Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-12-2024 04:22

General

  • Target

    31fa8cacfab53d2fc1086b0487991bf6edf34d9b45ad27e51a14445144749308.exe

  • Size

    6.7MB

  • MD5

    3d01842dcc4c7cbdf8a2a511e817720c

  • SHA1

    8555f66157a7ebe7415abf0034eb275e8c7e9958

  • SHA256

    31fa8cacfab53d2fc1086b0487991bf6edf34d9b45ad27e51a14445144749308

  • SHA512

    995c672540aae96e62463b1a1312f2746e54317a808768e2e669371a5d754578f1f7194e9531c9d81de7f75d3cbc4cbab8229f022dc704e46521e2f40a744972

  • SSDEEP

    196608:5HdXh+0ir6hu2mWhdE/QwyEMePb2MuZX3r5oCa:5HdDiOrjcDweTCZX

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

C2

https://pollution-raker.cyou/api

https://hosue-billowy.cyou/api

https://ripe-blade.cyou/api

https://smash-boiling.cyou/api

https://supporse-comment.cyou/api

https://greywe-snotty.cyou/api

https://steppriflej.xyz/api

https://sendypaster.xyz/api

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 11 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Redline family
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 14 IoCs
  • XMRig Miner payload 10 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 28 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 37 IoCs
  • Identifies Wine through registry keys 2 TTPs 14 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 8 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 14 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 5 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 30 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 45 IoCs
  • Suspicious use of FindShellTrayWindow 34 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Views/modifies file attributes 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\31fa8cacfab53d2fc1086b0487991bf6edf34d9b45ad27e51a14445144749308.exe
    "C:\Users\Admin\AppData\Local\Temp\31fa8cacfab53d2fc1086b0487991bf6edf34d9b45ad27e51a14445144749308.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4048
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\A7M27.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\A7M27.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4552
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m3j93.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m3j93.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:468
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1i63T2.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1i63T2.exe
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:4264
          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
            "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Adds Run key to start application
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:3624
            • C:\Users\Admin\AppData\Local\Temp\1021516001\d80a7ad268.exe
              "C:\Users\Admin\AppData\Local\Temp\1021516001\d80a7ad268.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:2264
            • C:\Users\Admin\AppData\Local\Temp\1021517001\93ce91d53e.exe
              "C:\Users\Admin\AppData\Local\Temp\1021517001\93ce91d53e.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:3560
              • C:\Users\Admin\AppData\Local\Temp\1021517001\93ce91d53e.exe
                "C:\Users\Admin\AppData\Local\Temp\1021517001\93ce91d53e.exe"
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:1468
            • C:\Users\Admin\AppData\Local\Temp\1021518001\e5381f133c.exe
              "C:\Users\Admin\AppData\Local\Temp\1021518001\e5381f133c.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:3708
            • C:\Users\Admin\AppData\Local\Temp\1021519001\578fe56c5b.exe
              "C:\Users\Admin\AppData\Local\Temp\1021519001\578fe56c5b.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:1068
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1068 -s 1536
                7⤵
                • Program crash
                PID:1216
            • C:\Users\Admin\AppData\Local\Temp\1021520001\36e23c6a32.exe
              "C:\Users\Admin\AppData\Local\Temp\1021520001\36e23c6a32.exe"
              6⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Drops file in Program Files directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:2984
              • C:\Program Files\Windows Media Player\graph\graph.exe
                "C:\Program Files\Windows Media Player\graph\graph.exe"
                7⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                PID:1584
            • C:\Users\Admin\AppData\Local\Temp\1021521001\7523ca28fd.exe
              "C:\Users\Admin\AppData\Local\Temp\1021521001\7523ca28fd.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:2300
            • C:\Users\Admin\AppData\Local\Temp\1021522001\187018a0de.exe
              "C:\Users\Admin\AppData\Local\Temp\1021522001\187018a0de.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:2788
            • C:\Users\Admin\AppData\Local\Temp\1021523001\9d39ed9b9e.exe
              "C:\Users\Admin\AppData\Local\Temp\1021523001\9d39ed9b9e.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of WriteProcessMemory
              PID:664
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM firefox.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:4824
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM chrome.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:1960
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM msedge.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:3720
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM opera.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:4676
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM brave.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:3468
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                7⤵
                  PID:2076
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                    8⤵
                    • Checks processor information in registry
                    • Modifies registry class
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SendNotifyMessage
                    • Suspicious use of SetWindowsHookEx
                    PID:908
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2032 -parentBuildID 20240401114208 -prefsHandle 1916 -prefMapHandle 1948 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5441c9ff-0f7c-42d4-ae7c-39611579bead} 908 "\\.\pipe\gecko-crash-server-pipe.908" gpu
                      9⤵
                        PID:5080
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2492 -parentBuildID 20240401114208 -prefsHandle 2484 -prefMapHandle 2472 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c63ec1ca-1848-4c7d-a6e0-f582ec33ab83} 908 "\\.\pipe\gecko-crash-server-pipe.908" socket
                        9⤵
                          PID:632
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3192 -childID 1 -isForBrowser -prefsHandle 3152 -prefMapHandle 3148 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c13a6cfb-0142-4f03-a6c5-3c550b084823} 908 "\\.\pipe\gecko-crash-server-pipe.908" tab
                          9⤵
                            PID:1544
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3164 -childID 2 -isForBrowser -prefsHandle 3880 -prefMapHandle 3876 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7266cc6f-d168-4dab-8a1a-de4c903dec80} 908 "\\.\pipe\gecko-crash-server-pipe.908" tab
                            9⤵
                              PID:3132
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4568 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4656 -prefMapHandle 4652 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {bb87d6f2-0af4-42b9-bb77-2aa235267f78} 908 "\\.\pipe\gecko-crash-server-pipe.908" utility
                              9⤵
                              • Checks processor information in registry
                              PID:2232
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5600 -childID 3 -isForBrowser -prefsHandle 5612 -prefMapHandle 5608 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8dbb0da9-5698-441a-b1f9-39f675c08c95} 908 "\\.\pipe\gecko-crash-server-pipe.908" tab
                              9⤵
                                PID:5720
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5744 -childID 4 -isForBrowser -prefsHandle 5752 -prefMapHandle 5756 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6353146d-2c8b-4a7c-9a4c-4fd67b8e6c75} 908 "\\.\pipe\gecko-crash-server-pipe.908" tab
                                9⤵
                                  PID:5740
                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5936 -childID 5 -isForBrowser -prefsHandle 5944 -prefMapHandle 5948 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {68e7e22e-628b-4e13-bc47-a19531ab455a} 908 "\\.\pipe\gecko-crash-server-pipe.908" tab
                                  9⤵
                                    PID:5772
                            • C:\Users\Admin\AppData\Local\Temp\1021524001\3370c37c93.exe
                              "C:\Users\Admin\AppData\Local\Temp\1021524001\3370c37c93.exe"
                              6⤵
                              • Modifies Windows Defender Real-time Protection settings
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Windows security modification
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1392
                            • C:\Users\Admin\AppData\Local\Temp\1021525001\e2a4eefd6f.exe
                              "C:\Users\Admin\AppData\Local\Temp\1021525001\e2a4eefd6f.exe"
                              6⤵
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              PID:224
                              • C:\Users\Admin\AppData\Local\Temp\1021525001\e2a4eefd6f.exe
                                "C:\Users\Admin\AppData\Local\Temp\1021525001\e2a4eefd6f.exe"
                                7⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                PID:3436
                            • C:\Users\Admin\AppData\Local\Temp\1021526001\fba2e440e5.exe
                              "C:\Users\Admin\AppData\Local\Temp\1021526001\fba2e440e5.exe"
                              6⤵
                              • Enumerates VirtualBox registry keys
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • System Location Discovery: System Language Discovery
                              PID:6064
                            • C:\Users\Admin\AppData\Local\Temp\1021527001\ecf84aa0f6.exe
                              "C:\Users\Admin\AppData\Local\Temp\1021527001\ecf84aa0f6.exe"
                              6⤵
                              • Checks computer location settings
                              • Executes dropped EXE
                              PID:1468
                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                "powershell.exe" -WindowStyle Hidden -EncodedCommand QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgACcAQwA6AFwAVQBzAGUAcgBzAFwAQQBkAG0AaQBuAFwAQQBwAHAARABhAHQAYQBcAFIAbwBhAG0AaQBuAGcAXABvAG4ANQBwAHEAaAB2AGUAcwBpADAAQgBHAEEARQBRAE4AUQBRACcA
                                7⤵
                                • Command and Scripting Interpreter: PowerShell
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1860
                              • C:\Users\Admin\AppData\Roaming\on5pqhvesi0BGAEQNQQ\DJj.exe
                                "C:\Users\Admin\AppData\Roaming\on5pqhvesi0BGAEQNQQ\DJj.exe"
                                7⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                PID:224
                            • C:\Users\Admin\AppData\Local\Temp\1021528001\945078f7d7.exe
                              "C:\Users\Admin\AppData\Local\Temp\1021528001\945078f7d7.exe"
                              6⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • System Location Discovery: System Language Discovery
                              PID:640
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 640 -s 1444
                                7⤵
                                • Program crash
                                PID:5480
                            • C:\Users\Admin\AppData\Local\Temp\1021529001\3d014d0f44.exe
                              "C:\Users\Admin\AppData\Local\Temp\1021529001\3d014d0f44.exe"
                              6⤵
                              • Checks computer location settings
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              PID:5792
                              • C:\Windows\system32\cmd.exe
                                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"
                                7⤵
                                  PID:5552
                                  • C:\Windows\system32\mode.com
                                    mode 65,10
                                    8⤵
                                      PID:5736
                                    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                      7z.exe e file.zip -p24291711423417250691697322505 -oextracted
                                      8⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:5868
                                    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                      7z.exe e extracted/file_7.zip -oextracted
                                      8⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:3648
                                    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                      7z.exe e extracted/file_6.zip -oextracted
                                      8⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:216
                                    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                      7z.exe e extracted/file_5.zip -oextracted
                                      8⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:4692
                                    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                      7z.exe e extracted/file_4.zip -oextracted
                                      8⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:4264
                                    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                      7z.exe e extracted/file_3.zip -oextracted
                                      8⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:5644
                                    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                      7z.exe e extracted/file_2.zip -oextracted
                                      8⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:2824
                                    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                      7z.exe e extracted/file_1.zip -oextracted
                                      8⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:5748
                                    • C:\Windows\system32\attrib.exe
                                      attrib +H "in.exe"
                                      8⤵
                                      • Views/modifies file attributes
                                      PID:3244
                                    • C:\Users\Admin\AppData\Local\Temp\main\in.exe
                                      "in.exe"
                                      8⤵
                                      • Executes dropped EXE
                                      PID:3672
                                      • C:\Windows\SYSTEM32\attrib.exe
                                        attrib +H +S C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                                        9⤵
                                        • Views/modifies file attributes
                                        PID:5576
                                      • C:\Windows\SYSTEM32\attrib.exe
                                        attrib +H C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                                        9⤵
                                        • Views/modifies file attributes
                                        PID:5608
                                      • C:\Windows\SYSTEM32\schtasks.exe
                                        schtasks /f /CREATE /TN "Intel_PTT_EK_Recertification" /TR "C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe" /SC MINUTE
                                        9⤵
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:5216
                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        powershell ping 127.0.0.1; del in.exe
                                        9⤵
                                        • System Network Configuration Discovery: Internet Connection Discovery
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:5572
                                        • C:\Windows\system32\PING.EXE
                                          "C:\Windows\system32\PING.EXE" 127.0.0.1
                                          10⤵
                                          • System Network Configuration Discovery: Internet Connection Discovery
                                          • Runs ping.exe
                                          PID:5768
                            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2L5399.exe
                              C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2L5399.exe
                              4⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              PID:2960
                          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3b76T.exe
                            C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3b76T.exe
                            3⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            PID:2980
                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4x020z.exe
                          C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4x020z.exe
                          2⤵
                          • Modifies Windows Defender Real-time Protection settings
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Windows security modification
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4676
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 1068 -ip 1068
                        1⤵
                          PID:2516
                        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                          C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                          1⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          PID:5576
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 640 -ip 640
                          1⤵
                            PID:5456
                          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                            C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                            1⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            PID:2676
                          • C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                            C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                            1⤵
                            • Executes dropped EXE
                            • Suspicious use of SetThreadContext
                            PID:1900
                            • C:\Windows\explorer.exe
                              explorer.exe
                              2⤵
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4460
                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              powershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe
                              2⤵
                              • System Network Configuration Discovery: Internet Connection Discovery
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4920
                              • C:\Windows\system32\PING.EXE
                                "C:\Windows\system32\PING.EXE" 127.1.10.1
                                3⤵
                                • System Network Configuration Discovery: Internet Connection Discovery
                                • Runs ping.exe
                                PID:1732

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Program Files\Windows Media Player\graph\graph.exe

                            Filesize

                            245KB

                            MD5

                            7d254439af7b1caaa765420bea7fbd3f

                            SHA1

                            7bd1d979de4a86cb0d8c2ad9e1945bd351339ad0

                            SHA256

                            d6e7ceb5b05634efbd06c3e28233e92f1bd362a36473688fbaf952504b76d394

                            SHA512

                            c3164b2f09dc914066201562be6483f61d3c368675ac5d3466c2d5b754813b8b23fd09af86b1f15ab8cc91be8a52b3488323e7a65198e5b104f9c635ec5ed5cc

                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\TTJXD3SW\download[1].htm

                            Filesize

                            1B

                            MD5

                            cfcd208495d565ef66e7dff9f98764da

                            SHA1

                            b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                            SHA256

                            5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                            SHA512

                            31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\activity-stream.discovery_stream.json

                            Filesize

                            24KB

                            MD5

                            d38cab0ef478cf7eccdb78d27f9f1fba

                            SHA1

                            689a1538bac1294c5b17423cd7e2741651503544

                            SHA256

                            8ff6ba09927cdee46178ec3b19b45ba1343b413c94a25786d5dcea993ea2004c

                            SHA512

                            c4e16e53aa1e46726f56866b8843da169f4551e045fc1342ae8a84b5a0e13bdb629ffcbd0edf0e0dbd1c4f5a0f5778f5bc2d3c398e493b297702b360c3e7e532

                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\cache2\entries\6653BC7BE242C21AA1988A4A42D1DEDA18231C31

                            Filesize

                            13KB

                            MD5

                            d504b1e02aeab5fe9ea5868b6cd23fb5

                            SHA1

                            36e8fdce748252690e85f98de76972aab6be2f46

                            SHA256

                            8a2bf887d64be0189eec21b4689d4025dd1d250d01415fc63fe0d068d36cc9c4

                            SHA512

                            df8dae7108a16106142584a282121233317ba028bd07b3f66d16694345a25325e8bbdf55b7b2fef91c164984c01b1ca741e2d7d6fe5bdee5cacfe9c070bb55c7

                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                            Filesize

                            15KB

                            MD5

                            96c542dec016d9ec1ecc4dddfcbaac66

                            SHA1

                            6199f7648bb744efa58acf7b96fee85d938389e4

                            SHA256

                            7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                            SHA512

                            cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                          • C:\Users\Admin\AppData\Local\Temp\1021516001\d80a7ad268.exe

                            Filesize

                            2.5MB

                            MD5

                            87330f1877c33a5a6203c49075223b16

                            SHA1

                            55b64ee8b2d1302581ab1978e9588191e4e62f81

                            SHA256

                            98f2344ed45ff0464769e5b006bf0e831dc3834f0534a23339bb703e50db17e0

                            SHA512

                            7c747d3edb04e4e71dce7efa33f5944a191896574fee5227316739a83d423936a523df12f925ee9b460cce23b49271f549c1ee5d77b50a7d7c6e3f31ba120c8f

                          • C:\Users\Admin\AppData\Local\Temp\1021517001\93ce91d53e.exe

                            Filesize

                            528KB

                            MD5

                            9ab250b0dc1d156e2d123d277eb4d132

                            SHA1

                            3b434ff78208c10f570dfe686455fd3094f3dd48

                            SHA256

                            49bfa0b1c3553208e59b6b881a58c94bb4aa3d09e51c3f510f207b7b24675864

                            SHA512

                            a30fb204b556b0decd7fab56a44e62356c7102bc8146b2dfd88e6545dea7574e043a3254035b7514ee0c686a726b8f5ba99bcd91e8c2c7f39c105e2724080ef0

                          • C:\Users\Admin\AppData\Local\Temp\1021518001\e5381f133c.exe

                            Filesize

                            1.8MB

                            MD5

                            8a0feb447f024f32d1ee001a56d7ee23

                            SHA1

                            39086a8133462fbbdbaad4a313789d216497e68a

                            SHA256

                            b474d829617220d8d949fa58a39d9eafde02ec488f0c7a4330950fefed66bd86

                            SHA512

                            09efc757b29341d91d08619e8924b5cbb3acd73f2fe13b1aa21327c4133721102110b17f6717b09e703d1137d4266ab6e563f85bd34e98a1ee03b1b50e7ddbec

                          • C:\Users\Admin\AppData\Local\Temp\1021519001\578fe56c5b.exe

                            Filesize

                            1.8MB

                            MD5

                            15709eba2afaf7cc0a86ce0abf8e53f1

                            SHA1

                            238ebf0d386ecf0e56d0ddb60faca0ea61939bb6

                            SHA256

                            10bff40a9d960d0be3cc81b074a748764d7871208f324de26d365b1f8ea3935a

                            SHA512

                            65edefa20f0bb35bee837951ccd427b94a18528c6e84de222b1aa0af380135491bb29a049009f77e66fcd2abe5376a831d98e39055e1042ccee889321b96e8e9

                          • C:\Users\Admin\AppData\Local\Temp\1021520001\36e23c6a32.exe

                            Filesize

                            591KB

                            MD5

                            3567cb15156760b2f111512ffdbc1451

                            SHA1

                            2fdb1f235fc5a9a32477dab4220ece5fda1539d4

                            SHA256

                            0285d3a6c1ca2e3a993491c44e9cf2d33dbec0fb85fdbf48989a4e3b14b37630

                            SHA512

                            e7a31b016417218387a4702e525d33dd4fe496557539b2ab173cec0cb92052c750cfc4b3e7f02f3c66ac23f19a0c8a4eb6c9d2b590a5e9faeb525e517bc877ba

                          • C:\Users\Admin\AppData\Local\Temp\1021521001\7523ca28fd.exe

                            Filesize

                            1.7MB

                            MD5

                            2b6d71bf9628fb892f3b29e8ba249e58

                            SHA1

                            24d17185d16e2236c4699d397d3cf0f78d7665b9

                            SHA256

                            43197dc24b40cb5775140fc85a626b11e3aa63f4a00ff85409d30e55554e2fe1

                            SHA512

                            fef9c29d84d3852315a2f4d39f56d3e27cca4475e7723df11d4fafc0e971ef13e8e02df02507dbb0097310800d893ed9992c7862b5f20af56e55a9f25a773343

                          • C:\Users\Admin\AppData\Local\Temp\1021522001\187018a0de.exe

                            Filesize

                            5.0MB

                            MD5

                            423365dd014e13ed83fddda2c7cb9670

                            SHA1

                            fe32e867be3508991aaf2392e7f260c64b61d974

                            SHA256

                            51207983d6a0f3ae1900020e12fa327d02cdd5ab67101f073896074270dd75cb

                            SHA512

                            5bee75db401da96c44e1f2ccd0b23849d4f10f0a2acad43b587535dcf31809ce43bbad847159658838242979d98da537d11fcc49761fe1fe2fc751f38cf77e36

                          • C:\Users\Admin\AppData\Local\Temp\1021523001\9d39ed9b9e.exe

                            Filesize

                            944KB

                            MD5

                            8fb0b309cfd7b54c77ea046622c50f00

                            SHA1

                            9667379e7fb9c85e37f780dc824745fb1d1a7616

                            SHA256

                            3e95299b2982da8402e328000157f7aac122a6f14006365a3ac46b5ae44bae35

                            SHA512

                            69719eeaf0fb4436143b82042afd99662f10fa0e8a99240419a58d947b618aa22996fa77de1d90d335cef0a31d67d4ba000a72ec5eb931f5b7c4cb606fab034e

                          • C:\Users\Admin\AppData\Local\Temp\1021524001\3370c37c93.exe

                            Filesize

                            2.7MB

                            MD5

                            1eb9111f06d9adf612a6fc52eeb12f35

                            SHA1

                            60522c4daa1c04702ca442d59c9a738fda7be209

                            SHA256

                            7c788e1a4fb74e4490275d941306dfd4d3dd0ae6d10b1133c5ff2a0854f81017

                            SHA512

                            3c7fb9da366b17aaac65cf0f4be286253b8a1e5318e7e3836b6c2554813697f4c86c13d5872012377c11d2a9b0406846d5ec761906356b614ae46db90768300c

                          • C:\Users\Admin\AppData\Local\Temp\1021525001\e2a4eefd6f.exe

                            Filesize

                            562KB

                            MD5

                            63c8c11ca850435d9b5ec2ea41e50c22

                            SHA1

                            09a92f137462216a052f2a819ce110a0ac2f4022

                            SHA256

                            89f58c08d1ccdc0aa645f11fb84de4c8a1ee328fd8a847aca63523291465a3a4

                            SHA512

                            abdb139e86a3268c4d2bb5581c804219eeefc992e1dab87b3eb059db24015c849ce64d16ed0745df43dc8ac7ae49dcd5fd5660e65924752e669deafa6bbaa803

                          • C:\Users\Admin\AppData\Local\Temp\1021526001\fba2e440e5.exe

                            Filesize

                            4.3MB

                            MD5

                            450295fbb1aa647744fd45cfebdffb8b

                            SHA1

                            8d530e9af2abb090e3f62dfb832379d186870dbb

                            SHA256

                            624acc2b6a4fd1ca7d56e305b9bca9b0ae6fbf7e1c1fb4023770a10c3d26577c

                            SHA512

                            4dcf82aeb3b48afe1778ab7bbb3005be7bd7c0e12f5bbc5a029e74ee7dd5d5699233c9bd7fe7ee13f053d9bc0e917ff398075d9142152d83fec81f4dcc8af929

                          • C:\Users\Admin\AppData\Local\Temp\1021527001\ecf84aa0f6.exe

                            Filesize

                            2.9MB

                            MD5

                            75ca34215f6e3916c51c0af34fc17284

                            SHA1

                            3726ba089194df9221b1eed520d62e452d74d509

                            SHA256

                            4d2340448332a51ceafe2cb2562b2441590eff605b7fc0478001ad103f495955

                            SHA512

                            51a8285cd0c989ca4a659fb84f401f81e92bcc9a2b03f3f55da565bc2a9b6fefb115ddb0009d675e265e391c65fb4defc6326037b70b03eb6ed1364f1d7dc679

                          • C:\Users\Admin\AppData\Local\Temp\1021528001\945078f7d7.exe

                            Filesize

                            1.9MB

                            MD5

                            85a7c0fa1580ae747a4cb534bcd880df

                            SHA1

                            f428f08aec67005a42b8295a63a2f9d3bd05c264

                            SHA256

                            b59cc98c32db92ae3917138b5811e7de52f1d2b684402e3e1def7fc00b63e167

                            SHA512

                            52bc1f2f265bee0b79a212e88144cb61e683d3418f97031887b075cda698a18e38764b8af19849d9abbe9ec3602d3868cc853634f0342d9a5da69b2f41509151

                          • C:\Users\Admin\AppData\Local\Temp\1021529001\3d014d0f44.exe

                            Filesize

                            4.2MB

                            MD5

                            3a425626cbd40345f5b8dddd6b2b9efa

                            SHA1

                            7b50e108e293e54c15dce816552356f424eea97a

                            SHA256

                            ba9212d2d5cd6df5eb7933fb37c1b72a648974c1730bf5c32439987558f8e8b1

                            SHA512

                            a7538c6b7e17c35f053721308b8d6dc53a90e79930ff4ed5cffecaa97f4d0fbc5f9e8b59f1383d8f0699c8d4f1331f226af71d40325022d10b885606a72fe668

                          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4x020z.exe

                            Filesize

                            2.6MB

                            MD5

                            44b9813ca1d56209f5b3c33ef943c47d

                            SHA1

                            1dd3930a9f7bbe8e3573ac3aadf99176702aac60

                            SHA256

                            147d1f116e6660e380e1566932a9939c14470f685120cc26464a269cc5f52dd9

                            SHA512

                            2b703d47a892f214728b080b09e21e91635c0e236b28917e2aad43c757a7bf3344fb97ada61a415e91e9c991c8ab6da4ec0ab6355317861ff18900d10f7e3bc7

                          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\A7M27.exe

                            Filesize

                            5.1MB

                            MD5

                            4d61aa31b2d8a1bb188f4bbd4b3426f0

                            SHA1

                            eec6c96cfb7fad152d7cee4c222fc9cedf7958f1

                            SHA256

                            2bd61d8542a34fe84446fa6bf9e2265236fb5ceb21eec9e7f66a59b81780ab70

                            SHA512

                            d8380c0f763854c0f859f1ad8c64247b0880381cdd1a667200fb2901b2f1a51ecccd205bb533e14741f97341592d506c44753c233a46f86f14376ec06404e52e

                          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3b76T.exe

                            Filesize

                            2.7MB

                            MD5

                            1794618c3a612beaba37a52b7407162f

                            SHA1

                            e14a60fabb9755c6269534823a572072bd57605a

                            SHA256

                            55ca4f0439ebe54bb4f45e96e4e29ded011630dcb6719e80d3532acceb7638d7

                            SHA512

                            64a10e0885680297a76a003b7a8e7252637cb4a8e3e0490f5b149cc16d029fba21de19c3190d814701369da3695539fedb43c20dacc87e379729a34f177268e2

                          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m3j93.exe

                            Filesize

                            3.5MB

                            MD5

                            6f44dfb0081b55b9f0a3f038be0e1f93

                            SHA1

                            d61c17cd54090c80a4061154d65645154f3b1eaa

                            SHA256

                            f587b1907f881c19c8876d2d5a8c382b3240e91580e7ed4bb4fd6365b61effde

                            SHA512

                            c94b64acbce072df98819d8b4da54dba2b1d3e5eadb7654e86543497609c27b0c38d80ddad9b0fe8116a0d1e6202b15c6854b09a53ad11ff41bb52c69d3824f3

                          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1i63T2.exe

                            Filesize

                            2.9MB

                            MD5

                            150a14aee722f93553528f147ac1cfdb

                            SHA1

                            a05fe7ada978105e51f8931a5049668234f5379e

                            SHA256

                            52738df9af06015dc0569c5cec905985b6e3e828bba5d45c96de83479859084c

                            SHA512

                            48c4bdc1b646c8f21f67ed0eb98ff55e8d26a9349004b467caf98178e8092e21aacb0bfacecaaf4009a3fa1d339e8c36d674fb2af81c34fed6a08d8c9c88cd69

                          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2L5399.exe

                            Filesize

                            1.7MB

                            MD5

                            368f618603cde6e4041a0b1f4632cb68

                            SHA1

                            b5abaaeaf5ad9125e3396d882c3e7ca9ae225dd3

                            SHA256

                            029930f50fb419462d7083fd3dbe6f86dfbe1224b7a25e3ac5ea728ff36ce2b1

                            SHA512

                            f3a9142620eabe16eb17729342cf68b515bfdbdbec8ae2df30f0e95a554a59c42561582429f861cfd836b5236180f08220e9f21b6ba2ffc049d5d53829a7d6da

                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_yc3wacnn.xip.ps1

                            Filesize

                            60B

                            MD5

                            d17fe0a3f47be24a6453e9ef58c94641

                            SHA1

                            6ab83620379fc69f80c0242105ddffd7d98d5d9d

                            SHA256

                            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                            SHA512

                            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                          • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

                            Filesize

                            1.6MB

                            MD5

                            72491c7b87a7c2dd350b727444f13bb4

                            SHA1

                            1e9338d56db7ded386878eab7bb44b8934ab1bc7

                            SHA256

                            34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

                            SHA512

                            583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

                          • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

                            Filesize

                            458KB

                            MD5

                            619f7135621b50fd1900ff24aade1524

                            SHA1

                            6c7ea8bbd435163ae3945cbef30ef6b9872a4591

                            SHA256

                            344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

                            SHA512

                            2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

                          • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_5.zip

                            Filesize

                            1.7MB

                            MD5

                            b7d1e04629bec112923446fda5391731

                            SHA1

                            814055286f963ddaa5bf3019821cb8a565b56cb8

                            SHA256

                            4da77d4ee30ad0cd56cd620f4e9dc4016244ace015c5b4b43f8f37dd8e3a8789

                            SHA512

                            79fc3606b0fe6a1e31a2ecacc96623caf236bf2be692dadab6ea8ffa4af4231d782094a63b76631068364ac9b6a872b02f1e080636eba40ed019c2949a8e28db

                          • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_6.zip

                            Filesize

                            1.7MB

                            MD5

                            0dc4014facf82aa027904c1be1d403c1

                            SHA1

                            5e6d6c020bfc2e6f24f3d237946b0103fe9b1831

                            SHA256

                            a29ddd29958c64e0af1a848409e97401307277bb6f11777b1cfb0404a6226de7

                            SHA512

                            cbeead189918657cc81e844ed9673ee8f743aed29ad9948e90afdfbecacc9c764fbdbfb92e8c8ceb5ae47cee52e833e386a304db0572c7130d1a54fd9c2cc028

                          • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_7.zip

                            Filesize

                            3.3MB

                            MD5

                            cea368fc334a9aec1ecff4b15612e5b0

                            SHA1

                            493d23f72731bb570d904014ffdacbba2334ce26

                            SHA256

                            07e38cad68b0cdbea62f55f9bc6ee80545c2e1a39983baa222e8af788f028541

                            SHA512

                            bed35a1cc56f32e0109ea5a02578489682a990b5cefa58d7cf778815254af9849e731031e824adba07c86c8425df58a1967ac84ce004c62e316a2e51a75c8748

                          • C:\Users\Admin\AppData\Local\Temp\main\file.bin

                            Filesize

                            3.3MB

                            MD5

                            045b0a3d5be6f10ddf19ae6d92dfdd70

                            SHA1

                            0387715b6681d7097d372cd0005b664f76c933c7

                            SHA256

                            94b392e94fa47d1b9b7ae6a29527727268cc2e3484e818c23608f8835bc1104d

                            SHA512

                            58255a755531791b888ffd9b663cc678c63d5caa932260e9546b1b10a8d54208334725c14529116b067bcf5a5e02da85e015a3bed80092b7698a43dab0168c7b

                          • C:\Users\Admin\AppData\Local\Temp\main\main.bat

                            Filesize

                            440B

                            MD5

                            3626532127e3066df98e34c3d56a1869

                            SHA1

                            5fa7102f02615afde4efd4ed091744e842c63f78

                            SHA256

                            2a0e18ef585db0802269b8c1ddccb95ce4c0bac747e207ee6131dee989788bca

                            SHA512

                            dcce66d6e24d5a4a352874144871cd73c327e04c1b50764399457d8d70a9515f5bc0a650232763bf34d4830bab70ee4539646e7625cfe5336a870e311043b2bd

                          • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                            Filesize

                            479KB

                            MD5

                            09372174e83dbbf696ee732fd2e875bb

                            SHA1

                            ba360186ba650a769f9303f48b7200fb5eaccee1

                            SHA256

                            c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                            SHA512

                            b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                          • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                            Filesize

                            13.8MB

                            MD5

                            0a8747a2ac9ac08ae9508f36c6d75692

                            SHA1

                            b287a96fd6cc12433adb42193dfe06111c38eaf0

                            SHA256

                            32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                            SHA512

                            59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin

                            Filesize

                            10KB

                            MD5

                            17a0da7dd0fc28a2b908a640284137d5

                            SHA1

                            221e6c0e2d26d4d6427a1052ae3dc03f28b96249

                            SHA256

                            5d82b870c37d82daf913a96c009684f7993565f1dc106d1437f97786d301fb95

                            SHA512

                            6f366db10840e89e8e416e047afca4100dfac638e042c000006a49d27b34a3620f7f59f515163e6c15d1375cea8135e7fa554c8eb0ff5b4253721e5d19ae3a7d

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.bin

                            Filesize

                            23KB

                            MD5

                            08c817d2d16effbe39504ceb1489b95c

                            SHA1

                            58fc933c8372e7f7faabf46b10fe3a3d3ec8d680

                            SHA256

                            bdcdc881af2479aced33ac958ef591a55a349574a65b810d4bb19d1e51b4bdb3

                            SHA512

                            3c6bd284a4dcc002faaabc68ba21102114328e42b2c0f97aad85ee9eba4f3b769315222d02a5f008063417283140be68cf0e0e000a6bb110c19c710f96b460be

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.bin

                            Filesize

                            5KB

                            MD5

                            c0db664813329110575435b597a05fec

                            SHA1

                            526792847674460f23e926c42d16b80741068c23

                            SHA256

                            f87748f41a585b981b35490d0dea91d048e2f1d76c931101e201d04f7e1bf12b

                            SHA512

                            988e645f17ab9edb28553759ec78761e1b26ae4adfc750b9cb6791ea77ab44eba3161553b220fd4c1cfb7ee02076a87aafffe2300ca54ba8c0e6baa43787ac64

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.bin

                            Filesize

                            6KB

                            MD5

                            97e02adc48754344b242d88d69fab425

                            SHA1

                            0fd9da7ba02a9d7378f45c141a03ee1a1107ceea

                            SHA256

                            d89de4a587b5da4a1a32add1b0bb9f4a957f12301eea95443d86e38af8254ab3

                            SHA512

                            79d0418002bfb99bc5ffce115ce5117deabf742265c93a4bfcccaec8c9175a86b1b0011e50d68d5ebb79b478fd4ea45e37de7fd016afbe05a71cd9f262bcef03

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.bin

                            Filesize

                            14KB

                            MD5

                            6012ecde531aee82026e564482ce1689

                            SHA1

                            ee9406daf2185e7f8511e9e8c1ae1d73793b8500

                            SHA256

                            4f1737e2434a671b128b02cdbdc37c37ced7195fd5d09fdff4d49756ef42f0bd

                            SHA512

                            978700cc4e70d9b84f424e8dcee181af666db70a139cf18dbcd9fbd4886f54354ac37e3f40f14c01ae1c32567d650f62d6e226e8b8c2604cddd93569bd562c07

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp

                            Filesize

                            5KB

                            MD5

                            295f772968a266176fb5b5ff002f1cfc

                            SHA1

                            d8a2f7b4153a26714daca8ac68cc4e7d2ec6c590

                            SHA256

                            d99db708f20f1bb0bd0e665c576b96307ee882064d869403ddb1c55d535f9b8f

                            SHA512

                            48cc948596fef5dee188d9d676abd42b81d74bf4b33052b60e610ebfda0bf1fe1feabd521b323029ae18fd2809bfe144fa625bc83dd12c8c466dc55592af6b38

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp

                            Filesize

                            15KB

                            MD5

                            c604b1366cd589b84c602c76da69d1db

                            SHA1

                            1540619a3ae27240a4a78fe688bee2ff0c9c71fb

                            SHA256

                            d4d490e78826e83f4000c8928a1f79e163a233e93588214799ae1c79a13881b0

                            SHA512

                            54a40049f5405414991b2595c14d595df6a75ec4d11d30a3ccdcf1ee09866cd8dc8c3802a4b3b141c557f70719a814dd77287c2d21281970abf9f02a3ba8f228

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp

                            Filesize

                            15KB

                            MD5

                            5a46e2fd3906861b84c02208faedf9de

                            SHA1

                            985369167f9e53a1aa822e5379436c4739fb0357

                            SHA256

                            51c76ba129474a798f625727ef897490acdd1abbf0718a4eabdc770436506384

                            SHA512

                            9f7991f931e3b4be2e4e17f87acad5e4849f238dcfe2d4ab5bd3b6ae455cd0e200fbb6d5492f912dc08fce39664f28c7b45cc251887c54f3cd3268da3abc3ab2

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp

                            Filesize

                            5KB

                            MD5

                            a4ffd2f845c258a9daa553a1e9e536f9

                            SHA1

                            a19b1a3e2a3a429cbb059a4bbda7da52022c0852

                            SHA256

                            041c581875738fabc35a8f615d68c6075171b24990f30e9e6303795c1268c787

                            SHA512

                            4134f03320af17f6d8cd8ccc16cab0cbad782494647be5dae1aabbbaed5ec799a4bcc91f3ce76b696c179ba6454c844019335c4587cc6f75e2f35436d35eddd4

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp

                            Filesize

                            5KB

                            MD5

                            c89350364accb5f88db22314b683681e

                            SHA1

                            250b851ba91262b460b97c3e3e41dec18d000df2

                            SHA256

                            72fa9cc5347c48a8b3d39d158b8b73362f0abc1fb9e826d7076029af7d5a56de

                            SHA512

                            a17d6b0c9bb0313bf108e3a1c30f056c6b1f2e07ddd4cf2734b4e8c50d3fcfc0c14b605f32553fa29618529473d8cb06c2738e1cd7e315e29de4468cc0bc56b7

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp

                            Filesize

                            6KB

                            MD5

                            bceddf53b6e6e22452f6519c4c207704

                            SHA1

                            93ba5fd7704f7b7d954317b4714dfe4cccbf13a8

                            SHA256

                            389e8e922f77f17a7d734df9de254b64581711d51ccd0435679886d47261047a

                            SHA512

                            c036ffac35b2f6e6bdab7ba7246256f571ff312be53416f314265d3b1cba458cef48658e4419abda9a9cc08e8ce32112ec619255bd3ea234223635fc3a9bb320

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp

                            Filesize

                            6KB

                            MD5

                            951b3a27ee21fb9ffb0e96b276d424e0

                            SHA1

                            2436e9f3da5d2627cc17c630193d06ce4333a941

                            SHA256

                            5fec67c2aa40c1777ff4bdbb6fd02d0f8922eddb62a579c8d1d101ccf76f28d6

                            SHA512

                            5af4132e1276da7fc5e94993fbf5db4db1281e4837165ee4929b6b915e8e149e3f1beb84910b13d512b2b67e0d459521a848fc2b90aadc6dcb3978c2da8e227c

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp

                            Filesize

                            6KB

                            MD5

                            3d2adaa0ea96a5e6d201bfa8887e5c02

                            SHA1

                            24d395c98e1b87e7259928b2f88a1ce3d3c57d20

                            SHA256

                            21fc069efb4403f6d5595977352fe3266da1d5ef6cd8775e82a01b5279761391

                            SHA512

                            0ea57b9d5b3905e7940841f68f761dfe6072c26a5eda2069eaa74f4bb731e1734139143a6ae549383ac60832366398762066c548efb2730ce58b62cf03c71bf5

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\0c64d8e0-576f-40ac-9b07-0a8c6fd3de9b

                            Filesize

                            671B

                            MD5

                            786c76333d0fba885b31364dfa0a6887

                            SHA1

                            64c5e02510b3ec9476eca0d439c3792dbff351f0

                            SHA256

                            b10af548a68b2606e747af4f32b42f33302f22968e8abccf16101cf81af35a7f

                            SHA512

                            71d69045de467a4e563c8c9faabb6a725066a854bc3b54dfc686a0aa2d9b38a267e6988e1d3df49f7acb0f164b2740a582d1cc3802802404ac704372094455f8

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\b77f415d-ae99-4743-a06c-bed11fded2ce

                            Filesize

                            982B

                            MD5

                            1b3fa1586d5974e927da5b12b9ec4436

                            SHA1

                            c3f1b180791160d8eee2845362f43f0dc512bdb7

                            SHA256

                            d70947844a87a5b5306fedfce911c47c0c636739fd42af6715632235aecaa629

                            SHA512

                            ff4dfa4de47341eb98af3f5e630d8ee2d70194140029224a5d1b6f6f15daf5bf8706d3bf698b94000bea10f531f561b40588819154e14cb7add4c6e170e385bc

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\d2c3e33d-93d2-4737-81ed-8543a23a0155

                            Filesize

                            28KB

                            MD5

                            876e8b7c59c0b9a91bd3647e5d9492ca

                            SHA1

                            cc2d401a5f91966e1d1d9e9c52abfd2e34337eeb

                            SHA256

                            ebe0c0c3186d14ab98169a0ecb1ce20ea98a413b12ccefe1bffae5c72a79f60f

                            SHA512

                            4c8f63f5700610e3f26a1bcdca5bf7761a4b974af58fb781b36201a508467ef6011727af8aeb76db4af45ecc4de08c63b5be59e0ed6522ea072cb82c0e769ebe

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                            Filesize

                            1.1MB

                            MD5

                            842039753bf41fa5e11b3a1383061a87

                            SHA1

                            3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                            SHA256

                            d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                            SHA512

                            d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                            Filesize

                            116B

                            MD5

                            2a461e9eb87fd1955cea740a3444ee7a

                            SHA1

                            b10755914c713f5a4677494dbe8a686ed458c3c5

                            SHA256

                            4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                            SHA512

                            34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                            Filesize

                            372B

                            MD5

                            bf957ad58b55f64219ab3f793e374316

                            SHA1

                            a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                            SHA256

                            bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                            SHA512

                            79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                            Filesize

                            17.8MB

                            MD5

                            daf7ef3acccab478aaa7d6dc1c60f865

                            SHA1

                            f8246162b97ce4a945feced27b6ea114366ff2ad

                            SHA256

                            bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                            SHA512

                            5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\prefs-1.js

                            Filesize

                            12KB

                            MD5

                            b7ee21160381105f40eacfc76dc4f26d

                            SHA1

                            0473e68954a7d4a81543cbf3f8868cac8c991781

                            SHA256

                            2127f24275a7faa8bbf119d0002d6b96461f5882b9322e0cae6b1b81418b67c4

                            SHA512

                            fb59068f2c815a13c08558e8b5e52f61e895329e330c6eda4e1872e25b90a20370d4d89707e1caa378da757db5056fa548fdcc45351d8e4a31c7bd1351616a06

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\prefs.js

                            Filesize

                            10KB

                            MD5

                            5b42b54b98a4fccdca9f985247f6f57c

                            SHA1

                            97c6fd08dbdf7f4b24cad217817000174c6c86b3

                            SHA256

                            ac4468bb26bc85020f88f353fa6f2f63e5a5d2180e9c0cd2b37e1ee7014fd3b6

                            SHA512

                            35dab2711220f14e45039e5fdbf5b8a3342e7c07b4c703301c8553e5075fe4c79b84fa59f9d87c41970f2445ea29a28c923d7e4af57862798b36716af5d51d9b

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                            Filesize

                            3.0MB

                            MD5

                            a4c2c1caa4a344b4b421e4a0ca66d9bd

                            SHA1

                            ceb4247df5d8a1e91230ac364928b47ef5bba689

                            SHA256

                            c178cd0d56d323f9d838f5e24af81c0118c1b337351d86197eb536056ab8949b

                            SHA512

                            46b4aca580516a8f0ea07d37a4db8262f85ad7610c59c338d64a6defbda06fbaf47fb2cf4fd61979ebe5e6e84deb84c40ff1d07ac40c0b5ed03c40ff0718f1e7

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                            Filesize

                            9.5MB

                            MD5

                            7743012318eb84d8017d14b176965cf1

                            SHA1

                            1f5f775519cdc36296aefbc08ad6df3fad3a94f0

                            SHA256

                            fce8471e025137ee2d471e9da1dcee68e8101e6837e18a0bcb15baef4a881b23

                            SHA512

                            152b3e1b4dc99cf1900a3ae599c4359ef3d6262efd7533758d3b697e8584eb88fabad10a8d902df9d304a78eabd65f5a3c08333a5d14a497e33e02fdeed1afe3

                          • C:\Users\Admin\AppData\Roaming\on5pqhvesi0BGAEQNQQ\DJj.exe

                            Filesize

                            300KB

                            MD5

                            95b7a7cbc0aff0215004c5a56ea5952c

                            SHA1

                            a1fb08b02975ec4869bcaf387d09d0abcced27e9

                            SHA256

                            e9aa0b4540115b3dcec3af70b6de27e54e4a0fa96d1d3cb33bac121d804c1d61

                            SHA512

                            97ac66de88cac709e37d59c8a388c18d69aa3422d275be3e28b92e87167bcd87a310125e7dca593fe1b66d2f826cb2e22b64d51eac07dc94981dcd123e906961

                          • memory/640-1505-0x0000000000400000-0x0000000000C74000-memory.dmp

                            Filesize

                            8.5MB

                          • memory/640-1585-0x0000000000400000-0x0000000000C74000-memory.dmp

                            Filesize

                            8.5MB

                          • memory/640-1502-0x0000000000400000-0x0000000000C74000-memory.dmp

                            Filesize

                            8.5MB

                          • memory/640-1131-0x0000000010000000-0x000000001001C000-memory.dmp

                            Filesize

                            112KB

                          • memory/640-1565-0x0000000000400000-0x0000000000C74000-memory.dmp

                            Filesize

                            8.5MB

                          • memory/640-1111-0x0000000000400000-0x0000000000C74000-memory.dmp

                            Filesize

                            8.5MB

                          • memory/640-1570-0x0000000000400000-0x0000000000C74000-memory.dmp

                            Filesize

                            8.5MB

                          • memory/640-1579-0x0000000000400000-0x0000000000C74000-memory.dmp

                            Filesize

                            8.5MB

                          • memory/1068-132-0x0000000000920000-0x0000000000DB8000-memory.dmp

                            Filesize

                            4.6MB

                          • memory/1068-153-0x0000000000920000-0x0000000000DB8000-memory.dmp

                            Filesize

                            4.6MB

                          • memory/1392-1044-0x00000000001C0000-0x0000000000476000-memory.dmp

                            Filesize

                            2.7MB

                          • memory/1392-269-0x00000000001C0000-0x0000000000476000-memory.dmp

                            Filesize

                            2.7MB

                          • memory/1392-1053-0x00000000001C0000-0x0000000000476000-memory.dmp

                            Filesize

                            2.7MB

                          • memory/1392-270-0x00000000001C0000-0x0000000000476000-memory.dmp

                            Filesize

                            2.7MB

                          • memory/1392-268-0x00000000001C0000-0x0000000000476000-memory.dmp

                            Filesize

                            2.7MB

                          • memory/1468-88-0x0000000000400000-0x0000000000457000-memory.dmp

                            Filesize

                            348KB

                          • memory/1468-90-0x0000000000400000-0x0000000000457000-memory.dmp

                            Filesize

                            348KB

                          • memory/1468-92-0x0000000000400000-0x0000000000457000-memory.dmp

                            Filesize

                            348KB

                          • memory/1860-1092-0x000001FD774A0000-0x000001FD774C2000-memory.dmp

                            Filesize

                            136KB

                          • memory/1900-1601-0x00007FF6FEA80000-0x00007FF6FEF10000-memory.dmp

                            Filesize

                            4.6MB

                          • memory/1900-1588-0x00007FF6FEA80000-0x00007FF6FEF10000-memory.dmp

                            Filesize

                            4.6MB

                          • memory/2264-1574-0x0000000000860000-0x00000000008B6000-memory.dmp

                            Filesize

                            344KB

                          • memory/2300-181-0x0000000000D70000-0x00000000011FB000-memory.dmp

                            Filesize

                            4.5MB

                          • memory/2300-212-0x0000000000D70000-0x00000000011FB000-memory.dmp

                            Filesize

                            4.5MB

                          • memory/2676-1587-0x00000000001E0000-0x000000000050F000-memory.dmp

                            Filesize

                            3.2MB

                          • memory/2788-231-0x00000000009F0000-0x0000000000EEB000-memory.dmp

                            Filesize

                            5.0MB

                          • memory/2788-227-0x00000000009F0000-0x0000000000EEB000-memory.dmp

                            Filesize

                            5.0MB

                          • memory/2960-39-0x00000000003A0000-0x0000000000822000-memory.dmp

                            Filesize

                            4.5MB

                          • memory/2960-40-0x00000000003A0000-0x0000000000822000-memory.dmp

                            Filesize

                            4.5MB

                          • memory/2980-43-0x00000000004A0000-0x0000000000985000-memory.dmp

                            Filesize

                            4.9MB

                          • memory/2980-45-0x00000000004A0000-0x0000000000985000-memory.dmp

                            Filesize

                            4.9MB

                          • memory/3436-947-0x0000000000400000-0x0000000000456000-memory.dmp

                            Filesize

                            344KB

                          • memory/3436-946-0x0000000000400000-0x0000000000456000-memory.dmp

                            Filesize

                            344KB

                          • memory/3624-1573-0x00000000001E0000-0x000000000050F000-memory.dmp

                            Filesize

                            3.2MB

                          • memory/3624-151-0x00000000001E0000-0x000000000050F000-memory.dmp

                            Filesize

                            3.2MB

                          • memory/3624-72-0x00000000001E0000-0x000000000050F000-memory.dmp

                            Filesize

                            3.2MB

                          • memory/3624-1082-0x00000000001E0000-0x000000000050F000-memory.dmp

                            Filesize

                            3.2MB

                          • memory/3624-1616-0x00000000001E0000-0x000000000050F000-memory.dmp

                            Filesize

                            3.2MB

                          • memory/3624-1614-0x00000000001E0000-0x000000000050F000-memory.dmp

                            Filesize

                            3.2MB

                          • memory/3624-1611-0x00000000001E0000-0x000000000050F000-memory.dmp

                            Filesize

                            3.2MB

                          • memory/3624-229-0x00000000001E0000-0x000000000050F000-memory.dmp

                            Filesize

                            3.2MB

                          • memory/3624-1279-0x00000000001E0000-0x000000000050F000-memory.dmp

                            Filesize

                            3.2MB

                          • memory/3624-1569-0x00000000001E0000-0x000000000050F000-memory.dmp

                            Filesize

                            3.2MB

                          • memory/3624-953-0x00000000001E0000-0x000000000050F000-memory.dmp

                            Filesize

                            3.2MB

                          • memory/3624-33-0x00000000001E0000-0x000000000050F000-memory.dmp

                            Filesize

                            3.2MB

                          • memory/3624-93-0x00000000001E0000-0x000000000050F000-memory.dmp

                            Filesize

                            3.2MB

                          • memory/3624-1615-0x00000000001E0000-0x000000000050F000-memory.dmp

                            Filesize

                            3.2MB

                          • memory/3624-1586-0x00000000001E0000-0x000000000050F000-memory.dmp

                            Filesize

                            3.2MB

                          • memory/3624-1561-0x00000000001E0000-0x000000000050F000-memory.dmp

                            Filesize

                            3.2MB

                          • memory/3672-1545-0x00007FF6EDD90000-0x00007FF6EE220000-memory.dmp

                            Filesize

                            4.6MB

                          • memory/3708-116-0x0000000000680000-0x0000000000B26000-memory.dmp

                            Filesize

                            4.6MB

                          • memory/3708-110-0x0000000000680000-0x0000000000B26000-memory.dmp

                            Filesize

                            4.6MB

                          • memory/4264-35-0x0000000000E10000-0x000000000113F000-memory.dmp

                            Filesize

                            3.2MB

                          • memory/4264-20-0x0000000000E10000-0x000000000113F000-memory.dmp

                            Filesize

                            3.2MB

                          • memory/4460-1599-0x0000000000FB0000-0x0000000000FD0000-memory.dmp

                            Filesize

                            128KB

                          • memory/4460-1596-0x0000000140000000-0x0000000140770000-memory.dmp

                            Filesize

                            7.4MB

                          • memory/4460-1592-0x0000000140000000-0x0000000140770000-memory.dmp

                            Filesize

                            7.4MB

                          • memory/4460-1593-0x0000000140000000-0x0000000140770000-memory.dmp

                            Filesize

                            7.4MB

                          • memory/4460-1612-0x0000000140000000-0x0000000140770000-memory.dmp

                            Filesize

                            7.4MB

                          • memory/4460-1598-0x0000000140000000-0x0000000140770000-memory.dmp

                            Filesize

                            7.4MB

                          • memory/4460-1600-0x0000000140000000-0x0000000140770000-memory.dmp

                            Filesize

                            7.4MB

                          • memory/4460-1589-0x0000000140000000-0x0000000140770000-memory.dmp

                            Filesize

                            7.4MB

                          • memory/4460-1590-0x0000000140000000-0x0000000140770000-memory.dmp

                            Filesize

                            7.4MB

                          • memory/4460-1591-0x0000000140000000-0x0000000140770000-memory.dmp

                            Filesize

                            7.4MB

                          • memory/4460-1594-0x0000000140000000-0x0000000140770000-memory.dmp

                            Filesize

                            7.4MB

                          • memory/4460-1595-0x0000000140000000-0x0000000140770000-memory.dmp

                            Filesize

                            7.4MB

                          • memory/4676-49-0x0000000000690000-0x000000000093E000-memory.dmp

                            Filesize

                            2.7MB

                          • memory/4676-51-0x0000000000690000-0x000000000093E000-memory.dmp

                            Filesize

                            2.7MB

                          • memory/4676-50-0x0000000000690000-0x000000000093E000-memory.dmp

                            Filesize

                            2.7MB

                          • memory/4676-114-0x0000000000690000-0x000000000093E000-memory.dmp

                            Filesize

                            2.7MB

                          • memory/4676-109-0x0000000000690000-0x000000000093E000-memory.dmp

                            Filesize

                            2.7MB

                          • memory/5576-1055-0x00000000001E0000-0x000000000050F000-memory.dmp

                            Filesize

                            3.2MB

                          • memory/5576-1057-0x00000000001E0000-0x000000000050F000-memory.dmp

                            Filesize

                            3.2MB

                          • memory/6064-1123-0x0000000000320000-0x0000000000F9B000-memory.dmp

                            Filesize

                            12.5MB

                          • memory/6064-1121-0x0000000000320000-0x0000000000F9B000-memory.dmp

                            Filesize

                            12.5MB

                          • memory/6064-1043-0x0000000000320000-0x0000000000F9B000-memory.dmp

                            Filesize

                            12.5MB

                          • memory/6064-1556-0x0000000000320000-0x0000000000F9B000-memory.dmp

                            Filesize

                            12.5MB

                          • memory/6064-1560-0x0000000000320000-0x0000000000F9B000-memory.dmp

                            Filesize

                            12.5MB