Analysis

  • max time kernel
    94s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    29-09-2024 01:32

General

  • Target

    b73c5385cfdddcf6d05fb95c7fae6dc567ae7dc5f33f6613032b4eaf9599e52f.exe

  • Size

    1.8MB

  • MD5

    d8ff53e7366fdb8e541dc0e7af6ab075

  • SHA1

    94a301bbce205be11f1b7e127b372cf862df2152

  • SHA256

    b73c5385cfdddcf6d05fb95c7fae6dc567ae7dc5f33f6613032b4eaf9599e52f

  • SHA512

    2f5274c72618013a172d072098c3d0958a971bdef93b753b600722fe540256cfe4341ad68ffb608a0208d7760484d4ecb154a15fce4a3c68c9f709f540a7894e

  • SSDEEP

    49152:EWsoBGYRSb8qWAGIA0BViJKK1ndg4H9BxIv5EePPi047:tByb8qWTIXBVi/I4H9BxIv5RiX

Malware Config

Extracted

Family

amadey

Version

4.41

Botnet

fed3aa

C2

http://185.215.113.16

Attributes
  • install_dir

    44111dbc49

  • install_file

    axplong.exe

  • strings_key

    8d0ad6945b1a30a186ec2d30be6db0b5

  • url_paths

    /Jo89Ku7d/index.php

rc4.plain

Extracted

Family

redline

Botnet

LiveTraffic

C2

136.244.88.135:17615

Extracted

Family

redline

Botnet

@OLEH_PSP

C2

65.21.18.51:45580

Extracted

Family

stealc

Botnet

default2

C2

http://185.215.113.17

Attributes
  • url_path

    /2fb6c2cc8dce150a.php

Extracted

Family

stealc

Botnet

default

C2

http://91.202.233.158

Attributes
  • url_path

    /e96ea2db21fa9a1b.php

Extracted

Family

redline

Botnet

TG CLOUD @RLREBORN Admin @FATHEROFCARDERS

C2

89.105.223.196:29862

Extracted

Family

redline

Botnet

newbundle2

C2

185.215.113.67:15206

Extracted

Family

lumma

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

stealc

Botnet

save

C2

http://185.215.113.37

Attributes
  • url_path

    /e2b1563c6670f193.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 14 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 16 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 28 IoCs
  • Identifies Wine through registry keys 2 TTPs 8 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 44 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 6 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates processes with tasklist 1 TTPs 4 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • Drops file in Windows directory 11 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 42 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 10 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 58 IoCs
  • Suspicious use of FindShellTrayWindow 44 IoCs
  • Suspicious use of SendNotifyMessage 35 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1200
      • C:\Users\Admin\AppData\Local\Temp\b73c5385cfdddcf6d05fb95c7fae6dc567ae7dc5f33f6613032b4eaf9599e52f.exe
        "C:\Users\Admin\AppData\Local\Temp\b73c5385cfdddcf6d05fb95c7fae6dc567ae7dc5f33f6613032b4eaf9599e52f.exe"
        2⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Identifies Wine through registry keys
        • Loads dropped DLL
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:1660
        • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
          "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2640
          • C:\Users\Admin\AppData\Local\Temp\1000002001\gold.exe
            "C:\Users\Admin\AppData\Local\Temp\1000002001\gold.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:992
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
              5⤵
              • System Location Discovery: System Language Discovery
              • Modifies system certificate store
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2720
          • C:\Users\Admin\AppData\Local\Temp\1000004001\12dsvc.exe
            "C:\Users\Admin\AppData\Local\Temp\1000004001\12dsvc.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1992
            • C:\Users\Admin\AppData\Roaming\izny5ojzIQ.exe
              "C:\Users\Admin\AppData\Roaming\izny5ojzIQ.exe"
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Modifies system certificate store
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:444
            • C:\Users\Admin\AppData\Roaming\sk25fSgsmI.exe
              "C:\Users\Admin\AppData\Roaming\sk25fSgsmI.exe"
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1832
          • C:\Users\Admin\AppData\Local\Temp\1000005001\Nework.exe
            "C:\Users\Admin\AppData\Local\Temp\1000005001\Nework.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of WriteProcessMemory
            PID:288
            • C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe
              "C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe"
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2860
              • C:\Users\Admin\AppData\Local\Temp\1000072001\javumarfirst.exe
                "C:\Users\Admin\AppData\Local\Temp\1000072001\javumarfirst.exe"
                6⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                • Checks processor information in registry
                PID:3064
                • C:\Users\Admin\AppData\Local\Temp\service123.exe
                  "C:\Users\Admin\AppData\Local\Temp\service123.exe"
                  7⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  PID:4044
                • C:\Windows\SysWOW64\schtasks.exe
                  "C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
                  7⤵
                  • System Location Discovery: System Language Discovery
                  • Scheduled Task/Job: Scheduled Task
                  PID:4092
          • C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe
            "C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Checks processor information in registry
            • Suspicious behavior: EnumeratesProcesses
            PID:2072
          • C:\Users\Admin\AppData\Local\Temp\1000191001\needmoney.exe
            "C:\Users\Admin\AppData\Local\Temp\1000191001\needmoney.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2120
            • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
              C:\Users\Admin\AppData\Local\Temp\svchost015.exe
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Checks processor information in registry
              • Suspicious behavior: EnumeratesProcesses
              PID:1592
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\svchost015.exe" & del "C:\ProgramData\*.dll"" & exit
                6⤵
                  PID:5240
                  • C:\Windows\SysWOW64\timeout.exe
                    timeout /t 5
                    7⤵
                    • Delays execution with timeout.exe
                    PID:6040
            • C:\Users\Admin\AppData\Local\Temp\1000254001\penis.exe
              "C:\Users\Admin\AppData\Local\Temp\1000254001\penis.exe"
              4⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              PID:2300
            • C:\Users\Admin\AppData\Local\Temp\1000290001\crypted.exe
              "C:\Users\Admin\AppData\Local\Temp\1000290001\crypted.exe"
              4⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:1368
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                5⤵
                  PID:1312
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                  5⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3028
              • C:\Users\Admin\AppData\Local\Temp\1000322001\newbundle2.exe
                "C:\Users\Admin\AppData\Local\Temp\1000322001\newbundle2.exe"
                4⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2800
              • C:\Users\Admin\AppData\Local\Temp\1000342001\rstxdhuj.exe
                "C:\Users\Admin\AppData\Local\Temp\1000342001\rstxdhuj.exe"
                4⤵
                • Executes dropped EXE
                • Adds Run key to start application
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2124
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 812
                  5⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:5312
              • C:\Users\Admin\AppData\Local\Temp\1000354001\ae4f39048f.exe
                "C:\Users\Admin\AppData\Local\Temp\1000354001\ae4f39048f.exe"
                4⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • Suspicious behavior: EnumeratesProcesses
                PID:5528
              • C:\Users\Admin\AppData\Local\Temp\1000355001\e317b48bcd.exe
                "C:\Users\Admin\AppData\Local\Temp\1000355001\e317b48bcd.exe"
                4⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Loads dropped DLL
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of FindShellTrayWindow
                PID:5852
                • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                  "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
                  5⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Loads dropped DLL
                  • Adds Run key to start application
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • Suspicious use of SetThreadContext
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  PID:6048
                  • C:\Users\Admin\AppData\Local\Temp\1000023001\660bb26088.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000023001\660bb26088.exe"
                    6⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • Suspicious behavior: EnumeratesProcesses
                    PID:3328
                  • C:\Users\Admin\1000026002\e7cacdc5ea.exe
                    "C:\Users\Admin\1000026002\e7cacdc5ea.exe"
                    6⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • Suspicious behavior: EnumeratesProcesses
                    PID:1152
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\1000032042\ko.ps1"
                    6⤵
                    • Command and Scripting Interpreter: PowerShell
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4700
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\CustomProfile --no-first-run --no-default-browser-check --disable-infobars
                      7⤵
                      • Enumerates system info in registry
                      • Suspicious use of AdjustPrivilegeToken
                      PID:4856
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Google\Chrome\User\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc8,0xcc,0xd0,0x9c,0xd4,0x7fef7079758,0x7fef7079768,0x7fef7079778
                        8⤵
                          PID:4872
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1188 --field-trial-handle=1216,i,14952634069733458493,17919228264799808143,131072 /prefetch:2
                          8⤵
                            PID:2736
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User" --mojo-platform-channel-handle=1496 --field-trial-handle=1216,i,14952634069733458493,17919228264799808143,131072 /prefetch:8
                            8⤵
                              PID:3104
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --kiosk --disable-infobars --no-first-run --no-default-browser-check --disable-session-crashed-bubble
                            7⤵
                            • Enumerates system info in registry
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of FindShellTrayWindow
                            • Suspicious use of SendNotifyMessage
                            PID:4516
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7079758,0x7fef7079768,0x7fef7079778
                              8⤵
                                PID:4944
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1092 --field-trial-handle=1292,i,6351667550131681638,227925648896579293,131072 /prefetch:2
                                8⤵
                                  PID:3084
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1428 --field-trial-handle=1292,i,6351667550131681638,227925648896579293,131072 /prefetch:8
                                  8⤵
                                    PID:1620
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1492 --field-trial-handle=1292,i,6351667550131681638,227925648896579293,131072 /prefetch:8
                                    8⤵
                                      PID:2168
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2176 --field-trial-handle=1292,i,6351667550131681638,227925648896579293,131072 /prefetch:1
                                      8⤵
                                        PID:4408
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2184 --field-trial-handle=1292,i,6351667550131681638,227925648896579293,131072 /prefetch:1
                                        8⤵
                                          PID:3176
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=972 --field-trial-handle=1292,i,6351667550131681638,227925648896579293,131072 /prefetch:1
                                          8⤵
                                            PID:3452
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1392 --field-trial-handle=1292,i,6351667550131681638,227925648896579293,131072 /prefetch:2
                                            8⤵
                                              PID:4804
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3484 --field-trial-handle=1292,i,6351667550131681638,227925648896579293,131072 /prefetch:1
                                              8⤵
                                                PID:812
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2468 --field-trial-handle=1292,i,6351667550131681638,227925648896579293,131072 /prefetch:8
                                                8⤵
                                                  PID:3284
                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\1000033142\so.ps1"
                                              6⤵
                                              • Command and Scripting Interpreter: PowerShell
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious behavior: EnumeratesProcesses
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:5260
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\CustomProfile --no-first-run --no-default-browser-check --disable-infobars
                                                7⤵
                                                • Enumerates system info in registry
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of AdjustPrivilegeToken
                                                • Suspicious use of FindShellTrayWindow
                                                PID:3612
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Google\Chrome\User\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc8,0xcc,0xd0,0x9c,0xd4,0x7fef7079758,0x7fef7079768,0x7fef7079778
                                                  8⤵
                                                    PID:3652
                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1212 --field-trial-handle=1260,i,7175760820148412833,16162688317870500563,131072 /prefetch:2
                                                    8⤵
                                                      PID:864
                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User" --mojo-platform-channel-handle=1512 --field-trial-handle=1260,i,7175760820148412833,16162688317870500563,131072 /prefetch:8
                                                      8⤵
                                                        PID:2076
                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User" --mojo-platform-channel-handle=1572 --field-trial-handle=1260,i,7175760820148412833,16162688317870500563,131072 /prefetch:8
                                                        8⤵
                                                          PID:900
                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User" --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2148 --field-trial-handle=1260,i,7175760820148412833,16162688317870500563,131072 /prefetch:1
                                                          8⤵
                                                            PID:4532
                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User" --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2156 --field-trial-handle=1260,i,7175760820148412833,16162688317870500563,131072 /prefetch:1
                                                            8⤵
                                                              PID:4564
                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User" --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=2636 --field-trial-handle=1260,i,7175760820148412833,16162688317870500563,131072 /prefetch:1
                                                              8⤵
                                                                PID:5368
                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User" --extension-process --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=2696 --field-trial-handle=1260,i,7175760820148412833,16162688317870500563,131072 /prefetch:1
                                                                8⤵
                                                                  PID:5272
                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User" --extension-process --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2712 --field-trial-handle=1260,i,7175760820148412833,16162688317870500563,131072 /prefetch:1
                                                                  8⤵
                                                                    PID:5432
                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User" --mojo-platform-channel-handle=3272 --field-trial-handle=1260,i,7175760820148412833,16162688317870500563,131072 /prefetch:8
                                                                    8⤵
                                                                      PID:5480
                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1388 --field-trial-handle=1260,i,7175760820148412833,16162688317870500563,131072 /prefetch:2
                                                                      8⤵
                                                                        PID:3748
                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User" --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=2500 --field-trial-handle=1260,i,7175760820148412833,16162688317870500563,131072 /prefetch:1
                                                                        8⤵
                                                                          PID:3424
                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User" --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=2360 --field-trial-handle=1260,i,7175760820148412833,16162688317870500563,131072 /prefetch:1
                                                                          8⤵
                                                                            PID:5296
                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=utility --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User" --mojo-platform-channel-handle=2336 --field-trial-handle=1260,i,7175760820148412833,16162688317870500563,131072 /prefetch:8
                                                                            8⤵
                                                                              PID:1060
                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User" --mojo-platform-channel-handle=4224 --field-trial-handle=1260,i,7175760820148412833,16162688317870500563,131072 /prefetch:8
                                                                              8⤵
                                                                                PID:1736
                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User" --mojo-platform-channel-handle=4208 --field-trial-handle=1260,i,7175760820148412833,16162688317870500563,131072 /prefetch:8
                                                                                8⤵
                                                                                  PID:3552
                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=utility --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User" --mojo-platform-channel-handle=4400 --field-trial-handle=1260,i,7175760820148412833,16162688317870500563,131072 /prefetch:8
                                                                                  8⤵
                                                                                    PID:3220
                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User" --mojo-platform-channel-handle=4568 --field-trial-handle=1260,i,7175760820148412833,16162688317870500563,131072 /prefetch:8
                                                                                    8⤵
                                                                                      PID:1328
                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User" --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=4192 --field-trial-handle=1260,i,7175760820148412833,16162688317870500563,131072 /prefetch:1
                                                                                      8⤵
                                                                                        PID:1088
                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User" --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --mojo-platform-channel-handle=4264 --field-trial-handle=1260,i,7175760820148412833,16162688317870500563,131072 /prefetch:1
                                                                                        8⤵
                                                                                          PID:3124
                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --kiosk --disable-infobars --no-first-run --no-default-browser-check --disable-session-crashed-bubble
                                                                                        7⤵
                                                                                        • Enumerates system info in registry
                                                                                        PID:5996
                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7079758,0x7fef7079768,0x7fef7079778
                                                                                          8⤵
                                                                                            PID:6016
                                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1192 --field-trial-handle=1248,i,14900900559854912515,4249054224104224394,131072 /prefetch:2
                                                                                            8⤵
                                                                                              PID:4128
                                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1448 --field-trial-handle=1248,i,14900900559854912515,4249054224104224394,131072 /prefetch:8
                                                                                              8⤵
                                                                                                PID:3196
                                                                                          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                                            "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
                                                                                            6⤵
                                                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                            • Checks BIOS information in registry
                                                                                            • Executes dropped EXE
                                                                                            • Identifies Wine through registry keys
                                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                            PID:3996
                                                                                      • C:\Users\Admin\AppData\Local\Temp\1000365001\lummetc.exe
                                                                                        "C:\Users\Admin\AppData\Local\Temp\1000365001\lummetc.exe"
                                                                                        4⤵
                                                                                        • Executes dropped EXE
                                                                                        • System Location Discovery: System Language Discovery
                                                                                        PID:3800
                                                                                      • C:\Users\Admin\AppData\Local\Temp\1000367001\processclass.exe
                                                                                        "C:\Users\Admin\AppData\Local\Temp\1000367001\processclass.exe"
                                                                                        4⤵
                                                                                        • Executes dropped EXE
                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                        PID:3940
                                                                                        • C:\Windows\System32\cmd.exe
                                                                                          "C:\Windows\System32\cmd.exe" /c start context.exe
                                                                                          5⤵
                                                                                            PID:3532
                                                                                            • C:\Users\Admin\AppData\Local\Temp\context.exe
                                                                                              context.exe
                                                                                              6⤵
                                                                                              • Executes dropped EXE
                                                                                              • Drops file in Windows directory
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              • Suspicious behavior: CmdExeWriteProcessMemorySpam
                                                                                              PID:2668
                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                "C:\Windows\System32\cmd.exe" /c move Emotions Emotions.bat & Emotions.bat
                                                                                                7⤵
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                PID:4092
                                                                                                • C:\Windows\SysWOW64\tasklist.exe
                                                                                                  tasklist
                                                                                                  8⤵
                                                                                                  • Enumerates processes with tasklist
                                                                                                  PID:4772
                                                                                                • C:\Windows\SysWOW64\findstr.exe
                                                                                                  findstr /I "wrsa opssvc"
                                                                                                  8⤵
                                                                                                    PID:4788
                                                                                                  • C:\Windows\SysWOW64\tasklist.exe
                                                                                                    tasklist
                                                                                                    8⤵
                                                                                                    • Enumerates processes with tasklist
                                                                                                    PID:2348
                                                                                                  • C:\Windows\SysWOW64\findstr.exe
                                                                                                    findstr /I "avastui avgui bdservicehost nswscsvc sophoshealth"
                                                                                                    8⤵
                                                                                                      PID:3496
                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                      cmd /c md 607698
                                                                                                      8⤵
                                                                                                        PID:3444
                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                        cmd /c copy /b ..\Navy + ..\Temperature + ..\Streaming + ..\Ashley + ..\Ensures + ..\Language + ..\Viruses + ..\Bet + ..\Fla + ..\Asbestos + ..\Width Q
                                                                                                        8⤵
                                                                                                          PID:2016
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\607698\Waters.pif
                                                                                                          Waters.pif Q
                                                                                                          8⤵
                                                                                                            PID:564
                                                                                                          • C:\Windows\SysWOW64\choice.exe
                                                                                                            choice /d y /t 5
                                                                                                            8⤵
                                                                                                              PID:2932
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\1000368001\splwow64.exe
                                                                                                      "C:\Users\Admin\AppData\Local\Temp\1000368001\splwow64.exe"
                                                                                                      4⤵
                                                                                                      • Executes dropped EXE
                                                                                                      • Drops file in Windows directory
                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                      PID:2504
                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                        "C:\Windows\System32\cmd.exe" /c move Emotions Emotions.bat & Emotions.bat
                                                                                                        5⤵
                                                                                                        • Loads dropped DLL
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        PID:264
                                                                                                        • C:\Windows\SysWOW64\tasklist.exe
                                                                                                          tasklist
                                                                                                          6⤵
                                                                                                          • Enumerates processes with tasklist
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                          PID:1624
                                                                                                        • C:\Windows\SysWOW64\findstr.exe
                                                                                                          findstr /I "wrsa opssvc"
                                                                                                          6⤵
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          PID:688
                                                                                                        • C:\Windows\SysWOW64\tasklist.exe
                                                                                                          tasklist
                                                                                                          6⤵
                                                                                                          • Enumerates processes with tasklist
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                          PID:4192
                                                                                                        • C:\Windows\SysWOW64\findstr.exe
                                                                                                          findstr /I "avastui avgui bdservicehost nswscsvc sophoshealth"
                                                                                                          6⤵
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          PID:4208
                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                          cmd /c md 607698
                                                                                                          6⤵
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          PID:4296
                                                                                                        • C:\Windows\SysWOW64\findstr.exe
                                                                                                          findstr /V "MaskBathroomCompositionInjection" Participants
                                                                                                          6⤵
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          PID:4332
                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                          cmd /c copy /b ..\Navy + ..\Temperature + ..\Streaming + ..\Ashley + ..\Ensures + ..\Language + ..\Viruses + ..\Bet + ..\Fla + ..\Asbestos + ..\Width Q
                                                                                                          6⤵
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          PID:4372
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\607698\Waters.pif
                                                                                                          Waters.pif Q
                                                                                                          6⤵
                                                                                                          • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                                                          • Executes dropped EXE
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                          • Suspicious use of FindShellTrayWindow
                                                                                                          • Suspicious use of SendNotifyMessage
                                                                                                          PID:4396
                                                                                                        • C:\Windows\SysWOW64\choice.exe
                                                                                                          choice /d y /t 5
                                                                                                          6⤵
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          PID:4432
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\1000373001\2.exe
                                                                                                      "C:\Users\Admin\AppData\Local\Temp\1000373001\2.exe"
                                                                                                      4⤵
                                                                                                      • Executes dropped EXE
                                                                                                      • Suspicious use of SetThreadContext
                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                      PID:4256
                                                                                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                                                                        5⤵
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        PID:5912
                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                  cmd /c schtasks.exe /create /tn "Tuition" /tr "wscript //B 'C:\Users\Admin\AppData\Local\QuantumDynamics Lab\QuantumFlow.js'" /sc minute /mo 5 /F
                                                                                                  2⤵
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  PID:4448
                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                    schtasks.exe /create /tn "Tuition" /tr "wscript //B 'C:\Users\Admin\AppData\Local\QuantumDynamics Lab\QuantumFlow.js'" /sc minute /mo 5 /F
                                                                                                    3⤵
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                    PID:4584
                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                  cmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\QuantumFlow.url" & echo URL="C:\Users\Admin\AppData\Local\QuantumDynamics Lab\QuantumFlow.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\QuantumFlow.url" & exit
                                                                                                  2⤵
                                                                                                  • Drops startup file
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  PID:4520
                                                                                              • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                                                                                "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                                                                                1⤵
                                                                                                  PID:5132
                                                                                                • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                                                                                  "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                                                                                  1⤵
                                                                                                    PID:3256
                                                                                                  • C:\Windows\system32\taskeng.exe
                                                                                                    taskeng.exe {C4D6B78B-9B3E-438E-A4F5-3E966699F3C9} S-1-5-21-3063565911-2056067323-3330884624-1000:KHBTHJFA\Admin:Interactive:[1]
                                                                                                    1⤵
                                                                                                      PID:2908
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\service123.exe
                                                                                                        C:\Users\Admin\AppData\Local\Temp\/service123.exe
                                                                                                        2⤵
                                                                                                          PID:4980

                                                                                                      Network

                                                                                                      MITRE ATT&CK Enterprise v15

                                                                                                      Replay Monitor

                                                                                                      Loading Replay Monitor...

                                                                                                      Downloads

                                                                                                      • C:\ProgramData\GDAAKKEHDHCAAAKFCBAK

                                                                                                        Filesize

                                                                                                        6KB

                                                                                                        MD5

                                                                                                        414b22ca6874059c455de301505d0135

                                                                                                        SHA1

                                                                                                        ce6575b24b6946071eb25783ac64a41ec8374d90

                                                                                                        SHA256

                                                                                                        96b6eb6bcd57caa709b2a6a5f8d8bf5135286f5726bf3d4189eee5e926080b2a

                                                                                                        SHA512

                                                                                                        0b01dd544231695ee260e2c4724076f6be02d068fb07e28ad8f66704f93a8590261a0dbbaa70db96417f1c0a5865ec84f8f9d75eaf31904a480ec6ec5e498c54

                                                                                                      • C:\ProgramData\IJDHCBGH

                                                                                                        Filesize

                                                                                                        92KB

                                                                                                        MD5

                                                                                                        9dacdf7238269810f4c56455bc02a2b5

                                                                                                        SHA1

                                                                                                        a4fdddc32f512bc7b3973b0026a65c61f0c09823

                                                                                                        SHA256

                                                                                                        96b70070ce33ffeec40bed34dbbed3b79b32d709e5f0c422ce4448b2574a8d8a

                                                                                                        SHA512

                                                                                                        05214bc2eea84586a19a35713a5132a2453ff6dc9b6bfa1304fc2fc9e89e05d250378102b04c692004c38d4caa1a334cdc01b827f0cfaee9d276cbd6ea95cd47

                                                                                                      • C:\Users\Admin\1000032042\ko.ps1

                                                                                                        Filesize

                                                                                                        1KB

                                                                                                        MD5

                                                                                                        50d96e43e42b57edffe0c51170a8e741

                                                                                                        SHA1

                                                                                                        452579060a428c0ab725398a625a70aa18b2f8fa

                                                                                                        SHA256

                                                                                                        30e153d5b22adf171901c59cda1cfc39aeaac521f10af17811be4c96314330ab

                                                                                                        SHA512

                                                                                                        da6daa9a146d1bb4cf09c0cc00f0337196c9aac99b756521cdfb98607707a80bf86d50062a93e8ef753212a9e66a7edadc6c1b92871003a76fcce51215f91237

                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\0f2a68c9-cafe-4bb0-a614-7b5e5dbf3a4d.tmp

                                                                                                        Filesize

                                                                                                        334KB

                                                                                                        MD5

                                                                                                        24092d7f1cd055755b14dee12f201ce7

                                                                                                        SHA1

                                                                                                        229ea8ced2bcb91dc89c447a16be08db0294d75c

                                                                                                        SHA256

                                                                                                        2c5b61a95cf4c3f869cb44127cd133e7da1a5d46440913ef17e7f763ef0a79e2

                                                                                                        SHA512

                                                                                                        68f217a962803bf8e0142fc811162840d9c97667500af95a8295c2baea1a67d83ad594938b6efa9b729f3954ec6b99b81a6cc053ff99db6bcf6e51242680df8f

                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat

                                                                                                        Filesize

                                                                                                        40B

                                                                                                        MD5

                                                                                                        9ca337524816226bf5da651706d62f51

                                                                                                        SHA1

                                                                                                        6f8a551c620e75e45b2340aac6720452d2886a26

                                                                                                        SHA256

                                                                                                        ba3dc56f607d63a68f065d56b69cefc8ab6dd4991fa972d80a1ff4ee388f4877

                                                                                                        SHA512

                                                                                                        97d45a79a646fe20a2ac9ef7aa142fe9483d95a6d2d9d007e7043f1b0776fbdf10616ba3fc93acd15404549bdd8c6e58706a76774fba18958dc8c1e76acc6e88

                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\9210e1c9-7c56-499a-a9de-c2f172790ebc.tmp

                                                                                                        Filesize

                                                                                                        6KB

                                                                                                        MD5

                                                                                                        68a2779c74d0dcf6d351748c885b4d8b

                                                                                                        SHA1

                                                                                                        3d55277ab828246704dcea7db86b083d7faa43b2

                                                                                                        SHA256

                                                                                                        1ba7388054d2addfc38755e693797de7b05d9fea348321fd101409d6035e8f04

                                                                                                        SHA512

                                                                                                        7e924e7a4fc7e11e8b91077c17dc96df904420942573dc99b894cd2acbbd0d36d4998458ed0a234e8095904edfe95299227a63b8a8c442c7f839f782cf6aa7d7

                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GCM Store\Encryption\000006.dbtmp

                                                                                                        Filesize

                                                                                                        16B

                                                                                                        MD5

                                                                                                        aefd77f47fb84fae5ea194496b44c67a

                                                                                                        SHA1

                                                                                                        dcfbb6a5b8d05662c4858664f81693bb7f803b82

                                                                                                        SHA256

                                                                                                        4166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611

                                                                                                        SHA512

                                                                                                        b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3

                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000007.dbtmp

                                                                                                        Filesize

                                                                                                        16B

                                                                                                        MD5

                                                                                                        18e723571b00fb1694a3bad6c78e4054

                                                                                                        SHA1

                                                                                                        afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                                                                                                        SHA256

                                                                                                        8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                                                                                                        SHA512

                                                                                                        43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                        Filesize

                                                                                                        334KB

                                                                                                        MD5

                                                                                                        0823aa422e22440a3bcf88d018ae6d5a

                                                                                                        SHA1

                                                                                                        ab30ca1b0279bc00c8e4de81ea9e9a5be9aa4edf

                                                                                                        SHA256

                                                                                                        2814a85222d8dba2d6093392cb6fd1b0ac31b907b27f7cbc4f0dd6e2df60066f

                                                                                                        SHA512

                                                                                                        50810bd5ba34b73a972376b3d87ebb48f61657b7aad9fe80fd25e0e754947ec5e1c155db3f3c71e966e7aa9b1ff0e47719241c3b1fb524b6dff37b08dffccbe9

                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User\214d7fc0-ccbe-4134-8adb-50959ca91483.tmp

                                                                                                        Filesize

                                                                                                        2B

                                                                                                        MD5

                                                                                                        99914b932bd37a50b983c5e7c90ae93b

                                                                                                        SHA1

                                                                                                        bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                                                                                        SHA256

                                                                                                        44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                                                                                        SHA512

                                                                                                        27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User\73d9c3ce-ffe5-4eab-b398-be0619e14f66.tmp

                                                                                                        Filesize

                                                                                                        1KB

                                                                                                        MD5

                                                                                                        7f9e7188e5db73604381773c9b3479e6

                                                                                                        SHA1

                                                                                                        300c9d4977bb672f2f1a098d88ae6372a86b181e

                                                                                                        SHA256

                                                                                                        7f218991add9df3bc6e169215c46cdfc6fa398dbdb71dbe51b7bff04811b00ff

                                                                                                        SHA512

                                                                                                        aec4bca20a794d3cb10614e1f85559d09db1ee915cc05bbed8310276c2ce628baa10ab9309187eb0df2f1ddfb74b528c3a65045f5daca0b08211d2b9b7adc46e

                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User\Crashpad\settings.dat

                                                                                                        Filesize

                                                                                                        40B

                                                                                                        MD5

                                                                                                        8ca18ee6195afac1d68b5307a2674409

                                                                                                        SHA1

                                                                                                        15e5ade03a2f6a35408d03cc9760b5f40ca3b03e

                                                                                                        SHA256

                                                                                                        98b3d5d46f48c5c9d6c1bc71ca59115226f3e7a9770a2b537faafa49a56cc764

                                                                                                        SHA512

                                                                                                        043b5dbe31ab73adbcf5aa8ef77f0515d489203ed625f6e6ec88c9900fe2433194631e9e0ef071773cde0cc3f1219fcab4f9497efdc8f3f0855f147ede95e26a

                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User\Default\Extension Scripts\MANIFEST-000001

                                                                                                        Filesize

                                                                                                        41B

                                                                                                        MD5

                                                                                                        5af87dfd673ba2115e2fcf5cfdb727ab

                                                                                                        SHA1

                                                                                                        d5b5bbf396dc291274584ef71f444f420b6056f1

                                                                                                        SHA256

                                                                                                        f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                                                                                        SHA512

                                                                                                        de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User\Default\GPUCache\data_0

                                                                                                        Filesize

                                                                                                        8KB

                                                                                                        MD5

                                                                                                        cf89d16bb9107c631daabf0c0ee58efb

                                                                                                        SHA1

                                                                                                        3ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b

                                                                                                        SHA256

                                                                                                        d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e

                                                                                                        SHA512

                                                                                                        8cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0

                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User\Default\GPUCache\data_1

                                                                                                        Filesize

                                                                                                        264KB

                                                                                                        MD5

                                                                                                        f50f89a0a91564d0b8a211f8921aa7de

                                                                                                        SHA1

                                                                                                        112403a17dd69d5b9018b8cede023cb3b54eab7d

                                                                                                        SHA256

                                                                                                        b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                                                                                        SHA512

                                                                                                        bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User\Default\GPUCache\data_2

                                                                                                        Filesize

                                                                                                        8KB

                                                                                                        MD5

                                                                                                        0962291d6d367570bee5454721c17e11

                                                                                                        SHA1

                                                                                                        59d10a893ef321a706a9255176761366115bedcb

                                                                                                        SHA256

                                                                                                        ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7

                                                                                                        SHA512

                                                                                                        f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed

                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User\Default\GPUCache\data_3

                                                                                                        Filesize

                                                                                                        8KB

                                                                                                        MD5

                                                                                                        41876349cb12d6db992f1309f22df3f0

                                                                                                        SHA1

                                                                                                        5cf26b3420fc0302cd0a71e8d029739b8765be27

                                                                                                        SHA256

                                                                                                        e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c

                                                                                                        SHA512

                                                                                                        e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e

                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User\Default\Site Characteristics Database\CURRENT~RFf7835a1.TMP

                                                                                                        Filesize

                                                                                                        16B

                                                                                                        MD5

                                                                                                        46295cac801e5d4857d09837238a6394

                                                                                                        SHA1

                                                                                                        44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                                                        SHA256

                                                                                                        0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                                                        SHA512

                                                                                                        8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User\Default\Sync Data\LevelDB\000002.dbtmp

                                                                                                        Filesize

                                                                                                        16B

                                                                                                        MD5

                                                                                                        206702161f94c5cd39fadd03f4014d98

                                                                                                        SHA1

                                                                                                        bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                                                                                        SHA256

                                                                                                        1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                                                                                        SHA512

                                                                                                        0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User\Default\bd697eaf-9597-40b8-bcf5-fbf79f7f78ee.tmp

                                                                                                        Filesize

                                                                                                        3KB

                                                                                                        MD5

                                                                                                        4a0c661500661b213e5f04dab841a6e4

                                                                                                        SHA1

                                                                                                        f117e20d79ef91e24342f40de4959ab4ce11c64b

                                                                                                        SHA256

                                                                                                        25ff5e61b9a69f952c1446d6bbae1686972fcaed09e28c2db191e7f2c769342d

                                                                                                        SHA512

                                                                                                        32d9e89eda7e05da0b69c8a739190ad497c6f6afe060704087b8f4325f7da7ffa38279af9e9b1c9b1d97a4a33e26cca81f823f8a890f8951680b11fe45d2ac73

                                                                                                      • C:\Users\Admin\AppData\Local\QuantumDynamics Lab\QuantumFlow.scr

                                                                                                        Filesize

                                                                                                        872KB

                                                                                                        MD5

                                                                                                        18ce19b57f43ce0a5af149c96aecc685

                                                                                                        SHA1

                                                                                                        1bd5ca29fc35fc8ac346f23b155337c5b28bbc36

                                                                                                        SHA256

                                                                                                        d8b7c7178fbadbf169294e4f29dce582f89a5cf372e9da9215aa082330dc12fd

                                                                                                        SHA512

                                                                                                        a0c58f04dfb49272a2b6f1e8ce3f541a030a6c7a09bb040e660fc4cd9892ca3ac39cf3d6754c125f7cd1987d1fca01640a153519b4e2eb3e3b4b8c9dc1480558

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1000002001\gold.exe

                                                                                                        Filesize

                                                                                                        314KB

                                                                                                        MD5

                                                                                                        f2d385ddbb2edafacd070f103f7f1576

                                                                                                        SHA1

                                                                                                        5ee6cb80bc943476067c148e5c16738b7b062029

                                                                                                        SHA256

                                                                                                        d56a1a5602b5e72b8b9b2d6f2e0c5bc689682d0983f30b8c66dad9af093679b3

                                                                                                        SHA512

                                                                                                        e6ee00d15483ef29fb7e48ed28833ce5059f7bfada96b92c350246f6032f85d318571950bf6d2ee557e417e87d24d90965aa1523782416792fa7eb7354266df5

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1000004001\12dsvc.exe

                                                                                                        Filesize

                                                                                                        1006KB

                                                                                                        MD5

                                                                                                        c005d4ffa3e28c22b41a9d222598260a

                                                                                                        SHA1

                                                                                                        57cc3a6540bc38c649ddfdd54fa4f3c8a2423677

                                                                                                        SHA256

                                                                                                        799d10acbb0e2886c4d32c771964f4c2cb47f93c817cdc26a9acaefa3ba042cb

                                                                                                        SHA512

                                                                                                        ce39903c46160deeee1c7b362000361a3f5a9243b2e180bbaafa5b8ab09cc09ca413ce32f4deb2074fa928110d25b3dae7465c849fc388a58ddf649a9caa3a68

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1000005001\Nework.exe

                                                                                                        Filesize

                                                                                                        416KB

                                                                                                        MD5

                                                                                                        f5d7b79ee6b6da6b50e536030bcc3b59

                                                                                                        SHA1

                                                                                                        751b555a8eede96d55395290f60adc43b28ba5e2

                                                                                                        SHA256

                                                                                                        2f1aff28961ba0ce85ea0e35b8936bc387f84f459a4a1d63d964ce79e34b8459

                                                                                                        SHA512

                                                                                                        532b17cd2a6ac5172b1ddba1e63edd51ab53a4527204415241e3a78e8ffeb9728071bde5ae1eefabefd2627f00963f8a5458668cd7b8df041c8683252ff56b46

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe

                                                                                                        Filesize

                                                                                                        187KB

                                                                                                        MD5

                                                                                                        7a02aa17200aeac25a375f290a4b4c95

                                                                                                        SHA1

                                                                                                        7cc94ca64268a9a9451fb6b682be42374afc22fd

                                                                                                        SHA256

                                                                                                        836799fd760eba25e15a55c75c50b977945c557065a708317e00f2c8f965339e

                                                                                                        SHA512

                                                                                                        f6ebfe7e087aa354722cea3fddd99b1883a862fb92bb5a5a86782ea846a1bff022ab7db4397930bcabaa05cb3d817de3a89331d41a565bc1da737f2c5e3720b6

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1000072001\javumarfirst.exe

                                                                                                        Filesize

                                                                                                        9.5MB

                                                                                                        MD5

                                                                                                        0603207308448ad82dc3d1fc17923ddb

                                                                                                        SHA1

                                                                                                        9c4f8f3e35d6404e22b50b7f1a0641a1b4195d94

                                                                                                        SHA256

                                                                                                        0fb82d8a8edd32ba4f80b129b228c9e74871f55f970b44c75af5aa4572b1b582

                                                                                                        SHA512

                                                                                                        50595287ba90421dbb6fc612b69d2a2bffdad54ff79b04c50a05ea414af4e7deeb7101fb1b0638257cb28d3627ef8258e7cb039178b6d504d922774e91f95ba5

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1000191001\needmoney.exe

                                                                                                        Filesize

                                                                                                        4.1MB

                                                                                                        MD5

                                                                                                        7fa5c660d124162c405984d14042506f

                                                                                                        SHA1

                                                                                                        69f0dff06ff1911b97a2a0aa4ca9046b722c6b2f

                                                                                                        SHA256

                                                                                                        fd3edfaff77dd969e3e0d086495e4c742d00e111df9f935ed61dfba8392584b2

                                                                                                        SHA512

                                                                                                        d50848adbfe75f509414acc97096dad191ae4cef54752bdddcb227ffc0f59bfd2770561e7b3c2a14f4a1423215f05847206ad5c242c7fd5b0655edf513b22f6c

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1000254001\penis.exe

                                                                                                        Filesize

                                                                                                        409KB

                                                                                                        MD5

                                                                                                        a21700718c70ec5e787ad373cb72a757

                                                                                                        SHA1

                                                                                                        027554ab5ff3245e7617f3b83d6548bf7919f92e

                                                                                                        SHA256

                                                                                                        87e639ecc7704cb5e29f1ebb1d8ade3ae863aaa2505a37b28f2d45121da500c6

                                                                                                        SHA512

                                                                                                        ea292a5442d9fe536e650a2bc5142dd3aef79c66930243897e0e87c57915f0a54e45e03e58daffb473f85fe10b963d4670050bff5ab3f91121d21d463e25659b

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1000290001\crypted.exe

                                                                                                        Filesize

                                                                                                        314KB

                                                                                                        MD5

                                                                                                        ff5afed0a8b802d74af1c1422c720446

                                                                                                        SHA1

                                                                                                        7135acfa641a873cb0c4c37afc49266bfeec91d8

                                                                                                        SHA256

                                                                                                        17ac37b4946539fa7fa68b12bd80946d340497a7971802b5848830ad99ea1e10

                                                                                                        SHA512

                                                                                                        11724d26e11b3146e0fc947c06c59c004c015de0afea24ec28a4eb8145fcd51e9b70007e17621c83f406d9aeb7cd96601245671d41c3fcc88a27c33bd7cf55ac

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1000322001\newbundle2.exe

                                                                                                        Filesize

                                                                                                        304KB

                                                                                                        MD5

                                                                                                        58e8b2eb19704c5a59350d4ff92e5ab6

                                                                                                        SHA1

                                                                                                        171fc96dda05e7d275ec42840746258217d9caf0

                                                                                                        SHA256

                                                                                                        07d4b7768e13d79ac5f05f81167b29bb6fbf97828a289d8d11eec38939846834

                                                                                                        SHA512

                                                                                                        e7655762c5f2d10ec246d11f82d437a2717ad05be847b5e0fd055e3241caaca85430f424055b343e3a44c90d76a0ba07a6913c2208f374f59b61f8aa4477889f

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1000342001\rstxdhuj.exe

                                                                                                        Filesize

                                                                                                        963KB

                                                                                                        MD5

                                                                                                        1ef39c8bc5799aa381fe093a1f2d532a

                                                                                                        SHA1

                                                                                                        57eabb02a7c43c9682988227dd470734cc75edb2

                                                                                                        SHA256

                                                                                                        0cced5b50789fca3ad4b2c151b798363d712da04c377bd704dcef4898e66b2b4

                                                                                                        SHA512

                                                                                                        13a9c267c4ceb2bd176f1339faa035ffeb08936deeeb4e38252ea43cfe487ea1c1876e4cc2a965548e767af02805a1da62885e6538da056be0c6fae33b637682

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1000354001\ae4f39048f.exe

                                                                                                        Filesize

                                                                                                        1.7MB

                                                                                                        MD5

                                                                                                        a4d6bc751e412799af4ba121c3dea4d2

                                                                                                        SHA1

                                                                                                        e8c1ea99154555f4dbd36aca23077f07140f02e8

                                                                                                        SHA256

                                                                                                        432129111f0cb21e66e21fa952f52294ccb131006a057fb866572fd424761365

                                                                                                        SHA512

                                                                                                        45e2c86c48cae683a6db8aa979a594be77329f1b67ee3eb50415cd0dfb759e55674c971faa5f88b2dd6808e5496968d201f4292b1307ad8410cea1a6fbf24df7

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1000355001\e317b48bcd.exe

                                                                                                        Filesize

                                                                                                        1.8MB

                                                                                                        MD5

                                                                                                        42e2475c56f9206da4d8579b1c58b17d

                                                                                                        SHA1

                                                                                                        bb5d9884275b0559951b1ad2b8dc07420937f961

                                                                                                        SHA256

                                                                                                        e559b32ada8136d3ba5d2bd7ecac169d46b7f1bf94294455015f1addcd1cce6d

                                                                                                        SHA512

                                                                                                        de5a5801e551a5e2a291f25eb73ddc54099261d5a5b38fb915ff0f8161b00abf2405a50daedc331f30b5b97d296e543ba25d9fc4e3e80f05f136cfd0d4cbea4e

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1000365001\lummetc.exe

                                                                                                        Filesize

                                                                                                        352KB

                                                                                                        MD5

                                                                                                        2fe92adf3fe6c95c045d07f3d2ecd2ed

                                                                                                        SHA1

                                                                                                        42d1d4b670b60ff3f27c3cc5b8134b67e9c4a138

                                                                                                        SHA256

                                                                                                        13167320a0e8266a56694be70a9560c83e2c645d6eeaa147b9ae585c2960ebb2

                                                                                                        SHA512

                                                                                                        0af7b4a3ce3981707ca450b90829a4a8e933ea3cd3affbce738265a1a0647e96323117db325d0e5e3884f67f36b21b8c955b6c3c6dda21d9b01212e28ef88d65

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1000367001\processclass.exe

                                                                                                        Filesize

                                                                                                        6KB

                                                                                                        MD5

                                                                                                        c042782226565f89ce3954489075e516

                                                                                                        SHA1

                                                                                                        256dd5ba42837a33c7aa6cb71cef33d5617117ee

                                                                                                        SHA256

                                                                                                        a7b63cd9959ac6f23c86644a4ca5411b519855d47f1f5e75a1645d7274f545a6

                                                                                                        SHA512

                                                                                                        9f0771c66ea7c0a2264b99a8782e3ab88a2d74b609265b5ce14f81dcc52b71e46248abd77767018711d72a18e20fe3b272513bfd722fff9043f962f7c8ed93fd

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1000368001\splwow64.exe

                                                                                                        Filesize

                                                                                                        1.3MB

                                                                                                        MD5

                                                                                                        2b01c9b0c69f13da5ee7889a4b17c45e

                                                                                                        SHA1

                                                                                                        27f0c1ae0ddeddc9efac38bc473476b103fef043

                                                                                                        SHA256

                                                                                                        d5526528363ceeb718d30bc669038759c4cd80a1d3e9c8c661b12b261dcc9e29

                                                                                                        SHA512

                                                                                                        23d4a0fc82b70cd2454a1be3d9b84b8ce7dd00ad7c3e8ad2b771b1b7cbca752c53feec5a3ac5a81d8384a9fc6583f63cc39f1ebe7de04d3d9b08be53641ec455

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1000373001\2.exe

                                                                                                        Filesize

                                                                                                        1.9MB

                                                                                                        MD5

                                                                                                        731200ce89a30b22a5530838e57862f3

                                                                                                        SHA1

                                                                                                        0c86827c47e040d82869846c68bedb9d8afbcde0

                                                                                                        SHA256

                                                                                                        b39525df56e9d5f26067add74133154b651ca91d4201302ce505444d00ac6693

                                                                                                        SHA512

                                                                                                        6c82f5949d05e3175e87d669447b90fec190b56b1317bcebbfb61fd52d434bf445e2d0c7b21eaa8de3859091a252128e3bf827943357cf6b10de36b071153a5d

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\3c7bdbaa-d190-40ce-a1a9-2f97d3e6f4a4.tmp

                                                                                                        Filesize

                                                                                                        1B

                                                                                                        MD5

                                                                                                        5058f1af8388633f609cadb75a75dc9d

                                                                                                        SHA1

                                                                                                        3a52ce780950d4d969792a2559cd519d7ee8c727

                                                                                                        SHA256

                                                                                                        cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

                                                                                                        SHA512

                                                                                                        0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe

                                                                                                        Filesize

                                                                                                        1.8MB

                                                                                                        MD5

                                                                                                        d8ff53e7366fdb8e541dc0e7af6ab075

                                                                                                        SHA1

                                                                                                        94a301bbce205be11f1b7e127b372cf862df2152

                                                                                                        SHA256

                                                                                                        b73c5385cfdddcf6d05fb95c7fae6dc567ae7dc5f33f6613032b4eaf9599e52f

                                                                                                        SHA512

                                                                                                        2f5274c72618013a172d072098c3d0958a971bdef93b753b600722fe540256cfe4341ad68ffb608a0208d7760484d4ecb154a15fce4a3c68c9f709f540a7894e

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\607698\Q

                                                                                                        Filesize

                                                                                                        794KB

                                                                                                        MD5

                                                                                                        7b5632dcd418bcbae2a9009dbaf85f37

                                                                                                        SHA1

                                                                                                        32aaf06166854718f0bcbb2f7173c2732cfb4d33

                                                                                                        SHA256

                                                                                                        361e9c3b62719b79bc280420b5f710e160fd55f2250bf605911ded7162483db4

                                                                                                        SHA512

                                                                                                        c834e90ccf2d35529c294319b8e9a49db7a7d67d0567e0739131d5af51170db32076d68147dc101f8047a75cb5b2275b25a9c8346a99a146a6798b9764316838

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Cab7DAA.tmp

                                                                                                        Filesize

                                                                                                        70KB

                                                                                                        MD5

                                                                                                        49aebf8cbd62d92ac215b2923fb1b9f5

                                                                                                        SHA1

                                                                                                        1723be06719828dda65ad804298d0431f6aff976

                                                                                                        SHA256

                                                                                                        b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                                                                                        SHA512

                                                                                                        bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Tar7E2A.tmp

                                                                                                        Filesize

                                                                                                        181KB

                                                                                                        MD5

                                                                                                        4ea6026cf93ec6338144661bf1202cd1

                                                                                                        SHA1

                                                                                                        a1dec9044f750ad887935a01430bf49322fbdcb7

                                                                                                        SHA256

                                                                                                        8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                                                                                                        SHA512

                                                                                                        6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Tmp713B.tmp

                                                                                                        Filesize

                                                                                                        2KB

                                                                                                        MD5

                                                                                                        1420d30f964eac2c85b2ccfe968eebce

                                                                                                        SHA1

                                                                                                        bdf9a6876578a3e38079c4f8cf5d6c79687ad750

                                                                                                        SHA256

                                                                                                        f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9

                                                                                                        SHA512

                                                                                                        6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\scoped_dir3612_1165672958\6dba0c40-7d04-4294-80ed-8c1dc1cd9ec7.tmp

                                                                                                        Filesize

                                                                                                        88KB

                                                                                                        MD5

                                                                                                        2cc86b681f2cd1d9f095584fd3153a61

                                                                                                        SHA1

                                                                                                        2a0ac7262fb88908a453bc125c5c3fc72b8d490e

                                                                                                        SHA256

                                                                                                        d412fbbeb84e2a6882b2f0267b058f2ceb97f501e440fe3f9f70fac5c2277b9c

                                                                                                        SHA512

                                                                                                        14ba32c3cd5b1faf100d06f78981deebbbb673299a355b6eaec88e6cb5543725242c850235a541afa8abba4a609bb2ec26e4a0526c6b198016b08d8af868b986

                                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3063565911-2056067323-3330884624-1000\76b53b3ec448f7ccdda2063b15d2bfc3_de87a6d6-9d44-4942-9ec6-2be31b435411

                                                                                                        Filesize

                                                                                                        2KB

                                                                                                        MD5

                                                                                                        777016bfed6b1961c07b82cd8b530d81

                                                                                                        SHA1

                                                                                                        38136991e082ed24c8f77495a3116f80a6c40de9

                                                                                                        SHA256

                                                                                                        c604b1871655e2e4a2c48fd243ff36fc42c434011b83abaca76b08c5b9b15737

                                                                                                        SHA512

                                                                                                        e7420cc31c3b8c6b60ec91d11bcedbd79ba89d6f1805936aaef5977822ff1fd7546a6aa0dcbf7356c2dd107d15e504409bbffe4e2cba91fd0aa6bef89a739b79

                                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3063565911-2056067323-3330884624-1000\76b53b3ec448f7ccdda2063b15d2bfc3_de87a6d6-9d44-4942-9ec6-2be31b435411

                                                                                                        Filesize

                                                                                                        2KB

                                                                                                        MD5

                                                                                                        b639ea6afe8103b1d46d8b2fe0ca0d5b

                                                                                                        SHA1

                                                                                                        efef791bbde62c8354c4a708b5abaf33b1b20dbb

                                                                                                        SHA256

                                                                                                        c69b7c7611a084850a07daa9d3d13a6560a7fcd6c2dc7a7e40c3446c64acefa3

                                                                                                        SHA512

                                                                                                        09be505d95a13768728db2be485d0bd17a77756ea7fb70e15943d208a5619677c2ed0c86a554dfaf981255f538b7c9565406e739f84171cbf37131e6c8c5549f

                                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\W74P6Y9T68CPSXOOFRX7.temp

                                                                                                        Filesize

                                                                                                        7KB

                                                                                                        MD5

                                                                                                        ced423c0369900f6d5fc25d58dbf41ca

                                                                                                        SHA1

                                                                                                        87403e4cdbd13742a1a4fdb0b79bfa98d12410d9

                                                                                                        SHA256

                                                                                                        7aa91b874318a78bf70a7e02f488735e97120d77cb1cab5de2868316e7991247

                                                                                                        SHA512

                                                                                                        abae0f46c4ce39019398ccf170f84423254cc0a01a81c68c08f3a45854bfbc2bea264f9868a0f6b5e64a0d96975a5bbe61b36c7f7f912006829276d7b9507f1c

                                                                                                      • C:\Users\Admin\AppData\Roaming\sk25fSgsmI.exe

                                                                                                        Filesize

                                                                                                        304KB

                                                                                                        MD5

                                                                                                        65c058e4a90d2ec70b03211d768b6ecc

                                                                                                        SHA1

                                                                                                        bf5af6f650759e5e612d42d72145660056737164

                                                                                                        SHA256

                                                                                                        5a00e3718afb5bfb18a6b1c824b680015733f0403af0d5663289a17ba8206cc3

                                                                                                        SHA512

                                                                                                        3d9114409f8096ce8a1d134a48235fbbad0c6c53f820707a951bac42c4f7ba6a38e98a50c9d929f049042263a7c0e24da8368d3aa4e934f5da79e9bda4a930aa

                                                                                                      • C:\Users\Public\Desktop\Google Chrome.lnk

                                                                                                        Filesize

                                                                                                        2KB

                                                                                                        MD5

                                                                                                        a59a290a95123d475afbd32bcc0e7ade

                                                                                                        SHA1

                                                                                                        7cc568d65ab353704bec99fd0d5ffe43181c4560

                                                                                                        SHA256

                                                                                                        87a2e5f2697bfca1fe523fa810bd52c38f6f767e0ba54b8b6a64f7cab463f192

                                                                                                        SHA512

                                                                                                        c24cdb4b5bba347d119d9055fe479b5201a44c24b9d067979bec1af473d138cffcc9915cdb81de25ae67f7cf994b67b5fd9435aa8c4c23249efa82f5c4f835d8

                                                                                                      • \ProgramData\mozglue.dll

                                                                                                        Filesize

                                                                                                        593KB

                                                                                                        MD5

                                                                                                        c8fd9be83bc728cc04beffafc2907fe9

                                                                                                        SHA1

                                                                                                        95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                                                                        SHA256

                                                                                                        ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                                                                        SHA512

                                                                                                        fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                                                                      • \ProgramData\nss3.dll

                                                                                                        Filesize

                                                                                                        2.0MB

                                                                                                        MD5

                                                                                                        1cc453cdf74f31e4d913ff9c10acdde2

                                                                                                        SHA1

                                                                                                        6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                                                                                        SHA256

                                                                                                        ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                                                                                        SHA512

                                                                                                        dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                                                                                      • \Users\Admin\AppData\Local\Temp\svchost015.exe

                                                                                                        Filesize

                                                                                                        2.9MB

                                                                                                        MD5

                                                                                                        b826dd92d78ea2526e465a34324ebeea

                                                                                                        SHA1

                                                                                                        bf8a0093acfd2eb93c102e1a5745fb080575372e

                                                                                                        SHA256

                                                                                                        7824b50acdd144764dac7445a4067b35cf0fef619e451045ab6c1f54f5653a5b

                                                                                                        SHA512

                                                                                                        1ac4b731b9b31cabf3b1c43aee37206aee5326c8e786abe2ab38e031633b778f97f2d6545cf745c3066f3bd47b7aaf2ded2f9955475428100eaf271dd9aeef17

                                                                                                      • \Users\Admin\AppData\Roaming\izny5ojzIQ.exe

                                                                                                        Filesize

                                                                                                        490KB

                                                                                                        MD5

                                                                                                        b473c40205c61dc4750bc49f779908dd

                                                                                                        SHA1

                                                                                                        88a0fc0962099f0ac2d827d2c4d691ed9cade251

                                                                                                        SHA256

                                                                                                        8707c03158ba6395a11bdfd8c1b11eeedc2e052d3b55d73d0a5c64417e5fbd3b

                                                                                                        SHA512

                                                                                                        8fbaaa5bde30fe7c6e31a349c14e3bd710e92c4dbcca8cbdbaf34583887bc31e07e10a0223fc6c6c0d091787c296eba139ec91af44ec4ee6abbfb611493951d1

                                                                                                      • memory/444-99-0x0000000000110000-0x0000000000190000-memory.dmp

                                                                                                        Filesize

                                                                                                        512KB

                                                                                                      • memory/992-40-0x00000000002C0000-0x0000000000314000-memory.dmp

                                                                                                        Filesize

                                                                                                        336KB

                                                                                                      • memory/1368-322-0x0000000001260000-0x00000000012B4000-memory.dmp

                                                                                                        Filesize

                                                                                                        336KB

                                                                                                      • memory/1592-292-0x0000000000400000-0x0000000000643000-memory.dmp

                                                                                                        Filesize

                                                                                                        2.3MB

                                                                                                      • memory/1592-302-0x0000000000400000-0x0000000000643000-memory.dmp

                                                                                                        Filesize

                                                                                                        2.3MB

                                                                                                      • memory/1592-298-0x0000000000400000-0x0000000000643000-memory.dmp

                                                                                                        Filesize

                                                                                                        2.3MB

                                                                                                      • memory/1592-296-0x0000000000400000-0x0000000000643000-memory.dmp

                                                                                                        Filesize

                                                                                                        2.3MB

                                                                                                      • memory/1592-294-0x0000000000400000-0x0000000000643000-memory.dmp

                                                                                                        Filesize

                                                                                                        2.3MB

                                                                                                      • memory/1592-300-0x0000000000400000-0x0000000000643000-memory.dmp

                                                                                                        Filesize

                                                                                                        2.3MB

                                                                                                      • memory/1592-305-0x0000000000400000-0x0000000000643000-memory.dmp

                                                                                                        Filesize

                                                                                                        2.3MB

                                                                                                      • memory/1592-307-0x0000000000400000-0x0000000000643000-memory.dmp

                                                                                                        Filesize

                                                                                                        2.3MB

                                                                                                      • memory/1592-2146-0x0000000000400000-0x0000000000643000-memory.dmp

                                                                                                        Filesize

                                                                                                        2.3MB

                                                                                                      • memory/1660-2-0x00000000000F1000-0x000000000011F000-memory.dmp

                                                                                                        Filesize

                                                                                                        184KB

                                                                                                      • memory/1660-1-0x0000000077CB0000-0x0000000077CB2000-memory.dmp

                                                                                                        Filesize

                                                                                                        8KB

                                                                                                      • memory/1660-3-0x00000000000F0000-0x00000000005A6000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.7MB

                                                                                                      • memory/1660-5-0x00000000000F0000-0x00000000005A6000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.7MB

                                                                                                      • memory/1660-0-0x00000000000F0000-0x00000000005A6000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.7MB

                                                                                                      • memory/1660-14-0x00000000000F0000-0x00000000005A6000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.7MB

                                                                                                      • memory/1832-97-0x0000000000DD0000-0x0000000000E22000-memory.dmp

                                                                                                        Filesize

                                                                                                        328KB

                                                                                                      • memory/2072-157-0x00000000012E0000-0x0000000001523000-memory.dmp

                                                                                                        Filesize

                                                                                                        2.3MB

                                                                                                      • memory/2072-187-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                                                                        Filesize

                                                                                                        972KB

                                                                                                      • memory/2072-306-0x00000000012E0000-0x0000000001523000-memory.dmp

                                                                                                        Filesize

                                                                                                        2.3MB

                                                                                                      • memory/2120-304-0x0000000000400000-0x000000000081B000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.1MB

                                                                                                      • memory/2124-395-0x0000000001200000-0x00000000012F8000-memory.dmp

                                                                                                        Filesize

                                                                                                        992KB

                                                                                                      • memory/2124-396-0x0000000005010000-0x00000000050FE000-memory.dmp

                                                                                                        Filesize

                                                                                                        952KB

                                                                                                      • memory/2124-398-0x0000000005010000-0x00000000050F8000-memory.dmp

                                                                                                        Filesize

                                                                                                        928KB

                                                                                                      • memory/2124-397-0x0000000005010000-0x00000000050F8000-memory.dmp

                                                                                                        Filesize

                                                                                                        928KB

                                                                                                      • memory/2124-404-0x0000000005010000-0x00000000050F8000-memory.dmp

                                                                                                        Filesize

                                                                                                        928KB

                                                                                                      • memory/2124-402-0x0000000005010000-0x00000000050F8000-memory.dmp

                                                                                                        Filesize

                                                                                                        928KB

                                                                                                      • memory/2124-400-0x0000000005010000-0x00000000050F8000-memory.dmp

                                                                                                        Filesize

                                                                                                        928KB

                                                                                                      • memory/2124-1471-0x00000000010D0000-0x0000000001138000-memory.dmp

                                                                                                        Filesize

                                                                                                        416KB

                                                                                                      • memory/2124-1472-0x0000000004700000-0x000000000474C000-memory.dmp

                                                                                                        Filesize

                                                                                                        304KB

                                                                                                      • memory/2124-1473-0x0000000004750000-0x00000000047A4000-memory.dmp

                                                                                                        Filesize

                                                                                                        336KB

                                                                                                      • memory/2300-287-0x0000000000060000-0x00000000000CC000-memory.dmp

                                                                                                        Filesize

                                                                                                        432KB

                                                                                                      • memory/2640-185-0x0000000000850000-0x0000000000D06000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.7MB

                                                                                                      • memory/2640-17-0x0000000000851000-0x000000000087F000-memory.dmp

                                                                                                        Filesize

                                                                                                        184KB

                                                                                                      • memory/2640-1501-0x0000000006B50000-0x00000000071E7000-memory.dmp

                                                                                                        Filesize

                                                                                                        6.6MB

                                                                                                      • memory/2640-251-0x0000000000850000-0x0000000000D06000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.7MB

                                                                                                      • memory/2640-1518-0x0000000006B50000-0x000000000700F000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.7MB

                                                                                                      • memory/2640-52-0x0000000000850000-0x0000000000D06000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.7MB

                                                                                                      • memory/2640-2436-0x0000000006530000-0x0000000006773000-memory.dmp

                                                                                                        Filesize

                                                                                                        2.3MB

                                                                                                      • memory/2640-2437-0x0000000006530000-0x0000000006773000-memory.dmp

                                                                                                        Filesize

                                                                                                        2.3MB

                                                                                                      • memory/2640-156-0x0000000006530000-0x0000000006773000-memory.dmp

                                                                                                        Filesize

                                                                                                        2.3MB

                                                                                                      • memory/2640-1542-0x0000000006B50000-0x00000000071E7000-memory.dmp

                                                                                                        Filesize

                                                                                                        6.6MB

                                                                                                      • memory/2640-154-0x0000000006530000-0x0000000006773000-memory.dmp

                                                                                                        Filesize

                                                                                                        2.3MB

                                                                                                      • memory/2640-16-0x0000000000850000-0x0000000000D06000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.7MB

                                                                                                      • memory/2640-18-0x0000000000850000-0x0000000000D06000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.7MB

                                                                                                      • memory/2640-1502-0x0000000006B50000-0x00000000071E7000-memory.dmp

                                                                                                        Filesize

                                                                                                        6.6MB

                                                                                                      • memory/2640-19-0x0000000000850000-0x0000000000D06000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.7MB

                                                                                                      • memory/2640-1575-0x0000000006B50000-0x000000000700F000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.7MB

                                                                                                      • memory/2640-25-0x0000000000850000-0x0000000000D06000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.7MB

                                                                                                      • memory/2640-24-0x0000000000850000-0x0000000000D06000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.7MB

                                                                                                      • memory/2640-23-0x0000000000850000-0x0000000000D06000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.7MB

                                                                                                      • memory/2640-22-0x0000000000850000-0x0000000000D06000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.7MB

                                                                                                      • memory/2640-21-0x0000000000850000-0x0000000000D06000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.7MB

                                                                                                      • memory/2720-44-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                                        Filesize

                                                                                                        328KB

                                                                                                      • memory/2720-51-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                                        Filesize

                                                                                                        328KB

                                                                                                      • memory/2720-50-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                                                                                                        Filesize

                                                                                                        4KB

                                                                                                      • memory/2720-48-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                                        Filesize

                                                                                                        328KB

                                                                                                      • memory/2720-42-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                                        Filesize

                                                                                                        328KB

                                                                                                      • memory/2720-54-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                                        Filesize

                                                                                                        328KB

                                                                                                      • memory/2720-47-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                                        Filesize

                                                                                                        328KB

                                                                                                      • memory/2720-53-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                                        Filesize

                                                                                                        328KB

                                                                                                      • memory/2800-364-0x0000000001120000-0x0000000001172000-memory.dmp

                                                                                                        Filesize

                                                                                                        328KB

                                                                                                      • memory/3028-328-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                                        Filesize

                                                                                                        328KB

                                                                                                      • memory/3028-332-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                                                                                                        Filesize

                                                                                                        4KB

                                                                                                      • memory/3028-326-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                                        Filesize

                                                                                                        328KB

                                                                                                      • memory/3028-330-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                                        Filesize

                                                                                                        328KB

                                                                                                      • memory/3028-335-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                                        Filesize

                                                                                                        328KB

                                                                                                      • memory/3028-334-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                                        Filesize

                                                                                                        328KB

                                                                                                      • memory/3028-333-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                                        Filesize

                                                                                                        328KB

                                                                                                      • memory/3064-380-0x0000000001300000-0x0000000001C90000-memory.dmp

                                                                                                        Filesize

                                                                                                        9.6MB

                                                                                                      • memory/3328-1574-0x00000000010F0000-0x0000000001787000-memory.dmp

                                                                                                        Filesize

                                                                                                        6.6MB

                                                                                                      • memory/3328-1695-0x00000000010F0000-0x0000000001787000-memory.dmp

                                                                                                        Filesize

                                                                                                        6.6MB

                                                                                                      • memory/3328-2249-0x00000000010F0000-0x0000000001787000-memory.dmp

                                                                                                        Filesize

                                                                                                        6.6MB

                                                                                                      • memory/3940-1558-0x0000000000B90000-0x0000000000B98000-memory.dmp

                                                                                                        Filesize

                                                                                                        32KB

                                                                                                      • memory/4256-1886-0x0000000000070000-0x0000000000254000-memory.dmp

                                                                                                        Filesize

                                                                                                        1.9MB

                                                                                                      • memory/5528-1503-0x0000000000B10000-0x00000000011A7000-memory.dmp

                                                                                                        Filesize

                                                                                                        6.6MB

                                                                                                      • memory/5528-1559-0x0000000000B10000-0x00000000011A7000-memory.dmp

                                                                                                        Filesize

                                                                                                        6.6MB

                                                                                                      • memory/5528-2491-0x0000000000B10000-0x00000000011A7000-memory.dmp

                                                                                                        Filesize

                                                                                                        6.6MB

                                                                                                      • memory/5852-1530-0x0000000001040000-0x00000000014FF000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.7MB

                                                                                                      • memory/5852-1519-0x0000000001040000-0x00000000014FF000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.7MB

                                                                                                      • memory/6048-1533-0x00000000011E0000-0x000000000169F000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.7MB

                                                                                                      • memory/6048-1573-0x0000000006AB0000-0x0000000007147000-memory.dmp

                                                                                                        Filesize

                                                                                                        6.6MB

                                                                                                      • memory/6048-1610-0x00000000011E0000-0x000000000169F000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.7MB

                                                                                                      • memory/6048-1616-0x0000000006AB0000-0x0000000007147000-memory.dmp

                                                                                                        Filesize

                                                                                                        6.6MB

                                                                                                      • memory/6048-1617-0x0000000006AB0000-0x0000000007147000-memory.dmp

                                                                                                        Filesize

                                                                                                        6.6MB

                                                                                                      • memory/6048-1680-0x0000000006AB0000-0x0000000007147000-memory.dmp

                                                                                                        Filesize

                                                                                                        6.6MB

                                                                                                      • memory/6048-1889-0x0000000006AB0000-0x0000000007147000-memory.dmp

                                                                                                        Filesize

                                                                                                        6.6MB