Analysis

  • max time kernel
    123s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    13-10-2022 19:41

General

  • Target

    Hellgate.exe

  • Size

    1.0MB

  • MD5

    e1cdb32a46b1bf6b3c4dffdaf1058100

  • SHA1

    0405bafb45a384e6e9855f1ca37b3be965e59406

  • SHA256

    96b725f4b6600d65455c4b7c67e417a8c819f06079634f9f8828093509a16054

  • SHA512

    b986e2c5bda8704bd4534098e0becde31588a5d8ae9f9e052869409ad8943bebe9909b9b2d2f4a5f77a546dd23997ee80905c89c0186f7020618ea2b52769906

  • SSDEEP

    6144:GSncRllCFdsiI8WZWuPf021sgkvnHn/gkvnHnldAnHnQbGYzN7+fdTd:L4mtItn021wvJvo8zF+

Malware Config

Extracted

Family

mercurialgrabber

C2

https://discord.com/api/webhooks/987640098617172000/PbaLpTwyRpxg4qbEnOz-zr-tqlDiGl8IEoGkhHD7lhsWbbidSSOOQHu7ONx6CmdAgK7-

Signatures

  • Mercurial Grabber Stealer

    Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.

  • Looks for VirtualBox Guest Additions in registry 2 TTPs 30 IoCs
  • Executes dropped EXE 30 IoCs
  • Looks for VMWare Tools registry key 2 TTPs 30 IoCs
  • Checks BIOS information in registry 2 TTPs 30 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Loads dropped DLL 30 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 64 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Maps connected drives based on registry 3 TTPs 60 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 30 IoCs
  • Checks SCSI registry key(s) 3 TTPs 30 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 60 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 64 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 30 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Hellgate.exe
    "C:\Users\Admin\AppData\Local\Temp\Hellgate.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1008
    • C:\Users\Admin\AppData\Local\Temp\GATE.EXE
      "C:\Users\Admin\AppData\Local\Temp\GATE.EXE"
      2⤵
      • Looks for VirtualBox Guest Additions in registry
      • Executes dropped EXE
      • Looks for VMWare Tools registry key
      • Checks BIOS information in registry
      • Maps connected drives based on registry
      • Checks SCSI registry key(s)
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious use of AdjustPrivilegeToken
      PID:520
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 520 -s 1868
        3⤵
        • Program crash
        PID:5668
    • C:\Users\Admin\AppData\Local\Temp\HELLGATE.EXE
      "C:\Users\Admin\AppData\Local\Temp\HELLGATE.EXE"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1516
      • C:\Users\Admin\AppData\Local\Temp\GATE.EXE
        "C:\Users\Admin\AppData\Local\Temp\GATE.EXE"
        3⤵
        • Looks for VirtualBox Guest Additions in registry
        • Executes dropped EXE
        • Looks for VMWare Tools registry key
        • Checks BIOS information in registry
        • Maps connected drives based on registry
        • Checks SCSI registry key(s)
        • Checks processor information in registry
        • Suspicious use of AdjustPrivilegeToken
        PID:1544
        • C:\Windows\system32\WerFault.exe
          C:\Windows\system32\WerFault.exe -u -p 1544 -s 1876
          4⤵
          • Program crash
          PID:5644
      • C:\Users\Admin\AppData\Local\Temp\HELLGATE.EXE
        "C:\Users\Admin\AppData\Local\Temp\HELLGATE.EXE"
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:912
        • C:\Users\Admin\AppData\Local\Temp\GATE.EXE
          "C:\Users\Admin\AppData\Local\Temp\GATE.EXE"
          4⤵
          • Looks for VirtualBox Guest Additions in registry
          • Executes dropped EXE
          • Looks for VMWare Tools registry key
          • Checks BIOS information in registry
          • Maps connected drives based on registry
          • Checks SCSI registry key(s)
          • Checks processor information in registry
          • Enumerates system info in registry
          • Suspicious use of AdjustPrivilegeToken
          PID:1524
          • C:\Windows\system32\WerFault.exe
            C:\Windows\system32\WerFault.exe -u -p 1524 -s 1856
            5⤵
            • Program crash
            PID:5460
        • C:\Users\Admin\AppData\Local\Temp\HELLGATE.EXE
          "C:\Users\Admin\AppData\Local\Temp\HELLGATE.EXE"
          4⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:748
          • C:\Users\Admin\AppData\Local\Temp\GATE.EXE
            "C:\Users\Admin\AppData\Local\Temp\GATE.EXE"
            5⤵
            • Looks for VirtualBox Guest Additions in registry
            • Executes dropped EXE
            • Looks for VMWare Tools registry key
            • Checks BIOS information in registry
            • Maps connected drives based on registry
            • Checks SCSI registry key(s)
            • Checks processor information in registry
            • Enumerates system info in registry
            • Suspicious use of AdjustPrivilegeToken
            PID:1020
            • C:\Windows\system32\WerFault.exe
              C:\Windows\system32\WerFault.exe -u -p 1020 -s 1852
              6⤵
              • Program crash
              PID:5676
          • C:\Users\Admin\AppData\Local\Temp\HELLGATE.EXE
            "C:\Users\Admin\AppData\Local\Temp\HELLGATE.EXE"
            5⤵
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:888
            • C:\Users\Admin\AppData\Local\Temp\HELLGATE.EXE
              "C:\Users\Admin\AppData\Local\Temp\HELLGATE.EXE"
              6⤵
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:1884
              • C:\Users\Admin\AppData\Local\Temp\GATE.EXE
                "C:\Users\Admin\AppData\Local\Temp\GATE.EXE"
                7⤵
                • Looks for VirtualBox Guest Additions in registry
                • Executes dropped EXE
                • Looks for VMWare Tools registry key
                • Checks BIOS information in registry
                • Maps connected drives based on registry
                • Checks SCSI registry key(s)
                • Checks processor information in registry
                • Enumerates system info in registry
                • Suspicious use of AdjustPrivilegeToken
                PID:1728
                • C:\Windows\system32\WerFault.exe
                  C:\Windows\system32\WerFault.exe -u -p 1728 -s 1852
                  8⤵
                  • Program crash
                  PID:5616
              • C:\Users\Admin\AppData\Local\Temp\HELLGATE.EXE
                "C:\Users\Admin\AppData\Local\Temp\HELLGATE.EXE"
                7⤵
                • Loads dropped DLL
                • Suspicious use of WriteProcessMemory
                PID:1724
                • C:\Users\Admin\AppData\Local\Temp\GATE.EXE
                  "C:\Users\Admin\AppData\Local\Temp\GATE.EXE"
                  8⤵
                  • Looks for VirtualBox Guest Additions in registry
                  • Executes dropped EXE
                  • Looks for VMWare Tools registry key
                  • Checks BIOS information in registry
                  • Maps connected drives based on registry
                  • Checks SCSI registry key(s)
                  • Checks processor information in registry
                  • Enumerates system info in registry
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1028
                  • C:\Windows\system32\WerFault.exe
                    C:\Windows\system32\WerFault.exe -u -p 1028 -s 1848
                    9⤵
                    • Program crash
                    PID:5528
                • C:\Users\Admin\AppData\Local\Temp\HELLGATE.EXE
                  "C:\Users\Admin\AppData\Local\Temp\HELLGATE.EXE"
                  8⤵
                  • Loads dropped DLL
                  • Suspicious use of WriteProcessMemory
                  PID:1964
                  • C:\Users\Admin\AppData\Local\Temp\GATE.EXE
                    "C:\Users\Admin\AppData\Local\Temp\GATE.EXE"
                    9⤵
                    • Looks for VirtualBox Guest Additions in registry
                    • Executes dropped EXE
                    • Looks for VMWare Tools registry key
                    • Checks BIOS information in registry
                    • Maps connected drives based on registry
                    • Checks SCSI registry key(s)
                    • Checks processor information in registry
                    • Enumerates system info in registry
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1640
                    • C:\Windows\system32\WerFault.exe
                      C:\Windows\system32\WerFault.exe -u -p 1640 -s 1872
                      10⤵
                      • Program crash
                      PID:5652
                  • C:\Users\Admin\AppData\Local\Temp\HELLGATE.EXE
                    "C:\Users\Admin\AppData\Local\Temp\HELLGATE.EXE"
                    9⤵
                    • Loads dropped DLL
                    PID:1704
                    • C:\Users\Admin\AppData\Local\Temp\GATE.EXE
                      "C:\Users\Admin\AppData\Local\Temp\GATE.EXE"
                      10⤵
                      • Looks for VirtualBox Guest Additions in registry
                      • Executes dropped EXE
                      • Looks for VMWare Tools registry key
                      • Checks BIOS information in registry
                      • Maps connected drives based on registry
                      • Checks SCSI registry key(s)
                      • Checks processor information in registry
                      • Enumerates system info in registry
                      • Suspicious use of AdjustPrivilegeToken
                      PID:872
                      • C:\Windows\system32\WerFault.exe
                        C:\Windows\system32\WerFault.exe -u -p 872 -s 1836
                        11⤵
                        • Program crash
                        PID:5520
                    • C:\Users\Admin\AppData\Local\Temp\HELLGATE.EXE
                      "C:\Users\Admin\AppData\Local\Temp\HELLGATE.EXE"
                      10⤵
                        PID:956
                        • C:\Users\Admin\AppData\Local\Temp\GATE.EXE
                          "C:\Users\Admin\AppData\Local\Temp\GATE.EXE"
                          11⤵
                          • Looks for VirtualBox Guest Additions in registry
                          • Executes dropped EXE
                          • Looks for VMWare Tools registry key
                          • Checks BIOS information in registry
                          • Maps connected drives based on registry
                          • Checks SCSI registry key(s)
                          • Checks processor information in registry
                          • Enumerates system info in registry
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2036
                          • C:\Windows\system32\WerFault.exe
                            C:\Windows\system32\WerFault.exe -u -p 2036 -s 1864
                            12⤵
                            • Program crash
                            PID:5660
                        • C:\Users\Admin\AppData\Local\Temp\HELLGATE.EXE
                          "C:\Users\Admin\AppData\Local\Temp\HELLGATE.EXE"
                          11⤵
                          • Loads dropped DLL
                          PID:1644
                          • C:\Users\Admin\AppData\Local\Temp\GATE.EXE
                            "C:\Users\Admin\AppData\Local\Temp\GATE.EXE"
                            12⤵
                            • Looks for VirtualBox Guest Additions in registry
                            • Executes dropped EXE
                            • Looks for VMWare Tools registry key
                            • Checks BIOS information in registry
                            • Maps connected drives based on registry
                            • Checks SCSI registry key(s)
                            • Checks processor information in registry
                            • Enumerates system info in registry
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1000
                            • C:\Windows\system32\WerFault.exe
                              C:\Windows\system32\WerFault.exe -u -p 1000 -s 1864
                              13⤵
                              • Program crash
                              PID:5504
                          • C:\Users\Admin\AppData\Local\Temp\HELLGATE.EXE
                            "C:\Users\Admin\AppData\Local\Temp\HELLGATE.EXE"
                            12⤵
                            • Loads dropped DLL
                            PID:1288
                            • C:\Users\Admin\AppData\Local\Temp\GATE.EXE
                              "C:\Users\Admin\AppData\Local\Temp\GATE.EXE"
                              13⤵
                              • Looks for VirtualBox Guest Additions in registry
                              • Executes dropped EXE
                              • Looks for VMWare Tools registry key
                              • Checks BIOS information in registry
                              • Maps connected drives based on registry
                              • Checks SCSI registry key(s)
                              • Checks processor information in registry
                              • Enumerates system info in registry
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1088
                              • C:\Windows\system32\WerFault.exe
                                C:\Windows\system32\WerFault.exe -u -p 1088 -s 1856
                                14⤵
                                • Program crash
                                PID:5716
                            • C:\Users\Admin\AppData\Local\Temp\HELLGATE.EXE
                              "C:\Users\Admin\AppData\Local\Temp\HELLGATE.EXE"
                              13⤵
                              • Loads dropped DLL
                              PID:2028
                              • C:\Users\Admin\AppData\Local\Temp\HELLGATE.EXE
                                "C:\Users\Admin\AppData\Local\Temp\HELLGATE.EXE"
                                14⤵
                                • Loads dropped DLL
                                PID:1372
                                • C:\Users\Admin\AppData\Local\Temp\GATE.EXE
                                  "C:\Users\Admin\AppData\Local\Temp\GATE.EXE"
                                  15⤵
                                  • Looks for VirtualBox Guest Additions in registry
                                  • Executes dropped EXE
                                  • Looks for VMWare Tools registry key
                                  • Checks BIOS information in registry
                                  • Maps connected drives based on registry
                                  • Checks SCSI registry key(s)
                                  • Checks processor information in registry
                                  • Enumerates system info in registry
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:316
                                  • C:\Windows\system32\WerFault.exe
                                    C:\Windows\system32\WerFault.exe -u -p 316 -s 1864
                                    16⤵
                                    • Program crash
                                    PID:5692
                                • C:\Users\Admin\AppData\Local\Temp\HELLGATE.EXE
                                  "C:\Users\Admin\AppData\Local\Temp\HELLGATE.EXE"
                                  15⤵
                                  • Loads dropped DLL
                                  PID:632
                                  • C:\Users\Admin\AppData\Local\Temp\GATE.EXE
                                    "C:\Users\Admin\AppData\Local\Temp\GATE.EXE"
                                    16⤵
                                    • Looks for VirtualBox Guest Additions in registry
                                    • Executes dropped EXE
                                    • Looks for VMWare Tools registry key
                                    • Checks BIOS information in registry
                                    • Maps connected drives based on registry
                                    • Checks SCSI registry key(s)
                                    • Checks processor information in registry
                                    • Enumerates system info in registry
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:1608
                                    • C:\Windows\system32\WerFault.exe
                                      C:\Windows\system32\WerFault.exe -u -p 1608 -s 1856
                                      17⤵
                                      • Program crash
                                      PID:5480
                                  • C:\Users\Admin\AppData\Local\Temp\HELLGATE.EXE
                                    "C:\Users\Admin\AppData\Local\Temp\HELLGATE.EXE"
                                    16⤵
                                    • Loads dropped DLL
                                    PID:836
                                    • C:\Users\Admin\AppData\Local\Temp\HELLGATE.EXE
                                      "C:\Users\Admin\AppData\Local\Temp\HELLGATE.EXE"
                                      17⤵
                                        PID:1620
                                        • C:\Users\Admin\AppData\Local\Temp\HELLGATE.EXE
                                          "C:\Users\Admin\AppData\Local\Temp\HELLGATE.EXE"
                                          18⤵
                                          • Loads dropped DLL
                                          PID:552
                                          • C:\Users\Admin\AppData\Local\Temp\HELLGATE.EXE
                                            "C:\Users\Admin\AppData\Local\Temp\HELLGATE.EXE"
                                            19⤵
                                            • Loads dropped DLL
                                            PID:1776
                                            • C:\Users\Admin\AppData\Local\Temp\HELLGATE.EXE
                                              "C:\Users\Admin\AppData\Local\Temp\HELLGATE.EXE"
                                              20⤵
                                              • Loads dropped DLL
                                              PID:2120
                                              • C:\Users\Admin\AppData\Local\Temp\HELLGATE.EXE
                                                "C:\Users\Admin\AppData\Local\Temp\HELLGATE.EXE"
                                                21⤵
                                                • Loads dropped DLL
                                                PID:2196
                                                • C:\Users\Admin\AppData\Local\Temp\HELLGATE.EXE
                                                  "C:\Users\Admin\AppData\Local\Temp\HELLGATE.EXE"
                                                  22⤵
                                                  • Loads dropped DLL
                                                  PID:2272
                                                  • C:\Users\Admin\AppData\Local\Temp\HELLGATE.EXE
                                                    "C:\Users\Admin\AppData\Local\Temp\HELLGATE.EXE"
                                                    23⤵
                                                    • Loads dropped DLL
                                                    PID:2436
                                                    • C:\Users\Admin\AppData\Local\Temp\GATE.EXE
                                                      "C:\Users\Admin\AppData\Local\Temp\GATE.EXE"
                                                      24⤵
                                                      • Looks for VirtualBox Guest Additions in registry
                                                      • Executes dropped EXE
                                                      • Looks for VMWare Tools registry key
                                                      • Checks BIOS information in registry
                                                      • Maps connected drives based on registry
                                                      • Checks SCSI registry key(s)
                                                      • Checks processor information in registry
                                                      • Enumerates system info in registry
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:2792
                                                      • C:\Windows\system32\WerFault.exe
                                                        C:\Windows\system32\WerFault.exe -u -p 2792 -s 1864
                                                        25⤵
                                                        • Program crash
                                                        PID:5684
                                                    • C:\Users\Admin\AppData\Local\Temp\HELLGATE.EXE
                                                      "C:\Users\Admin\AppData\Local\Temp\HELLGATE.EXE"
                                                      24⤵
                                                      • Loads dropped DLL
                                                      PID:2860
                                                      • C:\Users\Admin\AppData\Local\Temp\HELLGATE.EXE
                                                        "C:\Users\Admin\AppData\Local\Temp\HELLGATE.EXE"
                                                        25⤵
                                                        • Loads dropped DLL
                                                        PID:3036
                                                        • C:\Users\Admin\AppData\Local\Temp\HELLGATE.EXE
                                                          "C:\Users\Admin\AppData\Local\Temp\HELLGATE.EXE"
                                                          26⤵
                                                          • Loads dropped DLL
                                                          PID:2080
                                                          • C:\Users\Admin\AppData\Local\Temp\HELLGATE.EXE
                                                            "C:\Users\Admin\AppData\Local\Temp\HELLGATE.EXE"
                                                            27⤵
                                                            • Loads dropped DLL
                                                            PID:2240
                                                            • C:\Users\Admin\AppData\Local\Temp\HELLGATE.EXE
                                                              "C:\Users\Admin\AppData\Local\Temp\HELLGATE.EXE"
                                                              28⤵
                                                              • Loads dropped DLL
                                                              PID:3236
                                                              • C:\Users\Admin\AppData\Local\Temp\HELLGATE.EXE
                                                                "C:\Users\Admin\AppData\Local\Temp\HELLGATE.EXE"
                                                                29⤵
                                                                • Loads dropped DLL
                                                                PID:3408
                                                                • C:\Users\Admin\AppData\Local\Temp\HELLGATE.EXE
                                                                  "C:\Users\Admin\AppData\Local\Temp\HELLGATE.EXE"
                                                                  30⤵
                                                                  • Loads dropped DLL
                                                                  PID:3564
                                                                  • C:\Users\Admin\AppData\Local\Temp\HELLGATE.EXE
                                                                    "C:\Users\Admin\AppData\Local\Temp\HELLGATE.EXE"
                                                                    31⤵
                                                                      PID:3748
                                                                    • C:\Users\Admin\AppData\Local\Temp\GATE.EXE
                                                                      "C:\Users\Admin\AppData\Local\Temp\GATE.EXE"
                                                                      31⤵
                                                                      • Looks for VirtualBox Guest Additions in registry
                                                                      • Executes dropped EXE
                                                                      • Looks for VMWare Tools registry key
                                                                      • Checks BIOS information in registry
                                                                      • Maps connected drives based on registry
                                                                      • Checks SCSI registry key(s)
                                                                      • Checks processor information in registry
                                                                      • Enumerates system info in registry
                                                                      • Modifies system certificate store
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:3712
                                                                      • C:\Windows\system32\WerFault.exe
                                                                        C:\Windows\system32\WerFault.exe -u -p 3712 -s 1852
                                                                        32⤵
                                                                        • Program crash
                                                                        PID:5428
                                                                  • C:\Users\Admin\AppData\Local\Temp\GATE.EXE
                                                                    "C:\Users\Admin\AppData\Local\Temp\GATE.EXE"
                                                                    30⤵
                                                                    • Looks for VirtualBox Guest Additions in registry
                                                                    • Executes dropped EXE
                                                                    • Looks for VMWare Tools registry key
                                                                    • Checks BIOS information in registry
                                                                    • Maps connected drives based on registry
                                                                    • Checks SCSI registry key(s)
                                                                    • Checks processor information in registry
                                                                    • Enumerates system info in registry
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:3504
                                                                    • C:\Windows\system32\WerFault.exe
                                                                      C:\Windows\system32\WerFault.exe -u -p 3504 -s 1868
                                                                      31⤵
                                                                      • Program crash
                                                                      PID:5580
                                                                • C:\Users\Admin\AppData\Local\Temp\GATE.EXE
                                                                  "C:\Users\Admin\AppData\Local\Temp\GATE.EXE"
                                                                  29⤵
                                                                  • Looks for VirtualBox Guest Additions in registry
                                                                  • Executes dropped EXE
                                                                  • Looks for VMWare Tools registry key
                                                                  • Checks BIOS information in registry
                                                                  • Maps connected drives based on registry
                                                                  • Checks SCSI registry key(s)
                                                                  • Checks processor information in registry
                                                                  • Enumerates system info in registry
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:3360
                                                                  • C:\Windows\system32\WerFault.exe
                                                                    C:\Windows\system32\WerFault.exe -u -p 3360 -s 1880
                                                                    30⤵
                                                                    • Program crash
                                                                    PID:5552
                                                              • C:\Users\Admin\AppData\Local\Temp\GATE.EXE
                                                                "C:\Users\Admin\AppData\Local\Temp\GATE.EXE"
                                                                28⤵
                                                                • Looks for VirtualBox Guest Additions in registry
                                                                • Executes dropped EXE
                                                                • Looks for VMWare Tools registry key
                                                                • Checks BIOS information in registry
                                                                • Maps connected drives based on registry
                                                                • Checks SCSI registry key(s)
                                                                • Checks processor information in registry
                                                                • Enumerates system info in registry
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:3200
                                                                • C:\Windows\system32\WerFault.exe
                                                                  C:\Windows\system32\WerFault.exe -u -p 3200 -s 1864
                                                                  29⤵
                                                                  • Program crash
                                                                  PID:5488
                                                            • C:\Users\Admin\AppData\Local\Temp\GATE.EXE
                                                              "C:\Users\Admin\AppData\Local\Temp\GATE.EXE"
                                                              27⤵
                                                              • Looks for VirtualBox Guest Additions in registry
                                                              • Executes dropped EXE
                                                              • Looks for VMWare Tools registry key
                                                              • Checks BIOS information in registry
                                                              • Maps connected drives based on registry
                                                              • Checks SCSI registry key(s)
                                                              • Checks processor information in registry
                                                              • Enumerates system info in registry
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:2248
                                                              • C:\Windows\system32\WerFault.exe
                                                                C:\Windows\system32\WerFault.exe -u -p 2248 -s 1856
                                                                28⤵
                                                                • Program crash
                                                                PID:5636
                                                          • C:\Users\Admin\AppData\Local\Temp\GATE.EXE
                                                            "C:\Users\Admin\AppData\Local\Temp\GATE.EXE"
                                                            26⤵
                                                            • Looks for VirtualBox Guest Additions in registry
                                                            • Executes dropped EXE
                                                            • Looks for VMWare Tools registry key
                                                            • Checks BIOS information in registry
                                                            • Maps connected drives based on registry
                                                            • Checks SCSI registry key(s)
                                                            • Checks processor information in registry
                                                            • Enumerates system info in registry
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:1884
                                                            • C:\Windows\system32\WerFault.exe
                                                              C:\Windows\system32\WerFault.exe -u -p 1884 -s 1864
                                                              27⤵
                                                              • Program crash
                                                              PID:5496
                                                        • C:\Users\Admin\AppData\Local\Temp\GATE.EXE
                                                          "C:\Users\Admin\AppData\Local\Temp\GATE.EXE"
                                                          25⤵
                                                          • Looks for VirtualBox Guest Additions in registry
                                                          • Executes dropped EXE
                                                          • Looks for VMWare Tools registry key
                                                          • Checks BIOS information in registry
                                                          • Maps connected drives based on registry
                                                          • Checks SCSI registry key(s)
                                                          • Checks processor information in registry
                                                          • Enumerates system info in registry
                                                          • Modifies system certificate store
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:3000
                                                          • C:\Windows\system32\WerFault.exe
                                                            C:\Windows\system32\WerFault.exe -u -p 3000 -s 1852
                                                            26⤵
                                                            • Program crash
                                                            PID:5732
                                                    • C:\Users\Admin\AppData\Local\Temp\GATE.EXE
                                                      "C:\Users\Admin\AppData\Local\Temp\GATE.EXE"
                                                      23⤵
                                                      • Looks for VirtualBox Guest Additions in registry
                                                      • Executes dropped EXE
                                                      • Looks for VMWare Tools registry key
                                                      • Checks BIOS information in registry
                                                      • Maps connected drives based on registry
                                                      • Checks SCSI registry key(s)
                                                      • Checks processor information in registry
                                                      • Enumerates system info in registry
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:2404
                                                      • C:\Windows\system32\WerFault.exe
                                                        C:\Windows\system32\WerFault.exe -u -p 2404 -s 1860
                                                        24⤵
                                                        • Program crash
                                                        PID:5740
                                                  • C:\Users\Admin\AppData\Local\Temp\GATE.EXE
                                                    "C:\Users\Admin\AppData\Local\Temp\GATE.EXE"
                                                    22⤵
                                                    • Looks for VirtualBox Guest Additions in registry
                                                    • Executes dropped EXE
                                                    • Looks for VMWare Tools registry key
                                                    • Checks BIOS information in registry
                                                    • Maps connected drives based on registry
                                                    • Checks SCSI registry key(s)
                                                    • Checks processor information in registry
                                                    • Enumerates system info in registry
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:2232
                                                    • C:\Windows\system32\WerFault.exe
                                                      C:\Windows\system32\WerFault.exe -u -p 2232 -s 1852
                                                      23⤵
                                                      • Program crash
                                                      PID:5472
                                                • C:\Users\Admin\AppData\Local\Temp\GATE.EXE
                                                  "C:\Users\Admin\AppData\Local\Temp\GATE.EXE"
                                                  21⤵
                                                  • Looks for VirtualBox Guest Additions in registry
                                                  • Executes dropped EXE
                                                  • Looks for VMWare Tools registry key
                                                  • Checks BIOS information in registry
                                                  • Maps connected drives based on registry
                                                  • Checks SCSI registry key(s)
                                                  • Checks processor information in registry
                                                  • Enumerates system info in registry
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:2160
                                                  • C:\Windows\system32\WerFault.exe
                                                    C:\Windows\system32\WerFault.exe -u -p 2160 -s 1856
                                                    22⤵
                                                    • Program crash
                                                    PID:5748
                                              • C:\Users\Admin\AppData\Local\Temp\GATE.EXE
                                                "C:\Users\Admin\AppData\Local\Temp\GATE.EXE"
                                                20⤵
                                                • Looks for VirtualBox Guest Additions in registry
                                                • Executes dropped EXE
                                                • Looks for VMWare Tools registry key
                                                • Checks BIOS information in registry
                                                • Maps connected drives based on registry
                                                • Checks SCSI registry key(s)
                                                • Checks processor information in registry
                                                • Enumerates system info in registry
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:2084
                                                • C:\Windows\system32\WerFault.exe
                                                  C:\Windows\system32\WerFault.exe -u -p 2084 -s 1856
                                                  21⤵
                                                  • Program crash
                                                  PID:5512
                                            • C:\Users\Admin\AppData\Local\Temp\GATE.EXE
                                              "C:\Users\Admin\AppData\Local\Temp\GATE.EXE"
                                              19⤵
                                              • Looks for VirtualBox Guest Additions in registry
                                              • Executes dropped EXE
                                              • Looks for VMWare Tools registry key
                                              • Checks BIOS information in registry
                                              • Maps connected drives based on registry
                                              • Checks SCSI registry key(s)
                                              • Checks processor information in registry
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:1520
                                              • C:\Windows\system32\WerFault.exe
                                                C:\Windows\system32\WerFault.exe -u -p 1520 -s 1848
                                                20⤵
                                                • Program crash
                                                PID:5624
                                          • C:\Users\Admin\AppData\Local\Temp\GATE.EXE
                                            "C:\Users\Admin\AppData\Local\Temp\GATE.EXE"
                                            18⤵
                                            • Looks for VirtualBox Guest Additions in registry
                                            • Executes dropped EXE
                                            • Looks for VMWare Tools registry key
                                            • Checks BIOS information in registry
                                            • Maps connected drives based on registry
                                            • Checks SCSI registry key(s)
                                            • Checks processor information in registry
                                            • Enumerates system info in registry
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:988
                                            • C:\Windows\system32\WerFault.exe
                                              C:\Windows\system32\WerFault.exe -u -p 988 -s 1844
                                              19⤵
                                              • Program crash
                                              PID:5448
                                        • C:\Users\Admin\AppData\Local\Temp\GATE.EXE
                                          "C:\Users\Admin\AppData\Local\Temp\GATE.EXE"
                                          17⤵
                                          • Looks for VirtualBox Guest Additions in registry
                                          • Executes dropped EXE
                                          • Looks for VMWare Tools registry key
                                          • Checks BIOS information in registry
                                          • Maps connected drives based on registry
                                          • Checks SCSI registry key(s)
                                          • Checks processor information in registry
                                          • Enumerates system info in registry
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:1684
                                          • C:\Windows\system32\WerFault.exe
                                            C:\Windows\system32\WerFault.exe -u -p 1684 -s 1864
                                            18⤵
                                            • Program crash
                                            PID:5724
                                  • C:\Users\Admin\AppData\Local\Temp\GATE.EXE
                                    "C:\Users\Admin\AppData\Local\Temp\GATE.EXE"
                                    14⤵
                                    • Looks for VirtualBox Guest Additions in registry
                                    • Executes dropped EXE
                                    • Looks for VMWare Tools registry key
                                    • Checks BIOS information in registry
                                    • Maps connected drives based on registry
                                    • Checks SCSI registry key(s)
                                    • Checks processor information in registry
                                    • Enumerates system info in registry
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:1816
                                    • C:\Windows\system32\WerFault.exe
                                      C:\Windows\system32\WerFault.exe -u -p 1816 -s 1872
                                      15⤵
                                      • Program crash
                                      PID:5420
                  • C:\Users\Admin\AppData\Local\Temp\GATE.EXE
                    "C:\Users\Admin\AppData\Local\Temp\GATE.EXE"
                    6⤵
                    • Looks for VirtualBox Guest Additions in registry
                    • Executes dropped EXE
                    • Looks for VMWare Tools registry key
                    • Checks BIOS information in registry
                    • Maps connected drives based on registry
                    • Checks SCSI registry key(s)
                    • Checks processor information in registry
                    • Enumerates system info in registry
                    • Suspicious use of AdjustPrivilegeToken
                    PID:932
                    • C:\Windows\system32\WerFault.exe
                      C:\Windows\system32\WerFault.exe -u -p 932 -s 1856
                      7⤵
                      • Program crash
                      PID:5536
        • C:\Windows\system32\conhost.exe
          \??\C:\Windows\system32\conhost.exe "-1788006722-511198662-265515806-544246569-7423863621813184736-2101715010111338041"
          1⤵
          • Loads dropped DLL
          PID:956
        • C:\Windows\system32\conhost.exe
          \??\C:\Windows\system32\conhost.exe "-1682113020-1671060950-616534623527804605-506443869666465388-19814812491344188956"
          1⤵
          • Loads dropped DLL
          PID:1620

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Defense Evasion

        Virtualization/Sandbox Evasion

        2
        T1497

        Install Root Certificate

        1
        T1130

        Modify Registry

        1
        T1112

        Credential Access

        Credentials in Files

        1
        T1081

        Discovery

        Query Registry

        7
        T1012

        Virtualization/Sandbox Evasion

        2
        T1497

        System Information Discovery

        6
        T1082

        Peripheral Device Discovery

        2
        T1120

        Collection

        Data from Local System

        1
        T1005

        Command and Control

        Web Service

        1
        T1102

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15A
          Filesize

          893B

          MD5

          d4ae187b4574036c2d76b6df8a8c1a30

          SHA1

          b06f409fa14bab33cbaf4a37811b8740b624d9e5

          SHA256

          a2ce3a0fa7d2a833d1801e01ec48e35b70d84f3467cc9f8fab370386e13879c7

          SHA512

          1f44a360e8bb8ada22bc5bfe001f1babb4e72005a46bc2a94c33c4bd149ff256cce6f35d65ca4f7fc2a5b9e15494155449830d2809c8cf218d0b9196ec646b0c

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A
          Filesize

          252B

          MD5

          02a0c916f24edd87c7065ac4922b491d

          SHA1

          0392141b3583f901ba52d4a4487d54afd8276813

          SHA256

          65cdadfe55823b7bbf33b668be79a029554775f317e717b32fdd9b696ebbd084

          SHA512

          09749785a02672095d9110a01284588b373304a1800662dec11eb09ff63047cfb49c720e04814f6c5ce43bb5dd069468a55a7023e32818f76ca943b728c77904

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A
          Filesize

          252B

          MD5

          02a0c916f24edd87c7065ac4922b491d

          SHA1

          0392141b3583f901ba52d4a4487d54afd8276813

          SHA256

          65cdadfe55823b7bbf33b668be79a029554775f317e717b32fdd9b696ebbd084

          SHA512

          09749785a02672095d9110a01284588b373304a1800662dec11eb09ff63047cfb49c720e04814f6c5ce43bb5dd069468a55a7023e32818f76ca943b728c77904

        • C:\Users\Admin\AppData\Local\Temp\GATE.EXE
          Filesize

          107KB

          MD5

          1fdbfec3f56386b3f45e3676724818ba

          SHA1

          d295930d5d25c5b8e1968f92016d3aae771303b7

          SHA256

          67dbd4013e250850e4f6a564c601d7ed342f51220378238902b2dcc09bb9b483

          SHA512

          8ba022689896b209be7731e4cc8823e84ee3e4b04d795dd3f2c5a5292a24ca2e56aa78c78cac6ec6e78ca3770dcb891976bf808e752e8cf40803f44a0aa2b114

        • C:\Users\Admin\AppData\Local\Temp\GATE.EXE
          Filesize

          107KB

          MD5

          1fdbfec3f56386b3f45e3676724818ba

          SHA1

          d295930d5d25c5b8e1968f92016d3aae771303b7

          SHA256

          67dbd4013e250850e4f6a564c601d7ed342f51220378238902b2dcc09bb9b483

          SHA512

          8ba022689896b209be7731e4cc8823e84ee3e4b04d795dd3f2c5a5292a24ca2e56aa78c78cac6ec6e78ca3770dcb891976bf808e752e8cf40803f44a0aa2b114

        • C:\Users\Admin\AppData\Local\Temp\GATE.EXE
          Filesize

          107KB

          MD5

          1fdbfec3f56386b3f45e3676724818ba

          SHA1

          d295930d5d25c5b8e1968f92016d3aae771303b7

          SHA256

          67dbd4013e250850e4f6a564c601d7ed342f51220378238902b2dcc09bb9b483

          SHA512

          8ba022689896b209be7731e4cc8823e84ee3e4b04d795dd3f2c5a5292a24ca2e56aa78c78cac6ec6e78ca3770dcb891976bf808e752e8cf40803f44a0aa2b114

        • C:\Users\Admin\AppData\Local\Temp\GATE.EXE
          Filesize

          107KB

          MD5

          1fdbfec3f56386b3f45e3676724818ba

          SHA1

          d295930d5d25c5b8e1968f92016d3aae771303b7

          SHA256

          67dbd4013e250850e4f6a564c601d7ed342f51220378238902b2dcc09bb9b483

          SHA512

          8ba022689896b209be7731e4cc8823e84ee3e4b04d795dd3f2c5a5292a24ca2e56aa78c78cac6ec6e78ca3770dcb891976bf808e752e8cf40803f44a0aa2b114

        • C:\Users\Admin\AppData\Local\Temp\GATE.EXE
          Filesize

          107KB

          MD5

          1fdbfec3f56386b3f45e3676724818ba

          SHA1

          d295930d5d25c5b8e1968f92016d3aae771303b7

          SHA256

          67dbd4013e250850e4f6a564c601d7ed342f51220378238902b2dcc09bb9b483

          SHA512

          8ba022689896b209be7731e4cc8823e84ee3e4b04d795dd3f2c5a5292a24ca2e56aa78c78cac6ec6e78ca3770dcb891976bf808e752e8cf40803f44a0aa2b114

        • C:\Users\Admin\AppData\Local\Temp\GATE.EXE
          Filesize

          107KB

          MD5

          1fdbfec3f56386b3f45e3676724818ba

          SHA1

          d295930d5d25c5b8e1968f92016d3aae771303b7

          SHA256

          67dbd4013e250850e4f6a564c601d7ed342f51220378238902b2dcc09bb9b483

          SHA512

          8ba022689896b209be7731e4cc8823e84ee3e4b04d795dd3f2c5a5292a24ca2e56aa78c78cac6ec6e78ca3770dcb891976bf808e752e8cf40803f44a0aa2b114

        • C:\Users\Admin\AppData\Local\Temp\GATE.EXE
          Filesize

          107KB

          MD5

          1fdbfec3f56386b3f45e3676724818ba

          SHA1

          d295930d5d25c5b8e1968f92016d3aae771303b7

          SHA256

          67dbd4013e250850e4f6a564c601d7ed342f51220378238902b2dcc09bb9b483

          SHA512

          8ba022689896b209be7731e4cc8823e84ee3e4b04d795dd3f2c5a5292a24ca2e56aa78c78cac6ec6e78ca3770dcb891976bf808e752e8cf40803f44a0aa2b114

        • C:\Users\Admin\AppData\Local\Temp\GATE.EXE
          Filesize

          107KB

          MD5

          1fdbfec3f56386b3f45e3676724818ba

          SHA1

          d295930d5d25c5b8e1968f92016d3aae771303b7

          SHA256

          67dbd4013e250850e4f6a564c601d7ed342f51220378238902b2dcc09bb9b483

          SHA512

          8ba022689896b209be7731e4cc8823e84ee3e4b04d795dd3f2c5a5292a24ca2e56aa78c78cac6ec6e78ca3770dcb891976bf808e752e8cf40803f44a0aa2b114

        • C:\Users\Admin\AppData\Local\Temp\GATE.EXE
          Filesize

          107KB

          MD5

          1fdbfec3f56386b3f45e3676724818ba

          SHA1

          d295930d5d25c5b8e1968f92016d3aae771303b7

          SHA256

          67dbd4013e250850e4f6a564c601d7ed342f51220378238902b2dcc09bb9b483

          SHA512

          8ba022689896b209be7731e4cc8823e84ee3e4b04d795dd3f2c5a5292a24ca2e56aa78c78cac6ec6e78ca3770dcb891976bf808e752e8cf40803f44a0aa2b114

        • C:\Users\Admin\AppData\Local\Temp\GATE.EXE
          Filesize

          107KB

          MD5

          1fdbfec3f56386b3f45e3676724818ba

          SHA1

          d295930d5d25c5b8e1968f92016d3aae771303b7

          SHA256

          67dbd4013e250850e4f6a564c601d7ed342f51220378238902b2dcc09bb9b483

          SHA512

          8ba022689896b209be7731e4cc8823e84ee3e4b04d795dd3f2c5a5292a24ca2e56aa78c78cac6ec6e78ca3770dcb891976bf808e752e8cf40803f44a0aa2b114

        • C:\Users\Admin\AppData\Local\Temp\GATE.EXE
          Filesize

          107KB

          MD5

          1fdbfec3f56386b3f45e3676724818ba

          SHA1

          d295930d5d25c5b8e1968f92016d3aae771303b7

          SHA256

          67dbd4013e250850e4f6a564c601d7ed342f51220378238902b2dcc09bb9b483

          SHA512

          8ba022689896b209be7731e4cc8823e84ee3e4b04d795dd3f2c5a5292a24ca2e56aa78c78cac6ec6e78ca3770dcb891976bf808e752e8cf40803f44a0aa2b114

        • C:\Users\Admin\AppData\Local\Temp\GATE.EXE
          Filesize

          107KB

          MD5

          1fdbfec3f56386b3f45e3676724818ba

          SHA1

          d295930d5d25c5b8e1968f92016d3aae771303b7

          SHA256

          67dbd4013e250850e4f6a564c601d7ed342f51220378238902b2dcc09bb9b483

          SHA512

          8ba022689896b209be7731e4cc8823e84ee3e4b04d795dd3f2c5a5292a24ca2e56aa78c78cac6ec6e78ca3770dcb891976bf808e752e8cf40803f44a0aa2b114

        • C:\Users\Admin\AppData\Local\Temp\GATE.EXE
          Filesize

          107KB

          MD5

          1fdbfec3f56386b3f45e3676724818ba

          SHA1

          d295930d5d25c5b8e1968f92016d3aae771303b7

          SHA256

          67dbd4013e250850e4f6a564c601d7ed342f51220378238902b2dcc09bb9b483

          SHA512

          8ba022689896b209be7731e4cc8823e84ee3e4b04d795dd3f2c5a5292a24ca2e56aa78c78cac6ec6e78ca3770dcb891976bf808e752e8cf40803f44a0aa2b114

        • C:\Users\Admin\AppData\Local\Temp\GATE.EXE
          Filesize

          107KB

          MD5

          1fdbfec3f56386b3f45e3676724818ba

          SHA1

          d295930d5d25c5b8e1968f92016d3aae771303b7

          SHA256

          67dbd4013e250850e4f6a564c601d7ed342f51220378238902b2dcc09bb9b483

          SHA512

          8ba022689896b209be7731e4cc8823e84ee3e4b04d795dd3f2c5a5292a24ca2e56aa78c78cac6ec6e78ca3770dcb891976bf808e752e8cf40803f44a0aa2b114

        • C:\Users\Admin\AppData\Local\Temp\GATE.EXE
          Filesize

          107KB

          MD5

          1fdbfec3f56386b3f45e3676724818ba

          SHA1

          d295930d5d25c5b8e1968f92016d3aae771303b7

          SHA256

          67dbd4013e250850e4f6a564c601d7ed342f51220378238902b2dcc09bb9b483

          SHA512

          8ba022689896b209be7731e4cc8823e84ee3e4b04d795dd3f2c5a5292a24ca2e56aa78c78cac6ec6e78ca3770dcb891976bf808e752e8cf40803f44a0aa2b114

        • C:\Users\Admin\AppData\Local\Temp\GATE.EXE
          Filesize

          107KB

          MD5

          1fdbfec3f56386b3f45e3676724818ba

          SHA1

          d295930d5d25c5b8e1968f92016d3aae771303b7

          SHA256

          67dbd4013e250850e4f6a564c601d7ed342f51220378238902b2dcc09bb9b483

          SHA512

          8ba022689896b209be7731e4cc8823e84ee3e4b04d795dd3f2c5a5292a24ca2e56aa78c78cac6ec6e78ca3770dcb891976bf808e752e8cf40803f44a0aa2b114

        • C:\Users\Admin\AppData\Local\Temp\GATE.EXE
          Filesize

          107KB

          MD5

          1fdbfec3f56386b3f45e3676724818ba

          SHA1

          d295930d5d25c5b8e1968f92016d3aae771303b7

          SHA256

          67dbd4013e250850e4f6a564c601d7ed342f51220378238902b2dcc09bb9b483

          SHA512

          8ba022689896b209be7731e4cc8823e84ee3e4b04d795dd3f2c5a5292a24ca2e56aa78c78cac6ec6e78ca3770dcb891976bf808e752e8cf40803f44a0aa2b114

        • C:\Users\Admin\AppData\Local\Temp\GATE.EXE
          Filesize

          107KB

          MD5

          1fdbfec3f56386b3f45e3676724818ba

          SHA1

          d295930d5d25c5b8e1968f92016d3aae771303b7

          SHA256

          67dbd4013e250850e4f6a564c601d7ed342f51220378238902b2dcc09bb9b483

          SHA512

          8ba022689896b209be7731e4cc8823e84ee3e4b04d795dd3f2c5a5292a24ca2e56aa78c78cac6ec6e78ca3770dcb891976bf808e752e8cf40803f44a0aa2b114

        • C:\Users\Admin\AppData\Local\Temp\GATE.EXE
          Filesize

          107KB

          MD5

          1fdbfec3f56386b3f45e3676724818ba

          SHA1

          d295930d5d25c5b8e1968f92016d3aae771303b7

          SHA256

          67dbd4013e250850e4f6a564c601d7ed342f51220378238902b2dcc09bb9b483

          SHA512

          8ba022689896b209be7731e4cc8823e84ee3e4b04d795dd3f2c5a5292a24ca2e56aa78c78cac6ec6e78ca3770dcb891976bf808e752e8cf40803f44a0aa2b114

        • C:\Users\Admin\AppData\Local\Temp\GATE.EXE
          Filesize

          107KB

          MD5

          1fdbfec3f56386b3f45e3676724818ba

          SHA1

          d295930d5d25c5b8e1968f92016d3aae771303b7

          SHA256

          67dbd4013e250850e4f6a564c601d7ed342f51220378238902b2dcc09bb9b483

          SHA512

          8ba022689896b209be7731e4cc8823e84ee3e4b04d795dd3f2c5a5292a24ca2e56aa78c78cac6ec6e78ca3770dcb891976bf808e752e8cf40803f44a0aa2b114

        • C:\Users\Admin\AppData\Local\Temp\GATE.EXE
          Filesize

          107KB

          MD5

          1fdbfec3f56386b3f45e3676724818ba

          SHA1

          d295930d5d25c5b8e1968f92016d3aae771303b7

          SHA256

          67dbd4013e250850e4f6a564c601d7ed342f51220378238902b2dcc09bb9b483

          SHA512

          8ba022689896b209be7731e4cc8823e84ee3e4b04d795dd3f2c5a5292a24ca2e56aa78c78cac6ec6e78ca3770dcb891976bf808e752e8cf40803f44a0aa2b114

        • C:\Users\Admin\AppData\Local\Temp\GATE.EXE
          Filesize

          107KB

          MD5

          1fdbfec3f56386b3f45e3676724818ba

          SHA1

          d295930d5d25c5b8e1968f92016d3aae771303b7

          SHA256

          67dbd4013e250850e4f6a564c601d7ed342f51220378238902b2dcc09bb9b483

          SHA512

          8ba022689896b209be7731e4cc8823e84ee3e4b04d795dd3f2c5a5292a24ca2e56aa78c78cac6ec6e78ca3770dcb891976bf808e752e8cf40803f44a0aa2b114

        • C:\Users\Admin\AppData\Local\Temp\GATE.EXE
          Filesize

          107KB

          MD5

          1fdbfec3f56386b3f45e3676724818ba

          SHA1

          d295930d5d25c5b8e1968f92016d3aae771303b7

          SHA256

          67dbd4013e250850e4f6a564c601d7ed342f51220378238902b2dcc09bb9b483

          SHA512

          8ba022689896b209be7731e4cc8823e84ee3e4b04d795dd3f2c5a5292a24ca2e56aa78c78cac6ec6e78ca3770dcb891976bf808e752e8cf40803f44a0aa2b114

        • C:\Users\Admin\AppData\Local\Temp\GATE.EXE
          Filesize

          107KB

          MD5

          1fdbfec3f56386b3f45e3676724818ba

          SHA1

          d295930d5d25c5b8e1968f92016d3aae771303b7

          SHA256

          67dbd4013e250850e4f6a564c601d7ed342f51220378238902b2dcc09bb9b483

          SHA512

          8ba022689896b209be7731e4cc8823e84ee3e4b04d795dd3f2c5a5292a24ca2e56aa78c78cac6ec6e78ca3770dcb891976bf808e752e8cf40803f44a0aa2b114

        • C:\Users\Admin\AppData\Local\Temp\GATE.EXE
          Filesize

          107KB

          MD5

          1fdbfec3f56386b3f45e3676724818ba

          SHA1

          d295930d5d25c5b8e1968f92016d3aae771303b7

          SHA256

          67dbd4013e250850e4f6a564c601d7ed342f51220378238902b2dcc09bb9b483

          SHA512

          8ba022689896b209be7731e4cc8823e84ee3e4b04d795dd3f2c5a5292a24ca2e56aa78c78cac6ec6e78ca3770dcb891976bf808e752e8cf40803f44a0aa2b114

        • C:\Users\Admin\AppData\Local\Temp\GATE.EXE
          Filesize

          107KB

          MD5

          1fdbfec3f56386b3f45e3676724818ba

          SHA1

          d295930d5d25c5b8e1968f92016d3aae771303b7

          SHA256

          67dbd4013e250850e4f6a564c601d7ed342f51220378238902b2dcc09bb9b483

          SHA512

          8ba022689896b209be7731e4cc8823e84ee3e4b04d795dd3f2c5a5292a24ca2e56aa78c78cac6ec6e78ca3770dcb891976bf808e752e8cf40803f44a0aa2b114

        • C:\Users\Admin\AppData\Local\Temp\GATE.EXE
          Filesize

          107KB

          MD5

          1fdbfec3f56386b3f45e3676724818ba

          SHA1

          d295930d5d25c5b8e1968f92016d3aae771303b7

          SHA256

          67dbd4013e250850e4f6a564c601d7ed342f51220378238902b2dcc09bb9b483

          SHA512

          8ba022689896b209be7731e4cc8823e84ee3e4b04d795dd3f2c5a5292a24ca2e56aa78c78cac6ec6e78ca3770dcb891976bf808e752e8cf40803f44a0aa2b114

        • C:\Users\Admin\AppData\Local\Temp\GATE.EXE
          Filesize

          107KB

          MD5

          1fdbfec3f56386b3f45e3676724818ba

          SHA1

          d295930d5d25c5b8e1968f92016d3aae771303b7

          SHA256

          67dbd4013e250850e4f6a564c601d7ed342f51220378238902b2dcc09bb9b483

          SHA512

          8ba022689896b209be7731e4cc8823e84ee3e4b04d795dd3f2c5a5292a24ca2e56aa78c78cac6ec6e78ca3770dcb891976bf808e752e8cf40803f44a0aa2b114

        • C:\Users\Admin\AppData\Local\Temp\GATE.EXE
          Filesize

          107KB

          MD5

          1fdbfec3f56386b3f45e3676724818ba

          SHA1

          d295930d5d25c5b8e1968f92016d3aae771303b7

          SHA256

          67dbd4013e250850e4f6a564c601d7ed342f51220378238902b2dcc09bb9b483

          SHA512

          8ba022689896b209be7731e4cc8823e84ee3e4b04d795dd3f2c5a5292a24ca2e56aa78c78cac6ec6e78ca3770dcb891976bf808e752e8cf40803f44a0aa2b114

        • C:\Users\Admin\AppData\Local\Temp\GATE.EXE
          Filesize

          107KB

          MD5

          1fdbfec3f56386b3f45e3676724818ba

          SHA1

          d295930d5d25c5b8e1968f92016d3aae771303b7

          SHA256

          67dbd4013e250850e4f6a564c601d7ed342f51220378238902b2dcc09bb9b483

          SHA512

          8ba022689896b209be7731e4cc8823e84ee3e4b04d795dd3f2c5a5292a24ca2e56aa78c78cac6ec6e78ca3770dcb891976bf808e752e8cf40803f44a0aa2b114

        • C:\Users\Admin\AppData\Local\Temp\GATE.EXE
          Filesize

          107KB

          MD5

          1fdbfec3f56386b3f45e3676724818ba

          SHA1

          d295930d5d25c5b8e1968f92016d3aae771303b7

          SHA256

          67dbd4013e250850e4f6a564c601d7ed342f51220378238902b2dcc09bb9b483

          SHA512

          8ba022689896b209be7731e4cc8823e84ee3e4b04d795dd3f2c5a5292a24ca2e56aa78c78cac6ec6e78ca3770dcb891976bf808e752e8cf40803f44a0aa2b114

        • \Users\Admin\AppData\Local\Temp\GATE.EXE
          Filesize

          107KB

          MD5

          1fdbfec3f56386b3f45e3676724818ba

          SHA1

          d295930d5d25c5b8e1968f92016d3aae771303b7

          SHA256

          67dbd4013e250850e4f6a564c601d7ed342f51220378238902b2dcc09bb9b483

          SHA512

          8ba022689896b209be7731e4cc8823e84ee3e4b04d795dd3f2c5a5292a24ca2e56aa78c78cac6ec6e78ca3770dcb891976bf808e752e8cf40803f44a0aa2b114

        • \Users\Admin\AppData\Local\Temp\GATE.EXE
          Filesize

          107KB

          MD5

          1fdbfec3f56386b3f45e3676724818ba

          SHA1

          d295930d5d25c5b8e1968f92016d3aae771303b7

          SHA256

          67dbd4013e250850e4f6a564c601d7ed342f51220378238902b2dcc09bb9b483

          SHA512

          8ba022689896b209be7731e4cc8823e84ee3e4b04d795dd3f2c5a5292a24ca2e56aa78c78cac6ec6e78ca3770dcb891976bf808e752e8cf40803f44a0aa2b114

        • \Users\Admin\AppData\Local\Temp\GATE.EXE
          Filesize

          107KB

          MD5

          1fdbfec3f56386b3f45e3676724818ba

          SHA1

          d295930d5d25c5b8e1968f92016d3aae771303b7

          SHA256

          67dbd4013e250850e4f6a564c601d7ed342f51220378238902b2dcc09bb9b483

          SHA512

          8ba022689896b209be7731e4cc8823e84ee3e4b04d795dd3f2c5a5292a24ca2e56aa78c78cac6ec6e78ca3770dcb891976bf808e752e8cf40803f44a0aa2b114

        • \Users\Admin\AppData\Local\Temp\GATE.EXE
          Filesize

          107KB

          MD5

          1fdbfec3f56386b3f45e3676724818ba

          SHA1

          d295930d5d25c5b8e1968f92016d3aae771303b7

          SHA256

          67dbd4013e250850e4f6a564c601d7ed342f51220378238902b2dcc09bb9b483

          SHA512

          8ba022689896b209be7731e4cc8823e84ee3e4b04d795dd3f2c5a5292a24ca2e56aa78c78cac6ec6e78ca3770dcb891976bf808e752e8cf40803f44a0aa2b114

        • \Users\Admin\AppData\Local\Temp\GATE.EXE
          Filesize

          107KB

          MD5

          1fdbfec3f56386b3f45e3676724818ba

          SHA1

          d295930d5d25c5b8e1968f92016d3aae771303b7

          SHA256

          67dbd4013e250850e4f6a564c601d7ed342f51220378238902b2dcc09bb9b483

          SHA512

          8ba022689896b209be7731e4cc8823e84ee3e4b04d795dd3f2c5a5292a24ca2e56aa78c78cac6ec6e78ca3770dcb891976bf808e752e8cf40803f44a0aa2b114

        • \Users\Admin\AppData\Local\Temp\GATE.EXE
          Filesize

          107KB

          MD5

          1fdbfec3f56386b3f45e3676724818ba

          SHA1

          d295930d5d25c5b8e1968f92016d3aae771303b7

          SHA256

          67dbd4013e250850e4f6a564c601d7ed342f51220378238902b2dcc09bb9b483

          SHA512

          8ba022689896b209be7731e4cc8823e84ee3e4b04d795dd3f2c5a5292a24ca2e56aa78c78cac6ec6e78ca3770dcb891976bf808e752e8cf40803f44a0aa2b114

        • \Users\Admin\AppData\Local\Temp\GATE.EXE
          Filesize

          107KB

          MD5

          1fdbfec3f56386b3f45e3676724818ba

          SHA1

          d295930d5d25c5b8e1968f92016d3aae771303b7

          SHA256

          67dbd4013e250850e4f6a564c601d7ed342f51220378238902b2dcc09bb9b483

          SHA512

          8ba022689896b209be7731e4cc8823e84ee3e4b04d795dd3f2c5a5292a24ca2e56aa78c78cac6ec6e78ca3770dcb891976bf808e752e8cf40803f44a0aa2b114

        • \Users\Admin\AppData\Local\Temp\GATE.EXE
          Filesize

          107KB

          MD5

          1fdbfec3f56386b3f45e3676724818ba

          SHA1

          d295930d5d25c5b8e1968f92016d3aae771303b7

          SHA256

          67dbd4013e250850e4f6a564c601d7ed342f51220378238902b2dcc09bb9b483

          SHA512

          8ba022689896b209be7731e4cc8823e84ee3e4b04d795dd3f2c5a5292a24ca2e56aa78c78cac6ec6e78ca3770dcb891976bf808e752e8cf40803f44a0aa2b114

        • \Users\Admin\AppData\Local\Temp\GATE.EXE
          Filesize

          107KB

          MD5

          1fdbfec3f56386b3f45e3676724818ba

          SHA1

          d295930d5d25c5b8e1968f92016d3aae771303b7

          SHA256

          67dbd4013e250850e4f6a564c601d7ed342f51220378238902b2dcc09bb9b483

          SHA512

          8ba022689896b209be7731e4cc8823e84ee3e4b04d795dd3f2c5a5292a24ca2e56aa78c78cac6ec6e78ca3770dcb891976bf808e752e8cf40803f44a0aa2b114

        • \Users\Admin\AppData\Local\Temp\GATE.EXE
          Filesize

          107KB

          MD5

          1fdbfec3f56386b3f45e3676724818ba

          SHA1

          d295930d5d25c5b8e1968f92016d3aae771303b7

          SHA256

          67dbd4013e250850e4f6a564c601d7ed342f51220378238902b2dcc09bb9b483

          SHA512

          8ba022689896b209be7731e4cc8823e84ee3e4b04d795dd3f2c5a5292a24ca2e56aa78c78cac6ec6e78ca3770dcb891976bf808e752e8cf40803f44a0aa2b114

        • \Users\Admin\AppData\Local\Temp\GATE.EXE
          Filesize

          107KB

          MD5

          1fdbfec3f56386b3f45e3676724818ba

          SHA1

          d295930d5d25c5b8e1968f92016d3aae771303b7

          SHA256

          67dbd4013e250850e4f6a564c601d7ed342f51220378238902b2dcc09bb9b483

          SHA512

          8ba022689896b209be7731e4cc8823e84ee3e4b04d795dd3f2c5a5292a24ca2e56aa78c78cac6ec6e78ca3770dcb891976bf808e752e8cf40803f44a0aa2b114

        • \Users\Admin\AppData\Local\Temp\GATE.EXE
          Filesize

          107KB

          MD5

          1fdbfec3f56386b3f45e3676724818ba

          SHA1

          d295930d5d25c5b8e1968f92016d3aae771303b7

          SHA256

          67dbd4013e250850e4f6a564c601d7ed342f51220378238902b2dcc09bb9b483

          SHA512

          8ba022689896b209be7731e4cc8823e84ee3e4b04d795dd3f2c5a5292a24ca2e56aa78c78cac6ec6e78ca3770dcb891976bf808e752e8cf40803f44a0aa2b114

        • \Users\Admin\AppData\Local\Temp\GATE.EXE
          Filesize

          107KB

          MD5

          1fdbfec3f56386b3f45e3676724818ba

          SHA1

          d295930d5d25c5b8e1968f92016d3aae771303b7

          SHA256

          67dbd4013e250850e4f6a564c601d7ed342f51220378238902b2dcc09bb9b483

          SHA512

          8ba022689896b209be7731e4cc8823e84ee3e4b04d795dd3f2c5a5292a24ca2e56aa78c78cac6ec6e78ca3770dcb891976bf808e752e8cf40803f44a0aa2b114

        • \Users\Admin\AppData\Local\Temp\GATE.EXE
          Filesize

          107KB

          MD5

          1fdbfec3f56386b3f45e3676724818ba

          SHA1

          d295930d5d25c5b8e1968f92016d3aae771303b7

          SHA256

          67dbd4013e250850e4f6a564c601d7ed342f51220378238902b2dcc09bb9b483

          SHA512

          8ba022689896b209be7731e4cc8823e84ee3e4b04d795dd3f2c5a5292a24ca2e56aa78c78cac6ec6e78ca3770dcb891976bf808e752e8cf40803f44a0aa2b114

        • \Users\Admin\AppData\Local\Temp\GATE.EXE
          Filesize

          107KB

          MD5

          1fdbfec3f56386b3f45e3676724818ba

          SHA1

          d295930d5d25c5b8e1968f92016d3aae771303b7

          SHA256

          67dbd4013e250850e4f6a564c601d7ed342f51220378238902b2dcc09bb9b483

          SHA512

          8ba022689896b209be7731e4cc8823e84ee3e4b04d795dd3f2c5a5292a24ca2e56aa78c78cac6ec6e78ca3770dcb891976bf808e752e8cf40803f44a0aa2b114

        • \Users\Admin\AppData\Local\Temp\GATE.EXE
          Filesize

          107KB

          MD5

          1fdbfec3f56386b3f45e3676724818ba

          SHA1

          d295930d5d25c5b8e1968f92016d3aae771303b7

          SHA256

          67dbd4013e250850e4f6a564c601d7ed342f51220378238902b2dcc09bb9b483

          SHA512

          8ba022689896b209be7731e4cc8823e84ee3e4b04d795dd3f2c5a5292a24ca2e56aa78c78cac6ec6e78ca3770dcb891976bf808e752e8cf40803f44a0aa2b114

        • \Users\Admin\AppData\Local\Temp\GATE.EXE
          Filesize

          107KB

          MD5

          1fdbfec3f56386b3f45e3676724818ba

          SHA1

          d295930d5d25c5b8e1968f92016d3aae771303b7

          SHA256

          67dbd4013e250850e4f6a564c601d7ed342f51220378238902b2dcc09bb9b483

          SHA512

          8ba022689896b209be7731e4cc8823e84ee3e4b04d795dd3f2c5a5292a24ca2e56aa78c78cac6ec6e78ca3770dcb891976bf808e752e8cf40803f44a0aa2b114

        • \Users\Admin\AppData\Local\Temp\GATE.EXE
          Filesize

          107KB

          MD5

          1fdbfec3f56386b3f45e3676724818ba

          SHA1

          d295930d5d25c5b8e1968f92016d3aae771303b7

          SHA256

          67dbd4013e250850e4f6a564c601d7ed342f51220378238902b2dcc09bb9b483

          SHA512

          8ba022689896b209be7731e4cc8823e84ee3e4b04d795dd3f2c5a5292a24ca2e56aa78c78cac6ec6e78ca3770dcb891976bf808e752e8cf40803f44a0aa2b114

        • \Users\Admin\AppData\Local\Temp\GATE.EXE
          Filesize

          107KB

          MD5

          1fdbfec3f56386b3f45e3676724818ba

          SHA1

          d295930d5d25c5b8e1968f92016d3aae771303b7

          SHA256

          67dbd4013e250850e4f6a564c601d7ed342f51220378238902b2dcc09bb9b483

          SHA512

          8ba022689896b209be7731e4cc8823e84ee3e4b04d795dd3f2c5a5292a24ca2e56aa78c78cac6ec6e78ca3770dcb891976bf808e752e8cf40803f44a0aa2b114

        • \Users\Admin\AppData\Local\Temp\GATE.EXE
          Filesize

          107KB

          MD5

          1fdbfec3f56386b3f45e3676724818ba

          SHA1

          d295930d5d25c5b8e1968f92016d3aae771303b7

          SHA256

          67dbd4013e250850e4f6a564c601d7ed342f51220378238902b2dcc09bb9b483

          SHA512

          8ba022689896b209be7731e4cc8823e84ee3e4b04d795dd3f2c5a5292a24ca2e56aa78c78cac6ec6e78ca3770dcb891976bf808e752e8cf40803f44a0aa2b114

        • \Users\Admin\AppData\Local\Temp\GATE.EXE
          Filesize

          107KB

          MD5

          1fdbfec3f56386b3f45e3676724818ba

          SHA1

          d295930d5d25c5b8e1968f92016d3aae771303b7

          SHA256

          67dbd4013e250850e4f6a564c601d7ed342f51220378238902b2dcc09bb9b483

          SHA512

          8ba022689896b209be7731e4cc8823e84ee3e4b04d795dd3f2c5a5292a24ca2e56aa78c78cac6ec6e78ca3770dcb891976bf808e752e8cf40803f44a0aa2b114

        • \Users\Admin\AppData\Local\Temp\GATE.EXE
          Filesize

          107KB

          MD5

          1fdbfec3f56386b3f45e3676724818ba

          SHA1

          d295930d5d25c5b8e1968f92016d3aae771303b7

          SHA256

          67dbd4013e250850e4f6a564c601d7ed342f51220378238902b2dcc09bb9b483

          SHA512

          8ba022689896b209be7731e4cc8823e84ee3e4b04d795dd3f2c5a5292a24ca2e56aa78c78cac6ec6e78ca3770dcb891976bf808e752e8cf40803f44a0aa2b114

        • \Users\Admin\AppData\Local\Temp\GATE.EXE
          Filesize

          107KB

          MD5

          1fdbfec3f56386b3f45e3676724818ba

          SHA1

          d295930d5d25c5b8e1968f92016d3aae771303b7

          SHA256

          67dbd4013e250850e4f6a564c601d7ed342f51220378238902b2dcc09bb9b483

          SHA512

          8ba022689896b209be7731e4cc8823e84ee3e4b04d795dd3f2c5a5292a24ca2e56aa78c78cac6ec6e78ca3770dcb891976bf808e752e8cf40803f44a0aa2b114

        • \Users\Admin\AppData\Local\Temp\GATE.EXE
          Filesize

          107KB

          MD5

          1fdbfec3f56386b3f45e3676724818ba

          SHA1

          d295930d5d25c5b8e1968f92016d3aae771303b7

          SHA256

          67dbd4013e250850e4f6a564c601d7ed342f51220378238902b2dcc09bb9b483

          SHA512

          8ba022689896b209be7731e4cc8823e84ee3e4b04d795dd3f2c5a5292a24ca2e56aa78c78cac6ec6e78ca3770dcb891976bf808e752e8cf40803f44a0aa2b114

        • \Users\Admin\AppData\Local\Temp\GATE.EXE
          Filesize

          107KB

          MD5

          1fdbfec3f56386b3f45e3676724818ba

          SHA1

          d295930d5d25c5b8e1968f92016d3aae771303b7

          SHA256

          67dbd4013e250850e4f6a564c601d7ed342f51220378238902b2dcc09bb9b483

          SHA512

          8ba022689896b209be7731e4cc8823e84ee3e4b04d795dd3f2c5a5292a24ca2e56aa78c78cac6ec6e78ca3770dcb891976bf808e752e8cf40803f44a0aa2b114

        • \Users\Admin\AppData\Local\Temp\GATE.EXE
          Filesize

          107KB

          MD5

          1fdbfec3f56386b3f45e3676724818ba

          SHA1

          d295930d5d25c5b8e1968f92016d3aae771303b7

          SHA256

          67dbd4013e250850e4f6a564c601d7ed342f51220378238902b2dcc09bb9b483

          SHA512

          8ba022689896b209be7731e4cc8823e84ee3e4b04d795dd3f2c5a5292a24ca2e56aa78c78cac6ec6e78ca3770dcb891976bf808e752e8cf40803f44a0aa2b114

        • \Users\Admin\AppData\Local\Temp\GATE.EXE
          Filesize

          107KB

          MD5

          1fdbfec3f56386b3f45e3676724818ba

          SHA1

          d295930d5d25c5b8e1968f92016d3aae771303b7

          SHA256

          67dbd4013e250850e4f6a564c601d7ed342f51220378238902b2dcc09bb9b483

          SHA512

          8ba022689896b209be7731e4cc8823e84ee3e4b04d795dd3f2c5a5292a24ca2e56aa78c78cac6ec6e78ca3770dcb891976bf808e752e8cf40803f44a0aa2b114

        • \Users\Admin\AppData\Local\Temp\GATE.EXE
          Filesize

          107KB

          MD5

          1fdbfec3f56386b3f45e3676724818ba

          SHA1

          d295930d5d25c5b8e1968f92016d3aae771303b7

          SHA256

          67dbd4013e250850e4f6a564c601d7ed342f51220378238902b2dcc09bb9b483

          SHA512

          8ba022689896b209be7731e4cc8823e84ee3e4b04d795dd3f2c5a5292a24ca2e56aa78c78cac6ec6e78ca3770dcb891976bf808e752e8cf40803f44a0aa2b114

        • \Users\Admin\AppData\Local\Temp\GATE.EXE
          Filesize

          107KB

          MD5

          1fdbfec3f56386b3f45e3676724818ba

          SHA1

          d295930d5d25c5b8e1968f92016d3aae771303b7

          SHA256

          67dbd4013e250850e4f6a564c601d7ed342f51220378238902b2dcc09bb9b483

          SHA512

          8ba022689896b209be7731e4cc8823e84ee3e4b04d795dd3f2c5a5292a24ca2e56aa78c78cac6ec6e78ca3770dcb891976bf808e752e8cf40803f44a0aa2b114

        • \Users\Admin\AppData\Local\Temp\GATE.EXE
          Filesize

          107KB

          MD5

          1fdbfec3f56386b3f45e3676724818ba

          SHA1

          d295930d5d25c5b8e1968f92016d3aae771303b7

          SHA256

          67dbd4013e250850e4f6a564c601d7ed342f51220378238902b2dcc09bb9b483

          SHA512

          8ba022689896b209be7731e4cc8823e84ee3e4b04d795dd3f2c5a5292a24ca2e56aa78c78cac6ec6e78ca3770dcb891976bf808e752e8cf40803f44a0aa2b114

        • memory/316-122-0x0000000000000000-mapping.dmp
        • memory/520-56-0x0000000000000000-mapping.dmp
        • memory/552-140-0x0000000000000000-mapping.dmp
        • memory/632-124-0x0000000000000000-mapping.dmp
        • memory/748-69-0x0000000000000000-mapping.dmp
        • memory/836-130-0x0000000000000000-mapping.dmp
        • memory/872-97-0x0000000000000000-mapping.dmp
        • memory/888-74-0x0000000000000000-mapping.dmp
        • memory/912-64-0x0000000000000000-mapping.dmp
        • memory/932-77-0x0000000000000000-mapping.dmp
        • memory/956-99-0x0000000000000000-mapping.dmp
        • memory/988-138-0x0000000000000000-mapping.dmp
        • memory/1000-107-0x0000000000000000-mapping.dmp
        • memory/1008-54-0x0000000076261000-0x0000000076263000-memory.dmp
          Filesize

          8KB

        • memory/1020-72-0x0000000000000000-mapping.dmp
        • memory/1028-87-0x0000000000000000-mapping.dmp
        • memory/1088-112-0x0000000000000000-mapping.dmp
        • memory/1288-109-0x0000000000000000-mapping.dmp
        • memory/1372-119-0x0000000000000000-mapping.dmp
        • memory/1516-58-0x0000000000000000-mapping.dmp
        • memory/1520-143-0x0000000000000000-mapping.dmp
        • memory/1524-67-0x0000000000000000-mapping.dmp
        • memory/1544-62-0x0000000000000000-mapping.dmp
        • memory/1608-128-0x0000000000000000-mapping.dmp
        • memory/1620-135-0x0000000000000000-mapping.dmp
        • memory/1640-92-0x0000000000000000-mapping.dmp
        • memory/1640-126-0x00000000001C0000-0x00000000001E0000-memory.dmp
          Filesize

          128KB

        • memory/1644-104-0x0000000000000000-mapping.dmp
        • memory/1684-133-0x0000000000000000-mapping.dmp
        • memory/1704-94-0x0000000000000000-mapping.dmp
        • memory/1724-84-0x0000000000000000-mapping.dmp
        • memory/1728-82-0x0000000000000000-mapping.dmp
        • memory/1776-145-0x0000000000000000-mapping.dmp
        • memory/1816-117-0x0000000000000000-mapping.dmp
        • memory/1884-178-0x0000000000000000-mapping.dmp
        • memory/1884-79-0x0000000000000000-mapping.dmp
        • memory/1964-89-0x0000000000000000-mapping.dmp
        • memory/2028-114-0x0000000000000000-mapping.dmp
        • memory/2036-102-0x0000000000000000-mapping.dmp
        • memory/2080-180-0x0000000000000000-mapping.dmp
        • memory/2084-148-0x0000000000000000-mapping.dmp
        • memory/2120-150-0x0000000000000000-mapping.dmp
        • memory/2160-153-0x0000000000000000-mapping.dmp
        • memory/2196-155-0x0000000000000000-mapping.dmp
        • memory/2232-158-0x0000000000000000-mapping.dmp
        • memory/2240-185-0x0000000000000000-mapping.dmp
        • memory/2248-183-0x0000000000000000-mapping.dmp
        • memory/2272-160-0x0000000000000000-mapping.dmp
        • memory/2404-163-0x0000000000000000-mapping.dmp
        • memory/2436-165-0x0000000000000000-mapping.dmp
        • memory/2792-168-0x0000000000000000-mapping.dmp
        • memory/2860-170-0x0000000000000000-mapping.dmp
        • memory/3000-173-0x0000000000000000-mapping.dmp
        • memory/3036-175-0x0000000000000000-mapping.dmp
        • memory/3200-188-0x0000000000000000-mapping.dmp
        • memory/3236-190-0x0000000000000000-mapping.dmp
        • memory/3360-193-0x0000000000000000-mapping.dmp
        • memory/3408-195-0x0000000000000000-mapping.dmp
        • memory/3504-198-0x0000000000000000-mapping.dmp
        • memory/3564-200-0x0000000000000000-mapping.dmp
        • memory/3712-203-0x0000000000000000-mapping.dmp
        • memory/3748-205-0x0000000000000000-mapping.dmp
        • memory/5420-210-0x0000000000000000-mapping.dmp
        • memory/5428-211-0x0000000000000000-mapping.dmp
        • memory/5448-212-0x0000000000000000-mapping.dmp
        • memory/5460-213-0x0000000000000000-mapping.dmp