Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-11-2024 21:06

General

  • Target

    61ee5d73894b8e36a28e68f353b47de3eced147cf4a8242a06154a9821943554.exe

  • Size

    5.2MB

  • MD5

    12ff469efc267268e7e3ba6073ffe4b4

  • SHA1

    93ca628a235ffac9182020af8e6ed63f4ced3c6d

  • SHA256

    61ee5d73894b8e36a28e68f353b47de3eced147cf4a8242a06154a9821943554

  • SHA512

    2a1fccdce2657a910365e53ec62f4cc413d78dfebfed2f9156d97e0d968b14c2a6343a6eace7d96a409ab4416cf9eca353082d2eeb2c559b5bd39f8ac2180d29

  • SSDEEP

    98304:fkxnbzdTT4UFsKtfQFNks6f/aN2DhZsDPFDEbdv33MX92O0:AbzdTTzf2ksbEV3yM

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

stealc

Botnet

mars

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

lumma

C2

https://processhol.sbs/api

https://p10tgrace.sbs/api

https://peepburry828.sbs/api

https://3xp3cts1aim.sbs/api

https://p3ar11fter.sbs/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • CryptBot

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Cryptbot family
  • Detects CryptBot payload 1 IoCs

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
  • Downloads MZ/PE file
  • Uses browser remote debugging 2 TTPs 4 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 22 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 13 IoCs
  • Identifies Wine through registry keys 2 TTPs 11 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 16 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 10 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of FindShellTrayWindow 59 IoCs
  • Suspicious use of SendNotifyMessage 31 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\61ee5d73894b8e36a28e68f353b47de3eced147cf4a8242a06154a9821943554.exe
    "C:\Users\Admin\AppData\Local\Temp\61ee5d73894b8e36a28e68f353b47de3eced147cf4a8242a06154a9821943554.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4672
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\C0v33.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\C0v33.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3000
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1J19w9.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1J19w9.exe
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks computer location settings
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:1748
        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
          "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Adds Run key to start application
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3648
          • C:\Users\Admin\AppData\Local\Temp\1007242001\31e3bb5db8.exe
            "C:\Users\Admin\AppData\Local\Temp\1007242001\31e3bb5db8.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:2856
          • C:\Users\Admin\AppData\Local\Temp\1007243001\96a5ac1fc6.exe
            "C:\Users\Admin\AppData\Local\Temp\1007243001\96a5ac1fc6.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:1560
          • C:\Users\Admin\AppData\Local\Temp\1007244001\45e7c52353.exe
            "C:\Users\Admin\AppData\Local\Temp\1007244001\45e7c52353.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:2480
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM firefox.exe /T
              6⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1864
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM chrome.exe /T
              6⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:4804
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM msedge.exe /T
              6⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:3888
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM opera.exe /T
              6⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1528
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM brave.exe /T
              6⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:4832
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:4044
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                7⤵
                • Checks processor information in registry
                • Modifies registry class
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:2144
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2060 -parentBuildID 20240401114208 -prefsHandle 1972 -prefMapHandle 1964 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {dc08c8a7-33ca-49df-8abe-1d47afa94417} 2144 "\\.\pipe\gecko-crash-server-pipe.2144" gpu
                  8⤵
                    PID:1948
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2492 -parentBuildID 20240401114208 -prefsHandle 2484 -prefMapHandle 2480 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d66c6bde-6720-4861-b562-a1c63deea4b6} 2144 "\\.\pipe\gecko-crash-server-pipe.2144" socket
                    8⤵
                      PID:4560
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2832 -childID 1 -isForBrowser -prefsHandle 3284 -prefMapHandle 2828 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1180 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {659443b4-81f8-4ff8-928a-dcec265e10fe} 2144 "\\.\pipe\gecko-crash-server-pipe.2144" tab
                      8⤵
                        PID:2772
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4136 -childID 2 -isForBrowser -prefsHandle 4128 -prefMapHandle 4124 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1180 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {02d4fb7d-4519-4c96-a63e-bc0a38893954} 2144 "\\.\pipe\gecko-crash-server-pipe.2144" tab
                        8⤵
                          PID:1436
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3828 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4884 -prefMapHandle 1632 -prefsLen 29197 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cf9cd0e0-87fa-4dea-9dad-9792f1af7719} 2144 "\\.\pipe\gecko-crash-server-pipe.2144" utility
                          8⤵
                          • Checks processor information in registry
                          PID:6868
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5244 -childID 3 -isForBrowser -prefsHandle 5320 -prefMapHandle 5380 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1180 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3a0e6199-4a2b-43a1-905b-325020b8c902} 2144 "\\.\pipe\gecko-crash-server-pipe.2144" tab
                          8⤵
                            PID:5156
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5356 -childID 4 -isForBrowser -prefsHandle 5316 -prefMapHandle 5368 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1180 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5127ce10-fb61-4167-b998-fe775cfd9068} 2144 "\\.\pipe\gecko-crash-server-pipe.2144" tab
                            8⤵
                              PID:5160
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5620 -childID 5 -isForBrowser -prefsHandle 5508 -prefMapHandle 5244 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1180 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {915a3e45-6b24-4d1c-919d-13586600e4d5} 2144 "\\.\pipe\gecko-crash-server-pipe.2144" tab
                              8⤵
                                PID:5216
                        • C:\Users\Admin\AppData\Local\Temp\1007245001\f380f3d9b3.exe
                          "C:\Users\Admin\AppData\Local\Temp\1007245001\f380f3d9b3.exe"
                          5⤵
                          • Modifies Windows Defender Real-time Protection settings
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Windows security modification
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4832
                        • C:\Users\Admin\AppData\Local\Temp\1007246001\e84500824c.exe
                          "C:\Users\Admin\AppData\Local\Temp\1007246001\e84500824c.exe"
                          5⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Checks processor information in registry
                          • Suspicious behavior: EnumeratesProcesses
                          PID:5980
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
                            6⤵
                            • Uses browser remote debugging
                            • Enumerates system info in registry
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of FindShellTrayWindow
                            PID:4216
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7fffe94acc40,0x7fffe94acc4c,0x7fffe94acc58
                              7⤵
                                PID:2332
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1896,i,14567888252449252890,7148358251499919033,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1892 /prefetch:2
                                7⤵
                                  PID:5176
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2000,i,14567888252449252890,7148358251499919033,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2124 /prefetch:3
                                  7⤵
                                    PID:5200
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2260,i,14567888252449252890,7148358251499919033,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2588 /prefetch:8
                                    7⤵
                                      PID:5388
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3192,i,14567888252449252890,7148358251499919033,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3208 /prefetch:1
                                      7⤵
                                      • Uses browser remote debugging
                                      PID:3016
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3436,i,14567888252449252890,7148358251499919033,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3456 /prefetch:1
                                      7⤵
                                      • Uses browser remote debugging
                                      PID:5948
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4224,i,14567888252449252890,7148358251499919033,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4488 /prefetch:1
                                      7⤵
                                      • Uses browser remote debugging
                                      PID:4168
                            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2v3688.exe
                              C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2v3688.exe
                              3⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              PID:4860
                          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3R09i.exe
                            C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3R09i.exe
                            2⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            PID:3316
                        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                          C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                          1⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • Suspicious behavior: EnumeratesProcesses
                          PID:112
                        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                          C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                          1⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • Suspicious behavior: EnumeratesProcesses
                          PID:5840
                        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                          C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                          1⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • Suspicious behavior: EnumeratesProcesses
                          PID:5420
                        • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                          "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                          1⤵
                            PID:3128

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                            Filesize

                            2B

                            MD5

                            d751713988987e9331980363e24189ce

                            SHA1

                            97d170e1550eee4afc0af065b78cda302a97674c

                            SHA256

                            4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                            SHA512

                            b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\activity-stream.discovery_stream.json.tmp

                            Filesize

                            19KB

                            MD5

                            2c3966cfaf97693bf11449336d528559

                            SHA1

                            fae30d968d5b19cc156b5f619834054ca04c3693

                            SHA256

                            788b708244404bdaa3817e17cd607c46d786ea7700ff948656533e9c5e516a30

                            SHA512

                            9cc67822653404333ae40439bd55e28125cc314916e81d4ba030575856afdb845597d3d4deff69d0663f48706d87e411890dcf97b55a8c7bdbbacb366eb8a371

                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878

                            Filesize

                            13KB

                            MD5

                            70dda7733339d88d4002a092a12ecb01

                            SHA1

                            35087ab336aa89be2a6f562131155d1fd28eae15

                            SHA256

                            c37d5aab1a15eb21f4beef9d5dd1b30b866cf9c2c5686c9671eaa24761937953

                            SHA512

                            ad6c98400bb60de25c5a2b4635be027af327b5c099268d9d5db22ca3b2abc0878cf33992bf9d8fd4d3afb88d11e530c55d9cfb0e05d88750683cb8b80ca01f92

                          • C:\Users\Admin\AppData\Local\Temp\1007242001\31e3bb5db8.exe

                            Filesize

                            1.8MB

                            MD5

                            657a0831f669a0085d4e79295b57af68

                            SHA1

                            228ae245de0113a5c98d1d4a434164048206306a

                            SHA256

                            b9560e99138b10aa3243880a71aa5229a1d9f9fa31eb8bfcda99781859a90bb8

                            SHA512

                            07abec32d45f9017698d7a018e9746b292ba6bb8b0b9571ddbb66ee850158ad68f4b0ba9a42be4c2b71c294590eb79d622e751bf9592a27e4e57dfbd747e5b50

                          • C:\Users\Admin\AppData\Local\Temp\1007243001\96a5ac1fc6.exe

                            Filesize

                            1.7MB

                            MD5

                            76827fde25839a637186f7fe5ae9a16f

                            SHA1

                            bab71273f9cd4ac843a7d7a461ffb0ec9e9682c9

                            SHA256

                            4a72a777521ea5b75d7c3e32331ceb2ab870a25b2a64168fb3cfb16eb767c951

                            SHA512

                            6744dceaa0b02d2eb512a71df81b5df59e49b9148d9f934244b975446f7f63f0a99073348766485a8c17042fe58ddb0eabfff5326853900e9f90b43757b50ee3

                          • C:\Users\Admin\AppData\Local\Temp\1007244001\45e7c52353.exe

                            Filesize

                            901KB

                            MD5

                            f2a69e8a8e25a98910c9485b68b9e39d

                            SHA1

                            fc980404bc20c5eb91ea0d9b8281d6d294d55b0a

                            SHA256

                            8cfc88d84ea2463b5942e2e30357260fbdb677d80d4c94f2d52f447ccb573e0a

                            SHA512

                            857a4231f1a5ccfefa69bd52948eb5669f8419676b25c794c24488377cc19406487aba45a4d4b7a1576eca835c760f55f2f9cd146068bd1d710d2d326ad844e3

                          • C:\Users\Admin\AppData\Local\Temp\1007245001\f380f3d9b3.exe

                            Filesize

                            2.6MB

                            MD5

                            aac30885d28c52f21da49e1ca8f0b68a

                            SHA1

                            f116169079ceae5459adacd7b8f5425600df93fd

                            SHA256

                            543281397bb30296334be6d97c0daadc2567827affd71ff1d811124b8b464cf9

                            SHA512

                            2c46de5f993f323aa83066d2eff34591113194cb1847c377a6ede030de74e897eb03dfadbfeef2ee66df990afffea4e83c8d225ba0fdb9275b7d3bb83d2775d3

                          • C:\Users\Admin\AppData\Local\Temp\1007246001\e84500824c.exe

                            Filesize

                            4.2MB

                            MD5

                            f1b25767284aa3dbb2ee4b14cf43af3f

                            SHA1

                            44880c3fc6dcace137118790a40d1a1a449d8fbc

                            SHA256

                            738978c433edb4c822b92cd4c9c07c760174f5ac6826c90dd1a80c26e5f431b6

                            SHA512

                            f4973caa1c10835a483ddf41fb9b6367d2ca74ea90de9156f340ec54f72529726e55bcefc51552542698d320a85cf515c8a6ee7774a186752ab07f1736803a4b

                          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3R09i.exe

                            Filesize

                            1.7MB

                            MD5

                            e3fb8d95bf3280bcaec77ae6d1b6f357

                            SHA1

                            d8cb310e8bf2d8af8b3265d4f17b6163617f389a

                            SHA256

                            8913aa554d50871ce1c5086aec81ad11cc16f90a815b3151b2234782d8c5a63e

                            SHA512

                            82b7f2bcfdb064096d0cf0b8a7a798c3ae89a4558afa8caaafe0d95f80390bc097d97455a53a9be3cae28385a42beb85e79e020d13f85a54b33fe25a3bc2e49d

                          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\C0v33.exe

                            Filesize

                            3.4MB

                            MD5

                            9cf2b7e99352a52a6dadf75fcb40eda8

                            SHA1

                            64a6841e6801c75bf38377bd419436d22fd1b1d6

                            SHA256

                            04135d1c9dc5e589b27dc3b909b32c7e004114b7955a3a2c9f85591de21e5eb6

                            SHA512

                            e6d75d4ddbf39ed90f06b400d257dfc05e866accbafce5361f26bde2fa7edb106aa54707b2b8959f4fcb38160d00ce38808a561820230e9d1b44b8d9d6e04d13

                          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1J19w9.exe

                            Filesize

                            3.1MB

                            MD5

                            39df199149a48e97910026f0e71c3c0c

                            SHA1

                            45ac46911f5d850d67c642e2a0ba6d6675d21af3

                            SHA256

                            5b7e4d0b0ce95d0df04db3372e1ce4e5812766b58ed68aff2052d689c5911087

                            SHA512

                            7ae33353a33e9e71af35958580fcceeeb3cb5ec78768bffe8f0d848f5328ebdfb9114fe632dd54a44420e7770559376d68d4533930573e2adb20768cb92504cc

                          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2v3688.exe

                            Filesize

                            3.0MB

                            MD5

                            339c52d2c7eec1633781ec61ccc7514e

                            SHA1

                            6b09c06d7a22426b2328bffc613048f10ac4e8ab

                            SHA256

                            2b85e0eea5090d9465aada5fc32e429809d84501beac1b4d006ac172dfd46a33

                            SHA512

                            67006226777747bbd7fd7d6849a53464f55c37f19944b9afdd67971b8f061a56744eb1a3fe2884e866b0ba081fcae61c81b872265c2cccd6889bb19c1174fc02

                          • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                            Filesize

                            479KB

                            MD5

                            09372174e83dbbf696ee732fd2e875bb

                            SHA1

                            ba360186ba650a769f9303f48b7200fb5eaccee1

                            SHA256

                            c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                            SHA512

                            b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                          • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                            Filesize

                            13.8MB

                            MD5

                            0a8747a2ac9ac08ae9508f36c6d75692

                            SHA1

                            b287a96fd6cc12433adb42193dfe06111c38eaf0

                            SHA256

                            32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                            SHA512

                            59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin

                            Filesize

                            10KB

                            MD5

                            8f7bbbd875e4c20eb0ea86d7d7c68e3a

                            SHA1

                            08094867713e7f61a5a2cca40d3d2c870b2f5bff

                            SHA256

                            7ff0b0c61dcc04a81ac2b7f4b16400e47ad0e51ee9ebb038042d608a1614d8d1

                            SHA512

                            0d74a752acfc93644d9d78903bfbf5f994252cb73d921cbbcf23888299f676f4afa3aa301655f0219aeaa521e3dad47924a41ebe11e63a5a2578752105012c8e

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.bin

                            Filesize

                            23KB

                            MD5

                            f4bed8fbb8eda42426e6890ebc2bc051

                            SHA1

                            a6e27479c5ca2994ab8e104a61074cf7de095fa8

                            SHA256

                            899043ba60e05edfa6b3a9a80e8e9947d48bff9270c52708596631750d4daf16

                            SHA512

                            89095a472d8e9d0c98bcdeeda21588384ef079eea40bf8c5c02b6b8394df33c4b602fbd23116ec9d13b6383ec45fd8502a1b02dbd5328f0ea0aeb4bada67e507

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.bin

                            Filesize

                            5KB

                            MD5

                            3ab38b7e554a07914b57dbeefa258bab

                            SHA1

                            9ab94f89101d0dc0d0a1e2e2bf594abd20d39d16

                            SHA256

                            1ecee53fa19807167b2a4377c199f4b840d979cd394d3951beae013fd3e4649e

                            SHA512

                            3c10fbd57eaeacb1a1fa4ce6d1745477833b7f58147a5be0937b3217a8974d39233a80d2ef863a6fb2ec0985156f3960dab73290b0ed934648f975ffb7bd2909

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp

                            Filesize

                            5KB

                            MD5

                            41672780c91a8b0ecea1fc4b34327e05

                            SHA1

                            b952fdcac9775bef237fb04dacc8f5691471ba80

                            SHA256

                            592f7c945e0c1465ed650b688c12d3338d5b7480d2a0be3d954f2abffbe4af3c

                            SHA512

                            affdac0976829307730afcc19962b3043cafb031f16b383a2052d24165187b56397d0c986d17ee68b1785ea72da1ca58175f12338ca20223eb306af86bee6ff5

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp

                            Filesize

                            15KB

                            MD5

                            45cdf754fb36ba9f9ce1e74344c5fa66

                            SHA1

                            81d4874eca36c072aa2cd05a91fa9b2c2b797eb9

                            SHA256

                            244acd8353e8499631e78178752c7529e1dc7f068347b95c01b3d6295295331c

                            SHA512

                            0d4ce325c7806b2e8cac7fbd721a58f3586383ee7730963058e1512c39021ffde6014a727de16d4fd1fe1fa0c45d678b2971ed5090eb133c379fa3102247b7a6

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp

                            Filesize

                            6KB

                            MD5

                            ff2e7cf81472d5f083f8af0f2a6f255a

                            SHA1

                            4db33810dac7d5f33544419f0d09f15e4f39f192

                            SHA256

                            256697d389bb9ffa73e08914807a2205235eaa246dd912dcfdfef94d711dc850

                            SHA512

                            eba2c7f65cb9ad54e4bab37b03cde91880e1fb321deb41fd3fa3feb3e0c3605f892164d2c779f5caf3da7b1e282cc1b86abeabf68fe684c0aac8500d49a80434

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp

                            Filesize

                            6KB

                            MD5

                            ff80359a410921c66309895f6615395b

                            SHA1

                            9998353ce96a7a8d6dbdcc2e76f69aa3d047e79c

                            SHA256

                            caabc220d04accbc8b2ae8ea552377e740c426fdcb8579c1560cc27222fdb2c7

                            SHA512

                            b5fbb11539a13f88eb6975ce349eca9f8acaf99cf50d043e59c95099840348a7dffe0d95a0f6677a248e478a169e3586043a56df98a841c498d34e6f06b1cdc0

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp

                            Filesize

                            15KB

                            MD5

                            9c50148406557fcdc256251b777e7ed0

                            SHA1

                            02ca58ebfb2f8d7353837480fb547c8241a779c2

                            SHA256

                            b34918a331eb79ce42b0c777bf1af56c132fb1c29d4e5cbc74ebeed8a563ea74

                            SHA512

                            647c3051bc7b6ad1c774c7782dce366107ebdf25228e11e966bc514668a6904ce78bb8e56efce92a32d263c8fd2a7da52488ece61724115c8bb04459f7536a01

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp

                            Filesize

                            15KB

                            MD5

                            ae359eebcaf0ce82b246c41593f1442d

                            SHA1

                            5bf8973791b165a7b29db45f2291a93da1ea7938

                            SHA256

                            bc0b6c9157a1eb6852a3cb381a96736db627f2ea5435c5307107e720dc93c3aa

                            SHA512

                            4c8e0ad2caa8985b7c003177c36f82133185a7f15409a7e2b42caa1182247b0266457b925280703e0dbe0206fe18bd7566f01aabd0ac86aab8c7eec2c19a0aa1

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\bbba19b1-3299-4fc2-be7d-3eff2a2b47b1

                            Filesize

                            671B

                            MD5

                            a500471611a8fd4467d35eb88c3c4f78

                            SHA1

                            3f9aa28b61d45f3a7b1163a2ac5c7dde03464b46

                            SHA256

                            f15d6fb0e78e40b6f5f980d944cbc9ceec0439e9c5c312a037919b9261098246

                            SHA512

                            f39c34b1f8eb257519370642caa60de353705a559026541ff5616888292a05782e33c400670b735aa65aea3aa071f06d2ed166bb7eaf40218ce0f4d5c9b6a358

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\c942af3d-b6a8-4d03-a779-c1271dc2e1ff

                            Filesize

                            982B

                            MD5

                            fd10ce888f659df3fc4f0909206c0595

                            SHA1

                            dd9b9fc9b9f77b7c2315ce7f49000432815c9898

                            SHA256

                            bbf212f6e5270621239d11942387fa955c447910e3dccf9beb9166c131cef120

                            SHA512

                            7e07802896fb7a084ff8b1079613b0b700bd1444a8c8bb1a9422e99a4946ffd9f51c2260c31c050a4893733d10ac9feaaba6a8935cc561e282287b37ac97e1b0

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\dcd21d99-ac1a-4c9b-98cb-6d5ab63bdda9

                            Filesize

                            26KB

                            MD5

                            79e564b405e81a45c25739747b87db23

                            SHA1

                            945a2fcb308845458cd5ff238916d13ee69524c3

                            SHA256

                            3f755b66364c9ee55e3d8dc7df47743c61c2b718a45179d11c667af91eb25a15

                            SHA512

                            677c56293422a47f65ab510192186476a1801bf7a60921740f2bcce5aee4ae2520478622e8845b20d455a4521f6d3bfcece8299cc7466088108d5484d3d85939

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                            Filesize

                            1.1MB

                            MD5

                            842039753bf41fa5e11b3a1383061a87

                            SHA1

                            3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                            SHA256

                            d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                            SHA512

                            d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                            Filesize

                            116B

                            MD5

                            2a461e9eb87fd1955cea740a3444ee7a

                            SHA1

                            b10755914c713f5a4677494dbe8a686ed458c3c5

                            SHA256

                            4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                            SHA512

                            34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                            Filesize

                            372B

                            MD5

                            bf957ad58b55f64219ab3f793e374316

                            SHA1

                            a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                            SHA256

                            bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                            SHA512

                            79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                            Filesize

                            17.8MB

                            MD5

                            daf7ef3acccab478aaa7d6dc1c60f865

                            SHA1

                            f8246162b97ce4a945feced27b6ea114366ff2ad

                            SHA256

                            bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                            SHA512

                            5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\prefs-1.js

                            Filesize

                            11KB

                            MD5

                            c8816fa663bfbdb8e38418b155a6d1ca

                            SHA1

                            28ce3e34134049479585b6730bc14465c51d8ba4

                            SHA256

                            5511af1c5fea4a978896423ac35f8af5d9a16f94213ece28f46b8945c5867371

                            SHA512

                            7f7c2198304246b46e48915f5f62e0e50924b052b8ba267613cb0bb68947808e9643551d7d85bc2409669d67c5257a2970b2867273cd70b5ff21bc6d87dd6311

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\prefs-1.js

                            Filesize

                            16KB

                            MD5

                            26e6c850a70e697d6615a055c4bf65a4

                            SHA1

                            c8c6ea92f7f2e29d28694e5048247c497a656465

                            SHA256

                            c640bc976a35bc9a89825329df4ed9b61ed3745f768c0fb3171dc802ba44d7ce

                            SHA512

                            c585d088daebb4577897da1855f4b56aadbc6c77bf8e0466d13493006823d0df9a8039ecfda93beec69ef1358f348a08994dbd58c43ad4b798002eec6d6bd4e5

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\prefs.js

                            Filesize

                            11KB

                            MD5

                            925dbf0f8a2b07f8cfaa4bffadc26a6d

                            SHA1

                            1b295b6f7784b0c581a7be76694cacab7004504b

                            SHA256

                            175dda38f41fdaceb6ac9a0a33dd971723b5d6a3cef152607d0836c7ba28010d

                            SHA512

                            59306925577de3fb1c9ca33e427d72e552306fd62f33cac2c10cedbbc47e0d2b5a7b07e3c93290ca713dc7ed840e04ffd87d4dc45d70027b2fbf63e99654ecdd

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\prefs.js

                            Filesize

                            11KB

                            MD5

                            7aef56729b3cb1b51a3d9d42e0dd069a

                            SHA1

                            c5924bf851a0cb121229f67a178ac7883c5642e4

                            SHA256

                            ae217e52d53104fa7725e3c884144d44bee34f2ddc886c7bb0de4e75377562b2

                            SHA512

                            0f61ca229c9ccb0c6a77728e34fbd4640a732d5d34bd8416c76289dee5594081ed0bc2231c34e598df1865c8c9094fb448bb969b939232e9de140b1540b2d687

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\prefs.js

                            Filesize

                            12KB

                            MD5

                            cc51310972fa35ef73d3683a832601bc

                            SHA1

                            fdeb042631a0fd3f9c08490e1b973e652344c251

                            SHA256

                            ba356682bafb4346f99375adab1c825c3a48b8142295a0ef630dac63a90ae137

                            SHA512

                            b4e240284936ba978c6ee8a1ebf3d12db10d9975c9dc13ee5acfd4c09f9944bce3415ec71c238e9475736aa8c36e1500572a571c5f3b44bdf5d7ee827854aebb

                          • \??\pipe\crashpad_4216_WQGZSQEPWXAGVLPN

                            MD5

                            d41d8cd98f00b204e9800998ecf8427e

                            SHA1

                            da39a3ee5e6b4b0d3255bfef95601890afd80709

                            SHA256

                            e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                            SHA512

                            cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                          • memory/112-34-0x0000000000DC0000-0x00000000010E1000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/112-40-0x0000000000DC0000-0x00000000010E1000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/1560-82-0x0000000000360000-0x00000000009EA000-memory.dmp

                            Filesize

                            6.5MB

                          • memory/1560-83-0x0000000000360000-0x00000000009EA000-memory.dmp

                            Filesize

                            6.5MB

                          • memory/1748-14-0x0000000000170000-0x0000000000491000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/1748-16-0x0000000000171000-0x00000000001D9000-memory.dmp

                            Filesize

                            416KB

                          • memory/1748-15-0x0000000077A04000-0x0000000077A06000-memory.dmp

                            Filesize

                            8KB

                          • memory/1748-17-0x0000000000170000-0x0000000000491000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/1748-18-0x0000000000170000-0x0000000000491000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/1748-29-0x0000000000170000-0x0000000000491000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/1748-31-0x0000000000171000-0x00000000001D9000-memory.dmp

                            Filesize

                            416KB

                          • memory/2856-66-0x00000000005B0000-0x0000000000A4B000-memory.dmp

                            Filesize

                            4.6MB

                          • memory/2856-62-0x00000000005B0000-0x0000000000A4B000-memory.dmp

                            Filesize

                            4.6MB

                          • memory/3316-45-0x0000000000AC0000-0x0000000001164000-memory.dmp

                            Filesize

                            6.6MB

                          • memory/3316-46-0x0000000000AC0000-0x0000000001164000-memory.dmp

                            Filesize

                            6.6MB

                          • memory/3648-903-0x0000000000DC0000-0x00000000010E1000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/3648-64-0x0000000000DC0000-0x00000000010E1000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/3648-921-0x0000000000DC0000-0x00000000010E1000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/3648-3753-0x0000000000DC0000-0x00000000010E1000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/3648-3743-0x0000000000DC0000-0x00000000010E1000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/3648-3748-0x0000000000DC0000-0x00000000010E1000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/3648-3750-0x0000000000DC0000-0x00000000010E1000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/3648-102-0x0000000000DC0000-0x00000000010E1000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/3648-30-0x0000000000DC0000-0x00000000010E1000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/3648-3806-0x0000000000DC0000-0x00000000010E1000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/3648-63-0x0000000000DC0000-0x00000000010E1000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/3648-3736-0x0000000000DC0000-0x00000000010E1000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/3648-3538-0x0000000000DC0000-0x00000000010E1000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/3648-3746-0x0000000000DC0000-0x00000000010E1000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/3648-1596-0x0000000000DC0000-0x00000000010E1000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/3648-3766-0x0000000000DC0000-0x00000000010E1000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/4832-812-0x0000000000350000-0x00000000005FC000-memory.dmp

                            Filesize

                            2.7MB

                          • memory/4832-861-0x0000000000350000-0x00000000005FC000-memory.dmp

                            Filesize

                            2.7MB

                          • memory/4832-860-0x0000000000350000-0x00000000005FC000-memory.dmp

                            Filesize

                            2.7MB

                          • memory/4832-910-0x0000000000350000-0x00000000005FC000-memory.dmp

                            Filesize

                            2.7MB

                          • memory/4832-914-0x0000000000350000-0x00000000005FC000-memory.dmp

                            Filesize

                            2.7MB

                          • memory/4860-38-0x0000000001000000-0x0000000001303000-memory.dmp

                            Filesize

                            3.0MB

                          • memory/4860-41-0x0000000001000000-0x0000000001303000-memory.dmp

                            Filesize

                            3.0MB

                          • memory/5420-3755-0x0000000000DC0000-0x00000000010E1000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/5420-3754-0x0000000000DC0000-0x00000000010E1000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/5840-3555-0x0000000000DC0000-0x00000000010E1000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/5840-3539-0x0000000000DC0000-0x00000000010E1000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/5980-916-0x0000000000780000-0x000000000130A000-memory.dmp

                            Filesize

                            11.5MB

                          • memory/5980-3749-0x0000000000780000-0x000000000130A000-memory.dmp

                            Filesize

                            11.5MB

                          • memory/5980-3747-0x0000000000780000-0x000000000130A000-memory.dmp

                            Filesize

                            11.5MB

                          • memory/5980-3751-0x0000000000780000-0x000000000130A000-memory.dmp

                            Filesize

                            11.5MB

                          • memory/5980-3745-0x0000000000780000-0x000000000130A000-memory.dmp

                            Filesize

                            11.5MB

                          • memory/5980-3742-0x0000000000780000-0x000000000130A000-memory.dmp

                            Filesize

                            11.5MB

                          • memory/5980-3735-0x0000000000780000-0x000000000130A000-memory.dmp

                            Filesize

                            11.5MB

                          • memory/5980-3756-0x0000000069CC0000-0x000000006A71B000-memory.dmp

                            Filesize

                            10.4MB

                          • memory/5980-3765-0x0000000000780000-0x000000000130A000-memory.dmp

                            Filesize

                            11.5MB

                          • memory/5980-3444-0x0000000000780000-0x000000000130A000-memory.dmp

                            Filesize

                            11.5MB

                          • memory/5980-1470-0x0000000000780000-0x000000000130A000-memory.dmp

                            Filesize

                            11.5MB

                          • memory/5980-915-0x0000000000780000-0x000000000130A000-memory.dmp

                            Filesize

                            11.5MB

                          • memory/5980-3805-0x0000000000780000-0x000000000130A000-memory.dmp

                            Filesize

                            11.5MB

                          • memory/5980-902-0x0000000000780000-0x000000000130A000-memory.dmp

                            Filesize

                            11.5MB