa69e3b3ff747e0ddf461f34e50a9ff331ab53b4d07bb45465039e8eba2ee4684b3ee56987977ae8c7721751f5f9

              • C:\Users\Admin\AppData\Local\Temp\is-F37IS.tmp\_isetup\_setup64.tmp

                Filesize

                6KB

                MD5

                4ff75f505fddcc6a9ae62216446205d9

                SHA1

                efe32d504ce72f32e92dcf01aa2752b04d81a342

                SHA256

                a4c86fc4836ac728d7bd96e7915090fd59521a9e74f1d06ef8e5a47c8695fd81

                SHA512

                ba0469851438212d19906d6da8c4ae95ff1c0711a095d9f21f13530a6b8b21c3acbb0ff55edb8a35b41c1a9a342f5d3421c00ba395bc13bb1ef5902b979ce824

              • C:\Users\Admin\AppData\Local\Temp\is-F37IS.tmp\_isetup\_shfoldr.dll

                Filesize

                22KB

                MD5

                92dc6ef532fbb4a5c3201469a5b5eb63

                SHA1

                3e89ff837147c16b4e41c30d6c796374e0b8e62c

                SHA256

                9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

                SHA512

                9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

              • C:\Users\Admin\AppData\Local\Temp\is-F37IS.tmp\b2p.dll

                Filesize

                22KB

                MD5

                ab35386487b343e3e82dbd2671ff9dab

                SHA1

                03591d07aea3309b631a7d3a6e20a92653e199b8

                SHA256

                c3729545522fcff70db61046c0efd962df047d40e3b5ccd2272866540fc872b2

                SHA512

                b67d7384c769b2b1fdd3363fc3b47d300c2ea4d37334acfd774cf29169c0a504ba813dc3ecbda5b71a3f924110a77a363906b16a87b4b1432748557567d1cf09

              • C:\Users\Admin\AppData\Local\Temp\is-F37IS.tmp\botva2.dll

                Filesize

                37KB

                MD5

                67965a5957a61867d661f05ae1f4773e

                SHA1

                f14c0a4f154dc685bb7c65b2d804a02a0fb2360d

                SHA256

                450b9b0ba25bf068afbc2b23d252585a19e282939bf38326384ea9112dfd0105

                SHA512

                c6942818b9026dc5db2d62999d32cf99fe7289f79a28b8345af17acf9d13b2229a5e917a48ff1f6d59715bdbcb00c1625e0302abcfe10ca7e0475762e0a3f41b

              • C:\Users\Admin\AppData\Local\Temp\is-F37IS.tmp\iswin7logo.dll

                Filesize

                39KB

                MD5

                1ea948aad25ddd347d9b80bef6df9779

                SHA1

                0be971e67a6c3b1297e572d97c14f74b05dafed3

                SHA256

                30eb67bdd71d3a359819a72990029269672d52f597a2d1084d838caae91a6488

                SHA512

                f2cc5dce9754622f5a40c1ca20b4f00ac01197b8401fd4bd888bfdd296a43ca91a3ca261d0e9e01ee51591666d2852e34cee80badadcb77511b8a7ae72630545

              • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

                Filesize

                458KB

                MD5

                619f7135621b50fd1900ff24aade1524

                SHA1

                6c7ea8bbd435163ae3945cbef30ef6b9872a4591

                SHA256

                344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

                SHA512

                2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

              • C:\Users\Admin\AppData\Local\Temp\onefile_1232_133790478757522716\VCRUNTIME140.dll

                Filesize

                116KB

                MD5

                be8dbe2dc77ebe7f88f910c61aec691a

                SHA1

                a19f08bb2b1c1de5bb61daf9f2304531321e0e40

                SHA256

                4d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83

                SHA512

                0da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655

              • C:\Users\Admin\AppData\Local\Temp\onefile_1232_133790478757522716\_ssl.pyd

                Filesize

                174KB

                MD5

                90f080c53a2b7e23a5efd5fd3806f352

                SHA1

                e3b339533bc906688b4d885bdc29626fbb9df2fe

                SHA256

                fa5e6fe9545f83704f78316e27446a0026fbebb9c0c3c63faed73a12d89784d4

                SHA512

                4b9b8899052c1e34675985088d39fe7c95bfd1bbce6fd5cbac8b1e61eda2fbb253eef21f8a5362ea624e8b1696f1e46c366835025aabcb7aa66c1e6709aab58a

              • C:\Users\Admin\AppData\Local\Temp\onefile_1232_133790478757522716\_wmi.pyd

                Filesize

                36KB

                MD5

                827615eee937880862e2f26548b91e83

                SHA1

                186346b816a9de1ba69e51042faf36f47d768b6c

                SHA256

                73b7ee3156ef63d6eb7df9900ef3d200a276df61a70d08bd96f5906c39a3ac32

                SHA512

                45114caf2b4a7678e6b1e64d84b118fb3437232b4c0add345ddb6fbda87cebd7b5adad11899bdcd95ddfe83fdc3944a93674ca3d1b5f643a2963fbe709e44fb8

              • C:\Users\Admin\AppData\Local\Temp\onefile_1232_133790478757522716\libcrypto-3.dll

                Filesize

                5.0MB

                MD5

                123ad0908c76ccba4789c084f7a6b8d0

                SHA1

                86de58289c8200ed8c1fc51d5f00e38e32c1aad5

                SHA256

                4e5d5d20d6d31e72ab341c81e97b89e514326c4c861b48638243bdf0918cfa43

                SHA512

                80fae0533ba9a2f5fa7806e86f0db8b6aab32620dde33b70a3596938b529f3822856de75bddb1b06721f8556ec139d784bc0bb9c8da0d391df2c20a80d33cb04

              • C:\Users\Admin\AppData\Local\Temp\onefile_1232_133790478757522716\libssl-3.dll

                Filesize

                774KB

                MD5

                4ff168aaa6a1d68e7957175c8513f3a2

                SHA1

                782f886709febc8c7cebcec4d92c66c4d5dbcf57

                SHA256

                2e4d35b681a172d3298caf7dc670451be7a8ba27c26446efc67470742497a950

                SHA512

                c372b759b8c7817f2cbb78eccc5a42fa80bdd8d549965bd925a97c3eebdce0335fbfec3995430064dead0f4db68ebb0134eb686a0be195630c49f84b468113e3

              • C:\Users\Admin\AppData\Local\Temp\onefile_1232_133790478757522716\python312.dll

                Filesize

                6.6MB

                MD5

                166cc2f997cba5fc011820e6b46e8ea7

                SHA1

                d6179213afea084f02566ea190202c752286ca1f

                SHA256

                c045b57348c21f5f810bae60654ae39490846b487378e917595f1f95438f9546

                SHA512

                49d9d4df3d7ef5737e947a56e48505a2212e05fdbcd7b83d689639728639b7fd3be39506d7cfcb7563576ebee879fd305370fdb203909ed9b522b894dd87aacb

              • C:\Users\Admin\AppData\Local\Temp\onefile_1232_133790478757522716\select.pyd

                Filesize

                30KB

                MD5

                7c14c7bc02e47d5c8158383cb7e14124

                SHA1

                5ee9e5968e7b5ce9e4c53a303dac9fc8faf98df3

                SHA256

                00bd8bb6dec8c291ec14c8ddfb2209d85f96db02c7a3c39903803384ff3a65e5

                SHA512

                af70cbdd882b923013cb47545633b1147ce45c547b8202d7555043cfa77c1deee8a51a2bc5f93db4e3b9cbf7818f625ca8e3b367bffc534e26d35f475351a77c

              • C:\Users\Admin\AppData\Local\Temp\onefile_1232_133790478757522716\trunk.exe

                Filesize

                18.0MB

                MD5

                86ddf66d8651d0baa1cc13d6f8c18dc1

                SHA1

                ee15109134300e555085811f4060048e245269f9

                SHA256

                ee045dffee8b48356106a2105803b73776b73bf7462d364b1f82540fcf72f4cf

                SHA512

                385fce7ded01cba93f842a1b698b78e3eb1d73833c282669ebe6bea22ec6c4957b179325614f17ecb7c7357051fb7381e011cf2ebc0f5ca2f24414f0e23a0c6c

              • C:\Windows\System32\drivers\revoflt.sys

                Filesize

                37KB

                MD5

                ec8e58e6b58b4fcde77431cda3a24c0e

                SHA1

                ebb474009b2a2fbce648adff4b8b797fcd00c997

                SHA256

                25667717bf4691957f07a6363585e2c7eaf22e5fd7229bf32c91ea59ef4a2edd

                SHA512

                e2c667ebe97973ff27c1edf3e45ebf7950bc8d7aad1126da25290a2f590b21808654694cbe6a0ad1d3649566ec7645eb6b3379c7d7c0a650d5381a69e9cdade4

              • C:\yrqii\b94436bd4d674c0f84526489dfa06b11.exe

                Filesize

                1.2MB

                MD5

                577cd52217da6d7163cea46bb01c107f

                SHA1

                82b31cc52c538238e63bdfc22d1ea306ea0b852a

                SHA256

                139762e396fb930400fab8faab80cb679abbe642144261cba24973fb23bcd728

                SHA512

                8abad4eaf2a302dfd9ead058e8c14d996437975730125c46d034a71028921ff36ff5d157ad3671e328ac667ec8095db19fa14a9e8eaaf1a7738aa3d0120b5474

              • memory/712-294-0x0000000005450000-0x00000000054B6000-memory.dmp

                Filesize

                408KB

              • memory/712-292-0x0000000004AC0000-0x0000000004AE2000-memory.dmp

                Filesize

                136KB

              • memory/712-318-0x0000000006A20000-0x0000000006A3E000-memory.dmp

                Filesize

                120KB

              • memory/712-307-0x0000000006030000-0x0000000006062000-memory.dmp

                Filesize

                200KB

              • memory/712-308-0x000000006EA90000-0x000000006EADC000-memory.dmp

                Filesize

                304KB

              • memory/712-306-0x0000000005AA0000-0x0000000005AEC000-memory.dmp

                Filesize

                304KB

              • memory/712-305-0x0000000005A60000-0x0000000005A7E000-memory.dmp

                Filesize

                120KB

              • memory/712-304-0x00000000055C0000-0x0000000005914000-memory.dmp

                Filesize

                3.3MB

              • memory/712-326-0x0000000006FD0000-0x0000000006FE4000-memory.dmp

                Filesize

                80KB

              • memory/712-321-0x0000000006D90000-0x0000000006DAA000-memory.dmp

                Filesize

                104KB

              • memory/712-293-0x00000000053E0000-0x0000000005446000-memory.dmp

                Filesize

                408KB

              • memory/712-319-0x0000000006A50000-0x0000000006AF3000-memory.dmp

                Filesize

                652KB

              • memory/712-290-0x0000000004D40000-0x0000000005368000-memory.dmp

                Filesize

                6.2MB

              • memory/712-325-0x0000000006FC0000-0x0000000006FCE000-memory.dmp

                Filesize

                56KB

              • memory/712-289-0x0000000002130000-0x0000000002166000-memory.dmp

                Filesize

                216KB

              • memory/712-327-0x00000000070D0000-0x00000000070EA000-memory.dmp

                Filesize

                104KB

              • memory/712-328-0x00000000070B0000-0x00000000070B8000-memory.dmp

                Filesize

                32KB

              • memory/712-324-0x0000000006F90000-0x0000000006FA1000-memory.dmp

                Filesize

                68KB

              • memory/712-320-0x00000000073D0000-0x0000000007A4A000-memory.dmp

                Filesize

                6.5MB

              • memory/712-322-0x0000000006E00000-0x0000000006E0A000-memory.dmp

                Filesize

                40KB

              • memory/712-323-0x0000000007010000-0x00000000070A6000-memory.dmp

                Filesize

                600KB

              • memory/792-222-0x00000000000F0000-0x0000000000400000-memory.dmp

                Filesize

                3.1MB

              • memory/792-244-0x00000000000F0000-0x0000000000400000-memory.dmp

                Filesize

                3.1MB

              • memory/972-116-0x0000000000400000-0x000000000064F000-memory.dmp

                Filesize

                2.3MB

              • memory/972-111-0x0000000000400000-0x000000000064F000-memory.dmp

                Filesize

                2.3MB

              • memory/972-156-0x0000000000400000-0x000000000064F000-memory.dmp

                Filesize

                2.3MB

              • memory/972-155-0x0000000000400000-0x000000000064F000-memory.dmp

                Filesize

                2.3MB

              • memory/972-95-0x0000000000400000-0x000000000064F000-memory.dmp

                Filesize

                2.3MB

              • memory/972-100-0x0000000000400000-0x000000000064F000-memory.dmp

                Filesize

                2.3MB

              • memory/972-99-0x0000000000400000-0x000000000064F000-memory.dmp

                Filesize

                2.3MB

              • memory/972-94-0x0000000000400000-0x000000000064F000-memory.dmp

                Filesize

                2.3MB

              • memory/972-171-0x0000000000400000-0x000000000064F000-memory.dmp

                Filesize

                2.3MB

              • memory/972-169-0x0000000000400000-0x000000000064F000-memory.dmp

                Filesize

                2.3MB

              • memory/972-98-0x0000000000400000-0x000000000064F000-memory.dmp

                Filesize

                2.3MB

              • memory/972-97-0x0000000000400000-0x000000000064F000-memory.dmp

                Filesize

                2.3MB

              • memory/972-193-0x0000000000400000-0x000000000064F000-memory.dmp

                Filesize

                2.3MB

              • memory/972-190-0x0000000000400000-0x000000000064F000-memory.dmp

                Filesize

                2.3MB

              • memory/972-206-0x0000000000400000-0x000000000064F000-memory.dmp

                Filesize

                2.3MB

              • memory/972-101-0x0000000000400000-0x000000000064F000-memory.dmp

                Filesize

                2.3MB

              • memory/972-96-0x0000000000400000-0x000000000064F000-memory.dmp

                Filesize

                2.3MB

              • memory/972-85-0x0000000000400000-0x000000000064F000-memory.dmp

                Filesize

                2.3MB

              • memory/972-157-0x0000000000400000-0x000000000064F000-memory.dmp

                Filesize

                2.3MB

              • memory/972-109-0x0000000000400000-0x000000000064F000-memory.dmp

                Filesize

                2.3MB

              • memory/972-112-0x0000000000400000-0x000000000064F000-memory.dmp

                Filesize

                2.3MB

              • memory/972-125-0x0000000000400000-0x000000000064F000-memory.dmp

                Filesize

                2.3MB

              • memory/972-114-0x0000000000400000-0x000000000064F000-memory.dmp

                Filesize

                2.3MB

              • memory/972-113-0x0000000000400000-0x000000000064F000-memory.dmp

                Filesize

                2.3MB

              • memory/972-110-0x0000000000400000-0x000000000064F000-memory.dmp

                Filesize

                2.3MB

              • memory/972-108-0x0000000000400000-0x000000000064F000-memory.dmp

                Filesize

                2.3MB

              • memory/972-118-0x0000000000400000-0x000000000064F000-memory.dmp

                Filesize

                2.3MB

              • memory/972-119-0x0000000000400000-0x000000000064F000-memory.dmp

                Filesize

                2.3MB

              • memory/976-394-0x00000000006D0000-0x0000000000A8B000-memory.dmp

                Filesize

                3.7MB

              • memory/976-637-0x00000000006D0000-0x0000000000A8B000-memory.dmp

                Filesize

                3.7MB

              • memory/1424-779-0x0000000000320000-0x00000000007C6000-memory.dmp

                Filesize

                4.6MB

              • memory/1424-814-0x0000000000320000-0x00000000007C6000-memory.dmp

                Filesize

                4.6MB

              • memory/1560-833-0x0000000000DA0000-0x0000000001985000-memory.dmp

                Filesize

                11.9MB

              • memory/1560-831-0x0000000000DA0000-0x0000000001985000-memory.dmp

                Filesize

                11.9MB

              • memory/1884-262-0x0000000000D10000-0x00000000011B6000-memory.dmp

                Filesize

                4.6MB

              • memory/1884-382-0x0000000000D10000-0x00000000011B6000-memory.dmp

                Filesize

                4.6MB

              • memory/1884-362-0x0000000000D10000-0x00000000011B6000-memory.dmp

                Filesize

                4.6MB

              • memory/1928-883-0x000000006F310000-0x000000006F35C000-memory.dmp

                Filesize

                304KB

              • memory/1928-878-0x0000000005B60000-0x0000000005EB4000-memory.dmp

                Filesize

                3.3MB

              • memory/1928-908-0x0000000007500000-0x0000000007514000-memory.dmp

                Filesize

                80KB

              • memory/1928-906-0x00000000074C0000-0x00000000074D1000-memory.dmp

                Filesize

                68KB

              • memory/1928-879-0x0000000006030000-0x000000000607C000-memory.dmp

                Filesize

                304KB

              • memory/1928-893-0x00000000071B0000-0x0000000007253000-memory.dmp

                Filesize

                652KB

              • memory/2104-663-0x0000000000E50000-0x0000000001352000-memory.dmp

                Filesize

                5.0MB

              • memory/2104-665-0x0000000000E50000-0x0000000001352000-memory.dmp

                Filesize

                5.0MB

              • memory/2296-164-0x00000000071D0000-0x00000000071DF000-memory.dmp

                Filesize

                60KB

              • memory/2296-160-0x0000000072CF0000-0x0000000072D01000-memory.dmp

                Filesize

                68KB

              • memory/2296-138-0x0000000073040000-0x000000007305B000-memory.dmp

                Filesize

                108KB

              • memory/2552-727-0x0000020A48420000-0x0000020A48442000-memory.dmp

                Filesize

                136KB

              • memory/2920-104-0x0000000000400000-0x0000000000419000-memory.dmp

                Filesize

                100KB

              • memory/3012-287-0x0000000000380000-0x000000000038C000-memory.dmp

                Filesize

                48KB

              • memory/3160-19-0x0000000000E11000-0x0000000000E3F000-memory.dmp

                Filesize

                184KB

              • memory/3160-69-0x0000000000E10000-0x000000000111F000-memory.dmp

                Filesize

                3.1MB

              • memory/3160-24-0x0000000000E10000-0x000000000111F000-memory.dmp

                Filesize

                3.1MB

              • memory/3160-18-0x0000000000E10000-0x000000000111F000-memory.dmp

                Filesize

                3.1MB

              • memory/3160-20-0x0000000000E10000-0x000000000111F000-memory.dmp

                Filesize

                3.1MB

              • memory/3160-21-0x0000000000E10000-0x000000000111F000-memory.dmp

                Filesize

                3.1MB

              • memory/3160-57-0x0000000000E10000-0x000000000111F000-memory.dmp

                Filesize

                3.1MB

              • memory/3160-22-0x0000000000E10000-0x000000000111F000-memory.dmp

                Filesize

                3.1MB

              • memory/3160-25-0x0000000000E10000-0x000000000111F000-memory.dmp

                Filesize

                3.1MB

              • memory/3160-26-0x0000000000E10000-0x000000000111F000-memory.dmp

                Filesize

                3.1MB

              • memory/3160-56-0x0000000000E10000-0x000000000111F000-memory.dmp

                Filesize

                3.1MB

              • memory/3160-23-0x0000000000E10000-0x000000000111F000-memory.dmp

                Filesize

                3.1MB

              • memory/3160-53-0x0000000000E10000-0x000000000111F000-memory.dmp

                Filesize

                3.1MB

              • memory/3160-67-0x0000000000E10000-0x000000000111F000-memory.dmp

                Filesize

                3.1MB

              • memory/3160-68-0x0000000000E10000-0x000000000111F000-memory.dmp

                Filesize

                3.1MB

              • memory/3164-795-0x00000000003B0000-0x00000000006C2000-memory.dmp

                Filesize

                3.1MB

              • memory/3164-793-0x00000000003B0000-0x00000000006C2000-memory.dmp

                Filesize

                3.1MB

              • memory/3168-187-0x0000000000D80000-0x0000000001090000-memory.dmp

                Filesize

                3.1MB

              • memory/3168-217-0x0000000000D80000-0x0000000001090000-memory.dmp

                Filesize

                3.1MB

              • memory/3332-52-0x0000000000E10000-0x000000000111F000-memory.dmp

                Filesize

                3.1MB

              • memory/3332-51-0x0000000000E10000-0x000000000111F000-memory.dmp

                Filesize

                3.1MB

              • memory/3592-915-0x00000000057C0000-0x0000000005B14000-memory.dmp

                Filesize

                3.3MB

              • memory/3896-0-0x0000000000500000-0x000000000080F000-memory.dmp

                Filesize

                3.1MB

              • memory/3896-3-0x0000000000500000-0x000000000080F000-memory.dmp

                Filesize

                3.1MB

              • memory/3896-2-0x0000000000501000-0x000000000052F000-memory.dmp

                Filesize

                184KB

              • memory/3896-4-0x0000000000500000-0x000000000080F000-memory.dmp

                Filesize

                3.1MB

              • memory/3896-17-0x0000000000500000-0x000000000080F000-memory.dmp

                Filesize

                3.1MB

              • memory/3896-1-0x0000000077504000-0x0000000077506000-memory.dmp

                Filesize

                8KB

              • memory/4024-907-0x0000000000580000-0x0000000000A42000-memory.dmp

                Filesize

                4.8MB

              • memory/4024-616-0x0000000000570000-0x0000000000A1B000-memory.dmp

                Filesize

                4.7MB

              • memory/4024-378-0x0000000000570000-0x0000000000A1B000-memory.dmp

                Filesize

                4.7MB

              • memory/4024-645-0x0000000000570000-0x0000000000A1B000-memory.dmp

                Filesize

                4.7MB

              • memory/4024-868-0x0000000000580000-0x0000000000A42000-memory.dmp

                Filesize

                4.8MB

              • memory/4036-715-0x00007FF79E890000-0x00007FF79ED20000-memory.dmp

                Filesize

                4.6MB

              • memory/4036-717-0x00007FF79E890000-0x00007FF79ED20000-memory.dmp

                Filesize

                4.6MB

              • memory/4212-347-0x0000000073970000-0x00000000739BC000-memory.dmp

                Filesize

                304KB

              • memory/4212-358-0x0000000007440000-0x0000000007451000-memory.dmp

                Filesize

                68KB

              • memory/4212-346-0x0000000006410000-0x000000000645C000-memory.dmp

                Filesize

                304KB

              • memory/4212-334-0x0000000005870000-0x0000000005BC4000-memory.dmp

                Filesize

                3.3MB

              • memory/4212-359-0x0000000007480000-0x0000000007494000-memory.dmp

                Filesize

                80KB

              • memory/4340-224-0x0000000000E10000-0x000000000111F000-memory.dmp

                Filesize

                3.1MB

              • memory/4340-234-0x0000000000E10000-0x000000000111F000-memory.dmp

                Filesize

                3.1MB

              • memory/4344-288-0x00000000000F0000-0x0000000000400000-memory.dmp

                Filesize

                3.1MB

              • memory/4344-220-0x00000000000F0000-0x0000000000400000-memory.dmp

                Filesize

                3.1MB

              • memory/4392-65-0x0000000000400000-0x0000000000456000-memory.dmp

                Filesize

                344KB

              • memory/4392-62-0x0000000000400000-0x0000000000456000-memory.dmp

                Filesize

                344KB

              • memory/4444-45-0x000000007311E000-0x000000007311F000-memory.dmp

                Filesize

                4KB

              • memory/4444-46-0x0000000000030000-0x0000000000350000-memory.dmp

                Filesize

                3.1MB

              • memory/4444-54-0x000000007311E000-0x000000007311F000-memory.dmp

                Filesize

                4KB

              • memory/4444-58-0x0000000004F80000-0x00000000050D6000-memory.dmp

                Filesize

                1.3MB

              • memory/4444-66-0x0000000073110000-0x00000000738C0000-memory.dmp

                Filesize

                7.7MB

              • memory/4444-49-0x0000000073110000-0x00000000738C0000-memory.dmp

                Filesize

                7.7MB

              • memory/4444-55-0x0000000073110000-0x00000000738C0000-memory.dmp

                Filesize

                7.7MB

              • memory/4444-59-0x0000000005680000-0x0000000005C24000-memory.dmp

                Filesize

                5.6MB

              • memory/4444-47-0x0000000004C50000-0x0000000004CEC000-memory.dmp

                Filesize

                624KB

              • memory/4444-60-0x0000000004B30000-0x0000000004B52000-memory.dmp

                Filesize

                136KB

              • memory/4444-48-0x0000000073110000-0x00000000738C0000-memory.dmp

                Filesize

                7.7MB

              • memory/4688-749-0x0000000000D90000-0x0000000001252000-memory.dmp

                Filesize

                4.8MB

              • memory/4688-726-0x0000000000D90000-0x0000000001252000-memory.dmp

                Filesize

                4.8MB

              • memory/4872-811-0x00000000006D0000-0x0000000001231000-memory.dmp

                Filesize

                11.4MB

              • memory/4872-882-0x00000000006D0000-0x0000000001231000-memory.dmp

                Filesize

                11.4MB

              • memory/4872-835-0x00000000006D0000-0x0000000001231000-memory.dmp

                Filesize

                11.4MB