Analysis

  • max time kernel
    148s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    24-12-2024 07:12

General

  • Target

    4ba82b53593ae30a4f3294217cd0e9cbfb2f6dfb318ea14db0db2c8f41eda8b7.exe

  • Size

    1.8MB

  • MD5

    0d1a9158a94b405477bc55e68b6c240b

  • SHA1

    3dcf212a60b49701fb2aaf3f4216e43939edc840

  • SHA256

    4ba82b53593ae30a4f3294217cd0e9cbfb2f6dfb318ea14db0db2c8f41eda8b7

  • SHA512

    1d2cde790eafa07ce71467da3d3da5ade1beb4e88b58561110cb63509585c8c32f6dd6b9e3a8031b7e75ab62a60cd90d2ea349a442fae75148d3843282990694

  • SSDEEP

    24576:oTw8uU6UwOTJd+pXKWe6dATWMaq3kn6kuFQ2/1M2uH4XTfwB/ZBkTHZyolHTDbUB:JrULqReTWbn65/1MlsbwBhBk7hT1M

Malware Config

Extracted

Family

amadey

Version

4.41

Botnet

fed3aa

C2

http://185.215.113.16

Attributes
  • install_dir

    44111dbc49

  • install_file

    axplong.exe

  • strings_key

    8d0ad6945b1a30a186ec2d30be6db0b5

  • url_paths

    /Jo89Ku7d/index.php

rc4.plain

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

lumma

Extracted

Family

redline

Botnet

1488Traffer

C2

147.45.44.224:1912

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 16 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Downloads MZ/PE file
  • Uses browser remote debugging 2 TTPs 5 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 32 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 37 IoCs
  • Identifies Wine through registry keys 2 TTPs 16 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 60 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 7 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 16 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 5 IoCs
  • Drops file in Windows directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 29 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 6 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 5 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 7 IoCs
  • Runs ping.exe 1 TTPs 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 61 IoCs
  • Suspicious use of FindShellTrayWindow 17 IoCs
  • Suspicious use of SendNotifyMessage 13 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Views/modifies file attributes 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4ba82b53593ae30a4f3294217cd0e9cbfb2f6dfb318ea14db0db2c8f41eda8b7.exe
    "C:\Users\Admin\AppData\Local\Temp\4ba82b53593ae30a4f3294217cd0e9cbfb2f6dfb318ea14db0db2c8f41eda8b7.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2100
    • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
      "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2816
      • C:\Users\Admin\AppData\Local\Temp\1008527001\7212753525.exe
        "C:\Users\Admin\AppData\Local\Temp\1008527001\7212753525.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Loads dropped DLL
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2860
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
          4⤵
          • Uses browser remote debugging
          • Enumerates system info in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:684
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6fd9758,0x7fef6fd9768,0x7fef6fd9778
            5⤵
              PID:2172
            • C:\Windows\system32\ctfmon.exe
              ctfmon.exe
              5⤵
                PID:1712
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1140 --field-trial-handle=1220,i,6394610765661404240,7960668649781224683,131072 /prefetch:2
                5⤵
                  PID:2432
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1488 --field-trial-handle=1220,i,6394610765661404240,7960668649781224683,131072 /prefetch:8
                  5⤵
                    PID:1660
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1616 --field-trial-handle=1220,i,6394610765661404240,7960668649781224683,131072 /prefetch:8
                    5⤵
                      PID:1224
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2148 --field-trial-handle=1220,i,6394610765661404240,7960668649781224683,131072 /prefetch:1
                      5⤵
                      • Uses browser remote debugging
                      PID:2640
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2448 --field-trial-handle=1220,i,6394610765661404240,7960668649781224683,131072 /prefetch:1
                      5⤵
                      • Uses browser remote debugging
                      PID:1876
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=2464 --field-trial-handle=1220,i,6394610765661404240,7960668649781224683,131072 /prefetch:1
                      5⤵
                      • Uses browser remote debugging
                      PID:2780
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1440 --field-trial-handle=1220,i,6394610765661404240,7960668649781224683,131072 /prefetch:2
                      5⤵
                        PID:2712
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
                      4⤵
                      • Uses browser remote debugging
                      • Enumerates system info in registry
                      PID:2912
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6fd9758,0x7fef6fd9768,0x7fef6fd9778
                        5⤵
                          PID:2460
                        • C:\Windows\system32\ctfmon.exe
                          ctfmon.exe
                          5⤵
                            PID:2272
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1128 --field-trial-handle=1312,i,16045014149482638826,12812901793506540488,131072 /prefetch:2
                            5⤵
                              PID:2952
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1476 --field-trial-handle=1312,i,16045014149482638826,12812901793506540488,131072 /prefetch:8
                              5⤵
                                PID:1540
                            • C:\Windows\SysWOW64\cmd.exe
                              "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\Documents\KFCFBFHIEB.exe"
                              4⤵
                              • Loads dropped DLL
                              • System Location Discovery: System Language Discovery
                              PID:2192
                              • C:\Users\Admin\Documents\KFCFBFHIEB.exe
                                "C:\Users\Admin\Documents\KFCFBFHIEB.exe"
                                5⤵
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • Suspicious behavior: EnumeratesProcesses
                                PID:2900
                          • C:\Users\Admin\AppData\Local\Temp\1008528001\de5fbb960b.exe
                            "C:\Users\Admin\AppData\Local\Temp\1008528001\de5fbb960b.exe"
                            3⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Loads dropped DLL
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • Drops file in Windows directory
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of FindShellTrayWindow
                            • Suspicious use of WriteProcessMemory
                            PID:2012
                            • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                              "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
                              4⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Loads dropped DLL
                              • Adds Run key to start application
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              PID:2504
                              • C:\Users\Admin\AppData\Local\Temp\1021597001\70603f19dd.exe
                                "C:\Users\Admin\AppData\Local\Temp\1021597001\70603f19dd.exe"
                                5⤵
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • System Location Discovery: System Language Discovery
                                • Modifies system certificate store
                                • Suspicious behavior: EnumeratesProcesses
                                PID:2060
                              • C:\Users\Admin\AppData\Local\Temp\1021608001\86bc913b5e.exe
                                "C:\Users\Admin\AppData\Local\Temp\1021608001\86bc913b5e.exe"
                                5⤵
                                • Executes dropped EXE
                                PID:2412
                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                  "powershell.exe" -WindowStyle Hidden -EncodedCommand QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgACcAQwA6AFwAVQBzAGUAcgBzAFwAQQBkAG0AaQBuAFwAQQBwAHAARABhAHQAYQBcAFIAbwBhAG0AaQBuAGcAXAA1AHUAbABtAHAAMABiADIAegAyAHcAVgBCAEMATwBMAEIATwBUACcA
                                  6⤵
                                  • Command and Scripting Interpreter: PowerShell
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2040
                                • C:\Users\Admin\AppData\Roaming\5ulmp0b2z2wVBCOLBOT\DJj.exe
                                  "C:\Users\Admin\AppData\Roaming\5ulmp0b2z2wVBCOLBOT\DJj.exe"
                                  6⤵
                                  • Executes dropped EXE
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1828
                              • C:\Users\Admin\AppData\Local\Temp\1021609001\bd316d869d.exe
                                "C:\Users\Admin\AppData\Local\Temp\1021609001\bd316d869d.exe"
                                5⤵
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • Suspicious behavior: EnumeratesProcesses
                                PID:2220
                              • C:\Users\Admin\AppData\Local\Temp\1021610001\b48efb1c5d.exe
                                "C:\Users\Admin\AppData\Local\Temp\1021610001\b48efb1c5d.exe"
                                5⤵
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                • Loads dropped DLL
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • System Location Discovery: System Language Discovery
                                • Suspicious behavior: EnumeratesProcesses
                                PID:1508
                              • C:\Users\Admin\AppData\Local\Temp\1021611001\fcbc272691.exe
                                "C:\Users\Admin\AppData\Local\Temp\1021611001\fcbc272691.exe"
                                5⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                PID:2248
                                • C:\Windows\system32\cmd.exe
                                  cmd /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"
                                  6⤵
                                  • Loads dropped DLL
                                  PID:1684
                                  • C:\Windows\system32\mode.com
                                    mode 65,10
                                    7⤵
                                      PID:1984
                                    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                      7z.exe e file.zip -p24291711423417250691697322505 -oextracted
                                      7⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:328
                                    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                      7z.exe e extracted/file_7.zip -oextracted
                                      7⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:1936
                                    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                      7z.exe e extracted/file_6.zip -oextracted
                                      7⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:1236
                                    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                      7z.exe e extracted/file_5.zip -oextracted
                                      7⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:3056
                                    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                      7z.exe e extracted/file_4.zip -oextracted
                                      7⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:2872
                                    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                      7z.exe e extracted/file_3.zip -oextracted
                                      7⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:2676
                                    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                      7z.exe e extracted/file_2.zip -oextracted
                                      7⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:1256
                                    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                      7z.exe e extracted/file_1.zip -oextracted
                                      7⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:824
                                    • C:\Windows\system32\attrib.exe
                                      attrib +H "in.exe"
                                      7⤵
                                      • Views/modifies file attributes
                                      PID:2072
                                    • C:\Users\Admin\AppData\Local\Temp\main\in.exe
                                      "in.exe"
                                      7⤵
                                      • Executes dropped EXE
                                      PID:1760
                                      • C:\Windows\system32\attrib.exe
                                        attrib +H +S C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                                        8⤵
                                        • Views/modifies file attributes
                                        PID:2188
                                      • C:\Windows\system32\attrib.exe
                                        attrib +H C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                                        8⤵
                                        • Views/modifies file attributes
                                        PID:1476
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks /f /CREATE /TN "Intel_PTT_EK_Recertification" /TR "C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe" /SC MINUTE
                                        8⤵
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:2068
                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        powershell ping 127.0.0.1; del in.exe
                                        8⤵
                                        • System Network Configuration Discovery: Internet Connection Discovery
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:2752
                                        • C:\Windows\system32\PING.EXE
                                          "C:\Windows\system32\PING.EXE" 127.0.0.1
                                          9⤵
                                          • System Network Configuration Discovery: Internet Connection Discovery
                                          • Runs ping.exe
                                          PID:2932
                                • C:\Users\Admin\AppData\Local\Temp\1021612001\e6ad24dcb2.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1021612001\e6ad24dcb2.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  PID:1948
                                • C:\Users\Admin\AppData\Local\Temp\1021613001\563ae7042a.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1021613001\563ae7042a.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Suspicious use of SetThreadContext
                                  • System Location Discovery: System Language Discovery
                                  PID:1004
                                  • C:\Users\Admin\AppData\Local\Temp\1021613001\563ae7042a.exe
                                    "C:\Users\Admin\AppData\Local\Temp\1021613001\563ae7042a.exe"
                                    6⤵
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    • Modifies system certificate store
                                    PID:2376
                                • C:\Users\Admin\AppData\Local\Temp\1021614001\57f5168111.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1021614001\57f5168111.exe"
                                  5⤵
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:1932
                                • C:\Users\Admin\AppData\Local\Temp\1021615001\6ee3f951ca.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1021615001\6ee3f951ca.exe"
                                  5⤵
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:992
                                • C:\Users\Admin\AppData\Local\Temp\1021616001\1b75ff6a91.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1021616001\1b75ff6a91.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Adds Run key to start application
                                  • Drops file in Program Files directory
                                  • Modifies system certificate store
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:2592
                                  • C:\Program Files\Windows Media Player\graph\graph.exe
                                    "C:\Program Files\Windows Media Player\graph\graph.exe"
                                    6⤵
                                    • Executes dropped EXE
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:1592
                                • C:\Users\Admin\AppData\Local\Temp\1021617001\9545288528.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1021617001\9545288528.exe"
                                  5⤵
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:1236
                                • C:\Users\Admin\AppData\Local\Temp\1021618001\5590c97653.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1021618001\5590c97653.exe"
                                  5⤵
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:2784
                                • C:\Users\Admin\AppData\Local\Temp\1021619001\6160a0c1de.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1021619001\6160a0c1de.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of FindShellTrayWindow
                                  • Suspicious use of SendNotifyMessage
                                  PID:2780
                                  • C:\Windows\SysWOW64\taskkill.exe
                                    taskkill /F /IM firefox.exe /T
                                    6⤵
                                    • System Location Discovery: System Language Discovery
                                    • Kills process with taskkill
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:2060
                                  • C:\Windows\SysWOW64\taskkill.exe
                                    taskkill /F /IM chrome.exe /T
                                    6⤵
                                    • System Location Discovery: System Language Discovery
                                    • Kills process with taskkill
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:2008
                                  • C:\Windows\SysWOW64\taskkill.exe
                                    taskkill /F /IM msedge.exe /T
                                    6⤵
                                    • System Location Discovery: System Language Discovery
                                    • Kills process with taskkill
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:2268
                                  • C:\Windows\SysWOW64\taskkill.exe
                                    taskkill /F /IM opera.exe /T
                                    6⤵
                                    • System Location Discovery: System Language Discovery
                                    • Kills process with taskkill
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:2316
                                  • C:\Windows\SysWOW64\taskkill.exe
                                    taskkill /F /IM brave.exe /T
                                    6⤵
                                    • System Location Discovery: System Language Discovery
                                    • Kills process with taskkill
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:620
                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                    "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                    6⤵
                                      PID:2476
                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                        "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                        7⤵
                                        • Checks processor information in registry
                                        • Modifies registry class
                                        • Suspicious use of AdjustPrivilegeToken
                                        • Suspicious use of FindShellTrayWindow
                                        • Suspicious use of SendNotifyMessage
                                        PID:2004
                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2004.0.1251634774\1024714569" -parentBuildID 20221007134813 -prefsHandle 1212 -prefMapHandle 1204 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {49a6071d-cb4a-46ff-9378-62a0f413e3f2} 2004 "\\.\pipe\gecko-crash-server-pipe.2004" 1300 fed9a58 gpu
                                          8⤵
                                            PID:1768
                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2004.1.662843262\665951398" -parentBuildID 20221007134813 -prefsHandle 1500 -prefMapHandle 1480 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a78ae6ed-745d-49c4-a8f4-0c63cbda9629} 2004 "\\.\pipe\gecko-crash-server-pipe.2004" 1512 43eb558 socket
                                            8⤵
                                              PID:1844
                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2004.2.359810105\1433578787" -childID 1 -isForBrowser -prefsHandle 1932 -prefMapHandle 1928 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 572 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ce979b79-6572-4f81-8ca1-f82d96091cc5} 2004 "\\.\pipe\gecko-crash-server-pipe.2004" 1944 183b2858 tab
                                              8⤵
                                                PID:1828
                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2004.3.379869945\1571468505" -childID 2 -isForBrowser -prefsHandle 2604 -prefMapHandle 2600 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 572 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a5f0bcc7-2926-411b-a2c4-65ce82899b3a} 2004 "\\.\pipe\gecko-crash-server-pipe.2004" 2620 1c545558 tab
                                                8⤵
                                                  PID:2848
                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2004.4.1104681393\1367080903" -childID 3 -isForBrowser -prefsHandle 3780 -prefMapHandle 3776 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 572 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {bbbf5f96-5d6d-418b-ae5a-b136489e6852} 2004 "\\.\pipe\gecko-crash-server-pipe.2004" 3792 1f0c2258 tab
                                                  8⤵
                                                    PID:856
                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2004.5.1595188408\96304274" -childID 4 -isForBrowser -prefsHandle 3920 -prefMapHandle 3924 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 572 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {fdf9f5dd-7bee-4517-a2bd-dd9755276d7c} 2004 "\\.\pipe\gecko-crash-server-pipe.2004" 3908 1f0bf858 tab
                                                    8⤵
                                                      PID:2268
                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2004.6.2014010764\2038554763" -childID 5 -isForBrowser -prefsHandle 4084 -prefMapHandle 4088 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 572 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {bf8617e2-6a6b-4621-924f-3a440d2feacb} 2004 "\\.\pipe\gecko-crash-server-pipe.2004" 4072 1f0c2858 tab
                                                      8⤵
                                                        PID:1928
                                                • C:\Users\Admin\AppData\Local\Temp\1021620001\27548549b9.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\1021620001\27548549b9.exe"
                                                  5⤵
                                                  • Modifies Windows Defender Real-time Protection settings
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Windows security modification
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  • System Location Discovery: System Language Discovery
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:3516
                                                • C:\Users\Admin\AppData\Local\Temp\1021621001\583770e9b3.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\1021621001\583770e9b3.exe"
                                                  5⤵
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  • Suspicious use of SetThreadContext
                                                  • System Location Discovery: System Language Discovery
                                                  PID:3996
                                                  • C:\Users\Admin\AppData\Local\Temp\1021621001\583770e9b3.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\1021621001\583770e9b3.exe"
                                                    6⤵
                                                    • Executes dropped EXE
                                                    • System Location Discovery: System Language Discovery
                                                    PID:4072
                                            • C:\Users\Admin\AppData\Local\Temp\1008529001\99e1d7e9a3.exe
                                              "C:\Users\Admin\AppData\Local\Temp\1008529001\99e1d7e9a3.exe"
                                              3⤵
                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                              • Checks BIOS information in registry
                                              • Executes dropped EXE
                                              • Identifies Wine through registry keys
                                              • Loads dropped DLL
                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:2276
                                            • C:\Users\Admin\AppData\Local\Temp\1008530001\f08d052cae.exe
                                              "C:\Users\Admin\AppData\Local\Temp\1008530001\f08d052cae.exe"
                                              3⤵
                                              • Enumerates VirtualBox registry keys
                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                              • Checks BIOS information in registry
                                              • Executes dropped EXE
                                              • Identifies Wine through registry keys
                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:2104
                                        • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                          "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                          1⤵
                                            PID:2804
                                          • C:\Windows\system32\wbem\WMIADAP.EXE
                                            wmiadap.exe /F /T /R
                                            1⤵
                                              PID:1540
                                            • C:\Windows\system32\taskeng.exe
                                              taskeng.exe {9C8AC492-81E1-4085-AA1F-BF992D218E27} S-1-5-21-1163522206-1469769407-485553996-1000:PJCSDMRP\Admin:Interactive:[1]
                                              1⤵
                                              • Loads dropped DLL
                                              PID:3800
                                              • C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                                                C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                                                2⤵
                                                • Executes dropped EXE
                                                • Suspicious use of SetThreadContext
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:3832
                                                • C:\Windows\explorer.exe
                                                  explorer.exe
                                                  3⤵
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:3840
                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  powershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe
                                                  3⤵
                                                  • Drops file in System32 directory
                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:3884
                                                  • C:\Windows\system32\PING.EXE
                                                    "C:\Windows\system32\PING.EXE" 127.1.10.1
                                                    4⤵
                                                    • System Network Configuration Discovery: Internet Connection Discovery
                                                    • Runs ping.exe
                                                    PID:3152
                                              • C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                                                C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                                                2⤵
                                                • Executes dropped EXE
                                                • Suspicious use of SetThreadContext
                                                PID:3600
                                                • C:\Windows\explorer.exe
                                                  explorer.exe
                                                  3⤵
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:3612
                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  powershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe
                                                  3⤵
                                                  • Drops file in System32 directory
                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:3768
                                                  • C:\Windows\system32\PING.EXE
                                                    "C:\Windows\system32\PING.EXE" 127.1.10.1
                                                    4⤵
                                                    • System Network Configuration Discovery: Internet Connection Discovery
                                                    • Runs ping.exe
                                                    PID:3524

                                            Network

                                            MITRE ATT&CK Enterprise v15

                                            Replay Monitor

                                            Loading Replay Monitor...

                                            Downloads

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\614bba2c-4bfd-4824-acb1-45672811657e.tmp

                                              Filesize

                                              355KB

                                              MD5

                                              6b3ddcd7b867e86e9d1171020d724c62

                                              SHA1

                                              f6282232a5cf9a8ded53aefd402de174959d8584

                                              SHA256

                                              db9a85e01c43555ccb6633a1de4ff93b35ff6b58f0e21d447cf1e679d91ffc9d

                                              SHA512

                                              fe6a88ec59799862ddf8ca7f29bfbd5500d4fd45a45a29d623ca8b301090ce1116d582caf42927530dc0f1b1790dd5cfdbb689b68a4fa7b1ea024fe69277e14f

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat

                                              Filesize

                                              40B

                                              MD5

                                              4a665889f3436960b716c066cc9f7818

                                              SHA1

                                              3ba9ad9a24de57891e3a837bbfd74e16327f290b

                                              SHA256

                                              682fec0092076f4b284dca80067793252e2217bdf47b47a690bdb46d1a2f0483

                                              SHA512

                                              ad3a3a6df89587c6d4bf504bbb60602e20639875fa97b257b808306ba9de3903453ce62eddf94619e781f2aff0c0ce8cadf399a4de0863fe74794a2788d13f72

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000007.dbtmp

                                              Filesize

                                              16B

                                              MD5

                                              18e723571b00fb1694a3bad6c78e4054

                                              SHA1

                                              afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                                              SHA256

                                              8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                                              SHA512

                                              43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Site Characteristics Database\000002.dbtmp

                                              Filesize

                                              16B

                                              MD5

                                              206702161f94c5cd39fadd03f4014d98

                                              SHA1

                                              bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                              SHA256

                                              1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                              SHA512

                                              0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                              Filesize

                                              355KB

                                              MD5

                                              425ffd92b53f46e9b1f76d58d35077cc

                                              SHA1

                                              43068d5f288044038f9bb95fbcc95d7de99281b0

                                              SHA256

                                              516d4a35240985a37e33e9cc8a03c70b303fb765c503282938646a85a0dadcf7

                                              SHA512

                                              695f73c8e31ddc0c5cceccaa8ea8928501cde17684592b6667cd7cb2704444c5fc67b912c2838a983c93bb2a28a3caec7b3e4e0c0dceaf47c84580eb984a5322

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Extension Scripts\CURRENT

                                              Filesize

                                              16B

                                              MD5

                                              46295cac801e5d4857d09837238a6394

                                              SHA1

                                              44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                              SHA256

                                              0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                              SHA512

                                              8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Extension Scripts\MANIFEST-000001

                                              Filesize

                                              41B

                                              MD5

                                              5af87dfd673ba2115e2fcf5cfdb727ab

                                              SHA1

                                              d5b5bbf396dc291274584ef71f444f420b6056f1

                                              SHA256

                                              f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                              SHA512

                                              de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\History

                                              Filesize

                                              148KB

                                              MD5

                                              90a1d4b55edf36fa8b4cc6974ed7d4c4

                                              SHA1

                                              aba1b8d0e05421e7df5982899f626211c3c4b5c1

                                              SHA256

                                              7cf3e9e8619904e72ea6608cc43e9b6c9f8aa2af02476f60c2b3daf33075981c

                                              SHA512

                                              ea0838be754e1258c230111900c5937d2b0788f90bbf7c5f82b2ceda7868e50afb86c301f313267eaa912778da45755560b5434885521bf915967a7863922ae2

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Login Data

                                              Filesize

                                              46KB

                                              MD5

                                              02d2c46697e3714e49f46b680b9a6b83

                                              SHA1

                                              84f98b56d49f01e9b6b76a4e21accf64fd319140

                                              SHA256

                                              522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

                                              SHA512

                                              60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Web Data

                                              Filesize

                                              88KB

                                              MD5

                                              11b6879796f062d38ba0ec2de7680830

                                              SHA1

                                              ecb0f97f93f8f882966a56589162e328e2c8211f

                                              SHA256

                                              871b3dbd6548fda17acf2dcdc284bcd6a118e6f547f0702c801710f268743a61

                                              SHA512

                                              ed54facfe77e0491a8102d2846b1854aee645e1848db39b11951555d013984de710c715936518cf04cb5dc0fcc7846dcddb017bba9d299c915008532782034f8

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Variations

                                              Filesize

                                              86B

                                              MD5

                                              f732dbed9289177d15e236d0f8f2ddd3

                                              SHA1

                                              53f822af51b014bc3d4b575865d9c3ef0e4debde

                                              SHA256

                                              2741df9ee9e9d9883397078f94480e9bc1d9c76996eec5cfe4e77929337cbe93

                                              SHA512

                                              b64e5021f32e26c752fcba15a139815894309b25644e74ceca46a9aa97070bca3b77ded569a9bfd694193d035ba75b61a8d6262c8e6d5c4d76b452b38f5150a4

                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9GP4P3HF\soft[1]

                                              Filesize

                                              1.4MB

                                              MD5

                                              a8cf5621811f7fac55cfe8cb3fa6b9f6

                                              SHA1

                                              121356839e8138a03141f5f5856936a85bd2a474

                                              SHA256

                                              614a0362ab87cee48d0935b5bb957d539be1d94c6fdeb3fe42fac4fbe182c10c

                                              SHA512

                                              4479d951435f222ca7306774002f030972c9f1715d6aaf512fca9420dd79cb6d08240f80129f213851773290254be34f0ff63c7b1f4d554a7db5f84b69e84bdd

                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\L6J4GCMD\download[1].htm

                                              Filesize

                                              1B

                                              MD5

                                              cfcd208495d565ef66e7dff9f98764da

                                              SHA1

                                              b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                              SHA256

                                              5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                              SHA512

                                              31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                            • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\z3l10m6w.default-release\activity-stream.discovery_stream.json.tmp

                                              Filesize

                                              29KB

                                              MD5

                                              cd5e7cb4ac445547b8381d024e5bf391

                                              SHA1

                                              50a26877c1cdd105ecdcd2c438b3b07297780d67

                                              SHA256

                                              2f4934d05b73b3cab2caa9c802221618f9843571cc4b060545c62028da7b4a71

                                              SHA512

                                              19debbc1ae0afddc21ec85611ec56c605a569faa58f17695ce81a2cecf5594d05f0caa750b6fdcc404369577f970ad7c6d053811a2d374f86e85d19b221518e4

                                            • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\z3l10m6w.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                                              Filesize

                                              15KB

                                              MD5

                                              96c542dec016d9ec1ecc4dddfcbaac66

                                              SHA1

                                              6199f7648bb744efa58acf7b96fee85d938389e4

                                              SHA256

                                              7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                                              SHA512

                                              cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                                            • C:\Users\Admin\AppData\Local\Temp\1008527001\7212753525.exe

                                              Filesize

                                              5.0MB

                                              MD5

                                              6c95213561a861afe514a3a0ed42c612

                                              SHA1

                                              e049543aa1de46c116a29aac1b2245a4118a63f5

                                              SHA256

                                              a31fe1159bb23cfda87e08df5d344e18f02bb0888f1098ba40ddb22435ab0682

                                              SHA512

                                              1641564f6675712fac6581f5b0c07c57168088c451682a5f54aac97812e463a6a9caa363ce29b69565a739630003a9cbfb94f10737617c8a1de43af9f4ce703a

                                            • C:\Users\Admin\AppData\Local\Temp\1008528001\de5fbb960b.exe

                                              Filesize

                                              3.1MB

                                              MD5

                                              24319426f632744b2cc6c1436a7d95d9

                                              SHA1

                                              d4010e02dcb92880c8c5d6731f80abd3922fe2f5

                                              SHA256

                                              4a24b0b493901cff24e095d2e96e3baea0705423b28e44222e95b79b89a54409

                                              SHA512

                                              c88f9a9031da0f4f963304b32f60c2981298e0b3a57603e5c1d3f1ce7a58d486b0652368e5e5358eed48e9e5317a16f7643ccb142987f8c047ee0ccdd68710a6

                                            • C:\Users\Admin\AppData\Local\Temp\1008529001\99e1d7e9a3.exe

                                              Filesize

                                              1.9MB

                                              MD5

                                              377c2d7cf10a3643579b0ceb5038cd58

                                              SHA1

                                              b715d067ded1accddc518f2a0b352705e8b859ca

                                              SHA256

                                              919a1ea6127a16cce2ded0a98b24163f23f959f7d0f78662d57dd5288690142a

                                              SHA512

                                              fde937c8c1ef659ec327691646529f7c64935bcb736cb5ca117b055e773af3083fd65e271cd9df83435237c84f7a9cd231acd8275cc193bc3987813bcc96665b

                                            • C:\Users\Admin\AppData\Local\Temp\1008530001\f08d052cae.exe

                                              Filesize

                                              4.3MB

                                              MD5

                                              32418cf3b568237bee2ee252fa8ce7da

                                              SHA1

                                              c7760146c3fc6f02ab7d822eff5897cf159d847e

                                              SHA256

                                              09b76dc51da0cea7038234dcf73916526d34c7401cb488d0ceb099cda4b369d9

                                              SHA512

                                              198b0e63b99c579031547f9c5c46f08678d1b77b88e3c9f958ffc3f01ba1d91f02c53a82110860f4010bedff5996dfa556d3efc23981b7f469d1ea8bf46d64c7

                                            • C:\Users\Admin\AppData\Local\Temp\1021597001\70603f19dd.exe

                                              Filesize

                                              2.8MB

                                              MD5

                                              c7c35aa98a21f2d9b5a584f5f32b91a5

                                              SHA1

                                              b9a135dce7f5fdbaac03a84650c869880cebceb5

                                              SHA256

                                              e87601e6ed69dcfe547d8e8525083ee4f5f1cdfc0ae5c99a897445061adc8044

                                              SHA512

                                              0134eca56eb157df97e5ec57f4614a9e72ff35146d8433118830865ca469bed139772c28b55c3b0f582c4de53d0f20cda266f6322e3fb1d0d1f52d18f5807249

                                            • C:\Users\Admin\AppData\Local\Temp\1021608001\86bc913b5e.exe

                                              Filesize

                                              2.9MB

                                              MD5

                                              75ca34215f6e3916c51c0af34fc17284

                                              SHA1

                                              3726ba089194df9221b1eed520d62e452d74d509

                                              SHA256

                                              4d2340448332a51ceafe2cb2562b2441590eff605b7fc0478001ad103f495955

                                              SHA512

                                              51a8285cd0c989ca4a659fb84f401f81e92bcc9a2b03f3f55da565bc2a9b6fefb115ddb0009d675e265e391c65fb4defc6326037b70b03eb6ed1364f1d7dc679

                                            • C:\Users\Admin\AppData\Local\Temp\1021611001\fcbc272691.exe

                                              Filesize

                                              4.2MB

                                              MD5

                                              3a425626cbd40345f5b8dddd6b2b9efa

                                              SHA1

                                              7b50e108e293e54c15dce816552356f424eea97a

                                              SHA256

                                              ba9212d2d5cd6df5eb7933fb37c1b72a648974c1730bf5c32439987558f8e8b1

                                              SHA512

                                              a7538c6b7e17c35f053721308b8d6dc53a90e79930ff4ed5cffecaa97f4d0fbc5f9e8b59f1383d8f0699c8d4f1331f226af71d40325022d10b885606a72fe668

                                            • C:\Users\Admin\AppData\Local\Temp\1021612001\e6ad24dcb2.exe

                                              Filesize

                                              2.5MB

                                              MD5

                                              87330f1877c33a5a6203c49075223b16

                                              SHA1

                                              55b64ee8b2d1302581ab1978e9588191e4e62f81

                                              SHA256

                                              98f2344ed45ff0464769e5b006bf0e831dc3834f0534a23339bb703e50db17e0

                                              SHA512

                                              7c747d3edb04e4e71dce7efa33f5944a191896574fee5227316739a83d423936a523df12f925ee9b460cce23b49271f549c1ee5d77b50a7d7c6e3f31ba120c8f

                                            • C:\Users\Admin\AppData\Local\Temp\1021613001\563ae7042a.exe

                                              Filesize

                                              528KB

                                              MD5

                                              9ab250b0dc1d156e2d123d277eb4d132

                                              SHA1

                                              3b434ff78208c10f570dfe686455fd3094f3dd48

                                              SHA256

                                              49bfa0b1c3553208e59b6b881a58c94bb4aa3d09e51c3f510f207b7b24675864

                                              SHA512

                                              a30fb204b556b0decd7fab56a44e62356c7102bc8146b2dfd88e6545dea7574e043a3254035b7514ee0c686a726b8f5ba99bcd91e8c2c7f39c105e2724080ef0

                                            • C:\Users\Admin\AppData\Local\Temp\1021614001\57f5168111.exe

                                              Filesize

                                              1.8MB

                                              MD5

                                              15709eba2afaf7cc0a86ce0abf8e53f1

                                              SHA1

                                              238ebf0d386ecf0e56d0ddb60faca0ea61939bb6

                                              SHA256

                                              10bff40a9d960d0be3cc81b074a748764d7871208f324de26d365b1f8ea3935a

                                              SHA512

                                              65edefa20f0bb35bee837951ccd427b94a18528c6e84de222b1aa0af380135491bb29a049009f77e66fcd2abe5376a831d98e39055e1042ccee889321b96e8e9

                                            • C:\Users\Admin\AppData\Local\Temp\1021615001\6ee3f951ca.exe

                                              Filesize

                                              1.8MB

                                              MD5

                                              8a0feb447f024f32d1ee001a56d7ee23

                                              SHA1

                                              39086a8133462fbbdbaad4a313789d216497e68a

                                              SHA256

                                              b474d829617220d8d949fa58a39d9eafde02ec488f0c7a4330950fefed66bd86

                                              SHA512

                                              09efc757b29341d91d08619e8924b5cbb3acd73f2fe13b1aa21327c4133721102110b17f6717b09e703d1137d4266ab6e563f85bd34e98a1ee03b1b50e7ddbec

                                            • C:\Users\Admin\AppData\Local\Temp\1021616001\1b75ff6a91.exe

                                              Filesize

                                              591KB

                                              MD5

                                              3567cb15156760b2f111512ffdbc1451

                                              SHA1

                                              2fdb1f235fc5a9a32477dab4220ece5fda1539d4

                                              SHA256

                                              0285d3a6c1ca2e3a993491c44e9cf2d33dbec0fb85fdbf48989a4e3b14b37630

                                              SHA512

                                              e7a31b016417218387a4702e525d33dd4fe496557539b2ab173cec0cb92052c750cfc4b3e7f02f3c66ac23f19a0c8a4eb6c9d2b590a5e9faeb525e517bc877ba

                                            • C:\Users\Admin\AppData\Local\Temp\1021617001\9545288528.exe

                                              Filesize

                                              1.8MB

                                              MD5

                                              41ec9ac3ecb4f83cd0a48bbe84fc15a1

                                              SHA1

                                              f21f03135300cc4a21c991c0b293b4dbd2906edb

                                              SHA256

                                              3c6474dc3564419c893db051eccbd69e1a6cccca61cb3abadafa0bf63d4f5699

                                              SHA512

                                              4be967f7d88d3fe4e8663646d4e0e61c28d146364e4682bb78a03fda1f20492fb76e6ac186f43dda96592ca4da4e578843de798c97200684c9681b93095640ff

                                            • C:\Users\Admin\AppData\Local\Temp\1021619001\6160a0c1de.exe

                                              Filesize

                                              946KB

                                              MD5

                                              bc8655bfb1d74b2278e3c4af6354fd05

                                              SHA1

                                              fca18b00533815a40d722e913edf595f3bdcb6ed

                                              SHA256

                                              63712a61365f30b37325a845945676cf4ee2c8d5b50c9a09aa4939c0d972e9bd

                                              SHA512

                                              20238a2a1b8c9c7283081087cd77028fc612b4250bd46cccef6501e252032db9e9f38368e90ca41b3b2ec6ee5104fef5ddba3a5d61078d461a1ba99374f067a7

                                            • C:\Users\Admin\AppData\Local\Temp\1021620001\27548549b9.exe

                                              Filesize

                                              2.6MB

                                              MD5

                                              594a74343810159f48d43e789c5309cb

                                              SHA1

                                              82fab2d8ab33053505e722a2714fd5fb751c1938

                                              SHA256

                                              31609f612b4fa8373e2f9cf2ee21671e3c0338bcc45522dae8dc2d1cd8041d25

                                              SHA512

                                              c1bea0f769e282fa919596dd98cc86dbd99511f6f1ae7b730b031cfe322284775af47bd1aaccc7ba4297e09307626383bf92281ec8874f713cdde37338a8c2e6

                                            • C:\Users\Admin\AppData\Local\Temp\1021621001\583770e9b3.exe

                                              Filesize

                                              562KB

                                              MD5

                                              63c8c11ca850435d9b5ec2ea41e50c22

                                              SHA1

                                              09a92f137462216a052f2a819ce110a0ac2f4022

                                              SHA256

                                              89f58c08d1ccdc0aa645f11fb84de4c8a1ee328fd8a847aca63523291465a3a4

                                              SHA512

                                              abdb139e86a3268c4d2bb5581c804219eeefc992e1dab87b3eb059db24015c849ce64d16ed0745df43dc8ac7ae49dcd5fd5660e65924752e669deafa6bbaa803

                                            • C:\Users\Admin\AppData\Local\Temp\CabC7A5.tmp

                                              Filesize

                                              70KB

                                              MD5

                                              49aebf8cbd62d92ac215b2923fb1b9f5

                                              SHA1

                                              1723be06719828dda65ad804298d0431f6aff976

                                              SHA256

                                              b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                              SHA512

                                              bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                                            • C:\Users\Admin\AppData\Local\Temp\TarC7C7.tmp

                                              Filesize

                                              181KB

                                              MD5

                                              4ea6026cf93ec6338144661bf1202cd1

                                              SHA1

                                              a1dec9044f750ad887935a01430bf49322fbdcb7

                                              SHA256

                                              8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                                              SHA512

                                              6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                                            • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

                                              Filesize

                                              1.6MB

                                              MD5

                                              72491c7b87a7c2dd350b727444f13bb4

                                              SHA1

                                              1e9338d56db7ded386878eab7bb44b8934ab1bc7

                                              SHA256

                                              34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

                                              SHA512

                                              583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

                                            • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_7.zip

                                              Filesize

                                              3.3MB

                                              MD5

                                              cea368fc334a9aec1ecff4b15612e5b0

                                              SHA1

                                              493d23f72731bb570d904014ffdacbba2334ce26

                                              SHA256

                                              07e38cad68b0cdbea62f55f9bc6ee80545c2e1a39983baa222e8af788f028541

                                              SHA512

                                              bed35a1cc56f32e0109ea5a02578489682a990b5cefa58d7cf778815254af9849e731031e824adba07c86c8425df58a1967ac84ce004c62e316a2e51a75c8748

                                            • C:\Users\Admin\AppData\Local\Temp\main\file.bin

                                              Filesize

                                              3.3MB

                                              MD5

                                              045b0a3d5be6f10ddf19ae6d92dfdd70

                                              SHA1

                                              0387715b6681d7097d372cd0005b664f76c933c7

                                              SHA256

                                              94b392e94fa47d1b9b7ae6a29527727268cc2e3484e818c23608f8835bc1104d

                                              SHA512

                                              58255a755531791b888ffd9b663cc678c63d5caa932260e9546b1b10a8d54208334725c14529116b067bcf5a5e02da85e015a3bed80092b7698a43dab0168c7b

                                            • C:\Users\Admin\AppData\Local\Temp\main\main.bat

                                              Filesize

                                              440B

                                              MD5

                                              3626532127e3066df98e34c3d56a1869

                                              SHA1

                                              5fa7102f02615afde4efd4ed091744e842c63f78

                                              SHA256

                                              2a0e18ef585db0802269b8c1ddccb95ce4c0bac747e207ee6131dee989788bca

                                              SHA512

                                              dcce66d6e24d5a4a352874144871cd73c327e04c1b50764399457d8d70a9515f5bc0a650232763bf34d4830bab70ee4539646e7625cfe5336a870e311043b2bd

                                            • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                              Filesize

                                              442KB

                                              MD5

                                              85430baed3398695717b0263807cf97c

                                              SHA1

                                              fffbee923cea216f50fce5d54219a188a5100f41

                                              SHA256

                                              a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e

                                              SHA512

                                              06511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1

                                            • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                              Filesize

                                              8.0MB

                                              MD5

                                              a01c5ecd6108350ae23d2cddf0e77c17

                                              SHA1

                                              c6ac28a2cd979f1f9a75d56271821d5ff665e2b6

                                              SHA256

                                              345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42

                                              SHA512

                                              b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72

                                            • C:\Users\Admin\AppData\Roaming\5ulmp0b2z2wVBCOLBOT\DJj.exe

                                              Filesize

                                              300KB

                                              MD5

                                              95b7a7cbc0aff0215004c5a56ea5952c

                                              SHA1

                                              a1fb08b02975ec4869bcaf387d09d0abcced27e9

                                              SHA256

                                              e9aa0b4540115b3dcec3af70b6de27e54e4a0fa96d1d3cb33bac121d804c1d61

                                              SHA512

                                              97ac66de88cac709e37d59c8a388c18d69aa3422d275be3e28b92e87167bcd87a310125e7dca593fe1b66d2f826cb2e22b64d51eac07dc94981dcd123e906961

                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\NF1J2ON16TSNFXDLF61N.temp

                                              Filesize

                                              7KB

                                              MD5

                                              8bbc4db7fae579be2cac7e82f97ebf1a

                                              SHA1

                                              a6b4377244bf352754ef1960abc16d3798049d6b

                                              SHA256

                                              c0d9d18f20ceb85bc4859002ecf9327aff5a895cfcda2b7dc77f8b897ffb8390

                                              SHA512

                                              39dc1906b3bd2309b59b34652cec0fdd37d8fdb2912d894fd754502cff628413078ac98bf2804e2d191a6f81fe2a22be6282a0b9b60f4e58dfa9070ff7b58faa

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\datareporting\glean\db\data.safe.bin

                                              Filesize

                                              2KB

                                              MD5

                                              eb403398354a9d7a8a917b4b2bc884ca

                                              SHA1

                                              4abe8ded44a819ae3906a4281381531cbc1de2f5

                                              SHA256

                                              0371f9a501007f167616707b305eb2ad27575a4f11b4220e54fef2aedfbdce60

                                              SHA512

                                              c9157a0eac13058439c91b2b5892b40d9a16d8beefa3fac3bc101939fe23f3be2979abf429bc0a53c5c1e8cf1741f7f7b0328aa34d29ff6c7054dfcc4d8345a8

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\datareporting\glean\pending_pings\14b5e2ca-7def-4edd-9ddd-3ef574a79c0c

                                              Filesize

                                              12KB

                                              MD5

                                              7cb6017238a6654231ed910c1af4eefd

                                              SHA1

                                              52edb5b0e1d739f546cd6069445208f162a53616

                                              SHA256

                                              d0ab5dd921041fc626d54a3275458c413905e7d10ccb43649eb3280fc4df9fde

                                              SHA512

                                              efb7261c6f38d55efea8dba4afd49ae49c499fc92e0cab9bc5da446e181348cd3e615947fe6e4f8717c3e9d7b999dfcd7123e12cd9a0c5c3bd4201c80ab5d853

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\datareporting\glean\pending_pings\4bddcbb0-d14e-49d2-9891-00e810edfe61

                                              Filesize

                                              745B

                                              MD5

                                              3cbc2e1624bdcd04c4139b92ad73ef1b

                                              SHA1

                                              06b5fff76a6897b48251467897f835ddb597691a

                                              SHA256

                                              4aac008ed34c2329535446b0c04d1a5dd71ade1d087622d74feb3fdd13ab6dfe

                                              SHA512

                                              81e9139ca6463110d1b130c90a36d8e4d6928f930352ecb563623696adf72627f1dd1f0de82f60ec791c6eb831e18ba01d896139bed9ebc3ca65473b4e3b7e51

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll

                                              Filesize

                                              997KB

                                              MD5

                                              fe3355639648c417e8307c6d051e3e37

                                              SHA1

                                              f54602d4b4778da21bc97c7238fc66aa68c8ee34

                                              SHA256

                                              1ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e

                                              SHA512

                                              8f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info

                                              Filesize

                                              116B

                                              MD5

                                              3d33cdc0b3d281e67dd52e14435dd04f

                                              SHA1

                                              4db88689282fd4f9e9e6ab95fcbb23df6e6485db

                                              SHA256

                                              f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b

                                              SHA512

                                              a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt

                                              Filesize

                                              479B

                                              MD5

                                              49ddb419d96dceb9069018535fb2e2fc

                                              SHA1

                                              62aa6fea895a8b68d468a015f6e6ab400d7a7ca6

                                              SHA256

                                              2af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539

                                              SHA512

                                              48386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json

                                              Filesize

                                              372B

                                              MD5

                                              8be33af717bb1b67fbd61c3f4b807e9e

                                              SHA1

                                              7cf17656d174d951957ff36810e874a134dd49e0

                                              SHA256

                                              e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd

                                              SHA512

                                              6125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll

                                              Filesize

                                              11.8MB

                                              MD5

                                              33bf7b0439480effb9fb212efce87b13

                                              SHA1

                                              cee50f2745edc6dc291887b6075ca64d716f495a

                                              SHA256

                                              8ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e

                                              SHA512

                                              d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib

                                              Filesize

                                              1KB

                                              MD5

                                              688bed3676d2104e7f17ae1cd2c59404

                                              SHA1

                                              952b2cdf783ac72fcb98338723e9afd38d47ad8e

                                              SHA256

                                              33899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237

                                              SHA512

                                              7a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig

                                              Filesize

                                              1KB

                                              MD5

                                              937326fead5fd401f6cca9118bd9ade9

                                              SHA1

                                              4526a57d4ae14ed29b37632c72aef3c408189d91

                                              SHA256

                                              68a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81

                                              SHA512

                                              b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\prefs-1.js

                                              Filesize

                                              7KB

                                              MD5

                                              d53d4aa74122da1bf84ff8646f24f817

                                              SHA1

                                              6e429c34f855e093fea06d97a2a2e3f619991151

                                              SHA256

                                              eeaf14761a26c17fb85165bdef219117f14f9eb68d9788d6f09d0fd0c45aae3e

                                              SHA512

                                              e7495aaa2d2d81ffb92f15e34b86d14ff3bd67c8965964dea056980288a6e6e56f52cc9a8487a1d24862153f0261b7b2b05b30f4baac6d0aeb11bf54f87a4152

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\prefs-1.js

                                              Filesize

                                              6KB

                                              MD5

                                              22f1085b81955487b787dac90900faf8

                                              SHA1

                                              9234d6b653af53221ec357cb1bad602d6b43600c

                                              SHA256

                                              9d9f4593299798510616c83c388f18e951a5a13fa9d4ffd9468aa2b922fe79ab

                                              SHA512

                                              feb5d7a4b02dac3b9b0d65a20d9081394114a58c5946159cad8488f1c81f186f99b1486109d62e4d44d7a7028af8c6d777b789f590e088c98de0bc48ff6c0727

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\prefs-1.js

                                              Filesize

                                              7KB

                                              MD5

                                              908927c3c651c3570c74ef33bb509735

                                              SHA1

                                              c0719f51d1d3580f37c23b440096b6c651394395

                                              SHA256

                                              1da47b46b3ab9716cf34fa2d29ccb037f77d6caca3860d52f070cdc8d537adf0

                                              SHA512

                                              2052ebf7af2da22c6474642279849ee03e64e5e06d31d9fbcf72dbab7316c63afba266184d5ac0e7ad6be79893ef1ddd7056f6e831d13384b59303ac7713c5e5

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\prefs.js

                                              Filesize

                                              6KB

                                              MD5

                                              b1a9d1c8107215728e3c79dfb29ebce2

                                              SHA1

                                              f0d0a3453b19fb797bed4e44732665f1c9205394

                                              SHA256

                                              b3d9fd33928a574d2256a2c62b3c62077296d9278765a6515ed5a7dbfc580eeb

                                              SHA512

                                              7f3bbb041be76e2a3df1ac25637c79bc6666b089837258b2aa9665c824720f40571fc9ab009c032f587443fcafc2752bc204b36874b06bd37356c3c7627f9381

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\sessionstore-backups\recovery.jsonlz4

                                              Filesize

                                              4KB

                                              MD5

                                              9056d0fbc3bee4b8456c7d30e3c0e737

                                              SHA1

                                              480ef0256d927fd32bf5a18e89fcb21dd22ec8b8

                                              SHA256

                                              3c76639467f6843c81f6c67a0e9fb0702e93adf0260b8a69972f3d40e6d27af4

                                              SHA512

                                              c12bf08f0a355a764613e95bb523a907f661728136188feaa974f196ae140ae3281fc38ad5cd05aa80bb20a46046c0f07af75018cdeef80b5d1601c77a353589

                                            • \ProgramData\mozglue.dll

                                              Filesize

                                              593KB

                                              MD5

                                              c8fd9be83bc728cc04beffafc2907fe9

                                              SHA1

                                              95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                              SHA256

                                              ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                              SHA512

                                              fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                            • \ProgramData\nss3.dll

                                              Filesize

                                              2.0MB

                                              MD5

                                              1cc453cdf74f31e4d913ff9c10acdde2

                                              SHA1

                                              6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                              SHA256

                                              ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                              SHA512

                                              dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                            • \Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe

                                              Filesize

                                              1.8MB

                                              MD5

                                              0d1a9158a94b405477bc55e68b6c240b

                                              SHA1

                                              3dcf212a60b49701fb2aaf3f4216e43939edc840

                                              SHA256

                                              4ba82b53593ae30a4f3294217cd0e9cbfb2f6dfb318ea14db0db2c8f41eda8b7

                                              SHA512

                                              1d2cde790eafa07ce71467da3d3da5ade1beb4e88b58561110cb63509585c8c32f6dd6b9e3a8031b7e75ab62a60cd90d2ea349a442fae75148d3843282990694

                                            • \Users\Admin\AppData\Local\Temp\main\7z.exe

                                              Filesize

                                              458KB

                                              MD5

                                              619f7135621b50fd1900ff24aade1524

                                              SHA1

                                              6c7ea8bbd435163ae3945cbef30ef6b9872a4591

                                              SHA256

                                              344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

                                              SHA512

                                              2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

                                            • memory/1508-753-0x0000000000400000-0x0000000000C7C000-memory.dmp

                                              Filesize

                                              8.5MB

                                            • memory/1508-657-0x0000000000400000-0x0000000000C7C000-memory.dmp

                                              Filesize

                                              8.5MB

                                            • memory/1760-689-0x000000013FC00000-0x0000000140090000-memory.dmp

                                              Filesize

                                              4.6MB

                                            • memory/1828-593-0x0000000000890000-0x00000000008E2000-memory.dmp

                                              Filesize

                                              328KB

                                            • memory/1932-769-0x0000000000180000-0x0000000000618000-memory.dmp

                                              Filesize

                                              4.6MB

                                            • memory/2012-62-0x0000000000E00000-0x0000000001118000-memory.dmp

                                              Filesize

                                              3.1MB

                                            • memory/2012-76-0x0000000000E00000-0x0000000001118000-memory.dmp

                                              Filesize

                                              3.1MB

                                            • memory/2012-73-0x0000000006B30000-0x0000000006E48000-memory.dmp

                                              Filesize

                                              3.1MB

                                            • memory/2040-542-0x0000000001E70000-0x0000000001E78000-memory.dmp

                                              Filesize

                                              32KB

                                            • memory/2040-541-0x000000001B610000-0x000000001B8F2000-memory.dmp

                                              Filesize

                                              2.9MB

                                            • memory/2060-547-0x0000000000C70000-0x0000000000F67000-memory.dmp

                                              Filesize

                                              3.0MB

                                            • memory/2060-445-0x0000000000C70000-0x0000000000F67000-memory.dmp

                                              Filesize

                                              3.0MB

                                            • memory/2100-4-0x0000000000E90000-0x000000000134F000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2100-1-0x00000000771C0000-0x00000000771C2000-memory.dmp

                                              Filesize

                                              8KB

                                            • memory/2100-2-0x0000000000E91000-0x0000000000EBF000-memory.dmp

                                              Filesize

                                              184KB

                                            • memory/2100-0-0x0000000000E90000-0x000000000134F000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2100-20-0x0000000006F10000-0x00000000073CF000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2100-19-0x0000000000E90000-0x000000000134F000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2100-3-0x0000000000E90000-0x000000000134F000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2100-17-0x0000000006F10000-0x00000000073CF000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2104-453-0x0000000001080000-0x0000000001CF3000-memory.dmp

                                              Filesize

                                              12.4MB

                                            • memory/2104-770-0x0000000001080000-0x0000000001CF3000-memory.dmp

                                              Filesize

                                              12.4MB

                                            • memory/2104-600-0x0000000001080000-0x0000000001CF3000-memory.dmp

                                              Filesize

                                              12.4MB

                                            • memory/2104-711-0x0000000001080000-0x0000000001CF3000-memory.dmp

                                              Filesize

                                              12.4MB

                                            • memory/2104-455-0x0000000001080000-0x0000000001CF3000-memory.dmp

                                              Filesize

                                              12.4MB

                                            • memory/2104-1093-0x0000000001080000-0x0000000001CF3000-memory.dmp

                                              Filesize

                                              12.4MB

                                            • memory/2104-345-0x0000000001080000-0x0000000001CF3000-memory.dmp

                                              Filesize

                                              12.4MB

                                            • memory/2220-548-0x00000000008E0000-0x0000000001553000-memory.dmp

                                              Filesize

                                              12.4MB

                                            • memory/2276-615-0x0000000000400000-0x0000000000C7C000-memory.dmp

                                              Filesize

                                              8.5MB

                                            • memory/2276-751-0x0000000000400000-0x0000000000C7C000-memory.dmp

                                              Filesize

                                              8.5MB

                                            • memory/2276-528-0x0000000000400000-0x0000000000C7C000-memory.dmp

                                              Filesize

                                              8.5MB

                                            • memory/2276-448-0x0000000010000000-0x000000001001C000-memory.dmp

                                              Filesize

                                              112KB

                                            • memory/2276-389-0x0000000000400000-0x0000000000C7C000-memory.dmp

                                              Filesize

                                              8.5MB

                                            • memory/2276-390-0x0000000000400000-0x0000000000C7C000-memory.dmp

                                              Filesize

                                              8.5MB

                                            • memory/2276-724-0x0000000000400000-0x0000000000C7C000-memory.dmp

                                              Filesize

                                              8.5MB

                                            • memory/2276-192-0x0000000000400000-0x0000000000C7C000-memory.dmp

                                              Filesize

                                              8.5MB

                                            • memory/2376-736-0x0000000000400000-0x0000000000457000-memory.dmp

                                              Filesize

                                              348KB

                                            • memory/2376-738-0x0000000000400000-0x0000000000457000-memory.dmp

                                              Filesize

                                              348KB

                                            • memory/2376-734-0x0000000000400000-0x0000000000457000-memory.dmp

                                              Filesize

                                              348KB

                                            • memory/2376-740-0x0000000000400000-0x0000000000457000-memory.dmp

                                              Filesize

                                              348KB

                                            • memory/2376-742-0x0000000000400000-0x0000000000457000-memory.dmp

                                              Filesize

                                              348KB

                                            • memory/2376-744-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

                                              Filesize

                                              4KB

                                            • memory/2376-745-0x0000000000400000-0x0000000000457000-memory.dmp

                                              Filesize

                                              348KB

                                            • memory/2376-746-0x0000000000400000-0x0000000000457000-memory.dmp

                                              Filesize

                                              348KB

                                            • memory/2504-606-0x0000000000F00000-0x0000000001218000-memory.dmp

                                              Filesize

                                              3.1MB

                                            • memory/2504-581-0x0000000006480000-0x0000000006777000-memory.dmp

                                              Filesize

                                              3.0MB

                                            • memory/2504-347-0x0000000000F00000-0x0000000001218000-memory.dmp

                                              Filesize

                                              3.1MB

                                            • memory/2504-713-0x0000000000F00000-0x0000000001218000-memory.dmp

                                              Filesize

                                              3.1MB

                                            • memory/2504-771-0x0000000000F00000-0x0000000001218000-memory.dmp

                                              Filesize

                                              3.1MB

                                            • memory/2504-444-0x0000000006480000-0x0000000006777000-memory.dmp

                                              Filesize

                                              3.0MB

                                            • memory/2504-468-0x0000000000F00000-0x0000000001218000-memory.dmp

                                              Filesize

                                              3.1MB

                                            • memory/2504-443-0x0000000006480000-0x0000000006777000-memory.dmp

                                              Filesize

                                              3.0MB

                                            • memory/2504-342-0x0000000000F00000-0x0000000001218000-memory.dmp

                                              Filesize

                                              3.1MB

                                            • memory/2504-77-0x0000000000F00000-0x0000000001218000-memory.dmp

                                              Filesize

                                              3.1MB

                                            • memory/2752-695-0x000000001B740000-0x000000001BA22000-memory.dmp

                                              Filesize

                                              2.9MB

                                            • memory/2752-696-0x0000000001DA0000-0x0000000001DA8000-memory.dmp

                                              Filesize

                                              32KB

                                            • memory/2816-189-0x0000000006A10000-0x000000000728C000-memory.dmp

                                              Filesize

                                              8.5MB

                                            • memory/2816-23-0x0000000000270000-0x000000000072F000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2816-773-0x0000000000270000-0x000000000072F000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2816-504-0x0000000000270000-0x000000000072F000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2816-349-0x0000000006A10000-0x000000000728C000-memory.dmp

                                              Filesize

                                              8.5MB

                                            • memory/2816-607-0x0000000000270000-0x000000000072F000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2816-150-0x0000000000270000-0x000000000072F000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2816-324-0x00000000063F0000-0x0000000006708000-memory.dmp

                                              Filesize

                                              3.1MB

                                            • memory/2816-153-0x0000000006A10000-0x0000000006F14000-memory.dmp

                                              Filesize

                                              5.0MB

                                            • memory/2816-723-0x0000000000270000-0x000000000072F000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2816-344-0x0000000006A10000-0x0000000007683000-memory.dmp

                                              Filesize

                                              12.4MB

                                            • memory/2816-68-0x0000000000270000-0x000000000072F000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2816-61-0x00000000063F0000-0x0000000006708000-memory.dmp

                                              Filesize

                                              3.1MB

                                            • memory/2816-60-0x0000000000270000-0x000000000072F000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2816-58-0x0000000000270000-0x000000000072F000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2816-447-0x0000000006A10000-0x0000000007683000-memory.dmp

                                              Filesize

                                              12.4MB

                                            • memory/2816-21-0x0000000000270000-0x000000000072F000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2816-45-0x0000000000270000-0x000000000072F000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2816-41-0x0000000006A10000-0x0000000006F14000-memory.dmp

                                              Filesize

                                              5.0MB

                                            • memory/2816-43-0x0000000006A10000-0x0000000006F14000-memory.dmp

                                              Filesize

                                              5.0MB

                                            • memory/2816-22-0x0000000000271000-0x000000000029F000-memory.dmp

                                              Filesize

                                              184KB

                                            • memory/2816-385-0x0000000000270000-0x000000000072F000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2816-25-0x0000000000270000-0x000000000072F000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2860-592-0x0000000000F80000-0x0000000001484000-memory.dmp

                                              Filesize

                                              5.0MB

                                            • memory/2860-323-0x0000000000F80000-0x0000000001484000-memory.dmp

                                              Filesize

                                              5.0MB

                                            • memory/2860-437-0x0000000000F80000-0x0000000001484000-memory.dmp

                                              Filesize

                                              5.0MB

                                            • memory/2860-44-0x0000000000F80000-0x0000000001484000-memory.dmp

                                              Filesize

                                              5.0MB

                                            • memory/2860-260-0x0000000000F80000-0x0000000001484000-memory.dmp

                                              Filesize

                                              5.0MB

                                            • memory/2860-602-0x0000000000F80000-0x0000000001484000-memory.dmp

                                              Filesize

                                              5.0MB

                                            • memory/2860-78-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                              Filesize

                                              972KB

                                            • memory/2900-603-0x00000000012D0000-0x00000000015E8000-memory.dmp

                                              Filesize

                                              3.1MB

                                            • memory/3516-1058-0x0000000000CB0000-0x0000000000F5C000-memory.dmp

                                              Filesize

                                              2.7MB

                                            • memory/3516-1059-0x0000000000CB0000-0x0000000000F5C000-memory.dmp

                                              Filesize

                                              2.7MB

                                            • memory/3768-1259-0x000000001B610000-0x000000001B8F2000-memory.dmp

                                              Filesize

                                              2.9MB

                                            • memory/3768-1260-0x0000000002240000-0x0000000002248000-memory.dmp

                                              Filesize

                                              32KB

                                            • memory/3884-1091-0x0000000001D90000-0x0000000001D98000-memory.dmp

                                              Filesize

                                              32KB