Analysis

  • max time kernel
    146s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20-12-2024 03:10

General

  • Target

    file.exe

  • Size

    2.9MB

  • MD5

    ee12d8b8ca1b5a57024aa4543b3865eb

  • SHA1

    956606c8966a69d7e34a7ca2008e50440b3686fc

  • SHA256

    6519acfeab8705862fee44a34934eca2960d93f1cec000b2ee5552926865cf31

  • SHA512

    a31b97f221ec301799679d425b4df7158801b1c2b9c9bbb32283c18289dbcc7dd446784d04b3aa84a21a292535694d5fb2408a1984d1b17b183acb290030cdb6

  • SSDEEP

    49152:tImjPWPcoCD7hokvDEi4WHONULvnlDPkxYPR4Kqnc/RC:1jPicoCD7ykvYiN9Pkx24Kqnc/o

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

C2

https://sordid-snaked.cyou/api

https://awake-weaves.cyou/api

https://wrathful-jammy.cyou/api

https://debonairnukk.xyz/api

https://diffuculttan.xyz/api

https://effecterectz.xyz/api

https://deafeninggeh.biz/api

https://immureprech.biz/api

Extracted

Family

cryptbot

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • CryptBot

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Cryptbot family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 12 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 24 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 41 IoCs
  • Identifies Wine through registry keys 2 TTPs 12 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 64 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 39 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 49 IoCs
  • Suspicious use of AdjustPrivilegeToken 55 IoCs
  • Suspicious use of FindShellTrayWindow 15 IoCs
  • Suspicious use of SendNotifyMessage 13 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Views/modifies file attributes 1 TTPs 3 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1192
      • C:\Users\Admin\AppData\Local\Temp\file.exe
        "C:\Users\Admin\AppData\Local\Temp\file.exe"
        2⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Identifies Wine through registry keys
        • Loads dropped DLL
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:3052
        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
          "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2772
          • C:\Users\Admin\AppData\Local\Temp\1017855001\8ZVMneG.exe
            "C:\Users\Admin\AppData\Local\Temp\1017855001\8ZVMneG.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1992
            • C:\Users\Admin\AppData\Local\Temp\1017855001\8ZVMneG.exe
              "C:\Users\Admin\AppData\Local\Temp\1017855001\8ZVMneG.exe"
              5⤵
              • Executes dropped EXE
              PID:2204
            • C:\Users\Admin\AppData\Local\Temp\1017855001\8ZVMneG.exe
              "C:\Users\Admin\AppData\Local\Temp\1017855001\8ZVMneG.exe"
              5⤵
              • Executes dropped EXE
              PID:1948
            • C:\Users\Admin\AppData\Local\Temp\1017855001\8ZVMneG.exe
              "C:\Users\Admin\AppData\Local\Temp\1017855001\8ZVMneG.exe"
              5⤵
              • Executes dropped EXE
              PID:3004
            • C:\Users\Admin\AppData\Local\Temp\1017855001\8ZVMneG.exe
              "C:\Users\Admin\AppData\Local\Temp\1017855001\8ZVMneG.exe"
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Modifies system certificate store
              PID:1936
          • C:\Users\Admin\AppData\Local\Temp\1017916001\UZAj8wc.exe
            "C:\Users\Admin\AppData\Local\Temp\1017916001\UZAj8wc.exe"
            4⤵
            • Drops startup file
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1048
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc 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
              5⤵
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1616
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1048 -s 744
              5⤵
              • Loads dropped DLL
              • Program crash
              PID:3604
          • C:\Users\Admin\AppData\Local\Temp\1018024001\400150415f.exe
            "C:\Users\Admin\AppData\Local\Temp\1018024001\400150415f.exe"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Modifies system certificate store
            • Suspicious behavior: EnumeratesProcesses
            PID:6724
          • C:\Users\Admin\AppData\Local\Temp\1018141001\69f9e20f75.exe
            "C:\Users\Admin\AppData\Local\Temp\1018141001\69f9e20f75.exe"
            4⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:6972
          • C:\Users\Admin\AppData\Local\Temp\1018142001\de7ab2c9de.exe
            "C:\Users\Admin\AppData\Local\Temp\1018142001\de7ab2c9de.exe"
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1744
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "powershell.exe" Add-MpPreference -ExclusionPath "C:\xaebvhw"
              5⤵
              • Command and Scripting Interpreter: PowerShell
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2436
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData"
              5⤵
              • Command and Scripting Interpreter: PowerShell
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1732
          • C:\Users\Admin\AppData\Local\Temp\1018143001\e1c83f82d2.exe
            "C:\Users\Admin\AppData\Local\Temp\1018143001\e1c83f82d2.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            PID:3216
            • C:\Users\Admin\AppData\Local\Temp\1018143001\e1c83f82d2.exe
              "C:\Users\Admin\AppData\Local\Temp\1018143001\e1c83f82d2.exe"
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:3344
          • C:\Users\Admin\AppData\Local\Temp\1018144001\a19f8304fe.exe
            "C:\Users\Admin\AppData\Local\Temp\1018144001\a19f8304fe.exe"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:3784
          • C:\Users\Admin\AppData\Local\Temp\1018145001\4a8264cf3b.exe
            "C:\Users\Admin\AppData\Local\Temp\1018145001\4a8264cf3b.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4336
            • C:\Users\Admin\AppData\Local\Temp\1018145001\4a8264cf3b.exe
              "C:\Users\Admin\AppData\Local\Temp\1018145001\4a8264cf3b.exe"
              5⤵
              • Executes dropped EXE
              PID:6052
            • C:\Users\Admin\AppData\Local\Temp\1018145001\4a8264cf3b.exe
              "C:\Users\Admin\AppData\Local\Temp\1018145001\4a8264cf3b.exe"
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:6084
          • C:\Users\Admin\AppData\Local\Temp\1018146001\17d2e7d3e8.exe
            "C:\Users\Admin\AppData\Local\Temp\1018146001\17d2e7d3e8.exe"
            4⤵
            • Enumerates VirtualBox registry keys
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:4732
          • C:\Users\Admin\AppData\Local\Temp\1018147001\7e865ded70.exe
            "C:\Users\Admin\AppData\Local\Temp\1018147001\7e865ded70.exe"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious behavior: EnumeratesProcesses
            PID:5236
          • C:\Users\Admin\AppData\Local\Temp\1018148001\5e6e0f047f.exe
            "C:\Users\Admin\AppData\Local\Temp\1018148001\5e6e0f047f.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            PID:5716
            • C:\Users\Admin\AppData\Local\Temp\1018148001\5e6e0f047f.exe
              "C:\Users\Admin\AppData\Local\Temp\1018148001\5e6e0f047f.exe"
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:5872
          • C:\Users\Admin\AppData\Local\Temp\1018149001\544f6e316a.exe
            "C:\Users\Admin\AppData\Local\Temp\1018149001\544f6e316a.exe"
            4⤵
            • Executes dropped EXE
            PID:9984
          • C:\Users\Admin\AppData\Local\Temp\1018150001\fc115a671b.exe
            "C:\Users\Admin\AppData\Local\Temp\1018150001\fc115a671b.exe"
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:10052
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "powershell.exe" Add-MpPreference -ExclusionPath "C:\affarsmt"
              5⤵
              • Command and Scripting Interpreter: PowerShell
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:10124
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData"
              5⤵
              • Command and Scripting Interpreter: PowerShell
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:10200
          • C:\Users\Admin\AppData\Local\Temp\1018151001\e35c79fcb5.exe
            "C:\Users\Admin\AppData\Local\Temp\1018151001\e35c79fcb5.exe"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:3064
          • C:\Users\Admin\AppData\Local\Temp\1018152001\8fe3b36c0e.exe
            "C:\Users\Admin\AppData\Local\Temp\1018152001\8fe3b36c0e.exe"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:3408
          • C:\Users\Admin\AppData\Local\Temp\1018153001\be53927bef.exe
            "C:\Users\Admin\AppData\Local\Temp\1018153001\be53927bef.exe"
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            PID:4572
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM firefox.exe /T
              5⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:4712
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM chrome.exe /T
              5⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:5028
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM msedge.exe /T
              5⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:5188
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM opera.exe /T
              5⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:5356
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM brave.exe /T
              5⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:5532
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
              5⤵
                PID:5696
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                  6⤵
                  • Checks processor information in registry
                  • Modifies registry class
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  PID:5736
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5736.0.981148789\1218080778" -parentBuildID 20221007134813 -prefsHandle 1260 -prefMapHandle 1252 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e8420be1-5f0e-4f25-9cf1-051d035239ed} 5736 "\\.\pipe\gecko-crash-server-pipe.5736" 1336 106db158 gpu
                    7⤵
                      PID:6396
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5736.1.1769081107\2029873690" -parentBuildID 20221007134813 -prefsHandle 1528 -prefMapHandle 1524 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {0ee4d77a-b052-4c64-8ad3-b5f5990d8ccf} 5736 "\\.\pipe\gecko-crash-server-pipe.5736" 1540 edf9558 socket
                      7⤵
                        PID:832
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5736.2.1019077847\1479950933" -childID 1 -isForBrowser -prefsHandle 2132 -prefMapHandle 2128 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 828 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8e9fcb7f-4db7-45f7-9cf4-4411942ee17a} 5736 "\\.\pipe\gecko-crash-server-pipe.5736" 2144 1b0ac558 tab
                        7⤵
                          PID:884
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5736.3.481729544\1140735804" -childID 2 -isForBrowser -prefsHandle 2948 -prefMapHandle 2944 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 828 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {74739fa2-7334-4357-ba77-8408819f70bd} 5736 "\\.\pipe\gecko-crash-server-pipe.5736" 2960 1d931e58 tab
                          7⤵
                            PID:3268
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5736.4.149845555\891784084" -childID 3 -isForBrowser -prefsHandle 3856 -prefMapHandle 3848 -prefsLen 26531 -prefMapSize 233444 -jsInitHandle 828 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {42706088-6e3d-4c12-97cd-6df352aaa0c9} 5736 "\\.\pipe\gecko-crash-server-pipe.5736" 3864 1f9bc558 tab
                            7⤵
                              PID:8012
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5736.5.526846145\1850389338" -childID 4 -isForBrowser -prefsHandle 3968 -prefMapHandle 3972 -prefsLen 26531 -prefMapSize 233444 -jsInitHandle 828 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d546084c-eb75-4459-9440-aed226b5a374} 5736 "\\.\pipe\gecko-crash-server-pipe.5736" 3956 20d42e58 tab
                              7⤵
                                PID:8028
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5736.6.1767742845\2086996024" -childID 5 -isForBrowser -prefsHandle 4136 -prefMapHandle 4140 -prefsLen 26531 -prefMapSize 233444 -jsInitHandle 828 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {81cb27e9-d26a-46b4-b12a-cdf7e13f0fc1} 5736 "\\.\pipe\gecko-crash-server-pipe.5736" 4124 20de0f58 tab
                                7⤵
                                  PID:8076
                          • C:\Users\Admin\AppData\Local\Temp\1018154001\3b7c445e9b.exe
                            "C:\Users\Admin\AppData\Local\Temp\1018154001\3b7c445e9b.exe"
                            4⤵
                            • Modifies Windows Defender Real-time Protection settings
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Windows security modification
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:5304
                          • C:\Users\Admin\AppData\Local\Temp\1018155001\c270411886.exe
                            "C:\Users\Admin\AppData\Local\Temp\1018155001\c270411886.exe"
                            4⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            PID:8768
                          • C:\Users\Admin\AppData\Local\Temp\1018156001\f8e5b68567.exe
                            "C:\Users\Admin\AppData\Local\Temp\1018156001\f8e5b68567.exe"
                            4⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            PID:9544
                            • C:\Windows\system32\cmd.exe
                              cmd /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"
                              5⤵
                              • Loads dropped DLL
                              PID:9812
                              • C:\Windows\system32\mode.com
                                mode 65,10
                                6⤵
                                  PID:2296
                                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                  7z.exe e file.zip -p24291711423417250691697322505 -oextracted
                                  6⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2148
                                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                  7z.exe e extracted/file_7.zip -oextracted
                                  6⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3628
                                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                  7z.exe e extracted/file_6.zip -oextracted
                                  6⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:4148
                                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                  7z.exe e extracted/file_5.zip -oextracted
                                  6⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:4588
                                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                  7z.exe e extracted/file_4.zip -oextracted
                                  6⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3248
                                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                  7z.exe e extracted/file_3.zip -oextracted
                                  6⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1868
                                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                  7z.exe e extracted/file_2.zip -oextracted
                                  6⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:7644
                                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                  7z.exe e extracted/file_1.zip -oextracted
                                  6⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2368
                                • C:\Windows\system32\attrib.exe
                                  attrib +H "in.exe"
                                  6⤵
                                  • Views/modifies file attributes
                                  PID:1816
                                • C:\Users\Admin\AppData\Local\Temp\main\in.exe
                                  "in.exe"
                                  6⤵
                                  • Executes dropped EXE
                                  PID:2332
                                  • C:\Windows\system32\attrib.exe
                                    attrib +H +S C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                                    7⤵
                                    • Views/modifies file attributes
                                    PID:2668
                                  • C:\Windows\system32\attrib.exe
                                    attrib +H C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                                    7⤵
                                    • Views/modifies file attributes
                                    PID:1924
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks /f /CREATE /TN "Intel_PTT_EK_Recertification" /TR "C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe" /SC MINUTE
                                    7⤵
                                    • Scheduled Task/Job: Scheduled Task
                                    PID:2852
                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    powershell ping 127.0.0.1; del in.exe
                                    7⤵
                                    • System Network Configuration Discovery: Internet Connection Discovery
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:1688
                                    • C:\Windows\system32\PING.EXE
                                      "C:\Windows\system32\PING.EXE" 127.0.0.1
                                      8⤵
                                      • System Network Configuration Discovery: Internet Connection Discovery
                                      • Runs ping.exe
                                      PID:3200
                            • C:\Users\Admin\AppData\Local\Temp\1018157001\af9c1e08ce.exe
                              "C:\Users\Admin\AppData\Local\Temp\1018157001\af9c1e08ce.exe"
                              4⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              PID:3620
                            • C:\Users\Admin\AppData\Local\Temp\1018158001\8053e6ec5c.exe
                              "C:\Users\Admin\AppData\Local\Temp\1018158001\8053e6ec5c.exe"
                              4⤵
                              • Executes dropped EXE
                              • Suspicious use of SetThreadContext
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4548
                              • C:\Users\Admin\AppData\Local\Temp\1018158001\8053e6ec5c.exe
                                "C:\Users\Admin\AppData\Local\Temp\1018158001\8053e6ec5c.exe"
                                5⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                PID:488
                        • C:\Windows\SysWOW64\dialer.exe
                          "C:\Windows\system32\dialer.exe"
                          2⤵
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          PID:7160
                      • C:\Windows\system32\taskeng.exe
                        taskeng.exe {F5F3D592-FD4B-4134-ABC4-90CC50275510} S-1-5-21-3290804112-2823094203-3137964600-1000:VORHPBAB\Admin:Interactive:[1]
                        1⤵
                          PID:5044
                          • C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                            C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                            2⤵
                            • Executes dropped EXE
                            • Suspicious use of SetThreadContext
                            • Suspicious behavior: EnumeratesProcesses
                            PID:5160
                            • C:\Windows\explorer.exe
                              explorer.exe
                              3⤵
                              • Suspicious use of AdjustPrivilegeToken
                              PID:5212
                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              powershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe
                              3⤵
                              • Drops file in System32 directory
                              • System Network Configuration Discovery: Internet Connection Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:5364
                              • C:\Windows\system32\PING.EXE
                                "C:\Windows\system32\PING.EXE" 127.1.10.1
                                4⤵
                                • System Network Configuration Discovery: Internet Connection Discovery
                                • Runs ping.exe
                                PID:5660

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EB0KZ1Y4\download[1].htm

                          Filesize

                          1B

                          MD5

                          cfcd208495d565ef66e7dff9f98764da

                          SHA1

                          b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                          SHA256

                          5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                          SHA512

                          31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\activity-stream.discovery_stream.json.tmp

                          Filesize

                          32KB

                          MD5

                          5cbd0b2f50ca62e31412bfbffca282d5

                          SHA1

                          a73086f62fb0749c744291802fc686ef96f5fd59

                          SHA256

                          978691dce42234467cbb5cb5199b61c0dd90479f28dcdc90aefd01edd66088c7

                          SHA512

                          e9b94ddc9393a16c5f20ed48b67e2b3550591712638de5c4d2cc94eb5fcfca67bda3046e858ecdd7bdc3d7d4eb0f3b9ee7fe3246e7ad913aca4a4a8217158898

                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                          Filesize

                          15KB

                          MD5

                          96c542dec016d9ec1ecc4dddfcbaac66

                          SHA1

                          6199f7648bb744efa58acf7b96fee85d938389e4

                          SHA256

                          7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                          SHA512

                          cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                        • C:\Users\Admin\AppData\Local\Temp\1017855001\8ZVMneG.exe

                          Filesize

                          791KB

                          MD5

                          e8af4d0d0b47ac68d762b7f288ae8e6e

                          SHA1

                          1d65f31526cc20ab41d6b1625d6674d7f13e326c

                          SHA256

                          b83449768e7af68867c8bc42b19ff012722d88ea66aef69df48661e63e0eb15e

                          SHA512

                          80fad90314ff639f538a72c5e4ca2bf9ae52b9309caa7cd6f87d61791505bb3612b7f3190ab9b67348c5d71f4d29bb9d101e3f66d525eb9b5e2060a10b2d187a

                        • C:\Users\Admin\AppData\Local\Temp\1017916001\UZAj8wc.exe

                          Filesize

                          935KB

                          MD5

                          5b99682cb740202d783dde58ca97f045

                          SHA1

                          cecae054552ce295feaa0717d2a33e870addcadd

                          SHA256

                          724e283e1bb29a150c9bebc21bdf0e250e2d87257bf86c889bbe7544329c6882

                          SHA512

                          c37a2cb06407729344adb85d814223a24ec4fa65f711c7f02c0e77395ec969b7e1bd64a6f5806d4e2d88c8461587d68b6aae3378d2cf5c92f1ade2aacc13f2b2

                        • C:\Users\Admin\AppData\Local\Temp\1018024001\400150415f.exe

                          Filesize

                          2.8MB

                          MD5

                          70b6311a336b8fb48f9c64c1820393a5

                          SHA1

                          ae0fd2c31d56ffc2d2f12a2ad888a9e25b48282c

                          SHA256

                          fb49c5caf843363c1a34d5fec817bc4174b232b7b05ba888dd07d55180e46a0b

                          SHA512

                          fa7b1132e1024fd063dd61fbc73d5b33822fcfad0223df547176c7dc313e92a89ba912a9a7f0a5f43a604a280603eb35f9ae03d51448e570940956249e4b8269

                        • C:\Users\Admin\AppData\Local\Temp\1018141001\69f9e20f75.exe

                          Filesize

                          1.9MB

                          MD5

                          01baaf7c78e6861c97e7d5a5480e1214

                          SHA1

                          2dcd0def38f79d808e5759e84acfde351cc35b46

                          SHA256

                          d9cceb4e02a370fb262a1b1116563591df51f926e63d5e256fe8ac40cc408cea

                          SHA512

                          9c01325d724dc97620f67f4ff738f282abf50877b4ba1ba8d1f119182130b5683ee7f1150a9335eb678c16169881bb9f890b1c706883b966106adbb61feb431f

                        • C:\Users\Admin\AppData\Local\Temp\1018142001\de7ab2c9de.exe

                          Filesize

                          21KB

                          MD5

                          14becdf1e2402e9aa6c2be0e6167041e

                          SHA1

                          72cbbae6878f5e06060a0038b25ede93b445f0df

                          SHA256

                          7a769963165063758f15f6e0cece25c9d13072f67fa0d3c25a03a5104fe0783a

                          SHA512

                          16b837615505f352e134afd9d8655c9cabfa5bfcfbee2c0c34f2d7d9588aa71f875e4e5feb8cdf0f7bacc00f7c1ca8dabd3b3d92afc99abf705c05c78e298b4a

                        • C:\Users\Admin\AppData\Local\Temp\1018143001\e1c83f82d2.exe

                          Filesize

                          758KB

                          MD5

                          afd936e441bf5cbdb858e96833cc6ed3

                          SHA1

                          3491edd8c7caf9ae169e21fb58bccd29d95aefef

                          SHA256

                          c6491d7a6d70c7c51baca7436464667b4894e4989fa7c5e05068dde4699e1cbf

                          SHA512

                          928c15a1eda602b2a66a53734f3f563ab9626882104e30ee2bf5106cfd6e08ec54f96e3063f1ab89bf13be2c8822a8419f5d8ee0a3583a4c479785226051a325

                        • C:\Users\Admin\AppData\Local\Temp\1018144001\a19f8304fe.exe

                          Filesize

                          1.8MB

                          MD5

                          25fb9c54265bbacc7a055174479f0b70

                          SHA1

                          4af069a2ec874703a7e29023d23a1ada491b584e

                          SHA256

                          552f8be2c6b2208a89c728f68488930c661b3a06c35a20d133ef7d3c63a86b9c

                          SHA512

                          7dfd9e0f3fa2d68a6ce8c952e3b755559db73bb7a06c95ad6ed8ac16dedb49be8b8337afc07c9c682f0c4be9db291a551286353e2e2b624223487dc1c8b54668

                        • C:\Users\Admin\AppData\Local\Temp\1018145001\4a8264cf3b.exe

                          Filesize

                          1.1MB

                          MD5

                          ef08a45833a7d881c90ded1952f96cb4

                          SHA1

                          f04aeeb63a1409bd916558d2c40fab8a5ed8168b

                          SHA256

                          33c236dc81af2a47d595731d6fa47269b2874b281152530fdffdda9cbeb3b501

                          SHA512

                          74e84f710c90121527f06d453e9286910f2e8b6ac09d2aeb4ab1f0ead23ea9b410c5d1074d8bc759bc3e766b5bc77d156756c7df093ba94093107393290ced97

                        • C:\Users\Admin\AppData\Local\Temp\1018146001\17d2e7d3e8.exe

                          Filesize

                          4.2MB

                          MD5

                          3fbe557c7ec8409f30604b0f5e365f70

                          SHA1

                          00d9f4548c93be387f68c1b7aeedcf4c75873b60

                          SHA256

                          f4e7b423983d4606cb9a72876f57c870884b40556ab6ea3da498d69e02acacab

                          SHA512

                          802d3925592429a116f24c5a35723f030ea6fc4924dc201eb69a09bfeda57aac3e0c2246d0e213d131b888515936c31d13c03fd6c32c2d091a3ddc2437c1642d

                        • C:\Users\Admin\AppData\Local\Temp\1018147001\7e865ded70.exe

                          Filesize

                          4.3MB

                          MD5

                          35e2c99a2fed28f4148ef7f4c1431df4

                          SHA1

                          8b05aa4709fd09892238baa7a14f42d58dd58d14

                          SHA256

                          d01a1b39c935e182b6e4d6c2c15dfe35a59b086fe55bbea0338bc35626a1d3df

                          SHA512

                          e03cfe592504f165fdd3a04dc3293d2ac786c51b9b59f6ebc0560013aadde66bdfdcb3c93cd225b51cdff831050e1bfc94977ed761006f10a852fe132a6cebb8

                        • C:\Users\Admin\AppData\Local\Temp\1018149001\544f6e316a.exe

                          Filesize

                          1.3MB

                          MD5

                          669ed3665495a4a52029ff680ec8eba9

                          SHA1

                          7785e285365a141e307931ca4c4ef00b7ecc8986

                          SHA256

                          2d2d405409b128eea72a496ccff0ed56f9ed87ee2564ae4815b4b116d4fb74d6

                          SHA512

                          bedc8f7c1894fc64cdd00ebc58b434b7d931e52c198a0fa55f16f4e3d44a7dc4643eaa78ec55a43cc360571345cd71d91a64037a135663e72eed334fe77a21e6

                        • C:\Users\Admin\AppData\Local\Temp\1018150001\fc115a671b.exe

                          Filesize

                          21KB

                          MD5

                          04f57c6fb2b2cd8dcc4b38e4a93d4366

                          SHA1

                          61770495aa18d480f70b654d1f57998e5bd8c885

                          SHA256

                          51e4d0cbc184b8abfa6d84e219317cf81bd542286a7cc602c87eb703a39627c2

                          SHA512

                          53f95e98a5eca472ed6b1dfd6fecd1e28ea66967a1b3aa109fe911dbb935f1abf327438d4b2fe72cf7a0201281e9f56f4548f965b96e3916b9142257627e6ccd

                        • C:\Users\Admin\AppData\Local\Temp\1018151001\e35c79fcb5.exe

                          Filesize

                          1.8MB

                          MD5

                          5f79741840108c1b733b77cfe97ba3e8

                          SHA1

                          c01dcaac302dba85c1abf25c7f7d662e0927477e

                          SHA256

                          eeb4f6b6272256357d641cefe479feb49c2d96008811b055d5379144db96109a

                          SHA512

                          478193b6ad2ffc8aa6591e5971ba283bc009640ef6d70c57e9d5346f6067cdb8fc0f8a56eea23428c6e3f52bf52eac6d023de6a9cdd7d798c1459e5f620254d8

                        • C:\Users\Admin\AppData\Local\Temp\1018152001\8fe3b36c0e.exe

                          Filesize

                          2.8MB

                          MD5

                          f8c0c91422ed7b859bfcda794dda2759

                          SHA1

                          a5653682d4087bb8e2b906c9176bb1d469602738

                          SHA256

                          2f6bf62d2f8ece15859ac6606e2caab4793c7edc7bdf10d8fdb6f90692530a43

                          SHA512

                          272b5047c9e358dfed341f51159c0f0751b1bad033d86e42b82f1012672f600bad6ec3d11c09b783e398dd2575c14ca9c49dbd61537b4f71a50fda70e5ff5841

                        • C:\Users\Admin\AppData\Local\Temp\1018153001\be53927bef.exe

                          Filesize

                          947KB

                          MD5

                          837a2891094f4a6c39b894cc4a11ed18

                          SHA1

                          b6ff55e13ea3faf022977589dbe319551bb19e51

                          SHA256

                          42923207d35a7f4c46bf4b747f6e76fbd5b76f81573e03081b23b69d302782f9

                          SHA512

                          8a5a0e2d13d7b4f45d48407c4099c6454e141c4623473dd70484c88253b342e677d68c12598ad2c5dac4dfb63d31058f9ead8cfbab04ea824a023152fdb4f0dd

                        • C:\Users\Admin\AppData\Local\Temp\1018154001\3b7c445e9b.exe

                          Filesize

                          2.7MB

                          MD5

                          0e0e7191f2280f54f23b8822606402f0

                          SHA1

                          55aee5f610c2618acfa2f244215edb8f2b3d7cce

                          SHA256

                          3b00bd5900fff69fb2c342e351a4987784cbe99dc5c59fcdc0016abc89513f8a

                          SHA512

                          258083a684063ceb5550cf11dec43b45400ae769694d8bfbbe137870c0b4d1720de96ed9ee99f316c3aeaa9b8566ab8c2c4a0a9b1b8a639f1d8df85d02281d26

                        • C:\Users\Admin\AppData\Local\Temp\1018155001\c270411886.exe

                          Filesize

                          1.8MB

                          MD5

                          3c2e26d10fa55af2e913120df3b7eddb

                          SHA1

                          a6ba8c6378d44616d7196331c6ea54e286136ce6

                          SHA256

                          4463effeb9799edfe6c07776f1e044718792fabb6ea103b9ee016e5efd21a985

                          SHA512

                          be0d54efddd550dd9acc996df86ff2dc86a8fb50aa84e7d018736d16e06a97c746c2a3b92f70b56773fa791fe3b6ba365d676ed7683cd8f82738b2743d2a82c6

                        • C:\Users\Admin\AppData\Local\Temp\1018156001\f8e5b68567.exe

                          Filesize

                          4.2MB

                          MD5

                          3a425626cbd40345f5b8dddd6b2b9efa

                          SHA1

                          7b50e108e293e54c15dce816552356f424eea97a

                          SHA256

                          ba9212d2d5cd6df5eb7933fb37c1b72a648974c1730bf5c32439987558f8e8b1

                          SHA512

                          a7538c6b7e17c35f053721308b8d6dc53a90e79930ff4ed5cffecaa97f4d0fbc5f9e8b59f1383d8f0699c8d4f1331f226af71d40325022d10b885606a72fe668

                        • C:\Users\Admin\AppData\Local\Temp\1018157001\af9c1e08ce.exe

                          Filesize

                          1.8MB

                          MD5

                          ff279f4e5b1c6fbda804d2437c2dbdc8

                          SHA1

                          2feb3762c877a5ae3ca60eeebc37003ad0844245

                          SHA256

                          e115298ab160da9c7a998e4ae0b72333f64b207da165134ca45eb997a000d378

                          SHA512

                          c7a8bbcb122b2c7b57c8b678c5eed075ee5e7c355afbf86238282d2d3458019da1a8523520e1a1c631cd01b555f7df340545fd1e44ad678dc97c40b23428f967

                        • C:\Users\Admin\AppData\Local\Temp\1018158001\8053e6ec5c.exe

                          Filesize

                          3.1MB

                          MD5

                          c00a67d527ef38dc6f49d0ad7f13b393

                          SHA1

                          7b8f2de130ab5e4e59c3c2f4a071bda831ac219d

                          SHA256

                          12226ccae8c807641241ba5178d853aad38984eefb0c0c4d65abc4da3f9787c3

                          SHA512

                          9286d267b167cba01e55e68c8c5582f903bed0dd8bc4135eb528ef6814e60e7d4dda2b3611e13efb56aa993635fbab218b0885daf5daea6043061d8384af40ca

                        • C:\Users\Admin\AppData\Local\Temp\CabC6E9.tmp

                          Filesize

                          70KB

                          MD5

                          49aebf8cbd62d92ac215b2923fb1b9f5

                          SHA1

                          1723be06719828dda65ad804298d0431f6aff976

                          SHA256

                          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                          SHA512

                          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                        • C:\Users\Admin\AppData\Local\Temp\TarC71B.tmp

                          Filesize

                          181KB

                          MD5

                          4ea6026cf93ec6338144661bf1202cd1

                          SHA1

                          a1dec9044f750ad887935a01430bf49322fbdcb7

                          SHA256

                          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                          SHA512

                          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                          Filesize

                          2.9MB

                          MD5

                          ee12d8b8ca1b5a57024aa4543b3865eb

                          SHA1

                          956606c8966a69d7e34a7ca2008e50440b3686fc

                          SHA256

                          6519acfeab8705862fee44a34934eca2960d93f1cec000b2ee5552926865cf31

                          SHA512

                          a31b97f221ec301799679d425b4df7158801b1c2b9c9bbb32283c18289dbcc7dd446784d04b3aa84a21a292535694d5fb2408a1984d1b17b183acb290030cdb6

                        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

                          Filesize

                          458KB

                          MD5

                          619f7135621b50fd1900ff24aade1524

                          SHA1

                          6c7ea8bbd435163ae3945cbef30ef6b9872a4591

                          SHA256

                          344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

                          SHA512

                          2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

                        • C:\Users\Admin\AppData\Local\Temp\main\main.bat

                          Filesize

                          440B

                          MD5

                          3626532127e3066df98e34c3d56a1869

                          SHA1

                          5fa7102f02615afde4efd4ed091744e842c63f78

                          SHA256

                          2a0e18ef585db0802269b8c1ddccb95ce4c0bac747e207ee6131dee989788bca

                          SHA512

                          dcce66d6e24d5a4a352874144871cd73c327e04c1b50764399457d8d70a9515f5bc0a650232763bf34d4830bab70ee4539646e7625cfe5336a870e311043b2bd

                        • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                          Filesize

                          442KB

                          MD5

                          85430baed3398695717b0263807cf97c

                          SHA1

                          fffbee923cea216f50fce5d54219a188a5100f41

                          SHA256

                          a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e

                          SHA512

                          06511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1

                        • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                          Filesize

                          8.0MB

                          MD5

                          a01c5ecd6108350ae23d2cddf0e77c17

                          SHA1

                          c6ac28a2cd979f1f9a75d56271821d5ff665e2b6

                          SHA256

                          345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42

                          SHA512

                          b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72

                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

                          Filesize

                          7KB

                          MD5

                          db116ec17b841c721eaedd8ed71276ac

                          SHA1

                          2276fef68c10ca05f9d0b675f8c9213977486a5c

                          SHA256

                          beaaaa364def8125839652aca5122c93446b82732524756501d4d80efe99cc4a

                          SHA512

                          3291e516a61218b98b2c75b6ffcbc34888bcad9e7e9266412336081b8d644af8c08037b2e92fbdc5c4cc0571175134c9668fdd641905e7cc0fdbf0892941df3a

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\datareporting\glean\db\data.safe.bin

                          Filesize

                          9KB

                          MD5

                          c861bb82999efd362559e0ee919f53b1

                          SHA1

                          d6ecf57216f263064d8ba03d1dd23f4b34333699

                          SHA256

                          af5e4218e6b2ccb890966418abf7c93337aa891442c603717a9f650b908d4a17

                          SHA512

                          f581a27175b7557ce880a8d1efad5447386fd4b39104bb8f9bc54bf56157d6da9ed12378286aec8559847d9c6f4699e6b02961ba7a1af1b0cb3d1c8f330c2288

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\datareporting\glean\pending_pings\94782798-b035-4732-86f3-8e9b5ce0fb2e

                          Filesize

                          733B

                          MD5

                          3ae5f3f38a9e529e8995164b67233960

                          SHA1

                          ff5df006adbd6c633e954290853bd49ddb5dbde1

                          SHA256

                          f06642c44be6ccd996e95b621c63a759172e7b7c5b79ad5cf60436b02fd2b68a

                          SHA512

                          9406ffd2099aa4b4d907895e8312ab25d3a87e10abef9566c3d3083006448e7a006d053dc26b0ee2099ef736b55b579bd564952775696952cdb537912a567bcd

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll

                          Filesize

                          997KB

                          MD5

                          fe3355639648c417e8307c6d051e3e37

                          SHA1

                          f54602d4b4778da21bc97c7238fc66aa68c8ee34

                          SHA256

                          1ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e

                          SHA512

                          8f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info

                          Filesize

                          116B

                          MD5

                          3d33cdc0b3d281e67dd52e14435dd04f

                          SHA1

                          4db88689282fd4f9e9e6ab95fcbb23df6e6485db

                          SHA256

                          f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b

                          SHA512

                          a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt

                          Filesize

                          479B

                          MD5

                          49ddb419d96dceb9069018535fb2e2fc

                          SHA1

                          62aa6fea895a8b68d468a015f6e6ab400d7a7ca6

                          SHA256

                          2af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539

                          SHA512

                          48386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json

                          Filesize

                          372B

                          MD5

                          8be33af717bb1b67fbd61c3f4b807e9e

                          SHA1

                          7cf17656d174d951957ff36810e874a134dd49e0

                          SHA256

                          e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd

                          SHA512

                          6125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll

                          Filesize

                          11.8MB

                          MD5

                          33bf7b0439480effb9fb212efce87b13

                          SHA1

                          cee50f2745edc6dc291887b6075ca64d716f495a

                          SHA256

                          8ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e

                          SHA512

                          d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib

                          Filesize

                          1KB

                          MD5

                          688bed3676d2104e7f17ae1cd2c59404

                          SHA1

                          952b2cdf783ac72fcb98338723e9afd38d47ad8e

                          SHA256

                          33899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237

                          SHA512

                          7a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig

                          Filesize

                          1KB

                          MD5

                          937326fead5fd401f6cca9118bd9ade9

                          SHA1

                          4526a57d4ae14ed29b37632c72aef3c408189d91

                          SHA256

                          68a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81

                          SHA512

                          b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\prefs-1.js

                          Filesize

                          7KB

                          MD5

                          739dfe234af3a0acdb744c9acbe5255a

                          SHA1

                          023dfb62db154909ba87af03b9f241982f5a1457

                          SHA256

                          250f073630e60c01c80152eecf58553f25b88c7635cd500a2910e2d865e4d269

                          SHA512

                          9fbb01d5bbee241391266eb26635434bc4e469ee01524728473d0bf4c6126be3ae14fcf671d20350ea1d69b6aacc116084c67b90d62ecf3f5f999ab0129faa76

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\prefs-1.js

                          Filesize

                          6KB

                          MD5

                          aa52ab2ab475dc3b93d6d1f426e12b0d

                          SHA1

                          6326b546441521d9d108a370ae78921511654b67

                          SHA256

                          c06a09cd1e0109b4b70d52a4fddbf17ad1de8d1ce9d1160d4c383222a9866eda

                          SHA512

                          ea846c6a2c30791b68a2529ff3ebe48024c669f01cf07de7eae12c175e87768afe75ce70a73fc6185fd0b3f7c63f4cc627b64174b2f3a790d2d753ac53b4117e

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\prefs.js

                          Filesize

                          6KB

                          MD5

                          65eaadaeb025b608fec773d46f3a61e3

                          SHA1

                          e761339f56d609030ab3ec5e4ccdc02cfaaf97c3

                          SHA256

                          6ad1ccffcdab66b5e1b10a553a2835a81cf67ebb0710c90dde1c41e6724f0105

                          SHA512

                          f8aa3052bd540da6efa59464de9d87855eb65bbc5a49c93f36b9c0210a1446b5426be33cae09fa5e0be80047c81cbf94ca9139f052df63314c0b14b5c3467de1

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\prefs.js

                          Filesize

                          6KB

                          MD5

                          b4c02efaa94774a4a6d740fa0ecaf11c

                          SHA1

                          349aa611036cf09d09d8506b17a2c68807ad84c0

                          SHA256

                          9fa717e64cfbada68099e9522fd4096d0de9b0dba74463d57a6e8d6c87b29f9c

                          SHA512

                          29e4be726938c9858d61309779f44f8849e9be94ad0faa1e8ddf19278445814c52e4cf475f07230cd439bd27a510cba477568a76f0ed2d5c28094cefb35de9d7

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\sessionstore-backups\recovery.jsonlz4

                          Filesize

                          4KB

                          MD5

                          9619a6b5fad9ccd47d7dca74af2122dd

                          SHA1

                          29af0568b0cf31502f1147117aeef937936cf37a

                          SHA256

                          22a7bd28250a206600ebf51d07de958efe840ed373c4356d7cbbd0434caefa5c

                          SHA512

                          e2f7512243eca5ac83ee2b4952c11f0ce428a88ecfec2b7c32d9009d2fe6f234046efbae29fdfd2c2e87bb10276b0681373a228d58685baee2a568dd107e5460

                        • memory/1048-102-0x0000000000F00000-0x0000000000FE9000-memory.dmp

                          Filesize

                          932KB

                        • memory/1048-118-0x0000000000F00000-0x0000000000FE9000-memory.dmp

                          Filesize

                          932KB

                        • memory/1048-124-0x0000000000F00000-0x0000000000FE9000-memory.dmp

                          Filesize

                          932KB

                        • memory/1048-122-0x0000000000F00000-0x0000000000FE9000-memory.dmp

                          Filesize

                          932KB

                        • memory/1048-120-0x0000000000F00000-0x0000000000FE9000-memory.dmp

                          Filesize

                          932KB

                        • memory/1048-116-0x0000000000F00000-0x0000000000FE9000-memory.dmp

                          Filesize

                          932KB

                        • memory/1048-114-0x0000000000F00000-0x0000000000FE9000-memory.dmp

                          Filesize

                          932KB

                        • memory/1048-112-0x0000000000F00000-0x0000000000FE9000-memory.dmp

                          Filesize

                          932KB

                        • memory/1048-1289-0x0000000000BE0000-0x0000000000C40000-memory.dmp

                          Filesize

                          384KB

                        • memory/1048-1290-0x0000000000C40000-0x0000000000C8C000-memory.dmp

                          Filesize

                          304KB

                        • memory/1048-128-0x0000000000F00000-0x0000000000FE9000-memory.dmp

                          Filesize

                          932KB

                        • memory/1048-126-0x0000000000F00000-0x0000000000FE9000-memory.dmp

                          Filesize

                          932KB

                        • memory/1048-95-0x0000000000F00000-0x0000000000FE9000-memory.dmp

                          Filesize

                          932KB

                        • memory/1048-98-0x0000000000F00000-0x0000000000FE9000-memory.dmp

                          Filesize

                          932KB

                        • memory/1048-130-0x0000000000F00000-0x0000000000FE9000-memory.dmp

                          Filesize

                          932KB

                        • memory/1048-100-0x0000000000F00000-0x0000000000FE9000-memory.dmp

                          Filesize

                          932KB

                        • memory/1048-104-0x0000000000F00000-0x0000000000FE9000-memory.dmp

                          Filesize

                          932KB

                        • memory/1048-106-0x0000000000F00000-0x0000000000FE9000-memory.dmp

                          Filesize

                          932KB

                        • memory/1048-108-0x0000000000F00000-0x0000000000FE9000-memory.dmp

                          Filesize

                          932KB

                        • memory/1048-144-0x0000000000F00000-0x0000000000FE9000-memory.dmp

                          Filesize

                          932KB

                        • memory/1048-110-0x0000000000F00000-0x0000000000FE9000-memory.dmp

                          Filesize

                          932KB

                        • memory/1048-134-0x0000000000F00000-0x0000000000FE9000-memory.dmp

                          Filesize

                          932KB

                        • memory/1048-96-0x0000000000F00000-0x0000000000FE9000-memory.dmp

                          Filesize

                          932KB

                        • memory/1048-132-0x0000000000F00000-0x0000000000FE9000-memory.dmp

                          Filesize

                          932KB

                        • memory/1048-136-0x0000000000F00000-0x0000000000FE9000-memory.dmp

                          Filesize

                          932KB

                        • memory/1048-77-0x00000000010A0000-0x0000000001190000-memory.dmp

                          Filesize

                          960KB

                        • memory/1048-139-0x0000000000F00000-0x0000000000FE9000-memory.dmp

                          Filesize

                          932KB

                        • memory/1048-85-0x0000000000F00000-0x0000000000FEE000-memory.dmp

                          Filesize

                          952KB

                        • memory/1048-1411-0x0000000004860000-0x00000000048B4000-memory.dmp

                          Filesize

                          336KB

                        • memory/1048-142-0x0000000000F00000-0x0000000000FE9000-memory.dmp

                          Filesize

                          932KB

                        • memory/1688-3953-0x000000001B5B0000-0x000000001B892000-memory.dmp

                          Filesize

                          2.9MB

                        • memory/1688-3954-0x0000000002860000-0x0000000002868000-memory.dmp

                          Filesize

                          32KB

                        • memory/1744-1361-0x0000000001130000-0x000000000113C000-memory.dmp

                          Filesize

                          48KB

                        • memory/1936-48-0x0000000000400000-0x0000000000455000-memory.dmp

                          Filesize

                          340KB

                        • memory/1936-50-0x0000000000400000-0x0000000000455000-memory.dmp

                          Filesize

                          340KB

                        • memory/1936-52-0x0000000000400000-0x0000000000455000-memory.dmp

                          Filesize

                          340KB

                        • memory/1936-54-0x0000000000400000-0x0000000000455000-memory.dmp

                          Filesize

                          340KB

                        • memory/1936-56-0x0000000000400000-0x0000000000455000-memory.dmp

                          Filesize

                          340KB

                        • memory/1936-58-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

                          Filesize

                          4KB

                        • memory/1936-59-0x0000000000400000-0x0000000000455000-memory.dmp

                          Filesize

                          340KB

                        • memory/1936-61-0x0000000000400000-0x0000000000455000-memory.dmp

                          Filesize

                          340KB

                        • memory/2772-1332-0x0000000006000000-0x00000000062FB000-memory.dmp

                          Filesize

                          3.0MB

                        • memory/2772-1434-0x0000000006620000-0x0000000006ACB000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/2772-1476-0x0000000006620000-0x0000000007182000-memory.dmp

                          Filesize

                          11.4MB

                        • memory/2772-1496-0x0000000006620000-0x0000000007182000-memory.dmp

                          Filesize

                          11.4MB

                        • memory/2772-1497-0x0000000006620000-0x00000000072BD000-memory.dmp

                          Filesize

                          12.6MB

                        • memory/2772-1498-0x0000000006620000-0x00000000072BD000-memory.dmp

                          Filesize

                          12.6MB

                        • memory/2772-1306-0x0000000006000000-0x00000000062FB000-memory.dmp

                          Filesize

                          3.0MB

                        • memory/2772-1307-0x0000000006000000-0x00000000062FB000-memory.dmp

                          Filesize

                          3.0MB

                        • memory/2772-16-0x00000000013A0000-0x00000000016BE000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/2772-17-0x00000000013A1000-0x00000000013CF000-memory.dmp

                          Filesize

                          184KB

                        • memory/2772-1462-0x0000000006620000-0x0000000006ACB000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/2772-1460-0x0000000006620000-0x0000000006ACB000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/2772-18-0x00000000013A0000-0x00000000016BE000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/2772-3640-0x0000000006620000-0x00000000072BD000-memory.dmp

                          Filesize

                          12.6MB

                        • memory/2772-1330-0x0000000006000000-0x00000000062FB000-memory.dmp

                          Filesize

                          3.0MB

                        • memory/2772-1328-0x0000000006620000-0x0000000006AF0000-memory.dmp

                          Filesize

                          4.8MB

                        • memory/2772-1327-0x0000000006620000-0x0000000006AF0000-memory.dmp

                          Filesize

                          4.8MB

                        • memory/2772-22-0x00000000013A0000-0x00000000016BE000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/2772-46-0x00000000013A0000-0x00000000016BE000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/2772-1409-0x0000000006620000-0x0000000006AF0000-memory.dmp

                          Filesize

                          4.8MB

                        • memory/2772-1435-0x0000000006620000-0x0000000006ACB000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/2772-20-0x00000000013A0000-0x00000000016BE000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/2772-21-0x00000000013A0000-0x00000000016BE000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/3052-0-0x0000000000E10000-0x000000000112E000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/3052-3-0x0000000000E10000-0x000000000112E000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/3052-2-0x0000000000E11000-0x0000000000E3F000-memory.dmp

                          Filesize

                          184KB

                        • memory/3052-1-0x0000000077D20000-0x0000000077D22000-memory.dmp

                          Filesize

                          8KB

                        • memory/3052-5-0x0000000000E10000-0x000000000112E000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/3052-14-0x0000000000E10000-0x000000000112E000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/3784-1437-0x0000000001250000-0x00000000016FB000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/3784-1459-0x0000000001250000-0x00000000016FB000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/4336-1457-0x00000000005D0000-0x00000000005F6000-memory.dmp

                          Filesize

                          152KB

                        • memory/4336-1479-0x0000000005BF0000-0x0000000005CB2000-memory.dmp

                          Filesize

                          776KB

                        • memory/4336-1456-0x0000000000060000-0x0000000000176000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/4548-4117-0x0000000005740000-0x0000000005896000-memory.dmp

                          Filesize

                          1.3MB

                        • memory/4548-4118-0x0000000000540000-0x0000000000562000-memory.dmp

                          Filesize

                          136KB

                        • memory/4548-3993-0x0000000001370000-0x0000000001698000-memory.dmp

                          Filesize

                          3.2MB

                        • memory/4732-1500-0x00000000013C0000-0x0000000001F22000-memory.dmp

                          Filesize

                          11.4MB

                        • memory/4732-1477-0x00000000013C0000-0x0000000001F22000-memory.dmp

                          Filesize

                          11.4MB

                        • memory/5304-3797-0x0000000000DE0000-0x0000000001098000-memory.dmp

                          Filesize

                          2.7MB

                        • memory/5304-3798-0x0000000000DE0000-0x0000000001098000-memory.dmp

                          Filesize

                          2.7MB

                        • memory/5364-4024-0x000000001B690000-0x000000001B972000-memory.dmp

                          Filesize

                          2.9MB

                        • memory/5364-4025-0x00000000027A0000-0x00000000027A8000-memory.dmp

                          Filesize

                          32KB

                        • memory/6084-1550-0x00000000006B0000-0x0000000000748000-memory.dmp

                          Filesize

                          608KB

                        • memory/6084-3615-0x0000000000760000-0x000000000078C000-memory.dmp

                          Filesize

                          176KB

                        • memory/6084-1549-0x0000000000400000-0x0000000000464000-memory.dmp

                          Filesize

                          400KB

                        • memory/6724-1371-0x0000000000850000-0x0000000000B4B000-memory.dmp

                          Filesize

                          3.0MB

                        • memory/6724-1362-0x0000000000850000-0x0000000000B4B000-memory.dmp

                          Filesize

                          3.0MB

                        • memory/6724-1309-0x0000000000850000-0x0000000000B4B000-memory.dmp

                          Filesize

                          3.0MB

                        • memory/6972-1342-0x0000000000890000-0x0000000000D60000-memory.dmp

                          Filesize

                          4.8MB

                        • memory/6972-1331-0x0000000000890000-0x0000000000D60000-memory.dmp

                          Filesize

                          4.8MB

                        • memory/10052-3639-0x00000000000B0000-0x00000000000BC000-memory.dmp

                          Filesize

                          48KB