Analysis

  • max time kernel
    146s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20-12-2024 02:07

General

  • Target

    055c34101c332838618fdedb730655f61b97553c5e56df94efd373667a3db895.exe

  • Size

    2.8MB

  • MD5

    8cbe0ced0c0f7bfbdf19128ba80adb99

  • SHA1

    15e615a0fe64fe5200dd916232d9bc26b1c3d815

  • SHA256

    055c34101c332838618fdedb730655f61b97553c5e56df94efd373667a3db895

  • SHA512

    4b258260770b08fdd8f14b7bf0e703b8ca5010e4698e457bc0cfc76c246fb9e7c60ee4d2068b717f8205c2c1954d3b6b8742ed2547b67082f5b89c63d850e938

  • SSDEEP

    49152:kNv6yZz1fXBB9nu/SkIK3OdW+56W0xSDmoJb3:s6yZz1fRB9nu/SkIK3ibpDmA

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

C2

https://sordid-snaked.cyou/api

https://awake-weaves.cyou/api

https://wrathful-jammy.cyou/api

https://debonairnukk.xyz/api

https://diffuculttan.xyz/api

https://effecterectz.xyz/api

https://deafeninggeh.biz/api

https://immureprech.biz/api

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 12 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 24 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 36 IoCs
  • Identifies Wine through registry keys 2 TTPs 12 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 64 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 37 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 54 IoCs
  • Suspicious use of FindShellTrayWindow 15 IoCs
  • Suspicious use of SendNotifyMessage 13 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Views/modifies file attributes 1 TTPs 3 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1192
      • C:\Users\Admin\AppData\Local\Temp\055c34101c332838618fdedb730655f61b97553c5e56df94efd373667a3db895.exe
        "C:\Users\Admin\AppData\Local\Temp\055c34101c332838618fdedb730655f61b97553c5e56df94efd373667a3db895.exe"
        2⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Identifies Wine through registry keys
        • Loads dropped DLL
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:1924
        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
          "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2260
          • C:\Users\Admin\AppData\Local\Temp\1017763001\INOKWGC.exe
            "C:\Users\Admin\AppData\Local\Temp\1017763001\INOKWGC.exe"
            4⤵
            • Executes dropped EXE
            PID:816
          • C:\Users\Admin\AppData\Local\Temp\1017855001\8ZVMneG.exe
            "C:\Users\Admin\AppData\Local\Temp\1017855001\8ZVMneG.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1768
            • C:\Users\Admin\AppData\Local\Temp\1017855001\8ZVMneG.exe
              "C:\Users\Admin\AppData\Local\Temp\1017855001\8ZVMneG.exe"
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Modifies system certificate store
              PID:2928
          • C:\Users\Admin\AppData\Local\Temp\1017916001\UZAj8wc.exe
            "C:\Users\Admin\AppData\Local\Temp\1017916001\UZAj8wc.exe"
            4⤵
            • Drops startup file
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2656
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc 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
              5⤵
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2836
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2656 -s 744
              5⤵
              • Loads dropped DLL
              • Program crash
              PID:3944
          • C:\Users\Admin\AppData\Local\Temp\1018024001\a974a76264.exe
            "C:\Users\Admin\AppData\Local\Temp\1018024001\a974a76264.exe"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Modifies system certificate store
            • Suspicious behavior: EnumeratesProcesses
            PID:5796
          • C:\Users\Admin\AppData\Local\Temp\1018094001\2891211e0d.exe
            "C:\Users\Admin\AppData\Local\Temp\1018094001\2891211e0d.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:6028
            • C:\Users\Admin\AppData\Local\Temp\1018094001\2891211e0d.exe
              "C:\Users\Admin\AppData\Local\Temp\1018094001\2891211e0d.exe"
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:5632
          • C:\Users\Admin\AppData\Local\Temp\1018098001\ec404594f2.exe
            "C:\Users\Admin\AppData\Local\Temp\1018098001\ec404594f2.exe"
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:6132
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "powershell.exe" Add-MpPreference -ExclusionPath "C:\frdue"
              5⤵
              • Command and Scripting Interpreter: PowerShell
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:892
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData"
              5⤵
              • Command and Scripting Interpreter: PowerShell
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2720
          • C:\Users\Admin\AppData\Local\Temp\1018099001\87cd20bdb5.exe
            "C:\Users\Admin\AppData\Local\Temp\1018099001\87cd20bdb5.exe"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:3492
          • C:\Users\Admin\AppData\Local\Temp\1018100001\0fce128665.exe
            "C:\Users\Admin\AppData\Local\Temp\1018100001\0fce128665.exe"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:4232
          • C:\Users\Admin\AppData\Local\Temp\1018101001\a464a87709.exe
            "C:\Users\Admin\AppData\Local\Temp\1018101001\a464a87709.exe"
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            PID:4812
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM firefox.exe /T
              5⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:4868
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM chrome.exe /T
              5⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:5040
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM msedge.exe /T
              5⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:5144
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM opera.exe /T
              5⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:5268
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM brave.exe /T
              5⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:5380
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
              5⤵
                PID:5480
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                  6⤵
                  • Checks processor information in registry
                  • Modifies registry class
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  PID:2944
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2944.0.274885263\1025907023" -parentBuildID 20221007134813 -prefsHandle 1220 -prefMapHandle 1212 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7c6f1e52-ed4e-4ec0-83c8-76a7ac45ae43} 2944 "\\.\pipe\gecko-crash-server-pipe.2944" 1300 102d9a58 gpu
                    7⤵
                      PID:3368
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2944.1.137088260\1236500762" -parentBuildID 20221007134813 -prefsHandle 1488 -prefMapHandle 1484 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {37248e2c-fafb-4ef8-9e2c-fcb6cfdccb3c} 2944 "\\.\pipe\gecko-crash-server-pipe.2944" 1500 e72d58 socket
                      7⤵
                        PID:3776
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2944.2.913476524\67201995" -childID 1 -isForBrowser -prefsHandle 2072 -prefMapHandle 2068 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 892 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9d2aad69-d4cc-4ee1-9d58-c8d7dba1dcd8} 2944 "\\.\pipe\gecko-crash-server-pipe.2944" 2084 1a588d58 tab
                        7⤵
                          PID:2576
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2944.3.1874964072\1737713488" -childID 2 -isForBrowser -prefsHandle 2904 -prefMapHandle 2900 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 892 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {4de4d4a6-ced9-4487-8af5-69aea12000af} 2944 "\\.\pipe\gecko-crash-server-pipe.2944" 2928 1b9e2858 tab
                          7⤵
                            PID:1656
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2944.4.1526962614\1824265499" -childID 3 -isForBrowser -prefsHandle 3672 -prefMapHandle 3668 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 892 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {86c7cdc6-503c-43a3-bcb8-5b0ad3394ca2} 2944 "\\.\pipe\gecko-crash-server-pipe.2944" 3684 1b4ecb58 tab
                            7⤵
                              PID:3496
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2944.5.1914329656\734811894" -childID 4 -isForBrowser -prefsHandle 3792 -prefMapHandle 3796 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 892 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {38dec5d2-de28-4b63-b9fc-a40d1f5182e3} 2944 "\\.\pipe\gecko-crash-server-pipe.2944" 3780 1f9b0858 tab
                              7⤵
                                PID:3504
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2944.6.1324950450\130363469" -childID 5 -isForBrowser -prefsHandle 3952 -prefMapHandle 3956 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 892 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d502592b-27ca-454b-b9fa-35487bf6f848} 2944 "\\.\pipe\gecko-crash-server-pipe.2944" 3940 1fd30658 tab
                                7⤵
                                  PID:3528
                          • C:\Users\Admin\AppData\Local\Temp\1018102001\9e5ddb0b67.exe
                            "C:\Users\Admin\AppData\Local\Temp\1018102001\9e5ddb0b67.exe"
                            4⤵
                            • Modifies Windows Defender Real-time Protection settings
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Windows security modification
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4420
                          • C:\Users\Admin\AppData\Local\Temp\1018103001\e99158d429.exe
                            "C:\Users\Admin\AppData\Local\Temp\1018103001\e99158d429.exe"
                            4⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Loads dropped DLL
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            PID:5076
                          • C:\Users\Admin\AppData\Local\Temp\1018104001\91bb17cccd.exe
                            "C:\Users\Admin\AppData\Local\Temp\1018104001\91bb17cccd.exe"
                            4⤵
                            • Executes dropped EXE
                            PID:5424
                          • C:\Users\Admin\AppData\Local\Temp\1018105001\c0601430fa.exe
                            "C:\Users\Admin\AppData\Local\Temp\1018105001\c0601430fa.exe"
                            4⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            PID:5816
                          • C:\Users\Admin\AppData\Local\Temp\1018106001\a14ff0616a.exe
                            "C:\Users\Admin\AppData\Local\Temp\1018106001\a14ff0616a.exe"
                            4⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Suspicious use of SetThreadContext
                            • System Location Discovery: System Language Discovery
                            PID:2872
                            • C:\Users\Admin\AppData\Local\Temp\1018106001\a14ff0616a.exe
                              "C:\Users\Admin\AppData\Local\Temp\1018106001\a14ff0616a.exe"
                              5⤵
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4436
                          • C:\Users\Admin\AppData\Local\Temp\1018107001\44a8e4a3bb.exe
                            "C:\Users\Admin\AppData\Local\Temp\1018107001\44a8e4a3bb.exe"
                            4⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            PID:5908
                          • C:\Users\Admin\AppData\Local\Temp\1018108001\fa887dd056.exe
                            "C:\Users\Admin\AppData\Local\Temp\1018108001\fa887dd056.exe"
                            4⤵
                            • Suspicious use of NtCreateUserProcessOtherParentProcess
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            PID:912
                          • C:\Users\Admin\AppData\Local\Temp\1018109001\0abba223fa.exe
                            "C:\Users\Admin\AppData\Local\Temp\1018109001\0abba223fa.exe"
                            4⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3616
                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              "powershell.exe" Add-MpPreference -ExclusionPath "C:\gabxlp"
                              5⤵
                              • Command and Scripting Interpreter: PowerShell
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3808
                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              "powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData"
                              5⤵
                              • Command and Scripting Interpreter: PowerShell
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:5088
                          • C:\Users\Admin\AppData\Local\Temp\1018110001\c99aeac7c1.exe
                            "C:\Users\Admin\AppData\Local\Temp\1018110001\c99aeac7c1.exe"
                            4⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            PID:2296
                            • C:\Windows\system32\cmd.exe
                              cmd /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"
                              5⤵
                              • Loads dropped DLL
                              PID:3212
                              • C:\Windows\system32\mode.com
                                mode 65,10
                                6⤵
                                  PID:1376
                                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                  7z.exe e file.zip -p24291711423417250691697322505 -oextracted
                                  6⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3256
                                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                  7z.exe e extracted/file_7.zip -oextracted
                                  6⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3308
                                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                  7z.exe e extracted/file_6.zip -oextracted
                                  6⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3364
                                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                  7z.exe e extracted/file_5.zip -oextracted
                                  6⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2496
                                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                  7z.exe e extracted/file_4.zip -oextracted
                                  6⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3388
                                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                  7z.exe e extracted/file_3.zip -oextracted
                                  6⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3488
                                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                  7z.exe e extracted/file_2.zip -oextracted
                                  6⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3636
                                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                  7z.exe e extracted/file_1.zip -oextracted
                                  6⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3676
                                • C:\Windows\system32\attrib.exe
                                  attrib +H "in.exe"
                                  6⤵
                                  • Views/modifies file attributes
                                  PID:4012
                                • C:\Users\Admin\AppData\Local\Temp\main\in.exe
                                  "in.exe"
                                  6⤵
                                  • Executes dropped EXE
                                  PID:4252
                                  • C:\Windows\system32\attrib.exe
                                    attrib +H +S C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                                    7⤵
                                    • Views/modifies file attributes
                                    PID:4280
                                  • C:\Windows\system32\attrib.exe
                                    attrib +H C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                                    7⤵
                                    • Views/modifies file attributes
                                    PID:4276
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks /f /CREATE /TN "Intel_PTT_EK_Recertification" /TR "C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe" /SC MINUTE
                                    7⤵
                                    • Scheduled Task/Job: Scheduled Task
                                    PID:4300
                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    powershell ping 127.0.0.1; del in.exe
                                    7⤵
                                    • System Network Configuration Discovery: Internet Connection Discovery
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:4352
                                    • C:\Windows\system32\PING.EXE
                                      "C:\Windows\system32\PING.EXE" 127.0.0.1
                                      8⤵
                                      • System Network Configuration Discovery: Internet Connection Discovery
                                      • Runs ping.exe
                                      PID:4872
                            • C:\Users\Admin\AppData\Local\Temp\1018111001\fe44e31f5d.exe
                              "C:\Users\Admin\AppData\Local\Temp\1018111001\fe44e31f5d.exe"
                              4⤵
                              • Enumerates VirtualBox registry keys
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              PID:10896
                            • C:\Users\Admin\AppData\Local\Temp\1018112001\5427121a94.exe
                              "C:\Users\Admin\AppData\Local\Temp\1018112001\5427121a94.exe"
                              4⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • Suspicious behavior: EnumeratesProcesses
                              PID:11176
                            • C:\Users\Admin\AppData\Local\Temp\1018113001\1598c88859.exe
                              "C:\Users\Admin\AppData\Local\Temp\1018113001\1598c88859.exe"
                              4⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Suspicious use of SetThreadContext
                              • System Location Discovery: System Language Discovery
                              PID:2432
                              • C:\Users\Admin\AppData\Local\Temp\1018113001\1598c88859.exe
                                "C:\Users\Admin\AppData\Local\Temp\1018113001\1598c88859.exe"
                                5⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                PID:1332
                        • C:\Windows\SysWOW64\dialer.exe
                          "C:\Windows\system32\dialer.exe"
                          2⤵
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          PID:4724
                      • C:\Windows\system32\taskeng.exe
                        taskeng.exe {07829F7B-7810-4FA4-A274-F63BBB90DDBF} S-1-5-21-4177215427-74451935-3209572229-1000:JSMURNPT\Admin:Interactive:[1]
                        1⤵
                        • Loads dropped DLL
                        PID:5848
                        • C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                          C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                          2⤵
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          • Suspicious behavior: EnumeratesProcesses
                          PID:5872
                          • C:\Windows\explorer.exe
                            explorer.exe
                            3⤵
                            • Suspicious use of AdjustPrivilegeToken
                            PID:5884
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            powershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe
                            3⤵
                            • Drops file in System32 directory
                            • System Network Configuration Discovery: Internet Connection Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:5632
                            • C:\Windows\system32\PING.EXE
                              "C:\Windows\system32\PING.EXE" 127.1.10.1
                              4⤵
                              • System Network Configuration Discovery: Internet Connection Discovery
                              • Runs ping.exe
                              PID:3484

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\D6V88JEY\download[1].htm

                        Filesize

                        1B

                        MD5

                        cfcd208495d565ef66e7dff9f98764da

                        SHA1

                        b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                        SHA256

                        5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                        SHA512

                        31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\activity-stream.discovery_stream.json.tmp

                        Filesize

                        31KB

                        MD5

                        8d7a352aae9b345741f49220b1a63e51

                        SHA1

                        3512072857c4b8762e060584ab60fb871a2d6a4c

                        SHA256

                        e278dd22e6d944d687e0bfadbb55fbb449f3b35824f35824adff0c10424a02c0

                        SHA512

                        6d051fb90e1bc8a73378afea4a1a2b82a5f51a2548ae288bd731468d8e8b9ac0606b652e13b343d25ce453d8636547a82a5bb8e2683a00d385c9e45edd3d71be

                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\cache2\entries\37373F56CBD822F5FCF64BA01E1320A0924D8460

                        Filesize

                        24KB

                        MD5

                        b30f12bac7e1a361b0cf9c3bbca9c7a3

                        SHA1

                        0cd81996c535f58a3622dac2e2d919802c4d3b01

                        SHA256

                        a838a8a15bbf79e56aed5dab51ee099084d5a671ce4acba99ba780ce0c630e6e

                        SHA512

                        86c67517a8803c8995b592f422e87726576e0b7e6fd26568beb268424b9f47d3ffff374d9c5c3a91db2ba0cf7df682f8f8e120449b922104c3b082128a2ef91c

                      • C:\Users\Admin\AppData\Local\Temp\1017763001\INOKWGC.exe

                        Filesize

                        1.3MB

                        MD5

                        669ed3665495a4a52029ff680ec8eba9

                        SHA1

                        7785e285365a141e307931ca4c4ef00b7ecc8986

                        SHA256

                        2d2d405409b128eea72a496ccff0ed56f9ed87ee2564ae4815b4b116d4fb74d6

                        SHA512

                        bedc8f7c1894fc64cdd00ebc58b434b7d931e52c198a0fa55f16f4e3d44a7dc4643eaa78ec55a43cc360571345cd71d91a64037a135663e72eed334fe77a21e6

                      • C:\Users\Admin\AppData\Local\Temp\1017855001\8ZVMneG.exe

                        Filesize

                        791KB

                        MD5

                        e8af4d0d0b47ac68d762b7f288ae8e6e

                        SHA1

                        1d65f31526cc20ab41d6b1625d6674d7f13e326c

                        SHA256

                        b83449768e7af68867c8bc42b19ff012722d88ea66aef69df48661e63e0eb15e

                        SHA512

                        80fad90314ff639f538a72c5e4ca2bf9ae52b9309caa7cd6f87d61791505bb3612b7f3190ab9b67348c5d71f4d29bb9d101e3f66d525eb9b5e2060a10b2d187a

                      • C:\Users\Admin\AppData\Local\Temp\1017916001\UZAj8wc.exe

                        Filesize

                        935KB

                        MD5

                        5b99682cb740202d783dde58ca97f045

                        SHA1

                        cecae054552ce295feaa0717d2a33e870addcadd

                        SHA256

                        724e283e1bb29a150c9bebc21bdf0e250e2d87257bf86c889bbe7544329c6882

                        SHA512

                        c37a2cb06407729344adb85d814223a24ec4fa65f711c7f02c0e77395ec969b7e1bd64a6f5806d4e2d88c8461587d68b6aae3378d2cf5c92f1ade2aacc13f2b2

                      • C:\Users\Admin\AppData\Local\Temp\1018024001\a974a76264.exe

                        Filesize

                        2.7MB

                        MD5

                        af13a753c8a31d591e122e15c1d717bd

                        SHA1

                        396f37a0874f2bea3d397b7fe7a770f2ef6be173

                        SHA256

                        05724ef44c4401e17e540e65e3ab7d0d0ffcdb933040cfd38920f9eba67a5845

                        SHA512

                        b3bbb544e6af579fc3c2f6c52bbac936597b012dc9d094abc7f503122fc3619d6a3a4d4f1b53ef0b3cddd44f6e3f141003f1747b599318c0891131564afef6b2

                      • C:\Users\Admin\AppData\Local\Temp\1018094001\2891211e0d.exe

                        Filesize

                        3.1MB

                        MD5

                        c00a67d527ef38dc6f49d0ad7f13b393

                        SHA1

                        7b8f2de130ab5e4e59c3c2f4a071bda831ac219d

                        SHA256

                        12226ccae8c807641241ba5178d853aad38984eefb0c0c4d65abc4da3f9787c3

                        SHA512

                        9286d267b167cba01e55e68c8c5582f903bed0dd8bc4135eb528ef6814e60e7d4dda2b3611e13efb56aa993635fbab218b0885daf5daea6043061d8384af40ca

                      • C:\Users\Admin\AppData\Local\Temp\1018098001\ec404594f2.exe

                        Filesize

                        21KB

                        MD5

                        04f57c6fb2b2cd8dcc4b38e4a93d4366

                        SHA1

                        61770495aa18d480f70b654d1f57998e5bd8c885

                        SHA256

                        51e4d0cbc184b8abfa6d84e219317cf81bd542286a7cc602c87eb703a39627c2

                        SHA512

                        53f95e98a5eca472ed6b1dfd6fecd1e28ea66967a1b3aa109fe911dbb935f1abf327438d4b2fe72cf7a0201281e9f56f4548f965b96e3916b9142257627e6ccd

                      • C:\Users\Admin\AppData\Local\Temp\1018099001\87cd20bdb5.exe

                        Filesize

                        1.8MB

                        MD5

                        905a055e55bf1bead1d2df06d2fc9888

                        SHA1

                        0b69e66478bdaa14ea3da0f88cdf8a6b84ba3731

                        SHA256

                        7f0d53beb82e6590383049463e0375c9905a277b0af46ee79f614ecbe343fd95

                        SHA512

                        f0295c0e8cc6a3c1146a20c7107b1e7c17cd66d632f8b91b461062451e9ef940e116273cc13b51d780826c9ceee903f3cab7261b43ec9a76ccd01e96de3812d9

                      • C:\Users\Admin\AppData\Local\Temp\1018100001\0fce128665.exe

                        Filesize

                        2.8MB

                        MD5

                        52b49bc4dc2268ae5d827a065d5723f7

                        SHA1

                        0fd5a4079dac939869e243966987ece4e146a7fa

                        SHA256

                        a29343dda6e66875bb76baed5a655a8ea66e0c9759ac76bc3673d3453746282b

                        SHA512

                        73ce864ecb62eb1d6e022bce9fbf55d2a5765b534e42da616a0560e8c4e8ae034a340f515f234153ae786513a7da76a8ef3b317ef95050afd58fc4eb8dc23adf

                      • C:\Users\Admin\AppData\Local\Temp\1018101001\a464a87709.exe

                        Filesize

                        947KB

                        MD5

                        2b09cc7c70204429da7ec05b29fd0487

                        SHA1

                        688a15b873282d198c33bf387134c4f893878a06

                        SHA256

                        199114dbdd79a936831dbf3cd57f1ec188bd7ac86ab3971b5dda91040df20408

                        SHA512

                        382b93aff7c7118a120aa3414efdc428887f5c6353345b12fb62c994d16fa4a26638b988ca46afcf5c86a18da34eafa7770954a6c22a1ab57fe19b2651b87cd1

                      • C:\Users\Admin\AppData\Local\Temp\1018102001\9e5ddb0b67.exe

                        Filesize

                        2.7MB

                        MD5

                        4e8d2ba58e7eaf8e12bbfbae1766da3b

                        SHA1

                        c3ad2a4dde5cbd84f903876484f7079b130af930

                        SHA256

                        4b1089921522eb16c95c7bd868ae9e0688d035714f94b0a3564503b65126614a

                        SHA512

                        b21e3215e8a8f3ccd30cea8d7bfd3be36c60cffa115106409aae78654081984f2c4536c6180dd255c5e52da07a374f727b6b48c0f7b8686129f5f70e882beea9

                      • C:\Users\Admin\AppData\Local\Temp\1018103001\e99158d429.exe

                        Filesize

                        1.8MB

                        MD5

                        6d81636af92fae98c45898823e103e4f

                        SHA1

                        00de607eb0d08dd7936211f25ea4019443e52dd1

                        SHA256

                        18d3935ee40dffa59b390df8f2544c8a08ab9d5f997b57940b843356127ead92

                        SHA512

                        21d17f4707521de24258fdb3dbd35b8a2ad17833c286a0d153e9a19a6f57ba52443bbf665af2ffdc067b2872dd71239dd79b5c0b5967d3ef1bad9f7825ec6bbe

                      • C:\Users\Admin\AppData\Local\Temp\1018104001\91bb17cccd.exe

                        Filesize

                        758KB

                        MD5

                        afd936e441bf5cbdb858e96833cc6ed3

                        SHA1

                        3491edd8c7caf9ae169e21fb58bccd29d95aefef

                        SHA256

                        c6491d7a6d70c7c51baca7436464667b4894e4989fa7c5e05068dde4699e1cbf

                        SHA512

                        928c15a1eda602b2a66a53734f3f563ab9626882104e30ee2bf5106cfd6e08ec54f96e3063f1ab89bf13be2c8822a8419f5d8ee0a3583a4c479785226051a325

                      • C:\Users\Admin\AppData\Local\Temp\1018105001\c0601430fa.exe

                        Filesize

                        1.8MB

                        MD5

                        25fb9c54265bbacc7a055174479f0b70

                        SHA1

                        4af069a2ec874703a7e29023d23a1ada491b584e

                        SHA256

                        552f8be2c6b2208a89c728f68488930c661b3a06c35a20d133ef7d3c63a86b9c

                        SHA512

                        7dfd9e0f3fa2d68a6ce8c952e3b755559db73bb7a06c95ad6ed8ac16dedb49be8b8337afc07c9c682f0c4be9db291a551286353e2e2b624223487dc1c8b54668

                      • C:\Users\Admin\AppData\Local\Temp\1018106001\a14ff0616a.exe

                        Filesize

                        1.1MB

                        MD5

                        ef08a45833a7d881c90ded1952f96cb4

                        SHA1

                        f04aeeb63a1409bd916558d2c40fab8a5ed8168b

                        SHA256

                        33c236dc81af2a47d595731d6fa47269b2874b281152530fdffdda9cbeb3b501

                        SHA512

                        74e84f710c90121527f06d453e9286910f2e8b6ac09d2aeb4ab1f0ead23ea9b410c5d1074d8bc759bc3e766b5bc77d156756c7df093ba94093107393290ced97

                      • C:\Users\Admin\AppData\Local\Temp\1018107001\44a8e4a3bb.exe

                        Filesize

                        1.8MB

                        MD5

                        ff279f4e5b1c6fbda804d2437c2dbdc8

                        SHA1

                        2feb3762c877a5ae3ca60eeebc37003ad0844245

                        SHA256

                        e115298ab160da9c7a998e4ae0b72333f64b207da165134ca45eb997a000d378

                        SHA512

                        c7a8bbcb122b2c7b57c8b678c5eed075ee5e7c355afbf86238282d2d3458019da1a8523520e1a1c631cd01b555f7df340545fd1e44ad678dc97c40b23428f967

                      • C:\Users\Admin\AppData\Local\Temp\1018108001\fa887dd056.exe

                        Filesize

                        1.9MB

                        MD5

                        ed9fb7650e33c7fa5cf0c7dd57483eed

                        SHA1

                        847fd45efadd1a7c37548771b07a5f007ab4aa40

                        SHA256

                        37c00d35c082a812602fe1609e5bc87b20864123358828bbc47de9d7498694e1

                        SHA512

                        440ea66a6056b283312b32c1195f88cd6e8a518af0a8a88c0c51c4b93bad3ef1ce6c5712d84088061192ed4530105f15de04d44e4d3d1ca25cf0b5bd849ccb80

                      • C:\Users\Admin\AppData\Local\Temp\1018109001\0abba223fa.exe

                        Filesize

                        21KB

                        MD5

                        14becdf1e2402e9aa6c2be0e6167041e

                        SHA1

                        72cbbae6878f5e06060a0038b25ede93b445f0df

                        SHA256

                        7a769963165063758f15f6e0cece25c9d13072f67fa0d3c25a03a5104fe0783a

                        SHA512

                        16b837615505f352e134afd9d8655c9cabfa5bfcfbee2c0c34f2d7d9588aa71f875e4e5feb8cdf0f7bacc00f7c1ca8dabd3b3d92afc99abf705c05c78e298b4a

                      • C:\Users\Admin\AppData\Local\Temp\1018110001\c99aeac7c1.exe

                        Filesize

                        4.2MB

                        MD5

                        3a425626cbd40345f5b8dddd6b2b9efa

                        SHA1

                        7b50e108e293e54c15dce816552356f424eea97a

                        SHA256

                        ba9212d2d5cd6df5eb7933fb37c1b72a648974c1730bf5c32439987558f8e8b1

                        SHA512

                        a7538c6b7e17c35f053721308b8d6dc53a90e79930ff4ed5cffecaa97f4d0fbc5f9e8b59f1383d8f0699c8d4f1331f226af71d40325022d10b885606a72fe668

                      • C:\Users\Admin\AppData\Local\Temp\1018111001\fe44e31f5d.exe

                        Filesize

                        4.2MB

                        MD5

                        8664a5a6e958f985735b8a17171550bc

                        SHA1

                        3deb8bfcdc32ddf9a678f44c59aa70e3a7f5bb5f

                        SHA256

                        ffcc7288342a28c0580bea142951bf4ac33a3f391d8f9323f9e74293d2817e82

                        SHA512

                        adc1c9bc3af3a39b066a9231ef6bd9119d48dff41a4e5bfac695c40a5d2b9e5e9f4eb6e4779408cd7f22fe0e7e5697d7fa314778864fd13bb321db3f8d0514b0

                      • C:\Users\Admin\AppData\Local\Temp\1018112001\5427121a94.exe

                        Filesize

                        4.3MB

                        MD5

                        35e2c99a2fed28f4148ef7f4c1431df4

                        SHA1

                        8b05aa4709fd09892238baa7a14f42d58dd58d14

                        SHA256

                        d01a1b39c935e182b6e4d6c2c15dfe35a59b086fe55bbea0338bc35626a1d3df

                        SHA512

                        e03cfe592504f165fdd3a04dc3293d2ac786c51b9b59f6ebc0560013aadde66bdfdcb3c93cd225b51cdff831050e1bfc94977ed761006f10a852fe132a6cebb8

                      • C:\Users\Admin\AppData\Local\Temp\CabF02B.tmp

                        Filesize

                        70KB

                        MD5

                        49aebf8cbd62d92ac215b2923fb1b9f5

                        SHA1

                        1723be06719828dda65ad804298d0431f6aff976

                        SHA256

                        b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                        SHA512

                        bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                      • C:\Users\Admin\AppData\Local\Temp\TarF04D.tmp

                        Filesize

                        181KB

                        MD5

                        4ea6026cf93ec6338144661bf1202cd1

                        SHA1

                        a1dec9044f750ad887935a01430bf49322fbdcb7

                        SHA256

                        8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                        SHA512

                        6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                      • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

                        Filesize

                        458KB

                        MD5

                        619f7135621b50fd1900ff24aade1524

                        SHA1

                        6c7ea8bbd435163ae3945cbef30ef6b9872a4591

                        SHA256

                        344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

                        SHA512

                        2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

                      • C:\Users\Admin\AppData\Local\Temp\main\main.bat

                        Filesize

                        440B

                        MD5

                        3626532127e3066df98e34c3d56a1869

                        SHA1

                        5fa7102f02615afde4efd4ed091744e842c63f78

                        SHA256

                        2a0e18ef585db0802269b8c1ddccb95ce4c0bac747e207ee6131dee989788bca

                        SHA512

                        dcce66d6e24d5a4a352874144871cd73c327e04c1b50764399457d8d70a9515f5bc0a650232763bf34d4830bab70ee4539646e7625cfe5336a870e311043b2bd

                      • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                        Filesize

                        442KB

                        MD5

                        85430baed3398695717b0263807cf97c

                        SHA1

                        fffbee923cea216f50fce5d54219a188a5100f41

                        SHA256

                        a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e

                        SHA512

                        06511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1

                      • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                        Filesize

                        8.0MB

                        MD5

                        a01c5ecd6108350ae23d2cddf0e77c17

                        SHA1

                        c6ac28a2cd979f1f9a75d56271821d5ff665e2b6

                        SHA256

                        345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42

                        SHA512

                        b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72

                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

                        Filesize

                        7KB

                        MD5

                        6a8c4080b25af4555503f2b45df7867b

                        SHA1

                        88a5be57c2ed156b92a03d85c2b87938fd5eae88

                        SHA256

                        23cc5c7a77985e8235c73496c4d31cb2ad4066d0a6da42bf6fd1700f095d3227

                        SHA512

                        aa74e889f14ff9bd414f807e479cffc0aebeecbdf547c3a658191a93bd24a154664f4a5e3453a68d8e4c8876664dee2d34d02324259a52c77f30cf1d165a40fa

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\datareporting\glean\db\data.safe.bin

                        Filesize

                        9KB

                        MD5

                        fc5ccbccdad874346c79907dc13bbad4

                        SHA1

                        79fb91e16f1c8db56efdda38a53565296d7e6c0a

                        SHA256

                        8aa14f715d87527e9a65e294b4e80496c91396af942667128b7fa60ea225403a

                        SHA512

                        29ba2fe75256049582d262111a441ce947bc046f16db9e3d4cb6c2bf83cf97420a36440ffb75a0ad906303d1ee89e0b39af438111cfd2890c3cddc41b633f745

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\datareporting\glean\pending_pings\01de2ff4-bffe-4e73-8d5c-f08b19671967

                        Filesize

                        733B

                        MD5

                        8ecdbb0a380fad7f78e5adbab8809988

                        SHA1

                        48492414c6bbbf181c3f4a6c3a7592fe157ac9b9

                        SHA256

                        87747852e3db48df19b353f8f459a3103324147023f4a9a82377b351ac6ab7b9

                        SHA512

                        7c760c7afdf9cb752e00abd32d04d2dc3fb7ac0ed0f2eb8f89abd744cdef5279530501908e24c770602dae1962e9b2f48266eb02efe4d985b4a16bc990187091

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll

                        Filesize

                        997KB

                        MD5

                        fe3355639648c417e8307c6d051e3e37

                        SHA1

                        f54602d4b4778da21bc97c7238fc66aa68c8ee34

                        SHA256

                        1ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e

                        SHA512

                        8f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info

                        Filesize

                        116B

                        MD5

                        3d33cdc0b3d281e67dd52e14435dd04f

                        SHA1

                        4db88689282fd4f9e9e6ab95fcbb23df6e6485db

                        SHA256

                        f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b

                        SHA512

                        a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt

                        Filesize

                        479B

                        MD5

                        49ddb419d96dceb9069018535fb2e2fc

                        SHA1

                        62aa6fea895a8b68d468a015f6e6ab400d7a7ca6

                        SHA256

                        2af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539

                        SHA512

                        48386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json

                        Filesize

                        372B

                        MD5

                        8be33af717bb1b67fbd61c3f4b807e9e

                        SHA1

                        7cf17656d174d951957ff36810e874a134dd49e0

                        SHA256

                        e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd

                        SHA512

                        6125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll

                        Filesize

                        11.8MB

                        MD5

                        33bf7b0439480effb9fb212efce87b13

                        SHA1

                        cee50f2745edc6dc291887b6075ca64d716f495a

                        SHA256

                        8ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e

                        SHA512

                        d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib

                        Filesize

                        1KB

                        MD5

                        688bed3676d2104e7f17ae1cd2c59404

                        SHA1

                        952b2cdf783ac72fcb98338723e9afd38d47ad8e

                        SHA256

                        33899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237

                        SHA512

                        7a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig

                        Filesize

                        1KB

                        MD5

                        937326fead5fd401f6cca9118bd9ade9

                        SHA1

                        4526a57d4ae14ed29b37632c72aef3c408189d91

                        SHA256

                        68a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81

                        SHA512

                        b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\prefs-1.js

                        Filesize

                        6KB

                        MD5

                        307a21baad48d9d529ef392899d2a27c

                        SHA1

                        b2ddcf037b1031388e9a22f335fb7260c24ca50b

                        SHA256

                        2acd2a45851ef93283b48492c755612764768cd610a1f44525aa6380b0463529

                        SHA512

                        5527dcca6a665de5d920c88ee69413785691701f2a7c99f7e61bce38aa479fb91fadd67768770afd63aca03e5396f20ab9fa5488b7b7cf7e4793d2e50ef9423c

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\prefs-1.js

                        Filesize

                        7KB

                        MD5

                        d240dcb7ea354c6982dcf9c5be8074a1

                        SHA1

                        a6b4c0ab1f1ed689045adc4ebf867798a44976b4

                        SHA256

                        49e94db8dbfe795a1787c26648f25d378f2caadcc5ae405d58f29db3283bf683

                        SHA512

                        75cdde4b803d394100b901e66d084f9a635bb37755a44eaffd833b6b63fcfb3ef5f18ffe96fe0e2c08c117b07b1081f4a1f5c93dad867899b3efe9fd15438039

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\prefs-1.js

                        Filesize

                        7KB

                        MD5

                        eddaa43b16466ca60a23c6eddf89c1c1

                        SHA1

                        6270139ac71c02e624f6203c9bbee423a57251e3

                        SHA256

                        ef6eea5ffdc2e6bfeb122e9ef3f0372236f35e71b65f402790d998c57b0af1bb

                        SHA512

                        3e37ba04b508794d7d980d2e99ef6600477f0fab3408e31295c1133b0e4b647bf4f100e32927ad23dd4b14ca0d00b69488dde10fb2dcec1c323300c40b5839ba

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\prefs.js

                        Filesize

                        6KB

                        MD5

                        d34b521cb01a70cdce09f86b3a253607

                        SHA1

                        0407b5693f8a85039f441f968de2eb365b9c40d7

                        SHA256

                        9cbba05261bc0a611041b72cdee31877750d525ae3cb7de1ec7b7526f7b5e590

                        SHA512

                        f366e39cc0c5ca8d5e26642aaef2158808bac908580bc32cb55243984302def4b93e8b1d2eaf52d180c681d9bff9c82f64c31e50b532c0ae4e77e8f866a94420

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\sessionstore-backups\recovery.jsonlz4

                        Filesize

                        4KB

                        MD5

                        de33c03ba9564c82330226ea63eb101d

                        SHA1

                        d884ab73f301867683c37d93fdcf42b73b3a1826

                        SHA256

                        227e3d6cc82a9f1be8818252a2e393c49e1ab1d1d5790badac89d6f9118efa5a

                        SHA512

                        0c05514aee1088e0d61f2c220e0e03043626037e943535b4b4871cc6c320c5e3bc0edef94d1eafca489815efbfd94020f59dd9b04e5f6e194ce7831dfaa0b8f8

                      • \Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                        Filesize

                        2.8MB

                        MD5

                        8cbe0ced0c0f7bfbdf19128ba80adb99

                        SHA1

                        15e615a0fe64fe5200dd916232d9bc26b1c3d815

                        SHA256

                        055c34101c332838618fdedb730655f61b97553c5e56df94efd373667a3db895

                        SHA512

                        4b258260770b08fdd8f14b7bf0e703b8ca5010e4698e457bc0cfc76c246fb9e7c60ee4d2068b717f8205c2c1954d3b6b8742ed2547b67082f5b89c63d850e938

                      • memory/1924-14-0x0000000000A40000-0x0000000000D4B000-memory.dmp

                        Filesize

                        3.0MB

                      • memory/1924-5-0x0000000000A40000-0x0000000000D4B000-memory.dmp

                        Filesize

                        3.0MB

                      • memory/1924-0-0x0000000000A40000-0x0000000000D4B000-memory.dmp

                        Filesize

                        3.0MB

                      • memory/1924-3-0x0000000000A40000-0x0000000000D4B000-memory.dmp

                        Filesize

                        3.0MB

                      • memory/1924-2-0x0000000000A41000-0x0000000000A6F000-memory.dmp

                        Filesize

                        184KB

                      • memory/1924-1-0x00000000776D0000-0x00000000776D2000-memory.dmp

                        Filesize

                        8KB

                      • memory/1924-16-0x0000000006440000-0x000000000674B000-memory.dmp

                        Filesize

                        3.0MB

                      • memory/2260-1415-0x0000000006800000-0x0000000006D05000-memory.dmp

                        Filesize

                        5.0MB

                      • memory/2260-1695-0x0000000006800000-0x0000000006CAB000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/2260-1788-0x0000000006800000-0x0000000006CAB000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/2260-1753-0x0000000006800000-0x0000000006CAB000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/2260-1752-0x0000000006800000-0x0000000006CA6000-memory.dmp

                        Filesize

                        4.6MB

                      • memory/2260-1750-0x0000000006800000-0x0000000006CA6000-memory.dmp

                        Filesize

                        4.6MB

                      • memory/2260-1696-0x0000000006800000-0x0000000007040000-memory.dmp

                        Filesize

                        8.2MB

                      • memory/2260-1316-0x0000000006800000-0x0000000006AEC000-memory.dmp

                        Filesize

                        2.9MB

                      • memory/2260-1317-0x0000000006800000-0x0000000006AEC000-memory.dmp

                        Filesize

                        2.9MB

                      • memory/2260-17-0x0000000000CB0000-0x0000000000FBB000-memory.dmp

                        Filesize

                        3.0MB

                      • memory/2260-1693-0x0000000006800000-0x0000000006CAB000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/2260-18-0x0000000000CB1000-0x0000000000CDF000-memory.dmp

                        Filesize

                        184KB

                      • memory/2260-1336-0x0000000006800000-0x0000000006AEC000-memory.dmp

                        Filesize

                        2.9MB

                      • memory/2260-38-0x0000000000CB0000-0x0000000000FBB000-memory.dmp

                        Filesize

                        3.0MB

                      • memory/2260-19-0x0000000000CB0000-0x0000000000FBB000-memory.dmp

                        Filesize

                        3.0MB

                      • memory/2260-1355-0x0000000006800000-0x0000000006AEC000-memory.dmp

                        Filesize

                        2.9MB

                      • memory/2260-37-0x0000000000CB0000-0x0000000000FBB000-memory.dmp

                        Filesize

                        3.0MB

                      • memory/2260-21-0x0000000000CB0000-0x0000000000FBB000-memory.dmp

                        Filesize

                        3.0MB

                      • memory/2260-1642-0x0000000006800000-0x0000000006ABE000-memory.dmp

                        Filesize

                        2.7MB

                      • memory/2260-1385-0x0000000006800000-0x0000000006C95000-memory.dmp

                        Filesize

                        4.6MB

                      • memory/2260-1384-0x0000000006800000-0x0000000006C95000-memory.dmp

                        Filesize

                        4.6MB

                      • memory/2260-1874-0x0000000006800000-0x0000000006CA6000-memory.dmp

                        Filesize

                        4.6MB

                      • memory/2260-1622-0x0000000006800000-0x0000000007040000-memory.dmp

                        Filesize

                        8.2MB

                      • memory/2260-1884-0x0000000006800000-0x0000000006CA6000-memory.dmp

                        Filesize

                        4.6MB

                      • memory/2260-1412-0x0000000006800000-0x0000000006D05000-memory.dmp

                        Filesize

                        5.0MB

                      • memory/2260-1413-0x0000000006800000-0x0000000006C95000-memory.dmp

                        Filesize

                        4.6MB

                      • memory/2260-36-0x0000000000CB0000-0x0000000000FBB000-memory.dmp

                        Filesize

                        3.0MB

                      • memory/2260-1573-0x0000000006800000-0x0000000006ABE000-memory.dmp

                        Filesize

                        2.7MB

                      • memory/2260-22-0x0000000000CB0000-0x0000000000FBB000-memory.dmp

                        Filesize

                        3.0MB

                      • memory/2260-1419-0x0000000006800000-0x0000000006C95000-memory.dmp

                        Filesize

                        4.6MB

                      • memory/2260-1575-0x0000000006800000-0x0000000006ABE000-memory.dmp

                        Filesize

                        2.7MB

                      • memory/2260-1552-0x0000000006800000-0x0000000006D05000-memory.dmp

                        Filesize

                        5.0MB

                      • memory/2260-1453-0x0000000006800000-0x0000000006D05000-memory.dmp

                        Filesize

                        5.0MB

                      • memory/2656-94-0x00000000049D0000-0x0000000004AB9000-memory.dmp

                        Filesize

                        932KB

                      • memory/2656-1271-0x0000000004E90000-0x0000000004EDC000-memory.dmp

                        Filesize

                        304KB

                      • memory/2656-120-0x00000000049D0000-0x0000000004AB9000-memory.dmp

                        Filesize

                        932KB

                      • memory/2656-1270-0x00000000021C0000-0x0000000002220000-memory.dmp

                        Filesize

                        384KB

                      • memory/2656-124-0x00000000049D0000-0x0000000004AB9000-memory.dmp

                        Filesize

                        932KB

                      • memory/2656-128-0x00000000049D0000-0x0000000004AB9000-memory.dmp

                        Filesize

                        932KB

                      • memory/2656-116-0x00000000049D0000-0x0000000004AB9000-memory.dmp

                        Filesize

                        932KB

                      • memory/2656-130-0x00000000049D0000-0x0000000004AB9000-memory.dmp

                        Filesize

                        932KB

                      • memory/2656-126-0x00000000049D0000-0x0000000004AB9000-memory.dmp

                        Filesize

                        932KB

                      • memory/2656-106-0x00000000049D0000-0x0000000004AB9000-memory.dmp

                        Filesize

                        932KB

                      • memory/2656-112-0x00000000049D0000-0x0000000004AB9000-memory.dmp

                        Filesize

                        932KB

                      • memory/2656-90-0x00000000049D0000-0x0000000004AB9000-memory.dmp

                        Filesize

                        932KB

                      • memory/2656-110-0x00000000049D0000-0x0000000004AB9000-memory.dmp

                        Filesize

                        932KB

                      • memory/2656-132-0x00000000049D0000-0x0000000004AB9000-memory.dmp

                        Filesize

                        932KB

                      • memory/2656-134-0x00000000049D0000-0x0000000004AB9000-memory.dmp

                        Filesize

                        932KB

                      • memory/2656-1389-0x0000000005170000-0x00000000051C4000-memory.dmp

                        Filesize

                        336KB

                      • memory/2656-85-0x00000000001F0000-0x00000000002E0000-memory.dmp

                        Filesize

                        960KB

                      • memory/2656-100-0x00000000049D0000-0x0000000004AB9000-memory.dmp

                        Filesize

                        932KB

                      • memory/2656-108-0x00000000049D0000-0x0000000004AB9000-memory.dmp

                        Filesize

                        932KB

                      • memory/2656-86-0x00000000049D0000-0x0000000004ABE000-memory.dmp

                        Filesize

                        952KB

                      • memory/2656-104-0x00000000049D0000-0x0000000004AB9000-memory.dmp

                        Filesize

                        932KB

                      • memory/2656-102-0x00000000049D0000-0x0000000004AB9000-memory.dmp

                        Filesize

                        932KB

                      • memory/2656-122-0x00000000049D0000-0x0000000004AB9000-memory.dmp

                        Filesize

                        932KB

                      • memory/2656-118-0x00000000049D0000-0x0000000004AB9000-memory.dmp

                        Filesize

                        932KB

                      • memory/2656-88-0x00000000049D0000-0x0000000004AB9000-memory.dmp

                        Filesize

                        932KB

                      • memory/2656-87-0x00000000049D0000-0x0000000004AB9000-memory.dmp

                        Filesize

                        932KB

                      • memory/2656-92-0x00000000049D0000-0x0000000004AB9000-memory.dmp

                        Filesize

                        932KB

                      • memory/2656-98-0x00000000049D0000-0x0000000004AB9000-memory.dmp

                        Filesize

                        932KB

                      • memory/2656-96-0x00000000049D0000-0x0000000004AB9000-memory.dmp

                        Filesize

                        932KB

                      • memory/2656-114-0x00000000049D0000-0x0000000004AB9000-memory.dmp

                        Filesize

                        932KB

                      • memory/2872-1721-0x0000000001300000-0x0000000001416000-memory.dmp

                        Filesize

                        1.1MB

                      • memory/2872-1722-0x00000000003C0000-0x00000000003E6000-memory.dmp

                        Filesize

                        152KB

                      • memory/2872-1894-0x0000000004AF0000-0x0000000004BB2000-memory.dmp

                        Filesize

                        776KB

                      • memory/2928-67-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

                        Filesize

                        4KB

                      • memory/2928-65-0x0000000000400000-0x0000000000455000-memory.dmp

                        Filesize

                        340KB

                      • memory/2928-63-0x0000000000400000-0x0000000000455000-memory.dmp

                        Filesize

                        340KB

                      • memory/2928-70-0x0000000000400000-0x0000000000455000-memory.dmp

                        Filesize

                        340KB

                      • memory/2928-59-0x0000000000400000-0x0000000000455000-memory.dmp

                        Filesize

                        340KB

                      • memory/2928-68-0x0000000000400000-0x0000000000455000-memory.dmp

                        Filesize

                        340KB

                      • memory/2928-61-0x0000000000400000-0x0000000000455000-memory.dmp

                        Filesize

                        340KB

                      • memory/2928-57-0x0000000000400000-0x0000000000455000-memory.dmp

                        Filesize

                        340KB

                      • memory/3492-1438-0x0000000001360000-0x00000000017F5000-memory.dmp

                        Filesize

                        4.6MB

                      • memory/3492-1387-0x0000000001360000-0x00000000017F5000-memory.dmp

                        Filesize

                        4.6MB

                      • memory/3492-1421-0x0000000001360000-0x00000000017F5000-memory.dmp

                        Filesize

                        4.6MB

                      • memory/3616-1871-0x0000000000810000-0x000000000081C000-memory.dmp

                        Filesize

                        48KB

                      • memory/4232-1416-0x0000000001370000-0x0000000001875000-memory.dmp

                        Filesize

                        5.0MB

                      • memory/4232-1418-0x0000000001370000-0x0000000001875000-memory.dmp

                        Filesize

                        5.0MB

                      • memory/4352-1958-0x0000000002870000-0x0000000002878000-memory.dmp

                        Filesize

                        32KB

                      • memory/4352-1957-0x000000001B6D0000-0x000000001B9B2000-memory.dmp

                        Filesize

                        2.9MB

                      • memory/4420-1644-0x0000000000230000-0x00000000004EE000-memory.dmp

                        Filesize

                        2.7MB

                      • memory/4420-1574-0x0000000000230000-0x00000000004EE000-memory.dmp

                        Filesize

                        2.7MB

                      • memory/4420-1675-0x0000000000230000-0x00000000004EE000-memory.dmp

                        Filesize

                        2.7MB

                      • memory/4420-1594-0x0000000000230000-0x00000000004EE000-memory.dmp

                        Filesize

                        2.7MB

                      • memory/4420-1593-0x0000000000230000-0x00000000004EE000-memory.dmp

                        Filesize

                        2.7MB

                      • memory/4436-1974-0x0000000000400000-0x0000000000464000-memory.dmp

                        Filesize

                        400KB

                      • memory/4436-1975-0x00000000007F0000-0x0000000000888000-memory.dmp

                        Filesize

                        608KB

                      • memory/4436-4059-0x0000000000490000-0x00000000004BC000-memory.dmp

                        Filesize

                        176KB

                      • memory/5076-1703-0x0000000000400000-0x0000000000C40000-memory.dmp

                        Filesize

                        8.2MB

                      • memory/5076-1623-0x0000000000400000-0x0000000000C40000-memory.dmp

                        Filesize

                        8.2MB

                      • memory/5076-2260-0x0000000000400000-0x0000000000C40000-memory.dmp

                        Filesize

                        8.2MB

                      • memory/5632-4133-0x0000000002040000-0x0000000002048000-memory.dmp

                        Filesize

                        32KB

                      • memory/5632-4132-0x000000001B650000-0x000000001B932000-memory.dmp

                        Filesize

                        2.9MB

                      • memory/5796-1319-0x0000000000F00000-0x00000000011EC000-memory.dmp

                        Filesize

                        2.9MB

                      • memory/5796-1363-0x0000000000F00000-0x00000000011EC000-memory.dmp

                        Filesize

                        2.9MB

                      • memory/5816-1732-0x00000000013A0000-0x000000000184B000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/5816-1694-0x00000000013A0000-0x000000000184B000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/5908-1751-0x0000000000030000-0x00000000004D6000-memory.dmp

                        Filesize

                        4.6MB

                      • memory/5908-1756-0x0000000000030000-0x00000000004D6000-memory.dmp

                        Filesize

                        4.6MB

                      • memory/6028-1657-0x00000000055C0000-0x0000000005716000-memory.dmp

                        Filesize

                        1.3MB

                      • memory/6028-1335-0x00000000011F0000-0x0000000001518000-memory.dmp

                        Filesize

                        3.2MB

                      • memory/6028-1658-0x0000000000A10000-0x0000000000A32000-memory.dmp

                        Filesize

                        136KB

                      • memory/6132-1351-0x0000000001030000-0x000000000103C000-memory.dmp

                        Filesize

                        48KB