Analysis

  • max time kernel
    50s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    28-09-2024 13:05

General

  • Target

    97d8afaa50d9d0feb69d11ecdf7fc95a8762ba97458ece1216bb9d85ba6bf946N.exe

  • Size

    1.8MB

  • MD5

    fd07283a91157618934fee802604fea0

  • SHA1

    889820e0182d475e7f4332290fcc5d40e3b0bc8c

  • SHA256

    97d8afaa50d9d0feb69d11ecdf7fc95a8762ba97458ece1216bb9d85ba6bf946

  • SHA512

    6c9e4c325887717230e82ff2e57118bedec14147c7e0af4bb569ea7387f9b6df23c91b42e79cf3ced285ed75e7df69c14a537d40ccd76cbfef53c608df0cfa69

  • SSDEEP

    49152:LBZ+Qt+RQJm0btnwomxdkSpp6tcx3NuwokmnQ4EM:qQtaqmIZwowRpR3N1QQ

Malware Config

Extracted

Family

amadey

Version

4.41

Botnet

fed3aa

C2

http://185.215.113.16

Attributes
  • install_dir

    44111dbc49

  • install_file

    axplong.exe

  • strings_key

    8d0ad6945b1a30a186ec2d30be6db0b5

  • url_paths

    /Jo89Ku7d/index.php

rc4.plain

Extracted

Family

redline

Botnet

LiveTraffic

C2

136.244.88.135:17615

Extracted

Family

redline

Botnet

@OLEH_PSP

C2

65.21.18.51:45580

Extracted

Family

stealc

Botnet

default2

C2

http://185.215.113.17

Attributes
  • url_path

    /2fb6c2cc8dce150a.php

Extracted

Family

stealc

Botnet

default

C2

http://91.202.233.158

Attributes
  • url_path

    /e96ea2db21fa9a1b.php

Extracted

Family

redline

Botnet

TG CLOUD @RLREBORN Admin @FATHEROFCARDERS

C2

89.105.223.196:29862

Extracted

Family

redline

Botnet

newbundle2

C2

185.215.113.67:15206

Extracted

Family

stealc

Botnet

save

C2

http://185.215.113.37

Attributes
  • url_path

    /e2b1563c6670f193.php

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.2

Botnet

Default

C2

47.238.55.14:4449

Mutex

rqwcncaesrdtlckoweu

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Extracted

Family

lumma

C2

https://defenddsouneuw.shop/api

https://reinforcenh.shop/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 14 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 3 IoCs
  • VenomRAT 1 IoCs

    Detects VenomRAT.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 14 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 4 IoCs
  • Executes dropped EXE 28 IoCs
  • Identifies Wine through registry keys 2 TTPs 7 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 50 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates processes with tasklist 1 TTPs 6 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Windows directory 17 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 54 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 5 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 56 IoCs
  • Suspicious use of FindShellTrayWindow 13 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1208
      • C:\Users\Admin\AppData\Local\Temp\97d8afaa50d9d0feb69d11ecdf7fc95a8762ba97458ece1216bb9d85ba6bf946N.exe
        "C:\Users\Admin\AppData\Local\Temp\97d8afaa50d9d0feb69d11ecdf7fc95a8762ba97458ece1216bb9d85ba6bf946N.exe"
        2⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Identifies Wine through registry keys
        • Loads dropped DLL
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:2904
        • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
          "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2668
          • C:\Users\Admin\AppData\Local\Temp\1000002001\gold.exe
            "C:\Users\Admin\AppData\Local\Temp\1000002001\gold.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2500
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
              5⤵
              • System Location Discovery: System Language Discovery
              • Modifies system certificate store
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1716
          • C:\Users\Admin\AppData\Local\Temp\1000004001\12dsvc.exe
            "C:\Users\Admin\AppData\Local\Temp\1000004001\12dsvc.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2476
            • C:\Users\Admin\AppData\Roaming\uOCjOdPaWk.exe
              "C:\Users\Admin\AppData\Roaming\uOCjOdPaWk.exe"
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Modifies system certificate store
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:584
            • C:\Users\Admin\AppData\Roaming\eXdFKNSXGF.exe
              "C:\Users\Admin\AppData\Roaming\eXdFKNSXGF.exe"
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1108
          • C:\Users\Admin\AppData\Local\Temp\1000005001\Nework.exe
            "C:\Users\Admin\AppData\Local\Temp\1000005001\Nework.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of WriteProcessMemory
            PID:1536
            • C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe
              "C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe"
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2388
              • C:\Users\Admin\AppData\Local\Temp\1000070001\javtestnoreport.exe
                "C:\Users\Admin\AppData\Local\Temp\1000070001\javtestnoreport.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:2748
                • C:\Windows\system32\WerFault.exe
                  C:\Windows\system32\WerFault.exe -u -p 2748 -s 232
                  7⤵
                  • Loads dropped DLL
                  PID:1236
          • C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe
            "C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Checks processor information in registry
            • Suspicious behavior: EnumeratesProcesses
            PID:3024
          • C:\Users\Admin\AppData\Local\Temp\1000191001\needmoney.exe
            "C:\Users\Admin\AppData\Local\Temp\1000191001\needmoney.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1520
            • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
              C:\Users\Admin\AppData\Local\Temp\svchost015.exe
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:1596
          • C:\Users\Admin\AppData\Local\Temp\1000254001\penis.exe
            "C:\Users\Admin\AppData\Local\Temp\1000254001\penis.exe"
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:2908
          • C:\Users\Admin\AppData\Local\Temp\1000290001\crypted.exe
            "C:\Users\Admin\AppData\Local\Temp\1000290001\crypted.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            PID:2936
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
              5⤵
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2816
          • C:\Users\Admin\AppData\Local\Temp\1000314001\LummaC222222.exe
            "C:\Users\Admin\AppData\Local\Temp\1000314001\LummaC222222.exe"
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:308
          • C:\Users\Admin\AppData\Local\Temp\1000322001\newbundle2.exe
            "C:\Users\Admin\AppData\Local\Temp\1000322001\newbundle2.exe"
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2176
          • C:\Users\Admin\AppData\Local\Temp\1000342001\rstxdhuj.exe
            "C:\Users\Admin\AppData\Local\Temp\1000342001\rstxdhuj.exe"
            4⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2972
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2972 -s 804
              5⤵
              • Loads dropped DLL
              • Program crash
              PID:6620
          • C:\Users\Admin\AppData\Local\Temp\1000354001\3956d58270.exe
            "C:\Users\Admin\AppData\Local\Temp\1000354001\3956d58270.exe"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:6792
          • C:\Users\Admin\AppData\Local\Temp\1000355001\c88f052609.exe
            "C:\Users\Admin\AppData\Local\Temp\1000355001\c88f052609.exe"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Loads dropped DLL
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            PID:7096
            • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
              "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
              5⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Loads dropped DLL
              • Adds Run key to start application
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:2960
              • C:\Users\Admin\AppData\Local\Temp\1000023001\4861afcbbb.exe
                "C:\Users\Admin\AppData\Local\Temp\1000023001\4861afcbbb.exe"
                6⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:1112
              • C:\Users\Admin\1000026002\d9fc199e6c.exe
                "C:\Users\Admin\1000026002\d9fc199e6c.exe"
                6⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:2580
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\1000032042\ko.ps1"
                6⤵
                • Command and Scripting Interpreter: PowerShell
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:5200
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --kiosk --user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data
                  7⤵
                  • Enumerates system info in registry
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of FindShellTrayWindow
                  PID:5764
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Google\Chrome\User\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc8,0xcc,0xd0,0x9c,0xd4,0x7fef2999758,0x7fef2999768,0x7fef2999778
                    8⤵
                      PID:2172
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1172 --field-trial-handle=1376,i,1689421433302598429,1513243022576274955,131072 /prefetch:2
                      8⤵
                        PID:1660
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User" --mojo-platform-channel-handle=1508 --field-trial-handle=1376,i,1689421433302598429,1513243022576274955,131072 /prefetch:8
                        8⤵
                          PID:1840
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User" --mojo-platform-channel-handle=1588 --field-trial-handle=1376,i,1689421433302598429,1513243022576274955,131072 /prefetch:8
                          8⤵
                            PID:1484
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User" --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2076 --field-trial-handle=1376,i,1689421433302598429,1513243022576274955,131072 /prefetch:1
                            8⤵
                              PID:1652
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User" --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2084 --field-trial-handle=1376,i,1689421433302598429,1513243022576274955,131072 /prefetch:1
                              8⤵
                                PID:3120
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User" --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=2132 --field-trial-handle=1376,i,1689421433302598429,1513243022576274955,131072 /prefetch:1
                                8⤵
                                  PID:3644
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User" --extension-process --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2780 --field-trial-handle=1376,i,1689421433302598429,1513243022576274955,131072 /prefetch:1
                                  8⤵
                                    PID:4056
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User" --extension-process --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=2884 --field-trial-handle=1376,i,1689421433302598429,1513243022576274955,131072 /prefetch:1
                                    8⤵
                                      PID:4116
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1692 --field-trial-handle=1376,i,1689421433302598429,1513243022576274955,131072 /prefetch:2
                                      8⤵
                                        PID:5144
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User" --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=1316 --field-trial-handle=1376,i,1689421433302598429,1513243022576274955,131072 /prefetch:1
                                        8⤵
                                          PID:5792
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User" --mojo-platform-channel-handle=1320 --field-trial-handle=1376,i,1689421433302598429,1513243022576274955,131072 /prefetch:8
                                          8⤵
                                            PID:5832
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User" --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=2160 --field-trial-handle=1376,i,1689421433302598429,1513243022576274955,131072 /prefetch:1
                                            8⤵
                                              PID:6240
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User" --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=2200 --field-trial-handle=1376,i,1689421433302598429,1513243022576274955,131072 /prefetch:1
                                              8⤵
                                                PID:6360
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User" --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=4352 --field-trial-handle=1376,i,1689421433302598429,1513243022576274955,131072 /prefetch:1
                                                8⤵
                                                  PID:6396
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User" --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=2728 --field-trial-handle=1376,i,1689421433302598429,1513243022576274955,131072 /prefetch:1
                                                  8⤵
                                                    PID:6644
                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User" --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=2696 --field-trial-handle=1376,i,1689421433302598429,1513243022576274955,131072 /prefetch:1
                                                    8⤵
                                                      PID:1876
                                                    • C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe
                                                      "C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe" --configure-user-settings --verbose-logging --system-level --force-configure-user-settings
                                                      8⤵
                                                        PID:1708
                                                        • C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe
                                                          "C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x154,0x158,0x15c,0x128,0x160,0x13fa07688,0x13fa07698,0x13fa076a8
                                                          9⤵
                                                            PID:6872
                                                          • C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe
                                                            "C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe" --system-level --verbose-logging --installerdata="C:\Program Files\Google\Chrome\Application\master_preferences" --create-shortcuts=1 --install-level=0
                                                            9⤵
                                                              PID:2176
                                                              • C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe
                                                                "C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x154,0x158,0x15c,0x128,0x160,0x13fa07688,0x13fa07698,0x13fa076a8
                                                                10⤵
                                                                  PID:6120
                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=utility --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User" --mojo-platform-channel-handle=4616 --field-trial-handle=1376,i,1689421433302598429,1513243022576274955,131072 /prefetch:8
                                                              8⤵
                                                                PID:2800
                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User" --mojo-platform-channel-handle=5300 --field-trial-handle=1376,i,1689421433302598429,1513243022576274955,131072 /prefetch:8
                                                                8⤵
                                                                  PID:4332
                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User" --mojo-platform-channel-handle=5252 --field-trial-handle=1376,i,1689421433302598429,1513243022576274955,131072 /prefetch:8
                                                                  8⤵
                                                                    PID:4376
                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=utility --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User" --mojo-platform-channel-handle=4124 --field-trial-handle=1376,i,1689421433302598429,1513243022576274955,131072 /prefetch:8
                                                                    8⤵
                                                                      PID:3380
                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User" --mojo-platform-channel-handle=4016 --field-trial-handle=1376,i,1689421433302598429,1513243022576274955,131072 /prefetch:8
                                                                      8⤵
                                                                        PID:5756
                                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\1000033142\so.ps1"
                                                                    6⤵
                                                                    • Command and Scripting Interpreter: PowerShell
                                                                    • System Location Discovery: System Language Discovery
                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:988
                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --kiosk --user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data
                                                                      7⤵
                                                                      • Enumerates system info in registry
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:4128
                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Google\Chrome\User\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc8,0xcc,0xd0,0x9c,0xd4,0x7fef2999758,0x7fef2999768,0x7fef2999778
                                                                        8⤵
                                                                          PID:4664
                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1188 --field-trial-handle=1328,i,17750161181166134066,17126064353915173917,131072 /prefetch:2
                                                                          8⤵
                                                                            PID:6208
                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User" --mojo-platform-channel-handle=1480 --field-trial-handle=1328,i,17750161181166134066,17126064353915173917,131072 /prefetch:8
                                                                            8⤵
                                                                              PID:6236
                                                                        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
                                                                          6⤵
                                                                            PID:4692
                                                                      • C:\Users\Admin\AppData\Local\Temp\1000365001\lummetc.exe
                                                                        "C:\Users\Admin\AppData\Local\Temp\1000365001\lummetc.exe"
                                                                        4⤵
                                                                        • Executes dropped EXE
                                                                        • System Location Discovery: System Language Discovery
                                                                        PID:3084
                                                                      • C:\Users\Admin\AppData\Local\Temp\1000367001\processclass.exe
                                                                        "C:\Users\Admin\AppData\Local\Temp\1000367001\processclass.exe"
                                                                        4⤵
                                                                        • Executes dropped EXE
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        PID:3768
                                                                        • C:\Windows\System32\cmd.exe
                                                                          "C:\Windows\System32\cmd.exe" /c start context.exe
                                                                          5⤵
                                                                            PID:6640
                                                                            • C:\Users\Admin\AppData\Local\Temp\context.exe
                                                                              context.exe
                                                                              6⤵
                                                                              • Executes dropped EXE
                                                                              • Drops file in Windows directory
                                                                              • System Location Discovery: System Language Discovery
                                                                              • Suspicious behavior: CmdExeWriteProcessMemorySpam
                                                                              PID:6808
                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                "C:\Windows\System32\cmd.exe" /c move Emotions Emotions.bat & Emotions.bat
                                                                                7⤵
                                                                                • System Location Discovery: System Language Discovery
                                                                                PID:6928
                                                                                • C:\Windows\SysWOW64\tasklist.exe
                                                                                  tasklist
                                                                                  8⤵
                                                                                  • Enumerates processes with tasklist
                                                                                  PID:7132
                                                                                • C:\Windows\SysWOW64\findstr.exe
                                                                                  findstr /I "wrsa opssvc"
                                                                                  8⤵
                                                                                    PID:7148
                                                                                  • C:\Windows\SysWOW64\tasklist.exe
                                                                                    tasklist
                                                                                    8⤵
                                                                                    • Enumerates processes with tasklist
                                                                                    PID:2932
                                                                                  • C:\Windows\SysWOW64\findstr.exe
                                                                                    findstr /I "avastui avgui bdservicehost nswscsvc sophoshealth"
                                                                                    8⤵
                                                                                      PID:1252
                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                      cmd /c md 607698
                                                                                      8⤵
                                                                                        PID:7164
                                                                                      • C:\Windows\SysWOW64\findstr.exe
                                                                                        findstr /V "MaskBathroomCompositionInjection" Participants
                                                                                        8⤵
                                                                                          PID:2764
                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                          cmd /c copy /b ..\Navy + ..\Temperature + ..\Streaming + ..\Ashley + ..\Ensures + ..\Language + ..\Viruses + ..\Bet + ..\Fla + ..\Asbestos + ..\Width Q
                                                                                          8⤵
                                                                                            PID:308
                                                                                          • C:\Users\Admin\AppData\Local\Temp\607698\Waters.pif
                                                                                            Waters.pif Q
                                                                                            8⤵
                                                                                              PID:1916
                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                "C:\Windows\System32\cmd.exe" /k "taskkill /f /im "Waters.pif" && timeout 1 && del Waters.pif && Exit"
                                                                                                9⤵
                                                                                                  PID:4140
                                                                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                                                                    taskkill /f /im "Waters.pif"
                                                                                                    10⤵
                                                                                                    • Kills process with taskkill
                                                                                                    PID:4320
                                                                                                  • C:\Windows\SysWOW64\timeout.exe
                                                                                                    timeout 1
                                                                                                    10⤵
                                                                                                    • Delays execution with timeout.exe
                                                                                                    PID:4764
                                                                                              • C:\Windows\SysWOW64\choice.exe
                                                                                                choice /d y /t 5
                                                                                                8⤵
                                                                                                  PID:1776
                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000368001\splwow64.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\1000368001\splwow64.exe"
                                                                                          4⤵
                                                                                          • Executes dropped EXE
                                                                                          • Drops file in Windows directory
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          PID:4276
                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                            "C:\Windows\System32\cmd.exe" /c move Emotions Emotions.bat & Emotions.bat
                                                                                            5⤵
                                                                                            • Loads dropped DLL
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            PID:4640
                                                                                            • C:\Windows\SysWOW64\tasklist.exe
                                                                                              tasklist
                                                                                              6⤵
                                                                                              • Enumerates processes with tasklist
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:5324
                                                                                            • C:\Windows\SysWOW64\findstr.exe
                                                                                              findstr /I "wrsa opssvc"
                                                                                              6⤵
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              PID:5352
                                                                                            • C:\Windows\SysWOW64\tasklist.exe
                                                                                              tasklist
                                                                                              6⤵
                                                                                              • Enumerates processes with tasklist
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:5964
                                                                                            • C:\Windows\SysWOW64\findstr.exe
                                                                                              findstr /I "avastui avgui bdservicehost nswscsvc sophoshealth"
                                                                                              6⤵
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              PID:1792
                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                              cmd /c md 607698
                                                                                              6⤵
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              PID:2224
                                                                                            • C:\Windows\SysWOW64\findstr.exe
                                                                                              findstr /V "MaskBathroomCompositionInjection" Participants
                                                                                              6⤵
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              PID:6284
                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                              cmd /c copy /b ..\Navy + ..\Temperature + ..\Streaming + ..\Ashley + ..\Ensures + ..\Language + ..\Viruses + ..\Bet + ..\Fla + ..\Asbestos + ..\Width Q
                                                                                              6⤵
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              PID:6332
                                                                                            • C:\Users\Admin\AppData\Local\Temp\607698\Waters.pif
                                                                                              Waters.pif Q
                                                                                              6⤵
                                                                                              • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                                              • Executes dropped EXE
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                              • Suspicious use of FindShellTrayWindow
                                                                                              • Suspicious use of SendNotifyMessage
                                                                                              PID:6356
                                                                                            • C:\Windows\SysWOW64\choice.exe
                                                                                              choice /d y /t 5
                                                                                              6⤵
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              PID:1316
                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000370001\PkContent.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\1000370001\PkContent.exe"
                                                                                          4⤵
                                                                                          • Executes dropped EXE
                                                                                          • Loads dropped DLL
                                                                                          • Drops file in Windows directory
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          PID:4904
                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                            "C:\Windows\System32\cmd.exe" /c move Hammer Hammer.bat & Hammer.bat
                                                                                            5⤵
                                                                                            • Loads dropped DLL
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            PID:5140
                                                                                            • C:\Windows\SysWOW64\tasklist.exe
                                                                                              tasklist
                                                                                              6⤵
                                                                                              • Enumerates processes with tasklist
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:3136
                                                                                            • C:\Windows\SysWOW64\findstr.exe
                                                                                              findstr /I "wrsa opssvc"
                                                                                              6⤵
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              PID:3192
                                                                                            • C:\Windows\SysWOW64\tasklist.exe
                                                                                              tasklist
                                                                                              6⤵
                                                                                              • Enumerates processes with tasklist
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:3588
                                                                                            • C:\Windows\SysWOW64\findstr.exe
                                                                                              findstr /I "avastui avgui bdservicehost nswscsvc sophoshealth"
                                                                                              6⤵
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              PID:3708
                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                              cmd /c md 724598
                                                                                              6⤵
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              PID:4332
                                                                                            • C:\Windows\SysWOW64\findstr.exe
                                                                                              findstr /V "WowLiberalCalOfficer" Weight
                                                                                              6⤵
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              PID:4376
                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                              cmd /c copy /b ..\Explorer + ..\West + ..\Agencies + ..\Situated y
                                                                                              6⤵
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              PID:4448
                                                                                            • C:\Users\Admin\AppData\Local\Temp\724598\Thermal.pif
                                                                                              Thermal.pif y
                                                                                              6⤵
                                                                                              • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                                              • Executes dropped EXE
                                                                                              • Loads dropped DLL
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                              • Suspicious use of FindShellTrayWindow
                                                                                              • Suspicious use of SendNotifyMessage
                                                                                              PID:4580
                                                                                              • C:\Users\Admin\AppData\Local\Temp\724598\RegAsm.exe
                                                                                                C:\Users\Admin\AppData\Local\Temp\724598\RegAsm.exe
                                                                                                7⤵
                                                                                                  PID:1760
                                                                                              • C:\Windows\SysWOW64\choice.exe
                                                                                                choice /d y /t 5
                                                                                                6⤵
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                PID:1756
                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                        cmd /c schtasks.exe /create /tn "Tuition" /tr "wscript //B 'C:\Users\Admin\AppData\Local\QuantumDynamics Lab\QuantumFlow.js'" /sc minute /mo 5 /F
                                                                                        2⤵
                                                                                        • System Location Discovery: System Language Discovery
                                                                                        PID:1720
                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                          schtasks.exe /create /tn "Tuition" /tr "wscript //B 'C:\Users\Admin\AppData\Local\QuantumDynamics Lab\QuantumFlow.js'" /sc minute /mo 5 /F
                                                                                          3⤵
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          • Scheduled Task/Job: Scheduled Task
                                                                                          PID:1608
                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                        cmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\QuantumFlow.url" & echo URL="C:\Users\Admin\AppData\Local\QuantumDynamics Lab\QuantumFlow.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\QuantumFlow.url" & exit
                                                                                        2⤵
                                                                                        • Drops startup file
                                                                                        • System Location Discovery: System Language Discovery
                                                                                        PID:1364
                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                        cmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HermesKey.url" & echo URL="C:\Users\Admin\AppData\Local\GuardKey Solutions\HermesKey.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HermesKey.url" & exit
                                                                                        2⤵
                                                                                        • Drops startup file
                                                                                        • System Location Discovery: System Language Discovery
                                                                                        PID:4816
                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                        cmd /c schtasks.exe /create /tn "Tuition" /tr "wscript //B 'C:\Users\Admin\AppData\Local\QuantumDynamics Lab\QuantumFlow.js'" /sc minute /mo 5 /F
                                                                                        2⤵
                                                                                          PID:1772
                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                            schtasks.exe /create /tn "Tuition" /tr "wscript //B 'C:\Users\Admin\AppData\Local\QuantumDynamics Lab\QuantumFlow.js'" /sc minute /mo 5 /F
                                                                                            3⤵
                                                                                            • Scheduled Task/Job: Scheduled Task
                                                                                            PID:1296
                                                                                      • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                                                                        "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                                                                        1⤵
                                                                                          PID:3908

                                                                                        Network

                                                                                        MITRE ATT&CK Enterprise v15

                                                                                        Replay Monitor

                                                                                        Loading Replay Monitor...

                                                                                        Downloads

                                                                                        • C:\Program Files\Google\Chrome\Application\SetupMetrics\d33e6e3e-f7f9-4cef-9c69-cae1d6aae4bc.tmp

                                                                                          Filesize

                                                                                          488B

                                                                                          MD5

                                                                                          6d971ce11af4a6a93a4311841da1a178

                                                                                          SHA1

                                                                                          cbfdbc9b184f340cbad764abc4d8a31b9c250176

                                                                                          SHA256

                                                                                          338ddefb963d5042cae01de7b87ac40f4d78d1bfa2014ff774036f4bc7486783

                                                                                          SHA512

                                                                                          c58b59b9677f70a5bb5efd0ecbf59d2ac21cbc52e661980241d3be33663825e2a7a77adafbcec195e1d9d89d05b9ccb5e5be1a201f92cb1c1f54c258af16e29f

                                                                                        • C:\Users\Admin\1000032042\ko.ps1

                                                                                          Filesize

                                                                                          912B

                                                                                          MD5

                                                                                          fd20fbea11d956f653e48e57533f16b1

                                                                                          SHA1

                                                                                          a852c78bb32389fb4c5abd7d7e748e4ddc4a3695

                                                                                          SHA256

                                                                                          ac8a8901a5dd0728c8626015e509a856c257b2a0e5405d41f7cc0563c7ed28a5

                                                                                          SHA512

                                                                                          fbdae6b8dca3cd596afa8cb54846fb704a89033d34ba8cf7983dd6c288fa318120a09e12b244a1d8b43fa028873f036464fdac05e8f66bff1571d933bde94b53

                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User\Crashpad\settings.dat

                                                                                          Filesize

                                                                                          40B

                                                                                          MD5

                                                                                          5f5d059a6f909c9e511fffcbd90dc5b1

                                                                                          SHA1

                                                                                          501aca078ba471f56c0517531ba78566c20256ea

                                                                                          SHA256

                                                                                          0ca976bc792da4899aa1f98032ced79bb5f8d65cd74fbd247cdbe53617abaf4b

                                                                                          SHA512

                                                                                          0d09834ea19bfa9abe25291f9a158bdb54ba3aaa7e791ae6d1dd28ca9fc728a6a0c426867d664f97f1d6265b51c78b1235cbd80882aa337981dbd2256095e4a8

                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User\Default\DawnCache\data_1

                                                                                          Filesize

                                                                                          264KB

                                                                                          MD5

                                                                                          f50f89a0a91564d0b8a211f8921aa7de

                                                                                          SHA1

                                                                                          112403a17dd69d5b9018b8cede023cb3b54eab7d

                                                                                          SHA256

                                                                                          b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                                                                          SHA512

                                                                                          bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User\Default\Preferences

                                                                                          Filesize

                                                                                          7KB

                                                                                          MD5

                                                                                          8c3b54e449dcd6212705f42e982642ca

                                                                                          SHA1

                                                                                          861478beafea1865a9f43f8bec0d4870a82b5ff8

                                                                                          SHA256

                                                                                          c9c13c508f886a9aadedd81339574ddefacc48d98d2f16eb3db65b33f3b27667

                                                                                          SHA512

                                                                                          bbe89948ff30057f837a0c9d0e48cfcc7e269f68cd251542f01bae573bef68145e38ecab46ebd17163c72ddb40ac88d7057ac68aa81826f741c68433867322be

                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User\Default\Site Characteristics Database\CURRENT

                                                                                          Filesize

                                                                                          16B

                                                                                          MD5

                                                                                          46295cac801e5d4857d09837238a6394

                                                                                          SHA1

                                                                                          44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                                          SHA256

                                                                                          0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                                          SHA512

                                                                                          8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User\Default\Sync Data\LevelDB\000002.dbtmp

                                                                                          Filesize

                                                                                          16B

                                                                                          MD5

                                                                                          206702161f94c5cd39fadd03f4014d98

                                                                                          SHA1

                                                                                          bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                                                                          SHA256

                                                                                          1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                                                                          SHA512

                                                                                          0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User\Default\Sync Data\LevelDB\MANIFEST-000001

                                                                                          Filesize

                                                                                          41B

                                                                                          MD5

                                                                                          5af87dfd673ba2115e2fcf5cfdb727ab

                                                                                          SHA1

                                                                                          d5b5bbf396dc291274584ef71f444f420b6056f1

                                                                                          SHA256

                                                                                          f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                                                                          SHA512

                                                                                          de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User\Default\a429213c-2405-47a0-81d6-97569a0bb1a3.tmp

                                                                                          Filesize

                                                                                          7KB

                                                                                          MD5

                                                                                          7ce6b2911a3b74d5602f09e8b2621857

                                                                                          SHA1

                                                                                          4aa503600522599e41779d9509aeffab336ed2f8

                                                                                          SHA256

                                                                                          4ac3aa18a12ef5307d2d95b5961688365ff740ef9738e7bdcccecd427a5ab625

                                                                                          SHA512

                                                                                          2e42db86214be882a7f94a888aebefa14909e9863b9674175ab341bfa54a33e86c64165e7d3320d6ef518643b2c6474b29882fe76187e6a05b37248ec629431a

                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User\ShaderCache\data_0

                                                                                          Filesize

                                                                                          8KB

                                                                                          MD5

                                                                                          cf89d16bb9107c631daabf0c0ee58efb

                                                                                          SHA1

                                                                                          3ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b

                                                                                          SHA256

                                                                                          d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e

                                                                                          SHA512

                                                                                          8cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0

                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User\ShaderCache\data_2

                                                                                          Filesize

                                                                                          8KB

                                                                                          MD5

                                                                                          0962291d6d367570bee5454721c17e11

                                                                                          SHA1

                                                                                          59d10a893ef321a706a9255176761366115bedcb

                                                                                          SHA256

                                                                                          ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7

                                                                                          SHA512

                                                                                          f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed

                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User\ShaderCache\data_3

                                                                                          Filesize

                                                                                          8KB

                                                                                          MD5

                                                                                          41876349cb12d6db992f1309f22df3f0

                                                                                          SHA1

                                                                                          5cf26b3420fc0302cd0a71e8d029739b8765be27

                                                                                          SHA256

                                                                                          e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c

                                                                                          SHA512

                                                                                          e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e

                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User\a291943c-f4de-451c-b669-265f6f35c613.tmp

                                                                                          Filesize

                                                                                          1KB

                                                                                          MD5

                                                                                          7c2dc282da53cb3f80c609707fc72bf9

                                                                                          SHA1

                                                                                          da1b3ed8823f5cf63dc05e57d9ade8be50e10bb0

                                                                                          SHA256

                                                                                          9b0dc039fc7c3025a0f95ce71490dd68df9aee24b29f45a74ab1b71cf242d299

                                                                                          SHA512

                                                                                          560a0db6b27b9354369062585fc0f8115d83880b0be9066a82c692de13900fd3dbb09feb4a912de2f52cd3f60421842470009b74ffd374d231ad4b8120df5ee4

                                                                                        • C:\Users\Admin\AppData\Local\QuantumDynamics Lab\QuantumFlow.scr

                                                                                          Filesize

                                                                                          872KB

                                                                                          MD5

                                                                                          18ce19b57f43ce0a5af149c96aecc685

                                                                                          SHA1

                                                                                          1bd5ca29fc35fc8ac346f23b155337c5b28bbc36

                                                                                          SHA256

                                                                                          d8b7c7178fbadbf169294e4f29dce582f89a5cf372e9da9215aa082330dc12fd

                                                                                          SHA512

                                                                                          a0c58f04dfb49272a2b6f1e8ce3f541a030a6c7a09bb040e660fc4cd9892ca3ac39cf3d6754c125f7cd1987d1fca01640a153519b4e2eb3e3b4b8c9dc1480558

                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000002001\gold.exe

                                                                                          Filesize

                                                                                          314KB

                                                                                          MD5

                                                                                          f2d385ddbb2edafacd070f103f7f1576

                                                                                          SHA1

                                                                                          5ee6cb80bc943476067c148e5c16738b7b062029

                                                                                          SHA256

                                                                                          d56a1a5602b5e72b8b9b2d6f2e0c5bc689682d0983f30b8c66dad9af093679b3

                                                                                          SHA512

                                                                                          e6ee00d15483ef29fb7e48ed28833ce5059f7bfada96b92c350246f6032f85d318571950bf6d2ee557e417e87d24d90965aa1523782416792fa7eb7354266df5

                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000004001\12dsvc.exe

                                                                                          Filesize

                                                                                          1006KB

                                                                                          MD5

                                                                                          c005d4ffa3e28c22b41a9d222598260a

                                                                                          SHA1

                                                                                          57cc3a6540bc38c649ddfdd54fa4f3c8a2423677

                                                                                          SHA256

                                                                                          799d10acbb0e2886c4d32c771964f4c2cb47f93c817cdc26a9acaefa3ba042cb

                                                                                          SHA512

                                                                                          ce39903c46160deeee1c7b362000361a3f5a9243b2e180bbaafa5b8ab09cc09ca413ce32f4deb2074fa928110d25b3dae7465c849fc388a58ddf649a9caa3a68

                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000005001\Nework.exe

                                                                                          Filesize

                                                                                          416KB

                                                                                          MD5

                                                                                          f5d7b79ee6b6da6b50e536030bcc3b59

                                                                                          SHA1

                                                                                          751b555a8eede96d55395290f60adc43b28ba5e2

                                                                                          SHA256

                                                                                          2f1aff28961ba0ce85ea0e35b8936bc387f84f459a4a1d63d964ce79e34b8459

                                                                                          SHA512

                                                                                          532b17cd2a6ac5172b1ddba1e63edd51ab53a4527204415241e3a78e8ffeb9728071bde5ae1eefabefd2627f00963f8a5458668cd7b8df041c8683252ff56b46

                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe

                                                                                          Filesize

                                                                                          187KB

                                                                                          MD5

                                                                                          7a02aa17200aeac25a375f290a4b4c95

                                                                                          SHA1

                                                                                          7cc94ca64268a9a9451fb6b682be42374afc22fd

                                                                                          SHA256

                                                                                          836799fd760eba25e15a55c75c50b977945c557065a708317e00f2c8f965339e

                                                                                          SHA512

                                                                                          f6ebfe7e087aa354722cea3fddd99b1883a862fb92bb5a5a86782ea846a1bff022ab7db4397930bcabaa05cb3d817de3a89331d41a565bc1da737f2c5e3720b6

                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000070001\javtestnoreport.exe

                                                                                          Filesize

                                                                                          989KB

                                                                                          MD5

                                                                                          f0cb6a0555896e017b2f778a847b0196

                                                                                          SHA1

                                                                                          918e72af4ce78588f2d6fad65a91256ad69e1d8c

                                                                                          SHA256

                                                                                          8c3c459481bb940ad69a704a041516f42012775c60f288c731a394954e3eda3c

                                                                                          SHA512

                                                                                          af5ab34ba0faad80926c39bd97ae9e7521e1ae7a94ef7e71c20a837797cceaa01d728e186c8f75f754e535ff92a7c46e721aad43076fd6b855520971e4251e80

                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000191001\needmoney.exe

                                                                                          Filesize

                                                                                          4.1MB

                                                                                          MD5

                                                                                          7fa5c660d124162c405984d14042506f

                                                                                          SHA1

                                                                                          69f0dff06ff1911b97a2a0aa4ca9046b722c6b2f

                                                                                          SHA256

                                                                                          fd3edfaff77dd969e3e0d086495e4c742d00e111df9f935ed61dfba8392584b2

                                                                                          SHA512

                                                                                          d50848adbfe75f509414acc97096dad191ae4cef54752bdddcb227ffc0f59bfd2770561e7b3c2a14f4a1423215f05847206ad5c242c7fd5b0655edf513b22f6c

                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000254001\penis.exe

                                                                                          Filesize

                                                                                          409KB

                                                                                          MD5

                                                                                          a21700718c70ec5e787ad373cb72a757

                                                                                          SHA1

                                                                                          027554ab5ff3245e7617f3b83d6548bf7919f92e

                                                                                          SHA256

                                                                                          87e639ecc7704cb5e29f1ebb1d8ade3ae863aaa2505a37b28f2d45121da500c6

                                                                                          SHA512

                                                                                          ea292a5442d9fe536e650a2bc5142dd3aef79c66930243897e0e87c57915f0a54e45e03e58daffb473f85fe10b963d4670050bff5ab3f91121d21d463e25659b

                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000290001\crypted.exe

                                                                                          Filesize

                                                                                          314KB

                                                                                          MD5

                                                                                          ff5afed0a8b802d74af1c1422c720446

                                                                                          SHA1

                                                                                          7135acfa641a873cb0c4c37afc49266bfeec91d8

                                                                                          SHA256

                                                                                          17ac37b4946539fa7fa68b12bd80946d340497a7971802b5848830ad99ea1e10

                                                                                          SHA512

                                                                                          11724d26e11b3146e0fc947c06c59c004c015de0afea24ec28a4eb8145fcd51e9b70007e17621c83f406d9aeb7cd96601245671d41c3fcc88a27c33bd7cf55ac

                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000314001\LummaC222222.exe

                                                                                          Filesize

                                                                                          352KB

                                                                                          MD5

                                                                                          2f1d09f64218fffe7243a8b44345b27e

                                                                                          SHA1

                                                                                          72553e1b3a759c17f54e7b568f39b3f8f1b1cdbe

                                                                                          SHA256

                                                                                          4a553c39728410eb0ebd5e530fc47ef1bdf4b11848a69889e8301974fc26cde2

                                                                                          SHA512

                                                                                          5871e2925ca8375f3c3ce368c05eb67796e1fbec80649d3cc9c39b57ee33f46476d38d3ea8335e2f5518c79f27411a568209f9f6ef38a56650c7436bbaa3f909

                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000322001\newbundle2.exe

                                                                                          Filesize

                                                                                          304KB

                                                                                          MD5

                                                                                          58e8b2eb19704c5a59350d4ff92e5ab6

                                                                                          SHA1

                                                                                          171fc96dda05e7d275ec42840746258217d9caf0

                                                                                          SHA256

                                                                                          07d4b7768e13d79ac5f05f81167b29bb6fbf97828a289d8d11eec38939846834

                                                                                          SHA512

                                                                                          e7655762c5f2d10ec246d11f82d437a2717ad05be847b5e0fd055e3241caaca85430f424055b343e3a44c90d76a0ba07a6913c2208f374f59b61f8aa4477889f

                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000342001\rstxdhuj.exe

                                                                                          Filesize

                                                                                          963KB

                                                                                          MD5

                                                                                          1ef39c8bc5799aa381fe093a1f2d532a

                                                                                          SHA1

                                                                                          57eabb02a7c43c9682988227dd470734cc75edb2

                                                                                          SHA256

                                                                                          0cced5b50789fca3ad4b2c151b798363d712da04c377bd704dcef4898e66b2b4

                                                                                          SHA512

                                                                                          13a9c267c4ceb2bd176f1339faa035ffeb08936deeeb4e38252ea43cfe487ea1c1876e4cc2a965548e767af02805a1da62885e6538da056be0c6fae33b637682

                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000354001\3956d58270.exe

                                                                                          Filesize

                                                                                          1.7MB

                                                                                          MD5

                                                                                          8b9eb06428cfa535621a9ae6da0ef6b1

                                                                                          SHA1

                                                                                          0df1c0d663fbb4f15749a3046d839285d511c133

                                                                                          SHA256

                                                                                          1133b8d4f053603691149fa3512ddc2c5dec2aa2fa3938ec82d250c30a6aecbe

                                                                                          SHA512

                                                                                          7f2b93f39ea9eab0d6b99d09c5e5c35cf1cc7ba78ff0f101f2fdf5af1f18f9b258c318ea6ff0557c1ce4623f470c189ec8cc33d2d2609923bd957d14cc383bb3

                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000355001\c88f052609.exe

                                                                                          Filesize

                                                                                          1.8MB

                                                                                          MD5

                                                                                          e3a141376d59494db851e7252289fe13

                                                                                          SHA1

                                                                                          2cffc738185669f2a1dbdd7d7bd1e80a9048c6dc

                                                                                          SHA256

                                                                                          168c011e708b10d9a11bdca5115d028862b2640575c695a87fa39056e7953d97

                                                                                          SHA512

                                                                                          41dee3aaf4a42c181a1bc1322968ca011113292421161b266518419b43e35bc0d45ab6dfa9e00f5efeaead11cebebc7ad5d9077630f1be645b088de1b42e1f6d

                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000365001\lummetc.exe

                                                                                          Filesize

                                                                                          352KB

                                                                                          MD5

                                                                                          2fe92adf3fe6c95c045d07f3d2ecd2ed

                                                                                          SHA1

                                                                                          42d1d4b670b60ff3f27c3cc5b8134b67e9c4a138

                                                                                          SHA256

                                                                                          13167320a0e8266a56694be70a9560c83e2c645d6eeaa147b9ae585c2960ebb2

                                                                                          SHA512

                                                                                          0af7b4a3ce3981707ca450b90829a4a8e933ea3cd3affbce738265a1a0647e96323117db325d0e5e3884f67f36b21b8c955b6c3c6dda21d9b01212e28ef88d65

                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000367001\processclass.exe

                                                                                          Filesize

                                                                                          6KB

                                                                                          MD5

                                                                                          c042782226565f89ce3954489075e516

                                                                                          SHA1

                                                                                          256dd5ba42837a33c7aa6cb71cef33d5617117ee

                                                                                          SHA256

                                                                                          a7b63cd9959ac6f23c86644a4ca5411b519855d47f1f5e75a1645d7274f545a6

                                                                                          SHA512

                                                                                          9f0771c66ea7c0a2264b99a8782e3ab88a2d74b609265b5ce14f81dcc52b71e46248abd77767018711d72a18e20fe3b272513bfd722fff9043f962f7c8ed93fd

                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000368001\splwow64.exe

                                                                                          Filesize

                                                                                          1.3MB

                                                                                          MD5

                                                                                          2b01c9b0c69f13da5ee7889a4b17c45e

                                                                                          SHA1

                                                                                          27f0c1ae0ddeddc9efac38bc473476b103fef043

                                                                                          SHA256

                                                                                          d5526528363ceeb718d30bc669038759c4cd80a1d3e9c8c661b12b261dcc9e29

                                                                                          SHA512

                                                                                          23d4a0fc82b70cd2454a1be3d9b84b8ce7dd00ad7c3e8ad2b771b1b7cbca752c53feec5a3ac5a81d8384a9fc6583f63cc39f1ebe7de04d3d9b08be53641ec455

                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000370001\PkContent.exe

                                                                                          Filesize

                                                                                          810KB

                                                                                          MD5

                                                                                          87c051a77edc0cc77a4d791ef72367d1

                                                                                          SHA1

                                                                                          5d5bab642235f0af7d9afe3cacec5ae2a4cfc8e5

                                                                                          SHA256

                                                                                          b63bf28780e02bf0bb1bb59dec135e6263f4c582724c95eee0519b279022f31c

                                                                                          SHA512

                                                                                          259a3f823d5051fcc9e87ceacf25557ab17f5d26ff4f0c17801d9ef83a23d2a51261a73e5ba9c3caf1ca2feb18a569458f17a2a5d56b542b86d6a124a42d4c2c

                                                                                        • C:\Users\Admin\AppData\Local\Temp\607698\Q

                                                                                          Filesize

                                                                                          794KB

                                                                                          MD5

                                                                                          7b5632dcd418bcbae2a9009dbaf85f37

                                                                                          SHA1

                                                                                          32aaf06166854718f0bcbb2f7173c2732cfb4d33

                                                                                          SHA256

                                                                                          361e9c3b62719b79bc280420b5f710e160fd55f2250bf605911ded7162483db4

                                                                                          SHA512

                                                                                          c834e90ccf2d35529c294319b8e9a49db7a7d67d0567e0739131d5af51170db32076d68147dc101f8047a75cb5b2275b25a9c8346a99a146a6798b9764316838

                                                                                        • C:\Users\Admin\AppData\Local\Temp\Cab8DFF.tmp

                                                                                          Filesize

                                                                                          70KB

                                                                                          MD5

                                                                                          49aebf8cbd62d92ac215b2923fb1b9f5

                                                                                          SHA1

                                                                                          1723be06719828dda65ad804298d0431f6aff976

                                                                                          SHA256

                                                                                          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                                                                          SHA512

                                                                                          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                                                                                        • C:\Users\Admin\AppData\Local\Temp\Tar8EFC.tmp

                                                                                          Filesize

                                                                                          181KB

                                                                                          MD5

                                                                                          4ea6026cf93ec6338144661bf1202cd1

                                                                                          SHA1

                                                                                          a1dec9044f750ad887935a01430bf49322fbdcb7

                                                                                          SHA256

                                                                                          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                                                                                          SHA512

                                                                                          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                                                                                        • C:\Users\Admin\AppData\Local\Temp\Tmp7BC6.tmp

                                                                                          Filesize

                                                                                          2KB

                                                                                          MD5

                                                                                          1420d30f964eac2c85b2ccfe968eebce

                                                                                          SHA1

                                                                                          bdf9a6876578a3e38079c4f8cf5d6c79687ad750

                                                                                          SHA256

                                                                                          f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9

                                                                                          SHA512

                                                                                          6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8

                                                                                        • C:\Users\Admin\AppData\Local\Temp\scoped_dir5764_1780747838\20c99327-3bbf-425b-b1ad-c8978ead4b07.tmp

                                                                                          Filesize

                                                                                          88KB

                                                                                          MD5

                                                                                          2cc86b681f2cd1d9f095584fd3153a61

                                                                                          SHA1

                                                                                          2a0ac7262fb88908a453bc125c5c3fc72b8d490e

                                                                                          SHA256

                                                                                          d412fbbeb84e2a6882b2f0267b058f2ceb97f501e440fe3f9f70fac5c2277b9c

                                                                                          SHA512

                                                                                          14ba32c3cd5b1faf100d06f78981deebbbb673299a355b6eaec88e6cb5543725242c850235a541afa8abba4a609bb2ec26e4a0526c6b198016b08d8af868b986

                                                                                        • C:\Users\Admin\AppData\Local\Temp\scoped_dir5764_1780747838\CRX_INSTALL\_locales\en\messages.json

                                                                                          Filesize

                                                                                          851B

                                                                                          MD5

                                                                                          07ffbe5f24ca348723ff8c6c488abfb8

                                                                                          SHA1

                                                                                          6dc2851e39b2ee38f88cf5c35a90171dbea5b690

                                                                                          SHA256

                                                                                          6895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c

                                                                                          SHA512

                                                                                          7ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6

                                                                                        • C:\Users\Admin\AppData\Local\Temp\scoped_dir5764_1780747838\CRX_INSTALL\_locales\en_CA\messages.json

                                                                                          Filesize

                                                                                          711B

                                                                                          MD5

                                                                                          558659936250e03cc14b60ebf648aa09

                                                                                          SHA1

                                                                                          32f1ce0361bbfdff11e2ffd53d3ae88a8b81a825

                                                                                          SHA256

                                                                                          2445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b

                                                                                          SHA512

                                                                                          1632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727

                                                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3434294380-2554721341-1919518612-1000\76b53b3ec448f7ccdda2063b15d2bfc3_d9071d2c-e5ad-4187-a976-30114bb93bf6

                                                                                          Filesize

                                                                                          2KB

                                                                                          MD5

                                                                                          6457068d06d793a5a00c808a03324ecd

                                                                                          SHA1

                                                                                          2b5d64256d9b613e29fa0bdc205ac534b622a89d

                                                                                          SHA256

                                                                                          d7dbe9d0cde056aec2a625cf107a24af6350544a2dbf045a00afd3451c03a5e3

                                                                                          SHA512

                                                                                          b6290bd550c9398163c2910ec482b19f7c2c1fa14f849fe3cf9f71bdf148794dce4c896e2434e42c1f92b864c51dae5c94608836f23bd0cfc8efff4ba5299d2d

                                                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3434294380-2554721341-1919518612-1000\76b53b3ec448f7ccdda2063b15d2bfc3_d9071d2c-e5ad-4187-a976-30114bb93bf6

                                                                                          Filesize

                                                                                          2KB

                                                                                          MD5

                                                                                          bc77efcd542ba8ed71b8c7919c2c6833

                                                                                          SHA1

                                                                                          d5cb2bed67b0c392600cb5ed2ba98e0eb77926b4

                                                                                          SHA256

                                                                                          c18f7b8a05f15d4dace2757d33624e18367d30eed9219e2d36e5bf9d4889202a

                                                                                          SHA512

                                                                                          6bbcd72989556092c0efc9f28c806c649a4fa478b906b1ccbff111c7a5c4e541938efb26412898de97e1c27eb4f23f5396c89981dc819f841d1f74217acaa228

                                                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\DTGHSRMPO5VJV91NXLZ3.temp

                                                                                          Filesize

                                                                                          7KB

                                                                                          MD5

                                                                                          a925cb4695a7a9daaaba971d7ea5b03c

                                                                                          SHA1

                                                                                          1b2d2e21ab06c5266523e5b4ffaf9bfcbc4b1cb7

                                                                                          SHA256

                                                                                          01959cbaa686a81378430eef955c523be0ad20261535e83a867c08e921600bb1

                                                                                          SHA512

                                                                                          06bfa9258636a0bb5ee6e826701f0d2365f408776a18392ecd49f7c487f02f32a05b6886be8461c0585755e525072bdf4d5ef5faeefe0ee6f88baeb8678b575c

                                                                                        • C:\Users\Public\Desktop\Google Chrome.lnk

                                                                                          Filesize

                                                                                          2KB

                                                                                          MD5

                                                                                          9a1007aa4605dfdbced6395f0202db9b

                                                                                          SHA1

                                                                                          47b4f39411d258c6be8de5cc4c7e39b2eadab619

                                                                                          SHA256

                                                                                          77c749ce967d0437f8dce2184f9d45c89a1144fcdf99c9dc6cc8535a3f45cf11

                                                                                          SHA512

                                                                                          f1dea9df274f810dbd972b897df67b7e434f49e982155c43bd698b92aa3fec663fb77df6f2480218bfcb5f6b38bc7d41de4aebe90de7cadbd5109cfc50ccb0e3

                                                                                        • \ProgramData\mozglue.dll

                                                                                          Filesize

                                                                                          593KB

                                                                                          MD5

                                                                                          c8fd9be83bc728cc04beffafc2907fe9

                                                                                          SHA1

                                                                                          95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                                                          SHA256

                                                                                          ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                                                          SHA512

                                                                                          fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                                                        • \ProgramData\nss3.dll

                                                                                          Filesize

                                                                                          2.0MB

                                                                                          MD5

                                                                                          1cc453cdf74f31e4d913ff9c10acdde2

                                                                                          SHA1

                                                                                          6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                                                                          SHA256

                                                                                          ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                                                                          SHA512

                                                                                          dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                                                                        • \Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe

                                                                                          Filesize

                                                                                          1.8MB

                                                                                          MD5

                                                                                          fd07283a91157618934fee802604fea0

                                                                                          SHA1

                                                                                          889820e0182d475e7f4332290fcc5d40e3b0bc8c

                                                                                          SHA256

                                                                                          97d8afaa50d9d0feb69d11ecdf7fc95a8762ba97458ece1216bb9d85ba6bf946

                                                                                          SHA512

                                                                                          6c9e4c325887717230e82ff2e57118bedec14147c7e0af4bb569ea7387f9b6df23c91b42e79cf3ced285ed75e7df69c14a537d40ccd76cbfef53c608df0cfa69

                                                                                        • \Users\Admin\AppData\Local\Temp\svchost015.exe

                                                                                          Filesize

                                                                                          2.9MB

                                                                                          MD5

                                                                                          b826dd92d78ea2526e465a34324ebeea

                                                                                          SHA1

                                                                                          bf8a0093acfd2eb93c102e1a5745fb080575372e

                                                                                          SHA256

                                                                                          7824b50acdd144764dac7445a4067b35cf0fef619e451045ab6c1f54f5653a5b

                                                                                          SHA512

                                                                                          1ac4b731b9b31cabf3b1c43aee37206aee5326c8e786abe2ab38e031633b778f97f2d6545cf745c3066f3bd47b7aaf2ded2f9955475428100eaf271dd9aeef17

                                                                                        • \Users\Admin\AppData\Roaming\eXdFKNSXGF.exe

                                                                                          Filesize

                                                                                          304KB

                                                                                          MD5

                                                                                          65c058e4a90d2ec70b03211d768b6ecc

                                                                                          SHA1

                                                                                          bf5af6f650759e5e612d42d72145660056737164

                                                                                          SHA256

                                                                                          5a00e3718afb5bfb18a6b1c824b680015733f0403af0d5663289a17ba8206cc3

                                                                                          SHA512

                                                                                          3d9114409f8096ce8a1d134a48235fbbad0c6c53f820707a951bac42c4f7ba6a38e98a50c9d929f049042263a7c0e24da8368d3aa4e934f5da79e9bda4a930aa

                                                                                        • \Users\Admin\AppData\Roaming\uOCjOdPaWk.exe

                                                                                          Filesize

                                                                                          490KB

                                                                                          MD5

                                                                                          b473c40205c61dc4750bc49f779908dd

                                                                                          SHA1

                                                                                          88a0fc0962099f0ac2d827d2c4d691ed9cade251

                                                                                          SHA256

                                                                                          8707c03158ba6395a11bdfd8c1b11eeedc2e052d3b55d73d0a5c64417e5fbd3b

                                                                                          SHA512

                                                                                          8fbaaa5bde30fe7c6e31a349c14e3bd710e92c4dbcca8cbdbaf34583887bc31e07e10a0223fc6c6c0d091787c296eba139ec91af44ec4ee6abbfb611493951d1

                                                                                        • memory/584-104-0x00000000000D0000-0x0000000000150000-memory.dmp

                                                                                          Filesize

                                                                                          512KB

                                                                                        • memory/1108-103-0x0000000000BB0000-0x0000000000C02000-memory.dmp

                                                                                          Filesize

                                                                                          328KB

                                                                                        • memory/1112-1638-0x0000000000EC0000-0x0000000001551000-memory.dmp

                                                                                          Filesize

                                                                                          6.6MB

                                                                                        • memory/1112-1636-0x0000000000EC0000-0x0000000001551000-memory.dmp

                                                                                          Filesize

                                                                                          6.6MB

                                                                                        • memory/1520-290-0x0000000000400000-0x000000000081B000-memory.dmp

                                                                                          Filesize

                                                                                          4.1MB

                                                                                        • memory/1596-286-0x0000000000400000-0x0000000000643000-memory.dmp

                                                                                          Filesize

                                                                                          2.3MB

                                                                                        • memory/1596-1506-0x0000000000400000-0x0000000000643000-memory.dmp

                                                                                          Filesize

                                                                                          2.3MB

                                                                                        • memory/1596-282-0x0000000000400000-0x0000000000643000-memory.dmp

                                                                                          Filesize

                                                                                          2.3MB

                                                                                        • memory/1596-278-0x0000000000400000-0x0000000000643000-memory.dmp

                                                                                          Filesize

                                                                                          2.3MB

                                                                                        • memory/1596-284-0x0000000000400000-0x0000000000643000-memory.dmp

                                                                                          Filesize

                                                                                          2.3MB

                                                                                        • memory/1596-291-0x0000000000400000-0x0000000000643000-memory.dmp

                                                                                          Filesize

                                                                                          2.3MB

                                                                                        • memory/1596-292-0x0000000000400000-0x0000000000643000-memory.dmp

                                                                                          Filesize

                                                                                          2.3MB

                                                                                        • memory/1596-288-0x0000000000400000-0x0000000000643000-memory.dmp

                                                                                          Filesize

                                                                                          2.3MB

                                                                                        • memory/1596-280-0x0000000000400000-0x0000000000643000-memory.dmp

                                                                                          Filesize

                                                                                          2.3MB

                                                                                        • memory/1716-59-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                          Filesize

                                                                                          328KB

                                                                                        • memory/1716-50-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                          Filesize

                                                                                          328KB

                                                                                        • memory/1716-58-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                          Filesize

                                                                                          328KB

                                                                                        • memory/1716-57-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                          Filesize

                                                                                          328KB

                                                                                        • memory/1716-54-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                          Filesize

                                                                                          328KB

                                                                                        • memory/1716-52-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                          Filesize

                                                                                          328KB

                                                                                        • memory/1716-48-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                          Filesize

                                                                                          328KB

                                                                                        • memory/1716-56-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                                                                                          Filesize

                                                                                          4KB

                                                                                        • memory/1760-2119-0x0000000000090000-0x00000000000A8000-memory.dmp

                                                                                          Filesize

                                                                                          96KB

                                                                                        • memory/2176-386-0x0000000000970000-0x00000000009C2000-memory.dmp

                                                                                          Filesize

                                                                                          328KB

                                                                                        • memory/2500-46-0x0000000000F60000-0x0000000000FB4000-memory.dmp

                                                                                          Filesize

                                                                                          336KB

                                                                                        • memory/2668-30-0x0000000001350000-0x0000000001813000-memory.dmp

                                                                                          Filesize

                                                                                          4.8MB

                                                                                        • memory/2668-31-0x0000000001350000-0x0000000001813000-memory.dmp

                                                                                          Filesize

                                                                                          4.8MB

                                                                                        • memory/2668-1538-0x0000000006CA0000-0x0000000007160000-memory.dmp

                                                                                          Filesize

                                                                                          4.8MB

                                                                                        • memory/2668-18-0x0000000000D30000-0x0000000000D31000-memory.dmp

                                                                                          Filesize

                                                                                          4KB

                                                                                        • memory/2668-163-0x0000000001350000-0x0000000001813000-memory.dmp

                                                                                          Filesize

                                                                                          4.8MB

                                                                                        • memory/2668-19-0x0000000000E10000-0x0000000000E11000-memory.dmp

                                                                                          Filesize

                                                                                          4KB

                                                                                        • memory/2668-20-0x0000000000BC0000-0x0000000000BC1000-memory.dmp

                                                                                          Filesize

                                                                                          4KB

                                                                                        • memory/2668-21-0x0000000000E80000-0x0000000000E81000-memory.dmp

                                                                                          Filesize

                                                                                          4KB

                                                                                        • memory/2668-22-0x0000000000530000-0x0000000000531000-memory.dmp

                                                                                          Filesize

                                                                                          4KB

                                                                                        • memory/2668-23-0x0000000000A80000-0x0000000000A81000-memory.dmp

                                                                                          Filesize

                                                                                          4KB

                                                                                        • memory/2668-24-0x0000000000BB0000-0x0000000000BB1000-memory.dmp

                                                                                          Filesize

                                                                                          4KB

                                                                                        • memory/2668-25-0x0000000000D20000-0x0000000000D21000-memory.dmp

                                                                                          Filesize

                                                                                          4KB

                                                                                        • memory/2668-26-0x0000000000CD0000-0x0000000000CD1000-memory.dmp

                                                                                          Filesize

                                                                                          4KB

                                                                                        • memory/2668-234-0x0000000001350000-0x0000000001813000-memory.dmp

                                                                                          Filesize

                                                                                          4.8MB

                                                                                        • memory/2668-120-0x0000000001350000-0x0000000001813000-memory.dmp

                                                                                          Filesize

                                                                                          4.8MB

                                                                                        • memory/2668-1633-0x0000000006CA0000-0x0000000007160000-memory.dmp

                                                                                          Filesize

                                                                                          4.8MB

                                                                                        • memory/2668-1602-0x0000000006CA0000-0x0000000007331000-memory.dmp

                                                                                          Filesize

                                                                                          6.6MB

                                                                                        • memory/2668-27-0x0000000000A70000-0x0000000000A71000-memory.dmp

                                                                                          Filesize

                                                                                          4KB

                                                                                        • memory/2668-28-0x0000000001351000-0x000000000137F000-memory.dmp

                                                                                          Filesize

                                                                                          184KB

                                                                                        • memory/2668-1575-0x0000000006CA0000-0x0000000007331000-memory.dmp

                                                                                          Filesize

                                                                                          6.6MB

                                                                                        • memory/2668-160-0x0000000006CA0000-0x0000000006EE3000-memory.dmp

                                                                                          Filesize

                                                                                          2.3MB

                                                                                        • memory/2668-17-0x0000000001350000-0x0000000001813000-memory.dmp

                                                                                          Filesize

                                                                                          4.8MB

                                                                                        • memory/2668-1520-0x0000000006CA0000-0x0000000007331000-memory.dmp

                                                                                          Filesize

                                                                                          6.6MB

                                                                                        • memory/2668-161-0x0000000006CA0000-0x0000000006EE3000-memory.dmp

                                                                                          Filesize

                                                                                          2.3MB

                                                                                        • memory/2668-1521-0x0000000006CA0000-0x0000000007331000-memory.dmp

                                                                                          Filesize

                                                                                          6.6MB

                                                                                        • memory/2668-2819-0x0000000006CA0000-0x0000000006EE3000-memory.dmp

                                                                                          Filesize

                                                                                          2.3MB

                                                                                        • memory/2668-2820-0x0000000006CA0000-0x0000000006EE3000-memory.dmp

                                                                                          Filesize

                                                                                          2.3MB

                                                                                        • memory/2816-319-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                          Filesize

                                                                                          328KB

                                                                                        • memory/2816-311-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                          Filesize

                                                                                          328KB

                                                                                        • memory/2816-318-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                          Filesize

                                                                                          328KB

                                                                                        • memory/2816-320-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                          Filesize

                                                                                          328KB

                                                                                        • memory/2816-315-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                          Filesize

                                                                                          328KB

                                                                                        • memory/2816-313-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                          Filesize

                                                                                          328KB

                                                                                        • memory/2904-3-0x0000000000290000-0x0000000000753000-memory.dmp

                                                                                          Filesize

                                                                                          4.8MB

                                                                                        • memory/2904-0-0x0000000000290000-0x0000000000753000-memory.dmp

                                                                                          Filesize

                                                                                          4.8MB

                                                                                        • memory/2904-13-0x0000000006A00000-0x0000000006EC3000-memory.dmp

                                                                                          Filesize

                                                                                          4.8MB

                                                                                        • memory/2904-16-0x0000000000290000-0x0000000000753000-memory.dmp

                                                                                          Filesize

                                                                                          4.8MB

                                                                                        • memory/2904-1-0x00000000772F0000-0x00000000772F2000-memory.dmp

                                                                                          Filesize

                                                                                          8KB

                                                                                        • memory/2904-4-0x0000000000290000-0x0000000000753000-memory.dmp

                                                                                          Filesize

                                                                                          4.8MB

                                                                                        • memory/2904-2-0x0000000000291000-0x00000000002BF000-memory.dmp

                                                                                          Filesize

                                                                                          184KB

                                                                                        • memory/2908-274-0x0000000000A40000-0x0000000000AAC000-memory.dmp

                                                                                          Filesize

                                                                                          432KB

                                                                                        • memory/2936-307-0x0000000001340000-0x0000000001394000-memory.dmp

                                                                                          Filesize

                                                                                          336KB

                                                                                        • memory/2960-1634-0x0000000006DA0000-0x0000000007431000-memory.dmp

                                                                                          Filesize

                                                                                          6.6MB

                                                                                        • memory/2960-1556-0x0000000000880000-0x0000000000D40000-memory.dmp

                                                                                          Filesize

                                                                                          4.8MB

                                                                                        • memory/2960-1635-0x0000000006DA0000-0x0000000007431000-memory.dmp

                                                                                          Filesize

                                                                                          6.6MB

                                                                                        • memory/2960-1662-0x0000000000880000-0x0000000000D40000-memory.dmp

                                                                                          Filesize

                                                                                          4.8MB

                                                                                        • memory/2960-1909-0x0000000006DA0000-0x0000000007431000-memory.dmp

                                                                                          Filesize

                                                                                          6.6MB

                                                                                        • memory/2972-428-0x0000000004F40000-0x0000000005028000-memory.dmp

                                                                                          Filesize

                                                                                          928KB

                                                                                        • memory/2972-1496-0x00000000047B0000-0x0000000004818000-memory.dmp

                                                                                          Filesize

                                                                                          416KB

                                                                                        • memory/2972-417-0x0000000000100000-0x00000000001F8000-memory.dmp

                                                                                          Filesize

                                                                                          992KB

                                                                                        • memory/2972-1498-0x0000000004820000-0x0000000004874000-memory.dmp

                                                                                          Filesize

                                                                                          336KB

                                                                                        • memory/2972-422-0x0000000004F40000-0x0000000005028000-memory.dmp

                                                                                          Filesize

                                                                                          928KB

                                                                                        • memory/2972-420-0x0000000004F40000-0x0000000005028000-memory.dmp

                                                                                          Filesize

                                                                                          928KB

                                                                                        • memory/2972-419-0x0000000004F40000-0x0000000005028000-memory.dmp

                                                                                          Filesize

                                                                                          928KB

                                                                                        • memory/2972-430-0x0000000004F40000-0x0000000005028000-memory.dmp

                                                                                          Filesize

                                                                                          928KB

                                                                                        • memory/2972-424-0x0000000004F40000-0x0000000005028000-memory.dmp

                                                                                          Filesize

                                                                                          928KB

                                                                                        • memory/2972-426-0x0000000004F40000-0x0000000005028000-memory.dmp

                                                                                          Filesize

                                                                                          928KB

                                                                                        • memory/2972-1497-0x0000000004380000-0x00000000043CC000-memory.dmp

                                                                                          Filesize

                                                                                          304KB

                                                                                        • memory/2972-418-0x0000000004F40000-0x000000000502E000-memory.dmp

                                                                                          Filesize

                                                                                          952KB

                                                                                        • memory/3024-210-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                                                          Filesize

                                                                                          972KB

                                                                                        • memory/3024-164-0x0000000001060000-0x00000000012A3000-memory.dmp

                                                                                          Filesize

                                                                                          2.3MB

                                                                                        • memory/3024-410-0x0000000001060000-0x00000000012A3000-memory.dmp

                                                                                          Filesize

                                                                                          2.3MB

                                                                                        • memory/3768-1574-0x0000000000860000-0x0000000000868000-memory.dmp

                                                                                          Filesize

                                                                                          32KB

                                                                                        • memory/6792-1522-0x0000000000850000-0x0000000000EE1000-memory.dmp

                                                                                          Filesize

                                                                                          6.6MB

                                                                                        • memory/6792-1526-0x0000000000850000-0x0000000000EE1000-memory.dmp

                                                                                          Filesize

                                                                                          6.6MB

                                                                                        • memory/7096-1539-0x0000000001010000-0x00000000014D0000-memory.dmp

                                                                                          Filesize

                                                                                          4.8MB

                                                                                        • memory/7096-1558-0x0000000001010000-0x00000000014D0000-memory.dmp

                                                                                          Filesize

                                                                                          4.8MB

                                                                                        • memory/7096-1555-0x0000000006BF0000-0x00000000070B0000-memory.dmp

                                                                                          Filesize

                                                                                          4.8MB