Analysis

  • max time kernel
    147s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-12-2024 13:13

General

  • Target

    file.exe

  • Size

    2.9MB

  • MD5

    eb5e8af364226452a7b60cfdf34ce69b

  • SHA1

    cc80c76f29701db1dc2862d0ba28bd6a15495db1

  • SHA256

    c0645847e49ab8e30b22d510db3b31c8cb9e7301fa599c2cdacf4978f340abc8

  • SHA512

    62e312e1a75b8acd276b7fb6bfafb9dc4568f81415931b860cb5354ba3c3e0a0f0f2dfa683aabc69569e6b0e7d0bd830259b65e63af09ea0f3ec43ba58fb46f4

  • SSDEEP

    49152:XTJjZdsdiRYaCGZPNYWJuwrAZRvE5JitgU7sT/8az/tBBTgmEg:XTJjZdsdiRYTaNYWJuwsLvEnpU7Ta/J0

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

Extracted

Family

cryptbot

C2

http://home.fivetk5vt.top/hLfzXsaqNtoEGyaUtOMJ1734

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • CryptBot

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Cryptbot family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Enumerates VirtualBox registry keys 2 TTPs 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
  • XMRig Miner payload 10 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 20 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 30 IoCs
  • Identifies Wine through registry keys 2 TTPs 10 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 8 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 25 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 45 IoCs
  • Suspicious use of FindShellTrayWindow 33 IoCs
  • Suspicious use of SendNotifyMessage 31 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Views/modifies file attributes 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:3172
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:412
      • C:\Users\Admin\AppData\Local\Temp\1017613001\b41db8ba86.exe
        "C:\Users\Admin\AppData\Local\Temp\1017613001\b41db8ba86.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2368
        • C:\Users\Admin\AppData\Local\Temp\1017613001\b41db8ba86.exe
          "C:\Users\Admin\AppData\Local\Temp\1017613001\b41db8ba86.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:3760
      • C:\Users\Admin\AppData\Local\Temp\1017614001\4b9dc82a52.exe
        "C:\Users\Admin\AppData\Local\Temp\1017614001\4b9dc82a52.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2556
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2280
          • C:\Windows\system32\mode.com
            mode 65,10
            5⤵
              PID:3292
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e file.zip -p24291711423417250691697322505 -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:3628
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_7.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:724
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_6.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:1172
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_5.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:4992
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_4.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:4588
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_3.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:3320
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_2.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:1572
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_1.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:1848
            • C:\Windows\system32\attrib.exe
              attrib +H "in.exe"
              5⤵
              • Views/modifies file attributes
              PID:2308
            • C:\Users\Admin\AppData\Local\Temp\main\in.exe
              "in.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:4840
              • C:\Windows\SYSTEM32\attrib.exe
                attrib +H +S C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                6⤵
                • Views/modifies file attributes
                PID:4040
              • C:\Windows\SYSTEM32\attrib.exe
                attrib +H C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                6⤵
                • Views/modifies file attributes
                PID:3560
              • C:\Windows\SYSTEM32\schtasks.exe
                schtasks /f /CREATE /TN "Intel_PTT_EK_Recertification" /TR "C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe" /SC MINUTE
                6⤵
                • Scheduled Task/Job: Scheduled Task
                PID:1888
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell ping 127.0.0.1; del in.exe
                6⤵
                • System Network Configuration Discovery: Internet Connection Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1060
                • C:\Windows\system32\PING.EXE
                  "C:\Windows\system32\PING.EXE" 127.0.0.1
                  7⤵
                  • System Network Configuration Discovery: Internet Connection Discovery
                  • Runs ping.exe
                  PID:3464
        • C:\Users\Admin\AppData\Local\Temp\1017615001\2958459f0d.exe
          "C:\Users\Admin\AppData\Local\Temp\1017615001\2958459f0d.exe"
          3⤵
          • Enumerates VirtualBox registry keys
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:2188
        • C:\Users\Admin\AppData\Local\Temp\1017616001\74a7219e28.exe
          "C:\Users\Admin\AppData\Local\Temp\1017616001\74a7219e28.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5100
          • C:\Users\Admin\AppData\Local\Temp\1017616001\74a7219e28.exe
            "C:\Users\Admin\AppData\Local\Temp\1017616001\74a7219e28.exe"
            4⤵
            • Executes dropped EXE
            PID:1976
          • C:\Users\Admin\AppData\Local\Temp\1017616001\74a7219e28.exe
            "C:\Users\Admin\AppData\Local\Temp\1017616001\74a7219e28.exe"
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:2892
        • C:\Users\Admin\AppData\Local\Temp\1017617001\5b0cef2ebb.exe
          "C:\Users\Admin\AppData\Local\Temp\1017617001\5b0cef2ebb.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:2204
        • C:\Users\Admin\AppData\Local\Temp\1017618001\826f310eb3.exe
          "C:\Users\Admin\AppData\Local\Temp\1017618001\826f310eb3.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:2800
        • C:\Users\Admin\AppData\Local\Temp\1017619001\476376ccb0.exe
          "C:\Users\Admin\AppData\Local\Temp\1017619001\476376ccb0.exe"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:1100
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM firefox.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:404
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM chrome.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:4620
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM msedge.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:3316
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM opera.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:4364
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM brave.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:5104
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
            4⤵
              PID:1976
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                5⤵
                • Checks processor information in registry
                • Modifies registry class
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                • Suspicious use of SetWindowsHookEx
                PID:1092
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1972 -parentBuildID 20240401114208 -prefsHandle 1900 -prefMapHandle 1892 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {87696176-cf5c-4032-aaae-187848caae65} 1092 "\\.\pipe\gecko-crash-server-pipe.1092" gpu
                  6⤵
                    PID:4740
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2404 -parentBuildID 20240401114208 -prefsHandle 2396 -prefMapHandle 2384 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b2eb28b4-0aed-439c-bc8a-2712139b7be5} 1092 "\\.\pipe\gecko-crash-server-pipe.1092" socket
                    6⤵
                      PID:4588
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3580 -childID 1 -isForBrowser -prefsHandle 3260 -prefMapHandle 2616 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4e38dadf-d86c-45fe-8af3-43cf36b99fab} 1092 "\\.\pipe\gecko-crash-server-pipe.1092" tab
                      6⤵
                        PID:3236
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3020 -childID 2 -isForBrowser -prefsHandle 3952 -prefMapHandle 3948 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8f3f9f87-b625-4580-8fa1-4a388ee25385} 1092 "\\.\pipe\gecko-crash-server-pipe.1092" tab
                        6⤵
                          PID:3772
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2760 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4552 -prefMapHandle 4548 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3b5e703b-23f8-4057-9574-25a4da9e29a3} 1092 "\\.\pipe\gecko-crash-server-pipe.1092" utility
                          6⤵
                          • Checks processor information in registry
                          PID:5244
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5476 -childID 3 -isForBrowser -prefsHandle 5204 -prefMapHandle 5208 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8e9ec428-69fd-478a-a476-9a88d4744978} 1092 "\\.\pipe\gecko-crash-server-pipe.1092" tab
                          6⤵
                            PID:6032
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5704 -childID 4 -isForBrowser -prefsHandle 5696 -prefMapHandle 5692 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a89f9aa1-e444-4220-a617-d8a98055a8a8} 1092 "\\.\pipe\gecko-crash-server-pipe.1092" tab
                            6⤵
                              PID:6048
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5884 -childID 5 -isForBrowser -prefsHandle 5800 -prefMapHandle 5876 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2c654036-6b31-4f2f-9d49-6779db68f161} 1092 "\\.\pipe\gecko-crash-server-pipe.1092" tab
                              6⤵
                                PID:6060
                        • C:\Users\Admin\AppData\Local\Temp\1017620001\c644a67313.exe
                          "C:\Users\Admin\AppData\Local\Temp\1017620001\c644a67313.exe"
                          3⤵
                          • Modifies Windows Defender Real-time Protection settings
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Windows security modification
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4980
                        • C:\Users\Admin\AppData\Local\Temp\1017621001\272e04d96c.exe
                          "C:\Users\Admin\AppData\Local\Temp\1017621001\272e04d96c.exe"
                          3⤵
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          • System Location Discovery: System Language Discovery
                          PID:4180
                          • C:\Users\Admin\AppData\Local\Temp\1017621001\272e04d96c.exe
                            "C:\Users\Admin\AppData\Local\Temp\1017621001\272e04d96c.exe"
                            4⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            PID:2404
                        • C:\Users\Admin\AppData\Local\Temp\1017622001\2e63337314.exe
                          "C:\Users\Admin\AppData\Local\Temp\1017622001\2e63337314.exe"
                          3⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          PID:2572
                        • C:\Users\Admin\AppData\Local\Temp\1017624001\c2d9b337cc.exe
                          "C:\Users\Admin\AppData\Local\Temp\1017624001\c2d9b337cc.exe"
                          3⤵
                          • Enumerates VirtualBox registry keys
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          PID:4028
                        • C:\Users\Admin\AppData\Local\Temp\1017625001\b15425c942.exe
                          "C:\Users\Admin\AppData\Local\Temp\1017625001\b15425c942.exe"
                          3⤵
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          • System Location Discovery: System Language Discovery
                          PID:976
                          • C:\Users\Admin\AppData\Local\Temp\1017625001\b15425c942.exe
                            "C:\Users\Admin\AppData\Local\Temp\1017625001\b15425c942.exe"
                            4⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3500
                    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                      C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                      1⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • Suspicious behavior: EnumeratesProcesses
                      PID:2456
                    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                      C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                      1⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • Suspicious behavior: EnumeratesProcesses
                      PID:5372
                    • C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                      C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                      1⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      • Suspicious behavior: EnumeratesProcesses
                      PID:5860
                      • C:\Windows\explorer.exe
                        explorer.exe
                        2⤵
                        • Suspicious use of AdjustPrivilegeToken
                        PID:5880
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        powershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe
                        2⤵
                        • System Network Configuration Discovery: Internet Connection Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:5924
                        • C:\Windows\system32\PING.EXE
                          "C:\Windows\system32\PING.EXE" 127.1.10.1
                          3⤵
                          • System Network Configuration Discovery: Internet Connection Discovery
                          • Runs ping.exe
                          PID:1036

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                      Filesize

                      2KB

                      MD5

                      6cf293cb4d80be23433eecf74ddb5503

                      SHA1

                      24fe4752df102c2ef492954d6b046cb5512ad408

                      SHA256

                      b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8

                      SHA512

                      0f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00

                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                      Filesize

                      1KB

                      MD5

                      e4d5f16dff1c6c4bd78c48253f411da2

                      SHA1

                      0fb7366585572b2cf4144d169302ba21d8e71ac3

                      SHA256

                      360fe2bf9d46f0e6bb35c1b41ba0d70c5f10a1a9b42e29d9cafea37de5964133

                      SHA512

                      27cb84814bf84d0db623e68c06b6391e63d985d5fe77a9d6ca9093329fbe73da490bb9bef67fea667d2d03b1d42ed5b4591f9e72c281c15965d0765c019d4b69

                    • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\activity-stream.discovery_stream.json

                      Filesize

                      18KB

                      MD5

                      45d130d34a2159011c332de73ae3b2e5

                      SHA1

                      37b5d7b84f58a41be0eb63145530cf84a726c133

                      SHA256

                      7e00e86874d51f34eb068aeb1a5833083f3298484bbe9dab0ed05a1a61e879f9

                      SHA512

                      0c57d0dd7a3e3e66db370f8eca0a09ef21ee66159f335e41c1fa1285f4b85d7bc07c69ff4216ca251c50e7e9456b7fc5918100ec923b5563739056cc34dfb1df

                    • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984

                      Filesize

                      13KB

                      MD5

                      9cf4ee77448339f51e2448174d6db110

                      SHA1

                      2e07595f5a152a443d2d9f73a565749297fb1472

                      SHA256

                      1f4c6bcf2870920be784481646c6609687d34ecba9af5b17d8a7c519dfe3ca01

                      SHA512

                      c6244687c1531f5806f08bc7db54e522fb20a32fd8db8476715c253ae415824503a881809cb88f3187947e122c304c49fdfe65c32555a4cfebc53c66ea56336d

                    • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                      Filesize

                      15KB

                      MD5

                      96c542dec016d9ec1ecc4dddfcbaac66

                      SHA1

                      6199f7648bb744efa58acf7b96fee85d938389e4

                      SHA256

                      7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                      SHA512

                      cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                    • C:\Users\Admin\AppData\Local\Temp\1017613001\b41db8ba86.exe

                      Filesize

                      747KB

                      MD5

                      8a9cb17c0224a01bd34b46495983c50a

                      SHA1

                      00296ea6a56f6e10a0f1450a20c5fb329b8856c1

                      SHA256

                      3d51b9523b387859bc0d94246dfb216cfa82f9d650c8d11be11ed67f70e7440b

                      SHA512

                      1472e4670f469c43227b965984ecc223a526f6284363d8e08a3b5b55e602ccce62df4bc49939ee5bd7df7b0c26e20da896b084eccab767f8728e6bf14d71c840

                    • C:\Users\Admin\AppData\Local\Temp\1017614001\4b9dc82a52.exe

                      Filesize

                      4.2MB

                      MD5

                      3a425626cbd40345f5b8dddd6b2b9efa

                      SHA1

                      7b50e108e293e54c15dce816552356f424eea97a

                      SHA256

                      ba9212d2d5cd6df5eb7933fb37c1b72a648974c1730bf5c32439987558f8e8b1

                      SHA512

                      a7538c6b7e17c35f053721308b8d6dc53a90e79930ff4ed5cffecaa97f4d0fbc5f9e8b59f1383d8f0699c8d4f1331f226af71d40325022d10b885606a72fe668

                    • C:\Users\Admin\AppData\Local\Temp\1017615001\2958459f0d.exe

                      Filesize

                      4.2MB

                      MD5

                      ebfe28cb77f3d1246693fa372420d022

                      SHA1

                      f775bdf11301f3c1577668ae9245e1c22ab54ea6

                      SHA256

                      fcf09a75838f976b2a8112606dee0912e662a5727822d8e349006299c3f6093a

                      SHA512

                      dea11bcc617b17fd7bb050ef32c27f00a623f209d88df6c712d5cfc10c82141cc5ff8ec9507d0f8ec6bc8f8b675e105b1972264deab5a3fbc91c9f9b2ab80d9e

                    • C:\Users\Admin\AppData\Local\Temp\1017616001\74a7219e28.exe

                      Filesize

                      3.1MB

                      MD5

                      c00a67d527ef38dc6f49d0ad7f13b393

                      SHA1

                      7b8f2de130ab5e4e59c3c2f4a071bda831ac219d

                      SHA256

                      12226ccae8c807641241ba5178d853aad38984eefb0c0c4d65abc4da3f9787c3

                      SHA512

                      9286d267b167cba01e55e68c8c5582f903bed0dd8bc4135eb528ef6814e60e7d4dda2b3611e13efb56aa993635fbab218b0885daf5daea6043061d8384af40ca

                    • C:\Users\Admin\AppData\Local\Temp\1017617001\5b0cef2ebb.exe

                      Filesize

                      1.8MB

                      MD5

                      c55aabf570c84e3060df0d997f2bfb33

                      SHA1

                      8d2fd3178f3b1865c759e2df6ce3b9e889ef1ff4

                      SHA256

                      eda1f4fdb57fdab8e38c18eb512baf9d23f244d03c7ec2a022bac98e681fe91b

                      SHA512

                      8b7683bda774816158bed0a8b8d58342037ef51558b6f6827d5a80de89c1c31f732a632c4407144732064de2302e77e74409710a303b8bad827020ec5b2458f5

                    • C:\Users\Admin\AppData\Local\Temp\1017618001\826f310eb3.exe

                      Filesize

                      2.8MB

                      MD5

                      527b76dd8de1219705e08c1b7201ae32

                      SHA1

                      a5104085b7af40bd0df6745eccac7958e420aa60

                      SHA256

                      fcab4f9d0cb6621427ccf79ba2b4999edf5113f33d3e4ea2a8b939ecc2d2f0d2

                      SHA512

                      470f7cc12c998b4ee0aa1e36433563e5f83bdd1a0c48659fdd5a8217edc7f5c4ad4090a4cff28dc1e79700902837c6bb942c00ecfab034f2127fdb647d6199f3

                    • C:\Users\Admin\AppData\Local\Temp\1017619001\476376ccb0.exe

                      Filesize

                      948KB

                      MD5

                      c4e6da6cc077f542c5706e29f022ac9c

                      SHA1

                      543c625f3bd620af61d0fe1a1d4d1c40698e3627

                      SHA256

                      5db830dff4076154c9f06816915471ef804c0e842ae66a917d051ed2de85812d

                      SHA512

                      4b3fed8107c63a6996f63430efe4b7322890540e7e35060e8d59a68ba93baf1e60249c9690585133eac86dd27d47578a0efb123c3a3fbb2b69a2e17dcec383a1

                    • C:\Users\Admin\AppData\Local\Temp\1017620001\c644a67313.exe

                      Filesize

                      1.7MB

                      MD5

                      d9b889b6e46ad453efb9e4d78e03cfbc

                      SHA1

                      62a8d76d7e04d6a09eb32e605a28364cd30b5701

                      SHA256

                      91b3a5baa6cc1114d93ac44af1270d61f71b6e3c3a53979fec6549b3e31e6bfa

                      SHA512

                      83797f34a78f97647f6a260324c24960fbbb5f6ec3116f4db1831361979b3e048db0d757d16242b3257c5980b2b53b9cdfcd3302aed7b24274fac9e2aa496d40

                    • C:\Users\Admin\AppData\Local\Temp\1017621001\272e04d96c.exe

                      Filesize

                      758KB

                      MD5

                      afd936e441bf5cbdb858e96833cc6ed3

                      SHA1

                      3491edd8c7caf9ae169e21fb58bccd29d95aefef

                      SHA256

                      c6491d7a6d70c7c51baca7436464667b4894e4989fa7c5e05068dde4699e1cbf

                      SHA512

                      928c15a1eda602b2a66a53734f3f563ab9626882104e30ee2bf5106cfd6e08ec54f96e3063f1ab89bf13be2c8822a8419f5d8ee0a3583a4c479785226051a325

                    • C:\Users\Admin\AppData\Local\Temp\1017622001\2e63337314.exe

                      Filesize

                      1.8MB

                      MD5

                      25fb9c54265bbacc7a055174479f0b70

                      SHA1

                      4af069a2ec874703a7e29023d23a1ada491b584e

                      SHA256

                      552f8be2c6b2208a89c728f68488930c661b3a06c35a20d133ef7d3c63a86b9c

                      SHA512

                      7dfd9e0f3fa2d68a6ce8c952e3b755559db73bb7a06c95ad6ed8ac16dedb49be8b8337afc07c9c682f0c4be9db291a551286353e2e2b624223487dc1c8b54668

                    • C:\Users\Admin\AppData\Local\Temp\1017624001\c2d9b337cc.exe

                      Filesize

                      4.2MB

                      MD5

                      8a549f15d1418fb4207aadb4ba813a36

                      SHA1

                      9019f532acc00096055788d1212842e8bec35627

                      SHA256

                      7dc314359cdb76163923b61fc91175c7a09577e37443ca9711ba9c6b33863391

                      SHA512

                      1aadc1a1eb8715f02108a6df2b28852c58399335a4760afaa9d7637612b117b118d1f7dcbb9bdbb63a067872b7ee37669379575b51b207678cf55c2d45acfbab

                    • C:\Users\Admin\AppData\Local\Temp\1017625001\b15425c942.exe

                      Filesize

                      1.1MB

                      MD5

                      ef08a45833a7d881c90ded1952f96cb4

                      SHA1

                      f04aeeb63a1409bd916558d2c40fab8a5ed8168b

                      SHA256

                      33c236dc81af2a47d595731d6fa47269b2874b281152530fdffdda9cbeb3b501

                      SHA512

                      74e84f710c90121527f06d453e9286910f2e8b6ac09d2aeb4ab1f0ead23ea9b410c5d1074d8bc759bc3e766b5bc77d156756c7df093ba94093107393290ced97

                    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ffnrhwgl.cev.ps1

                      Filesize

                      60B

                      MD5

                      d17fe0a3f47be24a6453e9ef58c94641

                      SHA1

                      6ab83620379fc69f80c0242105ddffd7d98d5d9d

                      SHA256

                      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                      SHA512

                      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                      Filesize

                      2.9MB

                      MD5

                      eb5e8af364226452a7b60cfdf34ce69b

                      SHA1

                      cc80c76f29701db1dc2862d0ba28bd6a15495db1

                      SHA256

                      c0645847e49ab8e30b22d510db3b31c8cb9e7301fa599c2cdacf4978f340abc8

                      SHA512

                      62e312e1a75b8acd276b7fb6bfafb9dc4568f81415931b860cb5354ba3c3e0a0f0f2dfa683aabc69569e6b0e7d0bd830259b65e63af09ea0f3ec43ba58fb46f4

                    • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

                      Filesize

                      1.6MB

                      MD5

                      72491c7b87a7c2dd350b727444f13bb4

                      SHA1

                      1e9338d56db7ded386878eab7bb44b8934ab1bc7

                      SHA256

                      34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

                      SHA512

                      583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

                    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

                      Filesize

                      458KB

                      MD5

                      619f7135621b50fd1900ff24aade1524

                      SHA1

                      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

                      SHA256

                      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

                      SHA512

                      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

                    • C:\Users\Admin\AppData\Local\Temp\main\extracted\ANTIAV~1.DAT

                      Filesize

                      2.2MB

                      MD5

                      579a63bebccbacab8f14132f9fc31b89

                      SHA1

                      fca8a51077d352741a9c1ff8a493064ef5052f27

                      SHA256

                      0ac3504d5fa0460cae3c0fd9c4b628e1a65547a60563e6d1f006d17d5a6354b0

                      SHA512

                      4a58ca0f392187a483b9ef652b6e8b2e60d01daa5d331549df9f359d2c0a181e975cf9df79552e3474b9d77f8e37a1cf23725f32d4cdbe4885e257a7625f7b1f

                    • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_1.zip

                      Filesize

                      1.7MB

                      MD5

                      5659eba6a774f9d5322f249ad989114a

                      SHA1

                      4bfb12aa98a1dc2206baa0ac611877b815810e4c

                      SHA256

                      e04346fee15c3f98387a3641e0bba2e555a5a9b0200e4b9256b1b77094069ae4

                      SHA512

                      f93abf2787b1e06ce999a0cbc67dc787b791a58f9ce20af5587b2060d663f26be9f648d116d9ca279af39299ea5d38e3c86271297e47c1438102ca28fce8edc4

                    • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_2.zip

                      Filesize

                      1.7MB

                      MD5

                      5404286ec7853897b3ba00adf824d6c1

                      SHA1

                      39e543e08b34311b82f6e909e1e67e2f4afec551

                      SHA256

                      ec94a6666a3103ba6be60b92e843075a2d7fe7d30fa41099c3f3b1e2a5eba266

                      SHA512

                      c4b78298c42148d393feea6c3941c48def7c92ef0e6baac99144b083937d0a80d3c15bd9a0bf40daa60919968b120d62999fa61af320e507f7e99fbfe9b9ef30

                    • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_3.zip

                      Filesize

                      1.7MB

                      MD5

                      5eb39ba3698c99891a6b6eb036cfb653

                      SHA1

                      d2f1cdd59669f006a2f1aa9214aeed48bc88c06e

                      SHA256

                      e77f5e03ae140dda27d73e1ffe43f7911e006a108cf51cbd0e05d73aa92da7c2

                      SHA512

                      6c4ca20e88d49256ed9cabec0d1f2b00dfcf3d1603b5c95d158d4438c9f1e58495f8dfa200dbe7f49b5b0dd57886517eb3b98c4190484548720dad4b3db6069e

                    • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_4.zip

                      Filesize

                      1.7MB

                      MD5

                      7187cc2643affab4ca29d92251c96dee

                      SHA1

                      ab0a4de90a14551834e12bb2c8c6b9ee517acaf4

                      SHA256

                      c7e92a1af295307fb92ad534e05fba879a7cf6716f93aefca0ebfcb8cee7a830

                      SHA512

                      27985d317a5c844871ffb2527d04aa50ef7442b2f00d69d5ab6bbb85cd7be1d7057ffd3151d0896f05603677c2f7361ed021eac921e012d74da049ef6949e3a3

                    • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_5.zip

                      Filesize

                      1.7MB

                      MD5

                      b7d1e04629bec112923446fda5391731

                      SHA1

                      814055286f963ddaa5bf3019821cb8a565b56cb8

                      SHA256

                      4da77d4ee30ad0cd56cd620f4e9dc4016244ace015c5b4b43f8f37dd8e3a8789

                      SHA512

                      79fc3606b0fe6a1e31a2ecacc96623caf236bf2be692dadab6ea8ffa4af4231d782094a63b76631068364ac9b6a872b02f1e080636eba40ed019c2949a8e28db

                    • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_6.zip

                      Filesize

                      1.7MB

                      MD5

                      0dc4014facf82aa027904c1be1d403c1

                      SHA1

                      5e6d6c020bfc2e6f24f3d237946b0103fe9b1831

                      SHA256

                      a29ddd29958c64e0af1a848409e97401307277bb6f11777b1cfb0404a6226de7

                      SHA512

                      cbeead189918657cc81e844ed9673ee8f743aed29ad9948e90afdfbecacc9c764fbdbfb92e8c8ceb5ae47cee52e833e386a304db0572c7130d1a54fd9c2cc028

                    • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_7.zip

                      Filesize

                      3.3MB

                      MD5

                      cea368fc334a9aec1ecff4b15612e5b0

                      SHA1

                      493d23f72731bb570d904014ffdacbba2334ce26

                      SHA256

                      07e38cad68b0cdbea62f55f9bc6ee80545c2e1a39983baa222e8af788f028541

                      SHA512

                      bed35a1cc56f32e0109ea5a02578489682a990b5cefa58d7cf778815254af9849e731031e824adba07c86c8425df58a1967ac84ce004c62e316a2e51a75c8748

                    • C:\Users\Admin\AppData\Local\Temp\main\extracted\in.exe

                      Filesize

                      1.7MB

                      MD5

                      83d75087c9bf6e4f07c36e550731ccde

                      SHA1

                      d5ff596961cce5f03f842cfd8f27dde6f124e3ae

                      SHA256

                      46db3164bebffc61c201fe1e086bffe129ddfed575e6d839ddb4f9622963fb3f

                      SHA512

                      044e1f5507e92715ce9df8bb802e83157237a2f96f39bac3b6a444175f1160c4d82f41a0bcecf5feaf1c919272ed7929baef929a8c3f07deecebc44b0435164a

                    • C:\Users\Admin\AppData\Local\Temp\main\file.bin

                      Filesize

                      3.3MB

                      MD5

                      045b0a3d5be6f10ddf19ae6d92dfdd70

                      SHA1

                      0387715b6681d7097d372cd0005b664f76c933c7

                      SHA256

                      94b392e94fa47d1b9b7ae6a29527727268cc2e3484e818c23608f8835bc1104d

                      SHA512

                      58255a755531791b888ffd9b663cc678c63d5caa932260e9546b1b10a8d54208334725c14529116b067bcf5a5e02da85e015a3bed80092b7698a43dab0168c7b

                    • C:\Users\Admin\AppData\Local\Temp\main\main.bat

                      Filesize

                      440B

                      MD5

                      3626532127e3066df98e34c3d56a1869

                      SHA1

                      5fa7102f02615afde4efd4ed091744e842c63f78

                      SHA256

                      2a0e18ef585db0802269b8c1ddccb95ce4c0bac747e207ee6131dee989788bca

                      SHA512

                      dcce66d6e24d5a4a352874144871cd73c327e04c1b50764399457d8d70a9515f5bc0a650232763bf34d4830bab70ee4539646e7625cfe5336a870e311043b2bd

                    • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                      Filesize

                      479KB

                      MD5

                      09372174e83dbbf696ee732fd2e875bb

                      SHA1

                      ba360186ba650a769f9303f48b7200fb5eaccee1

                      SHA256

                      c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                      SHA512

                      b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                    • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                      Filesize

                      13.8MB

                      MD5

                      0a8747a2ac9ac08ae9508f36c6d75692

                      SHA1

                      b287a96fd6cc12433adb42193dfe06111c38eaf0

                      SHA256

                      32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                      SHA512

                      59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin

                      Filesize

                      6KB

                      MD5

                      3a115123e5787bd2c11ce185bb35d6d2

                      SHA1

                      35d318677df6c7b40678ab490fc95c5be4920492

                      SHA256

                      41ad0bd6ec4a3a8cadd8565b2f684a191e27691c8fd350eb13c1d800778b6775

                      SHA512

                      8d51de8c8cf9409d329f312d8f72ddf291f18e0748b864f90515fcdb44fdd3ea96a4068c7d9fd4b36125ac6b31df4ba8a7b1f147132247ae5c2a51246274ee12

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin

                      Filesize

                      8KB

                      MD5

                      d185d2b78d0cddc23d90bfec42cd4088

                      SHA1

                      042da3d3c7e3ac2a6372215e2e373c2d8457e361

                      SHA256

                      9caf9f839dcdca6befe5afead14afe2eff02e9fb37c9ac3a7f811d5b152da541

                      SHA512

                      6572614c3df60dbc413f93942991feea6ecd07b1e5e9060753919f6a84165283013ba2625a6850ebb90c6349d27c9d908d8a6b9a79991b45d8c86aa4b9eaa8a3

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin

                      Filesize

                      12KB

                      MD5

                      3510e3035888e8896d93b99380f78dd3

                      SHA1

                      ae0cd19c9446e0f693012f6a3e94bab9db3a3a45

                      SHA256

                      f96b6e363b66c5465e950ade5b2b737cee03adf98405eec280081bd7b6dbc7a8

                      SHA512

                      ab934bedde028807db82252e3cb233625784ed535793ce4fdeca9d254e1c03fad1b64145db51e022197f412dc5b17691055da7f36e4b73ec0bd03da548523cec

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\cert9.db

                      Filesize

                      224KB

                      MD5

                      29f3755cc45b5f88fb1d7f100650fe71

                      SHA1

                      fe239a9d97790a21e79e2076dd8f9b8446a579a8

                      SHA256

                      b46767632db36fbef122f7d94dde50f39b9a5ec9a17874611c00224053335cf7

                      SHA512

                      ffc72b43843d61670616d535535f9761547acad30fa3ca9d417ebe4caca742c6183da39cdb0e2e8f7b384c09d5ca31e1378a7f88b3fd63cccdc2947df12b896c

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp

                      Filesize

                      5KB

                      MD5

                      014a02dd23b4edfc3fc19485d9554cf7

                      SHA1

                      8aae0361d9cdb0d565e736093b1e1ae1f18eee8b

                      SHA256

                      ba72e314a259fb7dd378070023ebd52c2df489dc5ef30636a4efeccc78f9d412

                      SHA512

                      1a58cf1088022a8e3e30ba7161bc6c56cf5f0fbd4644296c3b2b721739a797ebff042fcf352cad843f0e222b4bbcf86b00cdca275fb32f52d1dbf0b046c71c84

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp

                      Filesize

                      15KB

                      MD5

                      5c3f8372eae83315d68eef9315687e1e

                      SHA1

                      b64fb403fff5357fbdb548ea23af73e9b927f7d8

                      SHA256

                      e9f44dc896515ce8d90e225dbc7747eec344c8a2d94c8507a107064ca9f92636

                      SHA512

                      da4edc7a0fcab17376a51d98e70b548199d7245dce6b6ee63731df602c458f52b32f93016bc80bf0e67806ea93ca83f510286904bf633430b5865dab5a681b7e

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp

                      Filesize

                      14KB

                      MD5

                      94fbf9670867452320b26d16f6f91f5f

                      SHA1

                      b3e7225793d02f99291a54947f2904207766a819

                      SHA256

                      7decb72de0498a822088864c5dc807974ded60fd28ccbc14f6b6efd7da4a8e7b

                      SHA512

                      f0597e14914646aa1080f8bab39beaa293c525ec13ebbfdaa594795c6470e7caa02192ad453346872d69fc90f461b90e2d1722142acf6fe318a7c86dc8b903e2

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp

                      Filesize

                      6KB

                      MD5

                      6a693dd2dbf4788ea804824059c2cf87

                      SHA1

                      6042803c8ea503683c5fdaa163e6cb3ad6fa3516

                      SHA256

                      5d821748b1218787e770c835ee73771b439a1a2ce45a7ffc6a0642f078df07d7

                      SHA512

                      b07a4646102d6300755b9d28b95cb3186d2992c152f795d4056f456eb86de07bfa4b0c4ce5055e9a2d7c75a719ddf8af6fba9476351f1571d96a4652f5d78dcf

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\3a0acc3f-ed42-471a-9ad8-db70f2585ffd

                      Filesize

                      26KB

                      MD5

                      7dbc2afb8ce311ad16f59a105dec30b6

                      SHA1

                      6e0476f31faab2698db8c3944cea82f5465a2c80

                      SHA256

                      02eb301a78845f3683b3c6127109e45b7f994d13b0231d6e44d4f643cf80c164

                      SHA512

                      29a5c0c450ddc0a5af5e0e68ade177d92d05ea926002b4c79c354cf59c084bbf803720275fd26290a14a7dcc97de0ada9f4701f355ea515a987a48f0b46cab65

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\46fd0453-b45b-4e1c-9346-d2e9f559f5b2

                      Filesize

                      671B

                      MD5

                      e4a826d26ba067eb23d4d551c4be2184

                      SHA1

                      a6430bff8c6756420a2076c75420ab4d3095b98b

                      SHA256

                      4764f9b4a62c4a9e65835521af0704f2c8968f45f2687717548a05ac8dc7c321

                      SHA512

                      5a53c4ac50d7576585a2d81530cf78492f83c04c3a66fb598879b16787599dc1deb42ac1f04d48991920cbaa20fd7e352f2121c2242dd5181b7bfb9fea8a403d

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\74c0e029-9109-4ab7-8f4d-7abc9c71baaf

                      Filesize

                      982B

                      MD5

                      b95cabf3996132087c79e5887a7cb0d0

                      SHA1

                      5b712ed0358287b253618e30962116d56a861f5d

                      SHA256

                      80f38a80d18deee0a85b48c9a4cd62d45663599569ae400a219ed3b208a63938

                      SHA512

                      1947f7de07c1b1149947d8fc8c10729298b5886cd2a010c1a086672ae957255f02d0ce6fb1eed9b026866b3ff2d62d75140b7ae035f346c3e4a1e87640793eef

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                      Filesize

                      1.1MB

                      MD5

                      842039753bf41fa5e11b3a1383061a87

                      SHA1

                      3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                      SHA256

                      d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                      SHA512

                      d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                      Filesize

                      116B

                      MD5

                      2a461e9eb87fd1955cea740a3444ee7a

                      SHA1

                      b10755914c713f5a4677494dbe8a686ed458c3c5

                      SHA256

                      4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                      SHA512

                      34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                      Filesize

                      372B

                      MD5

                      bf957ad58b55f64219ab3f793e374316

                      SHA1

                      a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                      SHA256

                      bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                      SHA512

                      79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                      Filesize

                      17.8MB

                      MD5

                      daf7ef3acccab478aaa7d6dc1c60f865

                      SHA1

                      f8246162b97ce4a945feced27b6ea114366ff2ad

                      SHA256

                      bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                      SHA512

                      5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\prefs-1.js

                      Filesize

                      15KB

                      MD5

                      8abebe94031255c272215546abf54a3a

                      SHA1

                      98962242b2ad85e0d169fc6456ead64336649f20

                      SHA256

                      79eca56a9288fe6761de0af6586f6b4a63c0b123b1378503ce422b9ab6636977

                      SHA512

                      bc0d98c38205b8ad1131688609c38e57bdb8814e3b2cb9e460256d85b80e0f960b7765e626a1881eb88f207867e15fcccb04f6fc0d2623382aec2d28001702c1

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\prefs-1.js

                      Filesize

                      12KB

                      MD5

                      f512201c0753fbeac691a5a7d53ad3fd

                      SHA1

                      bb7df3aa6227ba897fa395a95f7b547947a511fc

                      SHA256

                      9907fd07db697ef1bce0607c7c4a25973bfa7767a87cd71ac5bd687c563ff9ef

                      SHA512

                      a4348320af1e443ddd6f917d4b3833207fa22f3de6c59d31578e98726c7c21431b3d4b74225af5aa30ba3f16ccb665d580838d34c0aba9506c40a04c441d15fc

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\prefs.js

                      Filesize

                      10KB

                      MD5

                      ff8ec398d415280aab25792eff88a771

                      SHA1

                      1d8b89b7367a21d64e5c467cba4763390dee265c

                      SHA256

                      f236738624af758c0b67cac40f21705f66a705ac5bee4b17f1d091b62375ca29

                      SHA512

                      8cbf5c3acdc5268e4224dc46a43affcf8d07b3a4eaff2bb5635007e371f923fc24359f46472523e5fbc281cf2d67dc1032b45ebe11fa370ff172bc243c3fcb65

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\prefs.js

                      Filesize

                      10KB

                      MD5

                      41e17878a7043a776eae3bb5485f50ba

                      SHA1

                      d89948a6bff6e3010a2e82d8936a0d92b420a571

                      SHA256

                      d4d693f29a04f4d00bde53058e7b1a640c15192829961816eb9d93cdcb98749e

                      SHA512

                      63479885f69f5d5da68a25746e95c0f931cb24d67193358071d3711c4af8c5911c19ce5b05e1e3fc9f39b85baa4344e73a450329893ec2f152f0948821337d0c

                    • memory/412-231-0x0000000000BD0000-0x0000000000EEC000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/412-3024-0x0000000000BD0000-0x0000000000EEC000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/412-51-0x0000000000BD0000-0x0000000000EEC000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/412-964-0x0000000000BD0000-0x0000000000EEC000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/412-734-0x0000000000BD0000-0x0000000000EEC000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/412-16-0x0000000000BD0000-0x0000000000EEC000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/412-23-0x0000000000BD0000-0x0000000000EEC000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/412-22-0x0000000000BD0000-0x0000000000EEC000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/412-47-0x0000000000BD0000-0x0000000000EEC000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/412-119-0x0000000000BD0000-0x0000000000EEC000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/412-46-0x0000000000BD0000-0x0000000000EEC000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/412-24-0x0000000000BD0000-0x0000000000EEC000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/412-191-0x0000000000BD0000-0x0000000000EEC000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/412-1981-0x0000000000BD0000-0x0000000000EEC000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/412-648-0x0000000000BD0000-0x0000000000EEC000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/412-19-0x0000000000BD1000-0x0000000000BFF000-memory.dmp

                      Filesize

                      184KB

                    • memory/412-20-0x0000000000BD0000-0x0000000000EEC000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/412-21-0x0000000000BD0000-0x0000000000EEC000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/412-154-0x0000000000BD0000-0x0000000000EEC000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/976-1234-0x00000000025B0000-0x00000000025BA000-memory.dmp

                      Filesize

                      40KB

                    • memory/976-1216-0x0000000007170000-0x0000000007202000-memory.dmp

                      Filesize

                      584KB

                    • memory/976-1394-0x0000000007390000-0x00000000073B6000-memory.dmp

                      Filesize

                      152KB

                    • memory/976-1196-0x00000000002E0000-0x00000000003F6000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/976-3057-0x0000000004D10000-0x0000000004DD2000-memory.dmp

                      Filesize

                      776KB

                    • memory/1060-148-0x0000014F69940000-0x0000014F69962000-memory.dmp

                      Filesize

                      136KB

                    • memory/2188-207-0x00000000000B0000-0x0000000000C08000-memory.dmp

                      Filesize

                      11.3MB

                    • memory/2188-170-0x00000000000B0000-0x0000000000C08000-memory.dmp

                      Filesize

                      11.3MB

                    • memory/2188-230-0x00000000000B0000-0x0000000000C08000-memory.dmp

                      Filesize

                      11.3MB

                    • memory/2204-208-0x0000000000290000-0x0000000000730000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/2204-211-0x0000000000290000-0x0000000000730000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/2368-40-0x0000000000EF5000-0x0000000000EF6000-memory.dmp

                      Filesize

                      4KB

                    • memory/2404-651-0x0000000000400000-0x0000000000456000-memory.dmp

                      Filesize

                      344KB

                    • memory/2404-649-0x0000000000400000-0x0000000000456000-memory.dmp

                      Filesize

                      344KB

                    • memory/2456-49-0x0000000000BD0000-0x0000000000EEC000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/2456-50-0x0000000000BD0000-0x0000000000EEC000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/2572-679-0x00000000008D0000-0x0000000000D7B000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/2572-738-0x00000000008D0000-0x0000000000D7B000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/2572-737-0x00000000008D0000-0x0000000000D7B000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/2800-227-0x0000000000A80000-0x0000000000F84000-memory.dmp

                      Filesize

                      5.0MB

                    • memory/2800-228-0x0000000000A80000-0x0000000000F84000-memory.dmp

                      Filesize

                      5.0MB

                    • memory/2892-728-0x0000000000400000-0x0000000000456000-memory.dmp

                      Filesize

                      344KB

                    • memory/2892-730-0x0000000000400000-0x0000000000456000-memory.dmp

                      Filesize

                      344KB

                    • memory/3172-2-0x00000000007F1000-0x000000000081F000-memory.dmp

                      Filesize

                      184KB

                    • memory/3172-3-0x00000000007F0000-0x0000000000B0C000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/3172-18-0x00000000007F0000-0x0000000000B0C000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/3172-1-0x0000000077DD4000-0x0000000077DD6000-memory.dmp

                      Filesize

                      8KB

                    • memory/3172-0-0x00000000007F0000-0x0000000000B0C000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/3172-4-0x00000000007F0000-0x0000000000B0C000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/3500-3111-0x00000000053D0000-0x0000000005461000-memory.dmp

                      Filesize

                      580KB

                    • memory/3500-3095-0x0000000000400000-0x0000000000464000-memory.dmp

                      Filesize

                      400KB

                    • memory/3500-3109-0x00000000053D0000-0x0000000005461000-memory.dmp

                      Filesize

                      580KB

                    • memory/3500-3105-0x00000000053D0000-0x0000000005461000-memory.dmp

                      Filesize

                      580KB

                    • memory/3500-3103-0x00000000053D0000-0x0000000005461000-memory.dmp

                      Filesize

                      580KB

                    • memory/3500-3101-0x00000000053D0000-0x0000000005461000-memory.dmp

                      Filesize

                      580KB

                    • memory/3500-3113-0x00000000053D0000-0x0000000005461000-memory.dmp

                      Filesize

                      580KB

                    • memory/3500-3115-0x00000000053D0000-0x0000000005461000-memory.dmp

                      Filesize

                      580KB

                    • memory/3500-3097-0x00000000053D0000-0x0000000005468000-memory.dmp

                      Filesize

                      608KB

                    • memory/3500-3107-0x00000000053D0000-0x0000000005461000-memory.dmp

                      Filesize

                      580KB

                    • memory/3500-3099-0x00000000053D0000-0x0000000005461000-memory.dmp

                      Filesize

                      580KB

                    • memory/3500-5164-0x00000000057B0000-0x0000000005816000-memory.dmp

                      Filesize

                      408KB

                    • memory/3500-5163-0x00000000055B0000-0x00000000055FC000-memory.dmp

                      Filesize

                      304KB

                    • memory/3500-5162-0x0000000005520000-0x000000000554C000-memory.dmp

                      Filesize

                      176KB

                    • memory/3500-3098-0x00000000053D0000-0x0000000005461000-memory.dmp

                      Filesize

                      580KB

                    • memory/3760-41-0x0000000000400000-0x0000000000455000-memory.dmp

                      Filesize

                      340KB

                    • memory/3760-44-0x0000000000400000-0x0000000000455000-memory.dmp

                      Filesize

                      340KB

                    • memory/3760-45-0x0000000000ED0000-0x0000000000F8F000-memory.dmp

                      Filesize

                      764KB

                    • memory/4028-2496-0x0000000000670000-0x000000000124D000-memory.dmp

                      Filesize

                      11.9MB

                    • memory/4028-1001-0x0000000000670000-0x000000000124D000-memory.dmp

                      Filesize

                      11.9MB

                    • memory/4028-2087-0x0000000000670000-0x000000000124D000-memory.dmp

                      Filesize

                      11.9MB

                    • memory/4028-2078-0x0000000000670000-0x000000000124D000-memory.dmp

                      Filesize

                      11.9MB

                    • memory/4840-141-0x00007FF7F7420000-0x00007FF7F78B0000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/4840-138-0x00007FF7F7420000-0x00007FF7F78B0000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/4980-299-0x00000000009E0000-0x0000000000E36000-memory.dmp

                      Filesize

                      4.3MB

                    • memory/4980-467-0x00000000009E0000-0x0000000000E36000-memory.dmp

                      Filesize

                      4.3MB

                    • memory/4980-723-0x00000000009E0000-0x0000000000E36000-memory.dmp

                      Filesize

                      4.3MB

                    • memory/4980-275-0x00000000009E0000-0x0000000000E36000-memory.dmp

                      Filesize

                      4.3MB

                    • memory/4980-684-0x00000000009E0000-0x0000000000E36000-memory.dmp

                      Filesize

                      4.3MB

                    • memory/5100-724-0x0000000005BA0000-0x0000000005CF6000-memory.dmp

                      Filesize

                      1.3MB

                    • memory/5100-725-0x00000000062A0000-0x0000000006844000-memory.dmp

                      Filesize

                      5.6MB

                    • memory/5100-189-0x0000000000B20000-0x0000000000E48000-memory.dmp

                      Filesize

                      3.2MB

                    • memory/5100-190-0x0000000005880000-0x000000000591C000-memory.dmp

                      Filesize

                      624KB

                    • memory/5100-726-0x0000000005820000-0x0000000005842000-memory.dmp

                      Filesize

                      136KB

                    • memory/5372-683-0x0000000000BD0000-0x0000000000EEC000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/5372-681-0x0000000000BD0000-0x0000000000EEC000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/5860-699-0x00007FF6227E0000-0x00007FF622C70000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/5860-686-0x00007FF6227E0000-0x00007FF622C70000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/5880-688-0x0000000140000000-0x0000000140770000-memory.dmp

                      Filesize

                      7.4MB

                    • memory/5880-690-0x0000000140000000-0x0000000140770000-memory.dmp

                      Filesize

                      7.4MB

                    • memory/5880-689-0x0000000140000000-0x0000000140770000-memory.dmp

                      Filesize

                      7.4MB

                    • memory/5880-687-0x0000000140000000-0x0000000140770000-memory.dmp

                      Filesize

                      7.4MB

                    • memory/5880-691-0x0000000140000000-0x0000000140770000-memory.dmp

                      Filesize

                      7.4MB

                    • memory/5880-692-0x0000000140000000-0x0000000140770000-memory.dmp

                      Filesize

                      7.4MB

                    • memory/5880-697-0x0000000000E00000-0x0000000000E20000-memory.dmp

                      Filesize

                      128KB

                    • memory/5880-701-0x0000000140000000-0x0000000140770000-memory.dmp

                      Filesize

                      7.4MB

                    • memory/5880-693-0x0000000140000000-0x0000000140770000-memory.dmp

                      Filesize

                      7.4MB

                    • memory/5880-698-0x0000000140000000-0x0000000140770000-memory.dmp

                      Filesize

                      7.4MB

                    • memory/5880-694-0x0000000140000000-0x0000000140770000-memory.dmp

                      Filesize

                      7.4MB

                    • memory/5880-696-0x0000000140000000-0x0000000140770000-memory.dmp

                      Filesize

                      7.4MB