Analysis

  • max time kernel
    111s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05/03/2025, 17:59

General

  • Target

    daa1a8bd2f692cf85ebdbe3c66dbbf3801e9dac297aabf1a30d8ea616524a6ca.exe

  • Size

    1.8MB

  • MD5

    44432f95b130ce27ffe942af9562c738

  • SHA1

    8d44dd529c59881f2e728593b373f2eff42be305

  • SHA256

    daa1a8bd2f692cf85ebdbe3c66dbbf3801e9dac297aabf1a30d8ea616524a6ca

  • SHA512

    48c8b0f3d62a8d81129129e80bd432d949a644023a88568fb1aa5fce8c6731f70c5282bc981ad68cfd3eb1fc5ef3ac380dd29b2daf8577c265a24c6140481ff0

  • SSDEEP

    24576:mbsa4Csaaeb3mSAIfnn8SUFrUL299r2qoCwYl2Rg6atG4pk8H1w4I7HhrYFAOOtw:WQmhnc9rr2RxalblILoAVbuAjJ4

Malware Config

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

litehttp

Version

v1.0.9

C2

http://185.208.156.162/page.php

Attributes
  • key

    v1d6kd29g85cm8jp4pv8tvflvg303gbl

Extracted

Family

stealc

Botnet

trump

C2

http://45.93.20.28

Attributes
  • url_path

    /85a1cacf11314eb8.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detects Healer an antivirus disabler dropper 2 IoCs
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • LiteHTTP

    LiteHTTP is an open-source bot written in C#.

  • Litehttp family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file 16 IoCs
  • Uses browser remote debugging 2 TTPs 8 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • .NET Reactor proctector 2 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Checks BIOS information in registry 2 TTPs 18 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 13 IoCs
  • Identifies Wine through registry keys 2 TTPs 9 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 35 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 21 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 41 IoCs
  • Suspicious use of AdjustPrivilegeToken 34 IoCs
  • Suspicious use of FindShellTrayWindow 17 IoCs
  • Suspicious use of SendNotifyMessage 13 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\daa1a8bd2f692cf85ebdbe3c66dbbf3801e9dac297aabf1a30d8ea616524a6ca.exe
    "C:\Users\Admin\AppData\Local\Temp\daa1a8bd2f692cf85ebdbe3c66dbbf3801e9dac297aabf1a30d8ea616524a6ca.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2392
    • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
      "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Downloads MZ/PE file
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2900
      • C:\Users\Admin\AppData\Local\Temp\10104900101\ce4pMzk.exe
        "C:\Users\Admin\AppData\Local\Temp\10104900101\ce4pMzk.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2444
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Local\Caches\EjECdRtO\Anubis.exe""
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2804
      • C:\Users\Admin\AppData\Local\Temp\10105330101\b0b41028d6.exe
        "C:\Users\Admin\AppData\Local\Temp\10105330101\b0b41028d6.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2436
        • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
          "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
          4⤵
          • Downloads MZ/PE file
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          PID:708
      • C:\Users\Admin\AppData\Local\Temp\10105340101\08526ebd88.exe
        "C:\Users\Admin\AppData\Local\Temp\10105340101\08526ebd88.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2584
        • C:\Users\Admin\AppData\Local\Temp\10105340101\08526ebd88.exe
          "C:\Users\Admin\AppData\Local\Temp\10105340101\08526ebd88.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2800
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2800 -s 1016
            5⤵
            • Loads dropped DLL
            • Program crash
            PID:2480
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2584 -s 508
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:1260
      • C:\Users\Admin\AppData\Local\Temp\10105350101\dd833608e8.exe
        "C:\Users\Admin\AppData\Local\Temp\10105350101\dd833608e8.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • System Location Discovery: System Language Discovery
        PID:1484
        • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
          "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
          4⤵
          • Downloads MZ/PE file
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          PID:2000
      • C:\Users\Admin\AppData\Local\Temp\10105360101\bf58d0ec22.exe
        "C:\Users\Admin\AppData\Local\Temp\10105360101\bf58d0ec22.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2896
      • C:\Users\Admin\AppData\Local\Temp\10105370101\19ab1ca738.exe
        "C:\Users\Admin\AppData\Local\Temp\10105370101\19ab1ca738.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        PID:2148
      • C:\Users\Admin\AppData\Local\Temp\10105380101\a0040c27d3.exe
        "C:\Users\Admin\AppData\Local\Temp\10105380101\a0040c27d3.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1160
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1160 -s 1212
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:1516
      • C:\Users\Admin\AppData\Local\Temp\10105390101\5cdadb3832.exe
        "C:\Users\Admin\AppData\Local\Temp\10105390101\5cdadb3832.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Downloads MZ/PE file
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        PID:548
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
          4⤵
          • Uses browser remote debugging
          • Enumerates system info in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          PID:2252
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fee6079758,0x7fee6079768,0x7fee6079778
            5⤵
              PID:1580
            • C:\Windows\system32\ctfmon.exe
              ctfmon.exe
              5⤵
                PID:3048
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1060 --field-trial-handle=1292,i,10410665250294168104,1079597858898160616,131072 /prefetch:2
                5⤵
                  PID:3196
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1480 --field-trial-handle=1292,i,10410665250294168104,1079597858898160616,131072 /prefetch:8
                  5⤵
                    PID:3320
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1552 --field-trial-handle=1292,i,10410665250294168104,1079597858898160616,131072 /prefetch:8
                    5⤵
                      PID:3352
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2184 --field-trial-handle=1292,i,10410665250294168104,1079597858898160616,131072 /prefetch:1
                      5⤵
                      • Uses browser remote debugging
                      PID:3704
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2652 --field-trial-handle=1292,i,10410665250294168104,1079597858898160616,131072 /prefetch:1
                      5⤵
                      • Uses browser remote debugging
                      PID:3960
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=2660 --field-trial-handle=1292,i,10410665250294168104,1079597858898160616,131072 /prefetch:1
                      5⤵
                      • Uses browser remote debugging
                      PID:3972
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1684 --field-trial-handle=1292,i,10410665250294168104,1079597858898160616,131072 /prefetch:2
                      5⤵
                        PID:3076
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
                      4⤵
                      • Uses browser remote debugging
                      • Enumerates system info in registry
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of FindShellTrayWindow
                      PID:3372
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fee5f29758,0x7fee5f29768,0x7fee5f29778
                        5⤵
                          PID:2292
                        • C:\Windows\system32\ctfmon.exe
                          ctfmon.exe
                          5⤵
                            PID:3576
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1188 --field-trial-handle=1376,i,17914397631641699359,17660924397463393323,131072 /prefetch:2
                            5⤵
                              PID:3776
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1508 --field-trial-handle=1376,i,17914397631641699359,17660924397463393323,131072 /prefetch:8
                              5⤵
                                PID:4012
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1612 --field-trial-handle=1376,i,17914397631641699359,17660924397463393323,131072 /prefetch:8
                                5⤵
                                  PID:3928
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2328 --field-trial-handle=1376,i,17914397631641699359,17660924397463393323,131072 /prefetch:1
                                  5⤵
                                  • Uses browser remote debugging
                                  PID:3824
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2648 --field-trial-handle=1376,i,17914397631641699359,17660924397463393323,131072 /prefetch:1
                                  5⤵
                                  • Uses browser remote debugging
                                  PID:3376
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=2656 --field-trial-handle=1376,i,17914397631641699359,17660924397463393323,131072 /prefetch:1
                                  5⤵
                                  • Uses browser remote debugging
                                  PID:3064
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1460 --field-trial-handle=1376,i,17914397631641699359,17660924397463393323,131072 /prefetch:2
                                  5⤵
                                    PID:1980
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4084 --field-trial-handle=1376,i,17914397631641699359,17660924397463393323,131072 /prefetch:8
                                    5⤵
                                      PID:3464
                                • C:\Users\Admin\AppData\Local\Temp\10105400101\ed229c8001.exe
                                  "C:\Users\Admin\AppData\Local\Temp\10105400101\ed229c8001.exe"
                                  3⤵
                                  • Executes dropped EXE
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of FindShellTrayWindow
                                  • Suspicious use of SendNotifyMessage
                                  PID:3036
                                  • C:\Windows\SysWOW64\taskkill.exe
                                    taskkill /F /IM firefox.exe /T
                                    4⤵
                                    • System Location Discovery: System Language Discovery
                                    • Kills process with taskkill
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:2904
                                  • C:\Windows\SysWOW64\taskkill.exe
                                    taskkill /F /IM chrome.exe /T
                                    4⤵
                                    • System Location Discovery: System Language Discovery
                                    • Kills process with taskkill
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:1756
                                  • C:\Windows\SysWOW64\taskkill.exe
                                    taskkill /F /IM msedge.exe /T
                                    4⤵
                                    • System Location Discovery: System Language Discovery
                                    • Kills process with taskkill
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:2164
                                  • C:\Windows\SysWOW64\taskkill.exe
                                    taskkill /F /IM opera.exe /T
                                    4⤵
                                    • System Location Discovery: System Language Discovery
                                    • Kills process with taskkill
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:1720
                                  • C:\Windows\SysWOW64\taskkill.exe
                                    taskkill /F /IM brave.exe /T
                                    4⤵
                                    • System Location Discovery: System Language Discovery
                                    • Kills process with taskkill
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:3056
                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                    "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                    4⤵
                                      PID:596
                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                        "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                        5⤵
                                        • Checks processor information in registry
                                        • Modifies registry class
                                        • Suspicious use of AdjustPrivilegeToken
                                        • Suspicious use of FindShellTrayWindow
                                        • Suspicious use of SendNotifyMessage
                                        PID:1448
                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1448.0.1303276137\806281382" -parentBuildID 20221007134813 -prefsHandle 1172 -prefMapHandle 1096 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5a392169-3519-45be-9fe0-3ed03c181385} 1448 "\\.\pipe\gecko-crash-server-pipe.1448" 1248 102d7a58 gpu
                                          6⤵
                                            PID:1688
                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1448.1.253739097\1915605837" -parentBuildID 20221007134813 -prefsHandle 1556 -prefMapHandle 1480 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {f1b300f4-d074-4f7f-aba5-33ef962919d9} 1448 "\\.\pipe\gecko-crash-server-pipe.1448" 1568 46eee58 socket
                                            6⤵
                                              PID:1904
                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1448.2.531787697\346998826" -childID 1 -isForBrowser -prefsHandle 1976 -prefMapHandle 1972 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 668 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {936d0b09-5b4d-4825-b7e0-9ea8742fa581} 1448 "\\.\pipe\gecko-crash-server-pipe.1448" 1988 18e66a58 tab
                                              6⤵
                                                PID:2032
                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1448.3.365059153\183582140" -childID 2 -isForBrowser -prefsHandle 2660 -prefMapHandle 2656 -prefsLen 26151 -prefMapSize 233444 -jsInitHandle 668 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {72f6382e-0481-4c70-aaef-4050192105a1} 1448 "\\.\pipe\gecko-crash-server-pipe.1448" 2672 1d10a858 tab
                                                6⤵
                                                  PID:980
                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1448.4.2138871894\587562579" -childID 3 -isForBrowser -prefsHandle 3776 -prefMapHandle 3772 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 668 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {098590de-a78e-4b42-aed4-61df7c02b3ea} 1448 "\\.\pipe\gecko-crash-server-pipe.1448" 3788 1e887358 tab
                                                  6⤵
                                                    PID:1492
                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1448.5.1965412828\273798409" -childID 4 -isForBrowser -prefsHandle 3896 -prefMapHandle 3900 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 668 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {1d5e5c4a-a6f2-463b-b485-3d4e6272d5cd} 1448 "\\.\pipe\gecko-crash-server-pipe.1448" 3884 1e888858 tab
                                                    6⤵
                                                      PID:3056
                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1448.6.1580479458\1398168119" -childID 5 -isForBrowser -prefsHandle 4060 -prefMapHandle 4064 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 668 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {1c973902-5414-4b2c-a212-989559b50690} 1448 "\\.\pipe\gecko-crash-server-pipe.1448" 4048 1f4bdb58 tab
                                                      6⤵
                                                        PID:2172
                                                • C:\Users\Admin\AppData\Local\Temp\10105410101\7de3878b2c.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\10105410101\7de3878b2c.exe"
                                                  3⤵
                                                  • Modifies Windows Defender DisableAntiSpyware settings
                                                  • Modifies Windows Defender Real-time Protection settings
                                                  • Modifies Windows Defender TamperProtection settings
                                                  • Modifies Windows Defender notification settings
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Windows security modification
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  • System Location Discovery: System Language Discovery
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:3700
                                                • C:\Users\Admin\AppData\Local\Temp\10105420101\ce4pMzk.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\10105420101\ce4pMzk.exe"
                                                  3⤵
                                                  • Executes dropped EXE
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:3460
                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    "powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Local\Caches\EjECdRtO\Anubis.exe""
                                                    4⤵
                                                    • Command and Scripting Interpreter: PowerShell
                                                    PID:4020
                                                • C:\Users\Admin\AppData\Local\Temp\10105430101\mAtJWNv.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\10105430101\mAtJWNv.exe"
                                                  3⤵
                                                    PID:1876
                                                    • C:\Users\Admin\AppData\Local\Temp\10105430101\mAtJWNv.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\10105430101\mAtJWNv.exe"
                                                      4⤵
                                                        PID:3944
                                                      • C:\Users\Admin\AppData\Local\Temp\10105430101\mAtJWNv.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\10105430101\mAtJWNv.exe"
                                                        4⤵
                                                          PID:3476
                                                        • C:\Users\Admin\AppData\Local\Temp\10105430101\mAtJWNv.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\10105430101\mAtJWNv.exe"
                                                          4⤵
                                                            PID:3076
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 1876 -s 516
                                                            4⤵
                                                            • Program crash
                                                            PID:3412
                                                        • C:\Users\Admin\AppData\Local\Temp\10105440101\SvhQA35.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\10105440101\SvhQA35.exe"
                                                          3⤵
                                                            PID:3940
                                                            • C:\Users\Admin\AppData\Local\Temp\onefile_3940_133856713317223000\chromium.exe
                                                              C:\Users\Admin\AppData\Local\Temp\10105440101\SvhQA35.exe
                                                              4⤵
                                                                PID:2672
                                                        • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                                          "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                                          1⤵
                                                            PID:3984
                                                          • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                                            "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                                            1⤵
                                                              PID:1212

                                                            Network

                                                            MITRE ATT&CK Enterprise v15

                                                            Replay Monitor

                                                            Loading Replay Monitor...

                                                            Downloads

                                                            • C:\ProgramData\CAAKFIID

                                                              Filesize

                                                              92KB

                                                              MD5

                                                              5a11d4c52a76804780cbb414b2595bdb

                                                              SHA1

                                                              14c89a2283c41b10ce8f1576404e1541c04a8125

                                                              SHA256

                                                              e1b3260b2607c6a5fcf91575d1de278deceaf4e5f9f0530a3782c6d9567749d8

                                                              SHA512

                                                              0bffe811cbba5278d39e20b66a5c4770e3855d1f5cbd45161e8ad304b78da73f555a3c42a198378efab3dfc81f384fdaefc6cbb893a708c7e2649a89fdd11762

                                                            • C:\ProgramData\FHIDAFHCBAKFCAAKFCFC

                                                              Filesize

                                                              46KB

                                                              MD5

                                                              02d2c46697e3714e49f46b680b9a6b83

                                                              SHA1

                                                              84f98b56d49f01e9b6b76a4e21accf64fd319140

                                                              SHA256

                                                              522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

                                                              SHA512

                                                              60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

                                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

                                                              Filesize

                                                              71KB

                                                              MD5

                                                              83142242e97b8953c386f988aa694e4a

                                                              SHA1

                                                              833ed12fc15b356136dcdd27c61a50f59c5c7d50

                                                              SHA256

                                                              d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755

                                                              SHA512

                                                              bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat

                                                              Filesize

                                                              40B

                                                              MD5

                                                              c71a70ef46590ef0016a755286ca78ea

                                                              SHA1

                                                              f333ef55abb71212507b4796cb0e39940dd9280f

                                                              SHA256

                                                              36315c353e2802a76481df39dfd6b80bdc993f3db521aef716a1f927990decf3

                                                              SHA512

                                                              333e0c4300fd0baf59072bbf7c363c62e11d7b2351ec9e84125dec4c1047dd29bedaf99fd1c3bcc3fa43353a51f2b006030829b8c5615a7b29ffb9ed3a903295

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extension State\000009.dbtmp

                                                              Filesize

                                                              16B

                                                              MD5

                                                              979c29c2917bed63ccf520ece1d18cda

                                                              SHA1

                                                              65cd81cdce0be04c74222b54d0881d3fdfe4736c

                                                              SHA256

                                                              b3524365a633ee6d1fa9953638d2867946c515218c497a5ec2dbef7dc44a7c53

                                                              SHA512

                                                              e38f694fd6ab9f678ae156528230d7a8bfb7b59a13b227f59f9c38ab5617db11ebb6be1276323a905d09c4066a3fe820cf58077ab48bf201f3c467a98516ee7a

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000007.dbtmp

                                                              Filesize

                                                              16B

                                                              MD5

                                                              18e723571b00fb1694a3bad6c78e4054

                                                              SHA1

                                                              afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                                                              SHA256

                                                              8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                                                              SHA512

                                                              43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata\000010.dbtmp

                                                              Filesize

                                                              16B

                                                              MD5

                                                              60e3f691077715586b918375dd23c6b0

                                                              SHA1

                                                              476d3eab15649c40c6aebfb6ac2366db50283d1b

                                                              SHA256

                                                              e91d13722e31f9b06c5df3582cad1ea5b73547ce3dc08b12ed461f095aad48ee

                                                              SHA512

                                                              d1c146d27bbf19362d6571e2865bb472ce4fe43dc535305615d92d6a2366f98533747a8a70a578d1f00199f716a61ce39fac5cab9dd67e9c044bc49e7343130e

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Sync Data\LevelDB\000002.dbtmp

                                                              Filesize

                                                              16B

                                                              MD5

                                                              206702161f94c5cd39fadd03f4014d98

                                                              SHA1

                                                              bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                                              SHA256

                                                              1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                                              SHA512

                                                              0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Sync Data\LevelDB\MANIFEST-000001

                                                              Filesize

                                                              41B

                                                              MD5

                                                              5af87dfd673ba2115e2fcf5cfdb727ab

                                                              SHA1

                                                              d5b5bbf396dc291274584ef71f444f420b6056f1

                                                              SHA256

                                                              f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                                              SHA512

                                                              de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ShaderCache\data_1

                                                              Filesize

                                                              264KB

                                                              MD5

                                                              f50f89a0a91564d0b8a211f8921aa7de

                                                              SHA1

                                                              112403a17dd69d5b9018b8cede023cb3b54eab7d

                                                              SHA256

                                                              b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                                              SHA512

                                                              bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Site Characteristics Database\000004.dbtmp

                                                              Filesize

                                                              16B

                                                              MD5

                                                              6752a1d65b201c13b62ea44016eb221f

                                                              SHA1

                                                              58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                              SHA256

                                                              0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                              SHA512

                                                              9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Sync Data\LevelDB\CURRENT~RFf784a68.TMP

                                                              Filesize

                                                              16B

                                                              MD5

                                                              46295cac801e5d4857d09837238a6394

                                                              SHA1

                                                              44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                              SHA256

                                                              0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                              SHA512

                                                              8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Variations

                                                              Filesize

                                                              86B

                                                              MD5

                                                              961e3604f228b0d10541ebf921500c86

                                                              SHA1

                                                              6e00570d9f78d9cfebe67d4da5efe546543949a7

                                                              SHA256

                                                              f7b24f2eb3d5eb0550527490395d2f61c3d2fe74bb9cb345197dad81b58b5fed

                                                              SHA512

                                                              535f930afd2ef50282715c7e48859cc2d7b354ff4e6c156b94d5a2815f589b33189ffedfcaf4456525283e993087f9f560d84cfcf497d189ab8101510a09c472

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WCATT3E5\service[1].htm

                                                              Filesize

                                                              1B

                                                              MD5

                                                              cfcd208495d565ef66e7dff9f98764da

                                                              SHA1

                                                              b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                              SHA256

                                                              5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                              SHA512

                                                              31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                            • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\activity-stream.discovery_stream.json.tmp

                                                              Filesize

                                                              26KB

                                                              MD5

                                                              b5c0380b7378dd557b1d98e9dedcdb39

                                                              SHA1

                                                              dda2e28e19946abed9a90ea7056417cb7fc94eff

                                                              SHA256

                                                              e65aaaec9295cce77ac6453b9b5ebe47924c288159b302c92619431019fa1cf4

                                                              SHA512

                                                              65c8ae7e167f38b350694926071277860e5f63d64a95afbeef377fece198a1ee7e27b9bb739fdf23eeb90bbfe01c6dd4962372a6571b7e837f465fe01a2edac1

                                                            • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                                                              Filesize

                                                              15KB

                                                              MD5

                                                              96c542dec016d9ec1ecc4dddfcbaac66

                                                              SHA1

                                                              6199f7648bb744efa58acf7b96fee85d938389e4

                                                              SHA256

                                                              7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                                                              SHA512

                                                              cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                                                            • C:\Users\Admin\AppData\Local\Temp\10104900101\ce4pMzk.exe

                                                              Filesize

                                                              48KB

                                                              MD5

                                                              d39df45e0030e02f7e5035386244a523

                                                              SHA1

                                                              9ae72545a0b6004cdab34f56031dc1c8aa146cc9

                                                              SHA256

                                                              df468fc510aec82c827987f54b824b978dd71301f93d18d71e704727d6dfdfa2

                                                              SHA512

                                                              69866ba5b53d1183a0899e3d22ff06111ae2e8df429beeb853c89f3ed0afb015dd4139b1c507566ffb0fe171a4ff1b318247b7a568dc492d9f71266f5c848a64

                                                            • C:\Users\Admin\AppData\Local\Temp\10105330101\b0b41028d6.exe

                                                              Filesize

                                                              3.7MB

                                                              MD5

                                                              4769a99eadbd516c17b7f4c541b87003

                                                              SHA1

                                                              cfe5a9970182cf428919e9f110a63df37d0eee06

                                                              SHA256

                                                              446ee955b11dbd350c8d44825c88d7846cf6c88c1604b1908739b2ec8b1cfc3e

                                                              SHA512

                                                              36146efedbf0780bc6fe459f5c649549b79e79c3908593cc1471f6ed2bd79e1348353d2861a48364aaa86dd5c1a59f7d874811c4c5bcc843e459230c7afb0a91

                                                            • C:\Users\Admin\AppData\Local\Temp\10105340101\08526ebd88.exe

                                                              Filesize

                                                              445KB

                                                              MD5

                                                              c83ea72877981be2d651f27b0b56efec

                                                              SHA1

                                                              8d79c3cd3d04165b5cd5c43d6f628359940709a7

                                                              SHA256

                                                              13783c2615668fba4a503cbefdc18f8bc3d10d311d8dfe12f8f89868ed520482

                                                              SHA512

                                                              d212c563fdce1092d6d29e03928f142807c465ecaaead4fe9d8949b6f36184b8d067a830361559d59fc00d3bbe88feda03d67b549d54f0ec268e9e75698c1dd0

                                                            • C:\Users\Admin\AppData\Local\Temp\10105350101\dd833608e8.exe

                                                              Filesize

                                                              4.5MB

                                                              MD5

                                                              96dd38daadfd80cf699a8c087b581ab9

                                                              SHA1

                                                              ccea87fbad5d9fdea11ecedfd7f3d0b2d2ff3b2c

                                                              SHA256

                                                              ad659d3cd67b4c566ada6bc6dfbeece67e5b1941585fbc480bdd80daf290a110

                                                              SHA512

                                                              9862debc204be49700c1025ab9556a2b082890fae9e43ec9b7c7d41ed1db801601e48b51c755679b4035a4af7019b159451bc356769bd432b1173c15a10423ab

                                                            • C:\Users\Admin\AppData\Local\Temp\10105360101\bf58d0ec22.exe

                                                              Filesize

                                                              1.8MB

                                                              MD5

                                                              f155a51c9042254e5e3d7734cd1c3ab0

                                                              SHA1

                                                              9d6da9f8155b47bdba186be81fb5e9f3fae00ccf

                                                              SHA256

                                                              560c7869df511c5ea54f20be704bbda02e1623d0867333a90ac3783d29eae7af

                                                              SHA512

                                                              67ec5546d96e83a3c6f4197a50812f585b96b4f34a2b8d77503b51cddd4ea5a65d5416c3efc427a5e58119fa068125987e336efb2dfd5811fe59145aa5f5bd6a

                                                            • C:\Users\Admin\AppData\Local\Temp\10105370101\19ab1ca738.exe

                                                              Filesize

                                                              3.0MB

                                                              MD5

                                                              020e8f9ff53e518edb025a6f9e90a525

                                                              SHA1

                                                              afc1880f143c9eea39247954aba538ff7d2367bb

                                                              SHA256

                                                              5ad7dec6dace67e0f54adf896f2e846ede39239d9640ab932d1673e0c0415c1d

                                                              SHA512

                                                              1cb0c9f4f96f0a13261b289e7999d207aea95039e3562a9bddacc7222f2d0f933d63dfb7b49f45ba4a075cf31033d27af58b28a8cd9724eaacfe2dc6ca7b131d

                                                            • C:\Users\Admin\AppData\Local\Temp\10105380101\a0040c27d3.exe

                                                              Filesize

                                                              3.1MB

                                                              MD5

                                                              fb8a11382106b0ef3454fc1aa5a86c50

                                                              SHA1

                                                              f41d205674642f6a335ba9e90d620d20eb2eaf7c

                                                              SHA256

                                                              086f8bc32eddaa4e947338c087f677b1a78da8f7fc4604d0d0519c093e38f7f4

                                                              SHA512

                                                              6190e5830f82fdf19bef61a918b4123f1fa45828a7937e682fc80892d3771eef56a4989185261d9b59af72d4edb08e3b15313170dca1baf6e5cc2e643e0e2bb4

                                                            • C:\Users\Admin\AppData\Local\Temp\10105390101\5cdadb3832.exe

                                                              Filesize

                                                              1.8MB

                                                              MD5

                                                              0824d5f9638e1fed7aea21a97f70f38c

                                                              SHA1

                                                              83aead23fff28d92a28748702d8329818483c6bc

                                                              SHA256

                                                              6f2daaadec4daf489f7a5f923ecf0ef5b7a0af365d4af7e36040904f68545a90

                                                              SHA512

                                                              c86e43dac2b620c3d3465c0e9a9c78e72293881cf44b2e5c161c4d6d2ffe601e275bbc651e4a02e1f71f4bd2dc7df0e54248a7f2dc7756696cd42099186953aa

                                                            • C:\Users\Admin\AppData\Local\Temp\10105400101\ed229c8001.exe

                                                              Filesize

                                                              947KB

                                                              MD5

                                                              28f3e4c645b836fe6b7893752b37edcb

                                                              SHA1

                                                              af8e67a82648f1cb435ca22d26656fcad6bec9d6

                                                              SHA256

                                                              94757246933bf308c399fc5a46cb74a9203f5940de0c1724cdc9a01ac32d7aef

                                                              SHA512

                                                              d00eb74351597901d3feccedf26de34221ef6c08b5aa40b3f2d1669ef90ec0fa2ee935fad71fade353d5e889c21c7ef2bb270793ed19a2dd80ceae87f65181f8

                                                            • C:\Users\Admin\AppData\Local\Temp\10105410101\7de3878b2c.exe

                                                              Filesize

                                                              1.7MB

                                                              MD5

                                                              b9ec326f2c59b318c0a4ead48270846f

                                                              SHA1

                                                              8da0767e75879e574bcb3dc1eccde1b4abd5beef

                                                              SHA256

                                                              3f95a0648e4744771d61482b075cedb4d60694226cacddc5882e651acd8c42cd

                                                              SHA512

                                                              9cc550f7f8bd20bdc8543fca2773faa13defcde86ea09bf5111be60b1b65f085946162d49d8ed992db33d40c649832890397ca83e60ff1f7f2a1d2f54822f77e

                                                            • C:\Users\Admin\AppData\Local\Temp\10105430101\mAtJWNv.exe

                                                              Filesize

                                                              350KB

                                                              MD5

                                                              b60779fb424958088a559fdfd6f535c2

                                                              SHA1

                                                              bcea427b20d2f55c6372772668c1d6818c7328c9

                                                              SHA256

                                                              098c4fe0de1df5b46cf4c825e8eba1893138c751968fcf9fe009a6991e9b1221

                                                              SHA512

                                                              c17a7781790326579669c2b9ad6f7f9764cf51f44ad11642d268b077ade186563ae53fc5e6e84eb7f563021db00bef9ebd65a8d3fbe7a73e85f70a4caa7d8a7f

                                                            • C:\Users\Admin\AppData\Local\Temp\10105440101\SvhQA35.exe

                                                              Filesize

                                                              11.5MB

                                                              MD5

                                                              9da08b49cdcc4a84b4a722d1006c2af8

                                                              SHA1

                                                              7b5af0630b89bd2a19ae32aea30343330ca3a9eb

                                                              SHA256

                                                              215a9d61105d1ada2b22fbf70e58745cabfff72b93d95aae1ce20bbc6defa6dd

                                                              SHA512

                                                              579dcb0c2f0af9a97a9c75caf023f375bd93f1698678393e7315360a33f432f2d727bf14b22c8b1584c628582115462bdd0c3edaacdcaec8fd691595e6b5bfdb

                                                            • C:\Users\Admin\AppData\Local\Temp\TarBDCA.tmp

                                                              Filesize

                                                              183KB

                                                              MD5

                                                              109cab5505f5e065b63d01361467a83b

                                                              SHA1

                                                              4ed78955b9272a9ed689b51bf2bf4a86a25e53fc

                                                              SHA256

                                                              ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673

                                                              SHA512

                                                              753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc

                                                            • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe

                                                              Filesize

                                                              1.8MB

                                                              MD5

                                                              44432f95b130ce27ffe942af9562c738

                                                              SHA1

                                                              8d44dd529c59881f2e728593b373f2eff42be305

                                                              SHA256

                                                              daa1a8bd2f692cf85ebdbe3c66dbbf3801e9dac297aabf1a30d8ea616524a6ca

                                                              SHA512

                                                              48c8b0f3d62a8d81129129e80bd432d949a644023a88568fb1aa5fce8c6731f70c5282bc981ad68cfd3eb1fc5ef3ac380dd29b2daf8577c265a24c6140481ff0

                                                            • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                              Filesize

                                                              442KB

                                                              MD5

                                                              85430baed3398695717b0263807cf97c

                                                              SHA1

                                                              fffbee923cea216f50fce5d54219a188a5100f41

                                                              SHA256

                                                              a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e

                                                              SHA512

                                                              06511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1

                                                            • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                                              Filesize

                                                              8.0MB

                                                              MD5

                                                              a01c5ecd6108350ae23d2cddf0e77c17

                                                              SHA1

                                                              c6ac28a2cd979f1f9a75d56271821d5ff665e2b6

                                                              SHA256

                                                              345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42

                                                              SHA512

                                                              b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\datareporting\glean\db\data.safe.bin

                                                              Filesize

                                                              2KB

                                                              MD5

                                                              1d649fc07c3df565e71047e6d9e6fa30

                                                              SHA1

                                                              352418af86338824209cf32b6b682acd148c0b0a

                                                              SHA256

                                                              5b2be989801cdfbf587bfd335f796fbcc7943686daf444dbd74d0d98b537e09d

                                                              SHA512

                                                              7fa18b42238e0f8e5cc0bd007a2e3b30bd60f7aa4bfe8c350c0edf86d117be66f141fa38f9402aa22d18d77c3e377eb5e0881245aa65757509a095678876f80e

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\datareporting\glean\db\data.safe.bin

                                                              Filesize

                                                              2KB

                                                              MD5

                                                              9dba5c0595e4f1b557aa5bc6825b7e26

                                                              SHA1

                                                              c85429364e9483d1edcc430d6548738851d35197

                                                              SHA256

                                                              950c43fe36f055f39acad9671f77b2138cbddecd6b2a46992199b34742749a38

                                                              SHA512

                                                              6088ab238074a2f8ab0ab0bf3f6f3c3ec9c70978399aaf803aafb7c0cb88ec1ce51f09bacd73f0396348e735ded36d6186e80efbd3774d4af58dfcb6ca28b9e9

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\datareporting\glean\pending_pings\5dd797c6-de57-411c-b824-b884658bfbf0

                                                              Filesize

                                                              745B

                                                              MD5

                                                              f24e7d56540deb38fcefddc7a9a05eb9

                                                              SHA1

                                                              815a2dfe8b14651a5f166987df1a24df244afce6

                                                              SHA256

                                                              e0abf5e7a87b93317ed6e4e25ed3b9217076dbaac1d949a8e18d4a38a5ff5317

                                                              SHA512

                                                              9798bfbcfc7962ab66361b80c28dfced9a23eaec46e1d84f95fa42121ef8d87ac1cf9172c7335d7d517aaf477291b2324769fe28a4d800a87a90d5cf5e0488ca

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\datareporting\glean\pending_pings\92ce76a6-1303-452d-8a76-890fb43d35e7

                                                              Filesize

                                                              12KB

                                                              MD5

                                                              461ffe3664ca258652ef21bd8daf0732

                                                              SHA1

                                                              67033bf7f57935f434f8cb74ad1dde06f1ed451b

                                                              SHA256

                                                              011aabc446d5a3e278eae3cc3f371d3d4316ead027b32eb7045a33e03a9de4ad

                                                              SHA512

                                                              83729619eb7b04a85a413dcd8f6fa76e002392329f84a5abb22d2f49eec59743b30fad6ff2f5a2e89082d3c99c15f5a003f6952af022fe221135bd2f1ad97ccc

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll

                                                              Filesize

                                                              997KB

                                                              MD5

                                                              fe3355639648c417e8307c6d051e3e37

                                                              SHA1

                                                              f54602d4b4778da21bc97c7238fc66aa68c8ee34

                                                              SHA256

                                                              1ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e

                                                              SHA512

                                                              8f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info

                                                              Filesize

                                                              116B

                                                              MD5

                                                              3d33cdc0b3d281e67dd52e14435dd04f

                                                              SHA1

                                                              4db88689282fd4f9e9e6ab95fcbb23df6e6485db

                                                              SHA256

                                                              f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b

                                                              SHA512

                                                              a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt

                                                              Filesize

                                                              479B

                                                              MD5

                                                              49ddb419d96dceb9069018535fb2e2fc

                                                              SHA1

                                                              62aa6fea895a8b68d468a015f6e6ab400d7a7ca6

                                                              SHA256

                                                              2af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539

                                                              SHA512

                                                              48386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json

                                                              Filesize

                                                              372B

                                                              MD5

                                                              8be33af717bb1b67fbd61c3f4b807e9e

                                                              SHA1

                                                              7cf17656d174d951957ff36810e874a134dd49e0

                                                              SHA256

                                                              e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd

                                                              SHA512

                                                              6125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll

                                                              Filesize

                                                              11.8MB

                                                              MD5

                                                              33bf7b0439480effb9fb212efce87b13

                                                              SHA1

                                                              cee50f2745edc6dc291887b6075ca64d716f495a

                                                              SHA256

                                                              8ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e

                                                              SHA512

                                                              d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib

                                                              Filesize

                                                              1KB

                                                              MD5

                                                              688bed3676d2104e7f17ae1cd2c59404

                                                              SHA1

                                                              952b2cdf783ac72fcb98338723e9afd38d47ad8e

                                                              SHA256

                                                              33899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237

                                                              SHA512

                                                              7a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig

                                                              Filesize

                                                              1KB

                                                              MD5

                                                              937326fead5fd401f6cca9118bd9ade9

                                                              SHA1

                                                              4526a57d4ae14ed29b37632c72aef3c408189d91

                                                              SHA256

                                                              68a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81

                                                              SHA512

                                                              b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\prefs-1.js

                                                              Filesize

                                                              6KB

                                                              MD5

                                                              76a811398d8bdf770e7988dc8ec96d45

                                                              SHA1

                                                              6eccad46a3777ed6d794c0b9b46f422602f25645

                                                              SHA256

                                                              eb4aa65926f86ba187181aae4c0cb8940fa25a3c13b5c6e82c6b0753e2dafffc

                                                              SHA512

                                                              17e8a7c6c5259cc6ec8e00b3fc71f97db9f6bfcfea1488c0398df59c5a0204a9c26f49f0e3bb0771d73c69f5a4fdb2c69839ad7352df607cd19d9bb9fbf223df

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\prefs-1.js

                                                              Filesize

                                                              7KB

                                                              MD5

                                                              ac3ded602501592402e150efd3d441ea

                                                              SHA1

                                                              78a869df72c01d1a27b07c7a6a86764d1b1f262d

                                                              SHA256

                                                              9499b4dc70e909c64ba4271e3bd741fedadd77c1c26da06b8f856d16dd3ef5df

                                                              SHA512

                                                              ffc4b7ec8feefed08bdc8689611e9702f068dd8b2116d48074c18d9ebc0b32102bc4009943f44432a6971183737f4242453f68e29f277d5d782cdee4d02b9045

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\prefs-1.js

                                                              Filesize

                                                              6KB

                                                              MD5

                                                              5d991876e5d38c46e57aceb2ca90a391

                                                              SHA1

                                                              8b58af232a2d484667f3230764a02719fbb79ea6

                                                              SHA256

                                                              fbb06b34b0622cf3df98d1f4ce474c5bac6bb11dafbb0e21c8955eb9e307f33c

                                                              SHA512

                                                              2fedab7bec2bbd40add214284076b21d56188971e8d17f8d6774c9003116fc4ce46323c663f43bbc38fc0efc9187d51d92a37e17d021b677d44b942a47ad3889

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\prefs.js

                                                              Filesize

                                                              6KB

                                                              MD5

                                                              1f0dbe68468ccc0f5733a113e9d4719f

                                                              SHA1

                                                              390c8a1ab5a3a5bb49c0b1c769cb66fc2be0eac0

                                                              SHA256

                                                              f91e214b5c742088d01c0d3202d38c2642740fe810a3e2fe31416c60359fd3ae

                                                              SHA512

                                                              c68ad56db3fedd7389cd2fb89c43a40022b79837bd25bd42b1dc14e54bbcb70c2dc0956cb6d9942c427368715c993763a30fdc40e818c520355b51ec17536f85

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\sessionstore-backups\recovery.jsonlz4

                                                              Filesize

                                                              4KB

                                                              MD5

                                                              e2e9b38f0fd92e6ab8f994e59e462e68

                                                              SHA1

                                                              1c5d8d5fddf26492395597f3a86dd677e9914d69

                                                              SHA256

                                                              1742b1df75547cd1284e30971fbf4b4889ea9a21f5c6f8c3a4a6d30d9f39a088

                                                              SHA512

                                                              5c7d003bcb2ab86ea5f06c4a9b9411ce13b05aa46de8754279d80b54b5bb5234bb2476e5a725e8d2225600d4828968cee0745bb4a8e0272735d4f681337ae154

                                                            • C:\Users\Admin\Desktop\YCL.lnk

                                                              Filesize

                                                              1KB

                                                              MD5

                                                              40768c8fb47e7967d986800f5cd5b83c

                                                              SHA1

                                                              cbcde089a96cb59a0e7e6f7218e586e521185322

                                                              SHA256

                                                              e2c8da23e788dafe030f43c25a93b5baed5c539093f49da9ec9550c3dd4cdb94

                                                              SHA512

                                                              7f575770d4be42caa3295fb9c269f491c919644b8e61fee6e614dd2a5a930c8bf62e44eaefdff1e77a39327a6224ac702de62c9885cfe014a76fd2a3ca40e1f6

                                                            • \Users\Admin\AppData\Local\Temp\JWrRAWGzF8NeF68BED3e\Y-Cleaner.exe

                                                              Filesize

                                                              987KB

                                                              MD5

                                                              f49d1aaae28b92052e997480c504aa3b

                                                              SHA1

                                                              a422f6403847405cee6068f3394bb151d8591fb5

                                                              SHA256

                                                              81e31780a5f2078284b011c720261797eb8dd85e1b95a657dbce7ac31e9df1f0

                                                              SHA512

                                                              41f715eea031fd8d7d3a22d88e0199277db2f86be73f830819288c0f0665e81a314be6d356fdc66069cb3f2abf0dd02aaa49ac3732f3f44a533fcec0dfd6f773

                                                            • memory/548-873-0x0000000000160000-0x0000000000818000-memory.dmp

                                                              Filesize

                                                              6.7MB

                                                            • memory/548-352-0x0000000000160000-0x0000000000818000-memory.dmp

                                                              Filesize

                                                              6.7MB

                                                            • memory/548-403-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                              Filesize

                                                              972KB

                                                            • memory/708-109-0x0000000010000000-0x000000001001C000-memory.dmp

                                                              Filesize

                                                              112KB

                                                            • memory/708-105-0x0000000000400000-0x000000000042F000-memory.dmp

                                                              Filesize

                                                              188KB

                                                            • memory/708-103-0x0000000000400000-0x000000000042F000-memory.dmp

                                                              Filesize

                                                              188KB

                                                            • memory/1160-328-0x0000000000B10000-0x0000000000E24000-memory.dmp

                                                              Filesize

                                                              3.1MB

                                                            • memory/1484-132-0x0000000000130000-0x0000000000D75000-memory.dmp

                                                              Filesize

                                                              12.3MB

                                                            • memory/1484-169-0x0000000000130000-0x0000000000D75000-memory.dmp

                                                              Filesize

                                                              12.3MB

                                                            • memory/1484-161-0x0000000000130000-0x0000000000D75000-memory.dmp

                                                              Filesize

                                                              12.3MB

                                                            • memory/1484-159-0x0000000000130000-0x0000000000D75000-memory.dmp

                                                              Filesize

                                                              12.3MB

                                                            • memory/1876-982-0x0000000000180000-0x00000000001E0000-memory.dmp

                                                              Filesize

                                                              384KB

                                                            • memory/2000-168-0x0000000000400000-0x000000000042F000-memory.dmp

                                                              Filesize

                                                              188KB

                                                            • memory/2148-285-0x0000000001230000-0x000000000153E000-memory.dmp

                                                              Filesize

                                                              3.1MB

                                                            • memory/2148-287-0x0000000001230000-0x000000000153E000-memory.dmp

                                                              Filesize

                                                              3.1MB

                                                            • memory/2392-1-0x0000000077570000-0x0000000077572000-memory.dmp

                                                              Filesize

                                                              8KB

                                                            • memory/2392-2-0x00000000009D1000-0x00000000009FF000-memory.dmp

                                                              Filesize

                                                              184KB

                                                            • memory/2392-15-0x00000000009D0000-0x0000000000E80000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/2392-0-0x00000000009D0000-0x0000000000E80000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/2392-16-0x0000000006CD0000-0x0000000007180000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/2392-5-0x00000000009D0000-0x0000000000E80000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/2392-3-0x00000000009D0000-0x0000000000E80000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/2436-58-0x0000000000860000-0x000000000124D000-memory.dmp

                                                              Filesize

                                                              9.9MB

                                                            • memory/2436-104-0x0000000000860000-0x000000000124D000-memory.dmp

                                                              Filesize

                                                              9.9MB

                                                            • memory/2436-102-0x0000000000860000-0x000000000124D000-memory.dmp

                                                              Filesize

                                                              9.9MB

                                                            • memory/2436-101-0x0000000000860000-0x000000000124D000-memory.dmp

                                                              Filesize

                                                              9.9MB

                                                            • memory/2444-39-0x00000000002D0000-0x00000000002E0000-memory.dmp

                                                              Filesize

                                                              64KB

                                                            • memory/2444-38-0x0000000001090000-0x00000000010A2000-memory.dmp

                                                              Filesize

                                                              72KB

                                                            • memory/2584-72-0x0000000001030000-0x00000000010A8000-memory.dmp

                                                              Filesize

                                                              480KB

                                                            • memory/2800-81-0x0000000000400000-0x0000000000465000-memory.dmp

                                                              Filesize

                                                              404KB

                                                            • memory/2800-75-0x0000000000400000-0x0000000000465000-memory.dmp

                                                              Filesize

                                                              404KB

                                                            • memory/2800-83-0x0000000000400000-0x0000000000465000-memory.dmp

                                                              Filesize

                                                              404KB

                                                            • memory/2800-85-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/2800-86-0x0000000000400000-0x0000000000465000-memory.dmp

                                                              Filesize

                                                              404KB

                                                            • memory/2800-88-0x0000000000400000-0x0000000000465000-memory.dmp

                                                              Filesize

                                                              404KB

                                                            • memory/2800-79-0x0000000000400000-0x0000000000465000-memory.dmp

                                                              Filesize

                                                              404KB

                                                            • memory/2800-77-0x0000000000400000-0x0000000000465000-memory.dmp

                                                              Filesize

                                                              404KB

                                                            • memory/2804-177-0x0000000002670000-0x0000000002678000-memory.dmp

                                                              Filesize

                                                              32KB

                                                            • memory/2804-176-0x000000001B5B0000-0x000000001B892000-memory.dmp

                                                              Filesize

                                                              2.9MB

                                                            • memory/2896-157-0x00000000011C0000-0x0000000001661000-memory.dmp

                                                              Filesize

                                                              4.6MB

                                                            • memory/2896-223-0x00000000011C0000-0x0000000001661000-memory.dmp

                                                              Filesize

                                                              4.6MB

                                                            • memory/2900-243-0x00000000068A0000-0x0000000006D41000-memory.dmp

                                                              Filesize

                                                              4.6MB

                                                            • memory/2900-99-0x00000000068A0000-0x000000000728D000-memory.dmp

                                                              Filesize

                                                              9.9MB

                                                            • memory/2900-338-0x00000000010C0000-0x0000000001570000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/2900-17-0x00000000010C0000-0x0000000001570000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/2900-18-0x00000000010C1000-0x00000000010EF000-memory.dmp

                                                              Filesize

                                                              184KB

                                                            • memory/2900-306-0x00000000010C0000-0x0000000001570000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/2900-286-0x0000000006280000-0x000000000658E000-memory.dmp

                                                              Filesize

                                                              3.1MB

                                                            • memory/2900-264-0x00000000010C0000-0x0000000001570000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/2900-239-0x0000000006280000-0x000000000658E000-memory.dmp

                                                              Filesize

                                                              3.1MB

                                                            • memory/2900-170-0x00000000010C0000-0x0000000001570000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/2900-155-0x00000000068A0000-0x0000000006D41000-memory.dmp

                                                              Filesize

                                                              4.6MB

                                                            • memory/2900-19-0x00000000010C0000-0x0000000001570000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/2900-156-0x00000000068A0000-0x0000000006D41000-memory.dmp

                                                              Filesize

                                                              4.6MB

                                                            • memory/2900-154-0x00000000068A0000-0x00000000074E5000-memory.dmp

                                                              Filesize

                                                              12.3MB

                                                            • memory/2900-950-0x00000000010C0000-0x0000000001570000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/2900-133-0x00000000010C0000-0x0000000001570000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/2900-130-0x00000000068A0000-0x00000000074E5000-memory.dmp

                                                              Filesize

                                                              12.3MB

                                                            • memory/2900-21-0x00000000010C0000-0x0000000001570000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/2900-22-0x00000000010C0000-0x0000000001570000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/2900-24-0x00000000010C0000-0x0000000001570000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/2900-25-0x00000000010C0000-0x0000000001570000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/2900-128-0x00000000068A0000-0x00000000074E5000-memory.dmp

                                                              Filesize

                                                              12.3MB

                                                            • memory/2900-40-0x00000000010C0000-0x0000000001570000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/2900-57-0x00000000068A0000-0x000000000728D000-memory.dmp

                                                              Filesize

                                                              9.9MB

                                                            • memory/2900-100-0x00000000010C0000-0x0000000001570000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/2900-728-0x00000000010C0000-0x0000000001570000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/2900-55-0x00000000068A0000-0x000000000728D000-memory.dmp

                                                              Filesize

                                                              9.9MB

                                                            • memory/3076-984-0x0000000000400000-0x0000000000429000-memory.dmp

                                                              Filesize

                                                              164KB

                                                            • memory/3076-986-0x0000000000400000-0x0000000000429000-memory.dmp

                                                              Filesize

                                                              164KB

                                                            • memory/3076-988-0x0000000000400000-0x0000000000429000-memory.dmp

                                                              Filesize

                                                              164KB

                                                            • memory/3076-990-0x0000000000400000-0x0000000000429000-memory.dmp

                                                              Filesize

                                                              164KB

                                                            • memory/3460-883-0x0000000000EE0000-0x0000000000EF2000-memory.dmp

                                                              Filesize

                                                              72KB

                                                            • memory/3700-790-0x0000000001090000-0x00000000014D8000-memory.dmp

                                                              Filesize

                                                              4.3MB

                                                            • memory/3700-789-0x0000000001090000-0x00000000014D8000-memory.dmp

                                                              Filesize

                                                              4.3MB

                                                            • memory/4020-1042-0x0000000001D20000-0x0000000001D28000-memory.dmp

                                                              Filesize

                                                              32KB

                                                            • memory/4020-1041-0x000000001B820000-0x000000001BB02000-memory.dmp

                                                              Filesize

                                                              2.9MB