Analysis

  • max time kernel
    149s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/04/2025, 23:45

General

  • Target

    JaffaCakes118_9d07bbb8fe17526a432d813688a1c670.exe

  • Size

    339KB

  • MD5

    9d07bbb8fe17526a432d813688a1c670

  • SHA1

    e6775c1f091248a9660a632d791f59792a6bc1c3

  • SHA256

    04a5385ca5be897675f249927956d9f2b35532b00741b1a354ee56e41c3dc78e

  • SHA512

    651026ae2f549cb28d13c2259f40a2af91efc17203881763513f684d447a98ff291d20a9de8c22dc3ea9f728d3c4e3356d17174c723940ad700dbd2d428c07e3

  • SSDEEP

    6144:rLEchZLsu1AcKKIFrMg3p/UHLEhtfwjH5fc1zdLThGniSRxixV4naNiEGoZSKaU5:ciZLn1SKIFlUHLEk75UJdcniSRxuV4aB

Malware Config

Signatures

  • Blackshades

    Blackshades is a remote access trojan with various capabilities.

  • Blackshades family
  • Blackshades payload 32 IoCs
  • Modifies firewall policy service 3 TTPs 10 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 64 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 64 IoCs
  • Suspicious use of SetThreadContext 44 IoCs
  • UPX packed file 64 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry key 1 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 36 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9d07bbb8fe17526a432d813688a1c670.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9d07bbb8fe17526a432d813688a1c670.exe"
    1⤵
    • Checks whether UAC is enabled
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:5496
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9d07bbb8fe17526a432d813688a1c670.exe
      "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9d07bbb8fe17526a432d813688a1c670.exe"
      2⤵
      • Adds policy Run key to start application
      • Boot or Logon Autostart Execution: Active Setup
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3484
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:324
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • Modifies firewall policy service
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:3992
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9d07bbb8fe17526a432d813688a1c670.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9d07bbb8fe17526a432d813688a1c670.exe:*:Enabled:Windows Messanger" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1484
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9d07bbb8fe17526a432d813688a1c670.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9d07bbb8fe17526a432d813688a1c670.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • Modifies firewall policy service
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:5512
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3084
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • Modifies firewall policy service
          • Modifies registry key
          PID:220
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\msnmsngerr.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\msnmsngerr.exe:*:Enabled:Windows Messanger" /f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1992
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\msnmsngerr.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\msnmsngerr.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • Modifies firewall policy service
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:116
  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3160
    • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
      C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
      2⤵
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2172
      • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
        C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:5468
  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3572
    • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
      C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
      2⤵
      • Executes dropped EXE
      PID:1304
  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2336
    • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
      C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
      2⤵
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • System Location Discovery: System Language Discovery
      PID:264
  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2408
    • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
      C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1452
      • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
        C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2464
  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
    1⤵
      PID:636
      • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
        C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        PID:1308
        • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
          C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:6116
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
      1⤵
        PID:5376
        • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
          C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
          2⤵
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • System Location Discovery: System Language Discovery
          PID:2868
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
        1⤵
          PID:5092
          • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
            C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
            2⤵
            • Executes dropped EXE
            • Checks whether UAC is enabled
            • Suspicious use of SetThreadContext
            PID:1672
            • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
              C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
              3⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:3424
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
          1⤵
            PID:5372
            • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
              C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
              2⤵
              • Executes dropped EXE
              PID:1832
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
            1⤵
              PID:4960
              • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                2⤵
                • Executes dropped EXE
                • Checks whether UAC is enabled
                PID:4716
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
              1⤵
                PID:756
                • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                  C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                  2⤵
                  • Executes dropped EXE
                  • Checks whether UAC is enabled
                  • Suspicious use of SetThreadContext
                  PID:1208
                  • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                    C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                    3⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:2608
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                1⤵
                  PID:3696
                  • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                    C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                    2⤵
                    • Executes dropped EXE
                    • Checks whether UAC is enabled
                    • Suspicious use of SetThreadContext
                    • System Location Discovery: System Language Discovery
                    PID:5456
                    • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                      C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                      3⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of SetWindowsHookEx
                      PID:5128
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                  1⤵
                    PID:3324
                    • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                      C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                      2⤵
                      • Executes dropped EXE
                      • Checks whether UAC is enabled
                      PID:4036
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                    1⤵
                      PID:5572
                      • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                        C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                        2⤵
                        • Executes dropped EXE
                        • Checks whether UAC is enabled
                        • Suspicious use of SetThreadContext
                        PID:4484
                        • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                          C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                          3⤵
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of SetWindowsHookEx
                          PID:2356
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                      1⤵
                        PID:64
                        • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                          C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                          2⤵
                          • Executes dropped EXE
                          • Checks whether UAC is enabled
                          • System Location Discovery: System Language Discovery
                          PID:5264
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                        1⤵
                          PID:3104
                          • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                            C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                            2⤵
                            • Executes dropped EXE
                            • Checks whether UAC is enabled
                            PID:3772
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                          1⤵
                            PID:3760
                            • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                              C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                              2⤵
                              • Executes dropped EXE
                              • Checks whether UAC is enabled
                              • Suspicious use of SetThreadContext
                              • System Location Discovery: System Language Discovery
                              PID:664
                              • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                3⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                • Suspicious use of SetWindowsHookEx
                                PID:5452
                          • C:\Windows\system32\cmd.exe
                            C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                            1⤵
                              PID:3708
                              • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                2⤵
                                • Executes dropped EXE
                                • Checks whether UAC is enabled
                                PID:3572
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                              1⤵
                                PID:4488
                                • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                  C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                  2⤵
                                  • Executes dropped EXE
                                  • Checks whether UAC is enabled
                                  • Suspicious use of SetThreadContext
                                  PID:1668
                                  • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                    C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                    3⤵
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious use of SetWindowsHookEx
                                    PID:5548
                              • C:\Windows\system32\cmd.exe
                                C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                1⤵
                                  PID:4104
                                  • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                    C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                    2⤵
                                    • Executes dropped EXE
                                    • Checks whether UAC is enabled
                                    • System Location Discovery: System Language Discovery
                                    PID:1808
                                • C:\Windows\system32\cmd.exe
                                  C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                  1⤵
                                    PID:2336
                                    • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                      C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                      2⤵
                                      • Executes dropped EXE
                                      • Checks whether UAC is enabled
                                      • Suspicious use of SetThreadContext
                                      PID:5660
                                      • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                        C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                        3⤵
                                        • Executes dropped EXE
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious use of SetWindowsHookEx
                                        PID:5988
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                    1⤵
                                      PID:4612
                                      • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                        C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                        2⤵
                                        • Executes dropped EXE
                                        • Checks whether UAC is enabled
                                        PID:3404
                                    • C:\Windows\system32\cmd.exe
                                      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                      1⤵
                                        PID:404
                                        • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                          C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                          2⤵
                                          • Executes dropped EXE
                                          • Checks whether UAC is enabled
                                          • Suspicious use of SetThreadContext
                                          • System Location Discovery: System Language Discovery
                                          PID:540
                                          • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                            C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                            3⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetWindowsHookEx
                                            PID:2300
                                      • C:\Windows\system32\cmd.exe
                                        C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                        1⤵
                                          PID:2432
                                          • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                            C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                            2⤵
                                            • Executes dropped EXE
                                            PID:2796
                                        • C:\Windows\system32\cmd.exe
                                          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                          1⤵
                                            PID:2044
                                            • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                              C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                              2⤵
                                              • Executes dropped EXE
                                              • Checks whether UAC is enabled
                                              • Suspicious use of SetThreadContext
                                              PID:4784
                                              • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                3⤵
                                                • Executes dropped EXE
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious use of SetWindowsHookEx
                                                PID:4288
                                          • C:\Windows\system32\cmd.exe
                                            C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                            1⤵
                                              PID:4136
                                              • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                2⤵
                                                • Executes dropped EXE
                                                • Checks whether UAC is enabled
                                                PID:2256
                                            • C:\Windows\system32\cmd.exe
                                              C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                              1⤵
                                                PID:2400
                                                • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                  C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                  2⤵
                                                  • Executes dropped EXE
                                                  • Checks whether UAC is enabled
                                                  • Suspicious use of SetThreadContext
                                                  PID:4884
                                                  • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                    C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                    3⤵
                                                    • Executes dropped EXE
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:5704
                                              • C:\Windows\system32\cmd.exe
                                                C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                1⤵
                                                  PID:5572
                                                  • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                    C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                    2⤵
                                                    • Executes dropped EXE
                                                    • Checks whether UAC is enabled
                                                    • Suspicious use of SetThreadContext
                                                    • System Location Discovery: System Language Discovery
                                                    PID:3104
                                                    • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                      C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                      3⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:3748
                                                • C:\Windows\system32\cmd.exe
                                                  C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                  1⤵
                                                    PID:212
                                                    • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                      C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                      2⤵
                                                      • Executes dropped EXE
                                                      PID:4812
                                                  • C:\Windows\system32\cmd.exe
                                                    C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                    1⤵
                                                      PID:3488
                                                      • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                        C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                        2⤵
                                                        • Executes dropped EXE
                                                        • System Location Discovery: System Language Discovery
                                                        PID:5340
                                                    • C:\Windows\system32\cmd.exe
                                                      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                      1⤵
                                                        PID:5312
                                                        • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                          C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                          2⤵
                                                          • Executes dropped EXE
                                                          • Suspicious use of SetThreadContext
                                                          PID:2388
                                                          • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                            C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                            3⤵
                                                            • Executes dropped EXE
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:3540
                                                      • C:\Windows\system32\cmd.exe
                                                        C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                        1⤵
                                                          PID:5656
                                                          • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                            C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                            2⤵
                                                            • Executes dropped EXE
                                                            • Checks whether UAC is enabled
                                                            • Suspicious use of SetThreadContext
                                                            • System Location Discovery: System Language Discovery
                                                            PID:2552
                                                            • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                              C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                              3⤵
                                                              • Executes dropped EXE
                                                              • System Location Discovery: System Language Discovery
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:1104
                                                        • C:\Windows\system32\cmd.exe
                                                          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                          1⤵
                                                            PID:1496
                                                            • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                              C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                              2⤵
                                                              • Executes dropped EXE
                                                              • Checks whether UAC is enabled
                                                              • System Location Discovery: System Language Discovery
                                                              PID:4368
                                                          • C:\Windows\system32\cmd.exe
                                                            C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                            1⤵
                                                              PID:2884
                                                              • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                2⤵
                                                                • Executes dropped EXE
                                                                • Checks whether UAC is enabled
                                                                • Suspicious use of SetThreadContext
                                                                • System Location Discovery: System Language Discovery
                                                                PID:5064
                                                                • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                  C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                  3⤵
                                                                  • Executes dropped EXE
                                                                  • System Location Discovery: System Language Discovery
                                                                  • Suspicious use of SetWindowsHookEx
                                                                  PID:1724
                                                            • C:\Windows\system32\cmd.exe
                                                              C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                              1⤵
                                                                PID:1452
                                                                • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                  C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                  2⤵
                                                                  • Executes dropped EXE
                                                                  • Checks whether UAC is enabled
                                                                  PID:4956
                                                              • C:\Windows\system32\cmd.exe
                                                                C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                1⤵
                                                                  PID:1192
                                                                  • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                    C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                    2⤵
                                                                    • Executes dropped EXE
                                                                    • Checks whether UAC is enabled
                                                                    • Suspicious use of SetThreadContext
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:5736
                                                                    • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                      C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                      3⤵
                                                                      • Executes dropped EXE
                                                                      • System Location Discovery: System Language Discovery
                                                                      • Suspicious use of SetWindowsHookEx
                                                                      PID:1184
                                                                • C:\Windows\system32\cmd.exe
                                                                  C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                  1⤵
                                                                    PID:3492
                                                                    • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                      C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                      2⤵
                                                                      • Executes dropped EXE
                                                                      • Checks whether UAC is enabled
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:5376
                                                                  • C:\Windows\system32\cmd.exe
                                                                    C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                    1⤵
                                                                      PID:3528
                                                                      • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                        C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                        2⤵
                                                                        • Executes dropped EXE
                                                                        • Checks whether UAC is enabled
                                                                        • Suspicious use of SetThreadContext
                                                                        • System Location Discovery: System Language Discovery
                                                                        PID:2460
                                                                        • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                          C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                          3⤵
                                                                          • Executes dropped EXE
                                                                          • Suspicious use of SetWindowsHookEx
                                                                          PID:5388
                                                                    • C:\Windows\system32\cmd.exe
                                                                      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                      1⤵
                                                                        PID:2952
                                                                        • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                          C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                          2⤵
                                                                          • Executes dropped EXE
                                                                          • Checks whether UAC is enabled
                                                                          PID:4660
                                                                      • C:\Windows\system32\cmd.exe
                                                                        C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                        1⤵
                                                                          PID:5592
                                                                          • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                            C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                            2⤵
                                                                            • Executes dropped EXE
                                                                            • Checks whether UAC is enabled
                                                                            • Suspicious use of SetThreadContext
                                                                            PID:2840
                                                                            • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                              C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                              3⤵
                                                                              • Executes dropped EXE
                                                                              • System Location Discovery: System Language Discovery
                                                                              • Suspicious use of SetWindowsHookEx
                                                                              PID:4896
                                                                        • C:\Windows\system32\cmd.exe
                                                                          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                          1⤵
                                                                            PID:5752
                                                                            • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                              C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                              2⤵
                                                                              • Executes dropped EXE
                                                                              • Checks whether UAC is enabled
                                                                              PID:1508
                                                                          • C:\Windows\system32\cmd.exe
                                                                            C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                            1⤵
                                                                              PID:5864
                                                                              • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                2⤵
                                                                                • Executes dropped EXE
                                                                                • Suspicious use of SetThreadContext
                                                                                • System Location Discovery: System Language Discovery
                                                                                PID:4536
                                                                                • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                  C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                  3⤵
                                                                                  • Executes dropped EXE
                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                  PID:2256
                                                                            • C:\Windows\system32\cmd.exe
                                                                              C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                              1⤵
                                                                                PID:4056
                                                                                • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                  C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                  2⤵
                                                                                  • Executes dropped EXE
                                                                                  • Checks whether UAC is enabled
                                                                                  PID:2784
                                                                              • C:\Windows\system32\cmd.exe
                                                                                C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                1⤵
                                                                                  PID:4720
                                                                                  • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                    C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                    2⤵
                                                                                    • Executes dropped EXE
                                                                                    • Suspicious use of SetThreadContext
                                                                                    PID:1144
                                                                                    • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                      C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                      3⤵
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                      PID:1484
                                                                                • C:\Windows\system32\cmd.exe
                                                                                  C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                  1⤵
                                                                                    PID:3600
                                                                                    • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                      C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                      2⤵
                                                                                      • Checks whether UAC is enabled
                                                                                      PID:5512
                                                                                  • C:\Windows\system32\cmd.exe
                                                                                    C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                    1⤵
                                                                                      PID:6112
                                                                                      • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                        C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                        2⤵
                                                                                        • Suspicious use of SetThreadContext
                                                                                        • System Location Discovery: System Language Discovery
                                                                                        PID:4068
                                                                                        • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                          C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                          3⤵
                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                          PID:1924
                                                                                    • C:\Windows\system32\cmd.exe
                                                                                      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                      1⤵
                                                                                        PID:3772
                                                                                        • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                          C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                          2⤵
                                                                                          • Checks whether UAC is enabled
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          PID:3708
                                                                                      • C:\Windows\system32\cmd.exe
                                                                                        C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                        1⤵
                                                                                          PID:2800
                                                                                          • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                            C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                            2⤵
                                                                                            • Checks whether UAC is enabled
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            PID:4176
                                                                                        • C:\Windows\system32\cmd.exe
                                                                                          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                          1⤵
                                                                                            PID:2236
                                                                                            • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                              C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                              2⤵
                                                                                              • Checks whether UAC is enabled
                                                                                              • Suspicious use of SetThreadContext
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              PID:1448
                                                                                              • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                3⤵
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                PID:2136
                                                                                          • C:\Windows\system32\cmd.exe
                                                                                            C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                            1⤵
                                                                                              PID:2292
                                                                                              • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                2⤵
                                                                                                • Suspicious use of SetThreadContext
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                PID:5596
                                                                                                • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                  C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                  3⤵
                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                  PID:3000
                                                                                            • C:\Windows\system32\cmd.exe
                                                                                              C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                              1⤵
                                                                                                PID:1808
                                                                                                • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                  C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                  2⤵
                                                                                                    PID:2600
                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                  C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                  1⤵
                                                                                                    PID:4632
                                                                                                    • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                      C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                      2⤵
                                                                                                      • Checks whether UAC is enabled
                                                                                                      PID:3952
                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                    C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                    1⤵
                                                                                                      PID:2516
                                                                                                      • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                        C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                        2⤵
                                                                                                        • Suspicious use of SetThreadContext
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        PID:1016
                                                                                                        • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                          C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                          3⤵
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                                          PID:2588
                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                      1⤵
                                                                                                        PID:4048
                                                                                                        • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                          C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                          2⤵
                                                                                                          • Checks whether UAC is enabled
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          PID:4436
                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                        C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                        1⤵
                                                                                                          PID:820
                                                                                                          • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                            C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                            2⤵
                                                                                                            • Checks whether UAC is enabled
                                                                                                            • Suspicious use of SetThreadContext
                                                                                                            PID:5092
                                                                                                            • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                              C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                              3⤵
                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                                              PID:4060
                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                          1⤵
                                                                                                            PID:4148
                                                                                                            • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                              C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                              2⤵
                                                                                                                PID:2952
                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                              C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                              1⤵
                                                                                                                PID:2140
                                                                                                                • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                  C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                  2⤵
                                                                                                                  • Checks whether UAC is enabled
                                                                                                                  • Suspicious use of SetThreadContext
                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                  PID:1120
                                                                                                                  • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                    C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                    3⤵
                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                                    PID:1880
                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                1⤵
                                                                                                                  PID:5288
                                                                                                                  • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                    C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                    2⤵
                                                                                                                    • Checks whether UAC is enabled
                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                    PID:1320
                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                  C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                  1⤵
                                                                                                                    PID:5096
                                                                                                                    • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                      C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                      2⤵
                                                                                                                      • Checks whether UAC is enabled
                                                                                                                      • Suspicious use of SetThreadContext
                                                                                                                      PID:5168
                                                                                                                      • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                        C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                        3⤵
                                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                                        PID:5292
                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                    C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                    1⤵
                                                                                                                      PID:4116
                                                                                                                      • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                        C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                        2⤵
                                                                                                                        • Checks whether UAC is enabled
                                                                                                                        • Suspicious use of SetThreadContext
                                                                                                                        PID:1208
                                                                                                                        • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                          C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                          3⤵
                                                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                                                          PID:4900
                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                      1⤵
                                                                                                                        PID:5276
                                                                                                                        • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                          C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                          2⤵
                                                                                                                          • Checks whether UAC is enabled
                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                          PID:2920
                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                        C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                        1⤵
                                                                                                                          PID:5564
                                                                                                                          • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                            C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                            2⤵
                                                                                                                            • Checks whether UAC is enabled
                                                                                                                            PID:740
                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                          1⤵
                                                                                                                            PID:1828
                                                                                                                            • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                              C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                              2⤵
                                                                                                                              • Checks whether UAC is enabled
                                                                                                                              • Suspicious use of SetThreadContext
                                                                                                                              PID:3696
                                                                                                                              • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                3⤵
                                                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                                                PID:996
                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                            C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                            1⤵
                                                                                                                              PID:220
                                                                                                                              • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                2⤵
                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                PID:4604
                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                              C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                              1⤵
                                                                                                                                PID:1844
                                                                                                                                • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                  C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                  2⤵
                                                                                                                                  • Checks whether UAC is enabled
                                                                                                                                  • Suspicious use of SetThreadContext
                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                  PID:2792
                                                                                                                                  • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                    C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                    3⤵
                                                                                                                                      PID:5492
                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                  C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                  1⤵
                                                                                                                                    PID:1144
                                                                                                                                    • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                      C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                      2⤵
                                                                                                                                        PID:3816
                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                      1⤵
                                                                                                                                        PID:1028
                                                                                                                                        • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                          C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                          2⤵
                                                                                                                                          • Checks whether UAC is enabled
                                                                                                                                          • Suspicious use of SetThreadContext
                                                                                                                                          PID:5572
                                                                                                                                          • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                            C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                            3⤵
                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                            PID:3772
                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                        C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                        1⤵
                                                                                                                                          PID:664
                                                                                                                                          • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                            C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                            2⤵
                                                                                                                                            • Checks whether UAC is enabled
                                                                                                                                            PID:4176
                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                          1⤵
                                                                                                                                            PID:1780
                                                                                                                                            • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                              C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                              2⤵
                                                                                                                                              • Checks whether UAC is enabled
                                                                                                                                              • Suspicious use of SetThreadContext
                                                                                                                                              PID:2404
                                                                                                                                              • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                                C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                                3⤵
                                                                                                                                                  PID:4548
                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                              C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                              1⤵
                                                                                                                                                PID:2916
                                                                                                                                                • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                                  C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                                  2⤵
                                                                                                                                                    PID:952
                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                  C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                                  1⤵
                                                                                                                                                    PID:324
                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                                      C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                                      2⤵
                                                                                                                                                      • Checks whether UAC is enabled
                                                                                                                                                      • Suspicious use of SetThreadContext
                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                      PID:2324
                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                                        C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                                        3⤵
                                                                                                                                                          PID:1792
                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                                      1⤵
                                                                                                                                                        PID:5160
                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                                          C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                                          2⤵
                                                                                                                                                            PID:3372
                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                                          1⤵
                                                                                                                                                            PID:5460
                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                                              C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                                              2⤵
                                                                                                                                                              • Suspicious use of SetThreadContext
                                                                                                                                                              PID:1068
                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                                                C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                                                3⤵
                                                                                                                                                                  PID:2276
                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                              C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                                              1⤵
                                                                                                                                                                PID:3640
                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                                                  2⤵
                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                  PID:3064
                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                                                1⤵
                                                                                                                                                                  PID:2396
                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                                                    2⤵
                                                                                                                                                                    • Suspicious use of SetThreadContext
                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                    PID:2516
                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                                                      3⤵
                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                      PID:5236
                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                  C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                                                  1⤵
                                                                                                                                                                    PID:5376
                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                                                      2⤵
                                                                                                                                                                      • Checks whether UAC is enabled
                                                                                                                                                                      • Suspicious use of SetThreadContext
                                                                                                                                                                      PID:4728
                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                                                        3⤵
                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                        PID:2480
                                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                                    C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                                                    1⤵
                                                                                                                                                                      PID:3720
                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                                                        2⤵
                                                                                                                                                                        • Checks whether UAC is enabled
                                                                                                                                                                        PID:5216
                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                                                      1⤵
                                                                                                                                                                        PID:5464
                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                                                          2⤵
                                                                                                                                                                          • Checks whether UAC is enabled
                                                                                                                                                                          • Suspicious use of SetThreadContext
                                                                                                                                                                          PID:2420
                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                                                            3⤵
                                                                                                                                                                              PID:4660
                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                                                          1⤵
                                                                                                                                                                            PID:6136
                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                                                              2⤵
                                                                                                                                                                              • Checks whether UAC is enabled
                                                                                                                                                                              PID:1392
                                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                                            C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                                                            1⤵
                                                                                                                                                                              PID:5672
                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                                                                2⤵
                                                                                                                                                                                • Checks whether UAC is enabled
                                                                                                                                                                                • Suspicious use of SetThreadContext
                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                PID:2128
                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                                                                  3⤵
                                                                                                                                                                                    PID:628
                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                                                                1⤵
                                                                                                                                                                                  PID:1408
                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                                                                    2⤵
                                                                                                                                                                                      PID:4456
                                                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                                                    C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                                                                    1⤵
                                                                                                                                                                                      PID:3528
                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                                                                        2⤵
                                                                                                                                                                                        • Checks whether UAC is enabled
                                                                                                                                                                                        • Suspicious use of SetThreadContext
                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                        PID:768
                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                                                                          3⤵
                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                          PID:1604
                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                                                                      1⤵
                                                                                                                                                                                        PID:2284
                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                                                                          2⤵
                                                                                                                                                                                          • Checks whether UAC is enabled
                                                                                                                                                                                          PID:4784
                                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                                        C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                                                                        1⤵
                                                                                                                                                                                          PID:552
                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                                                                            2⤵
                                                                                                                                                                                            • Checks whether UAC is enabled
                                                                                                                                                                                            • Suspicious use of SetThreadContext
                                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                                            PID:740
                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                                                                              3⤵
                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                              PID:3140
                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                                                                          1⤵
                                                                                                                                                                                            PID:4116
                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                                                                              2⤵
                                                                                                                                                                                              • Checks whether UAC is enabled
                                                                                                                                                                                              PID:2044
                                                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                                                            C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                                                                            1⤵
                                                                                                                                                                                              PID:4572
                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                                                                                2⤵
                                                                                                                                                                                                • Checks whether UAC is enabled
                                                                                                                                                                                                PID:5876
                                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                                              C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                                                                              1⤵
                                                                                                                                                                                                PID:5864
                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                  • Checks whether UAC is enabled
                                                                                                                                                                                                  • Suspicious use of SetThreadContext
                                                                                                                                                                                                  PID:4968
                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\msnmsngerr.exe
                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                      PID:1088

                                                                                                                                                                                                Network

                                                                                                                                                                                                MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                Replay Monitor

                                                                                                                                                                                                Loading Replay Monitor...

                                                                                                                                                                                                Downloads

                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\data.dat

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  33B

                                                                                                                                                                                                  MD5

                                                                                                                                                                                                  dcd1cc9ea016096c2de9e1dca6c5190b

                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                  e51bbbbd2314eec2ebb78a095fb02901305dc8bc

                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                  ff4646261bdcdcf66094732ab32728418f6cf4106d23fb4fbc5668153d4b66fa

                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                  7cc3b6e82345db15ec418573a4acd1d79c07b6e7bb702ec87f1020be41a7116a0804a07ea4dc120762ceba4086ef4b9aac4a8f8958aeacba2caebf7a4b5bf6fd

                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\msnmsngerr.exe

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  339KB

                                                                                                                                                                                                  MD5

                                                                                                                                                                                                  9d07bbb8fe17526a432d813688a1c670

                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                  e6775c1f091248a9660a632d791f59792a6bc1c3

                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                  04a5385ca5be897675f249927956d9f2b35532b00741b1a354ee56e41c3dc78e

                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                  651026ae2f549cb28d13c2259f40a2af91efc17203881763513f684d447a98ff291d20a9de8c22dc3ea9f728d3c4e3356d17174c723940ad700dbd2d428c07e3

                                                                                                                                                                                                • memory/264-39-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/540-199-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/664-146-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/1016-454-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/1104-292-0x0000000000400000-0x0000000000474000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  464KB

                                                                                                                                                                                                • memory/1144-396-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/1184-330-0x0000000000400000-0x0000000000474000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  464KB

                                                                                                                                                                                                • memory/1208-97-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/1304-21-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/1304-22-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/1308-64-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/1448-425-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/1448-416-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/1452-47-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/1484-399-0x0000000000400000-0x0000000000474000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  464KB

                                                                                                                                                                                                • memory/1508-352-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/1508-350-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/1668-151-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/1668-159-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/1672-82-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/1724-309-0x0000000000400000-0x0000000000474000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  464KB

                                                                                                                                                                                                • memory/1808-174-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/1808-172-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/1832-73-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/1924-412-0x0000000000400000-0x0000000000474000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  464KB

                                                                                                                                                                                                • memory/2136-429-0x0000000000400000-0x0000000000474000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  464KB

                                                                                                                                                                                                • memory/2172-31-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/2256-227-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/2256-385-0x0000000000400000-0x0000000000474000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  464KB

                                                                                                                                                                                                • memory/2300-202-0x0000000000400000-0x0000000000474000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  464KB

                                                                                                                                                                                                • memory/2356-134-0x0000000000400000-0x0000000000474000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  464KB

                                                                                                                                                                                                • memory/2388-273-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/2460-344-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/2464-51-0x0000000000400000-0x0000000000474000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  464KB

                                                                                                                                                                                                • memory/2552-289-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/2588-457-0x0000000000400000-0x0000000000474000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  464KB

                                                                                                                                                                                                • memory/2600-430-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/2600-432-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/2608-100-0x0000000000400000-0x0000000000474000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  464KB

                                                                                                                                                                                                • memory/2784-370-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/2784-373-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/2796-206-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/2796-208-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/2840-361-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/2868-54-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/2868-56-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/3000-443-0x0000000000400000-0x0000000000474000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  464KB

                                                                                                                                                                                                • memory/3104-253-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/3404-190-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/3424-85-0x0000000000400000-0x0000000000474000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  464KB

                                                                                                                                                                                                • memory/3484-117-0x0000000000400000-0x0000000000474000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  464KB

                                                                                                                                                                                                • memory/3484-38-0x0000000000400000-0x0000000000474000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  464KB

                                                                                                                                                                                                • memory/3484-15-0x0000000000400000-0x0000000000474000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  464KB

                                                                                                                                                                                                • memory/3484-1-0x0000000000400000-0x0000000000474000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  464KB

                                                                                                                                                                                                • memory/3484-3-0x0000000000400000-0x0000000000474000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  464KB

                                                                                                                                                                                                • memory/3484-14-0x0000000000400000-0x0000000000474000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  464KB

                                                                                                                                                                                                • memory/3484-5-0x0000000000400000-0x0000000000474000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  464KB

                                                                                                                                                                                                • memory/3484-36-0x0000000000400000-0x0000000000474000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  464KB

                                                                                                                                                                                                • memory/3540-276-0x0000000000400000-0x0000000000474000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  464KB

                                                                                                                                                                                                • memory/3572-152-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/3708-401-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/3748-257-0x0000000000400000-0x0000000000474000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  464KB

                                                                                                                                                                                                • memory/3772-137-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/3952-446-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/3952-444-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/4036-104-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/4068-409-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/4176-418-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/4288-220-0x0000000000400000-0x0000000000474000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  464KB

                                                                                                                                                                                                • memory/4368-280-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/4436-464-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/4484-122-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/4484-131-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/4536-371-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/4536-382-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/4660-335-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/4660-333-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/4716-89-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/4716-88-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/4784-205-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/4784-217-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/4812-243-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/4812-245-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/4884-237-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/4896-364-0x0000000000400000-0x0000000000474000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  464KB

                                                                                                                                                                                                • memory/4956-295-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/4956-297-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/5064-306-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/5092-462-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/5128-116-0x0000000000400000-0x0000000000474000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  464KB

                                                                                                                                                                                                • memory/5264-123-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/5340-261-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/5376-315-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/5388-347-0x0000000000400000-0x0000000000474000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  464KB

                                                                                                                                                                                                • memory/5452-148-0x0000000000400000-0x0000000000474000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  464KB

                                                                                                                                                                                                • memory/5456-111-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/5456-103-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/5468-32-0x0000000000480000-0x0000000000549000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  804KB

                                                                                                                                                                                                • memory/5468-34-0x0000000000400000-0x0000000000474000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  464KB

                                                                                                                                                                                                • memory/5496-8-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/5496-0-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/5512-386-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/5512-388-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/5548-164-0x0000000000400000-0x0000000000474000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  464KB

                                                                                                                                                                                                • memory/5596-440-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/5660-183-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/5704-240-0x0000000000400000-0x0000000000474000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  464KB

                                                                                                                                                                                                • memory/5704-232-0x0000000000400000-0x0000000000474000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  464KB

                                                                                                                                                                                                • memory/5736-326-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/5736-312-0x0000000000400000-0x000000000049A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  616KB

                                                                                                                                                                                                • memory/5988-186-0x0000000000400000-0x0000000000474000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  464KB

                                                                                                                                                                                                • memory/6116-67-0x0000000000400000-0x0000000000474000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  464KB