Resubmissions

13/01/2023, 03:15

230113-dr4r1adh43 10

13/01/2023, 03:05

230113-dlfszsdg95 10

Analysis

  • max time kernel
    1802s
  • max time network
    1804s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/01/2023, 03:15

General

  • Target

    hitho.lua

  • Size

    134B

  • MD5

    ddfdcc11a3e4a5dd265442a5bcea9fcf

  • SHA1

    a98cf41fb793d5c23bef6baac5c5848233c6ff41

  • SHA256

    8a8762536fbbd093b02ed8e6d698b8831575206d3d2f0b9d4a06a770ff95785f

  • SHA512

    25baa3074642a5f45760a905e238b3882debc856d9c84701930f4b6ed5d105e983bec3a3dfed0de6c8b6b5b901f575cbccf8fe3debc8f970acc8ff70371d6c02

Malware Config

Extracted

Path

C:\Program Files\WinRAR\Rar.txt

Ransom Note
User's Manual ~~~~~~~~~~~~~ RAR 6.11 console version ~~~~~~~~~~~~~~~~~~~~~~~~ =-=-=-=-=-=-=-=-=-=-=-=-=-=- Welcome to the RAR Archiver! -=-=-=-=-=-=-=-=-=-=-=-=-=-= Introduction ~~~~~~~~~~~~ RAR is a console application allowing to manage archive files in command line mode. RAR provides compression, encryption, data recovery and many other functions described in this manual. RAR supports only RAR format archives, which have .rar file name extension by default. ZIP and other formats are not supported. Even if you specify .zip extension when creating an archive, it will still be in RAR format. Windows users may install WinRAR, which supports more archive types including RAR and ZIP formats. WinRAR provides both graphical user interface and command line mode. While console RAR and GUI WinRAR have the similar command line syntax, some differences exist. So it is recommended to use this rar.txt manual for console RAR (rar.exe in case of Windows version) and winrar.chm WinRAR help file for GUI WinRAR (winrar.exe). Configuration file ~~~~~~~~~~~~~~~~~~ RAR and UnRAR for Unix read configuration information from .rarrc file in a user's home directory (stored in HOME environment variable) or in /etc directory. RAR and UnRAR for Windows read configuration information from rar.ini file, placed in the same directory as the rar.exe file. This file can contain the following string: switches=<any RAR switches separated by spaces> For example: switches=-m5 -s It is also possible to specify separate switch sets for individual RAR commands using the following syntax: switches_<command>=<any RAR switches separated by spaces> For example: switches_a=-m5 -s switches_x=-o+ Environment variable ~~~~~~~~~~~~~~~~~~~~ Default parameters may be added to the RAR command line by establishing an environment variable "RAR". For instance, in Unix following lines may be added to your profile: RAR='-s -md1024' export RAR RAR will use this string as default parameters in the command line and will create "solid" archives with 1024 MB sliding dictionary size. RAR handles options with priority as following: command line switches highest priority switches in the RAR variable lower priority switches saved in configuration file lowest priority Log file ~~~~~~~~ If switch -ilog is specified in the command line or configuration file, RAR will write informational messages about errors encountered while processing archives into a log file. Read the switch -ilog description for more details. The file order list for solid archiving - rarfiles.lst ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ rarfiles.lst contains a user-defined file list, which tells RAR the order in which to add files to a solid archive. It may contain file names, wildcards and special entry - $default. The default entry defines the place in order list for files not matched with other entries in this file. The comment character is ';'. In Windows this file should be placed in the same directory as RAR or in %APPDATA%\WinRAR directory, in Unix - to the user's home directory or in /etc. Tips to provide improved compression and speed of operation: - similar files should be grouped together in the archive; - frequently accessed files should be placed at the beginning. Normally masks placed nearer to the top of list have a higher priority, but there is an exception from this rule. If rarfiles.lst contains such two masks that all files matched by one mask are also matched by another, that mask which matches a smaller subset of file names will have higher priority regardless of its position in the list. For example, if you have *.cpp and f*.cpp masks, f*.cpp has a higher priority, so the position of 'filename.cpp' will be chosen according to 'f*.cpp', not '*.cpp'. RAR command line syntax ~~~~~~~~~~~~~~~~~~~~~~~ Syntax RAR <command> [ -<switches> ] <archive> [ <@listfiles...> ] [ <files...> ] [ <path_to_extract\> ] Description Command is a single character or string specifying an action to be performed by RAR. Switches are designed to modify the way RAR performs such action. Other parameters are archive name and files to be archived or extracted. Listfiles are plain text files containing names of files to process. File names must start at the first column. It is possible to put comments to the listfile after // characters. For example, you can create backup.lst containing the following strings: c:\work\doc\*.txt //backup text documents c:\work\image\*.bmp //backup pictures c:\work\misc and then run: rar a backup @backup.lst If you wish to read file names from stdin (standard input), specify the empty listfile name (just @). By default, console RAR uses the single byte encoding in list files, but it can be redefined with -sc<charset>l switch. You can specify both usual file names and list files in the same command line. If neither files nor listfiles are specified, then *.* is implied and RAR will process all files. path_to_extract includes the destination directory name followed by a path separator character. For example, it can be c:\dest\ in Windows or data/ in Unix. It specifies the directory to place extracted files in 'x' and 'e' commands. This directory is created by RAR if it does not exist yet. Alternatively it can be set with -op<path> switch. Many RAR commands, such as extraction, test or list, allow to use wildcards in archive name. If no extension is specified in archive mask, RAR assumes .rar, so * means all archives with .rar extension. If you need to process all archives without extension, use *. mask. *.* mask selects all files. Wildcards in archive name are not allowed when archiving and deleting. In Unix you need to enclose RAR command line parameters containing wildcards in single or double quotes to prevent their expansion by Unix shell. For example, this command will extract *.asm files from all *.rar archives in current directory: rar e '*.rar' '*.asm' Command could be any of the following: a Add files to archive. Examples: 1) add all *.hlp files from the current directory to the archive help.rar: rar a help *.hlp 2) archive all files from the current directory and subdirectories to 362000 bytes size solid, self-extracting volumes and add the recovery record to each volume: rar a -r -v362 -s -sfx -rr save Because no file names are specified, all files (*) are assumed. 3) as a special exception, if directory name is specified as an argument and if directory name does not include file masks and trailing path separator, the entire contents of the directory and all subdirectories will be added to the archive even if switch -r is not specified. The following command will add all files from the directory Bitmaps and its subdirectories to the RAR archive Pictures.rar: rar a Pictures.rar Bitmaps 4) if directory name includes the trailing path separator, normal rules apply and you need to specify switch -r to process its subdirectories. The following command will add all files from directory Bitmaps, but not from its subdirectories, because switch -r is not specified: rar a Pictures.rar Bitmaps\* c Add archive comment. Comments are displayed while the archive is being processed. Comment length is limited to 256 KB. Examples: rar c distrib.rar Also comments may be added from a file using -z[file] switch. The following command adds a comment from info.txt file: rar c -zinfo.txt dummy ch Change archive parameters. This command can be used with most of archive modification switches to modify archive parameters. It is especially convenient for switches like -cl, -cu, -tl, which do not have a dedicated command. It is not able to recompress, encrypt or decrypt archive data and it cannot merge or create volumes. If used without any switches, 'ch' command just copies the archive data without modification. Example: Set archive time to latest file: rar ch -tl files.rar cw Write archive comment to specified file. Format of output file depends on -sc switch. If output file name is not specified, comment data will be sent to stdout. Examples: 1) rar cw arc comment.txt 2) rar cw -scuc arc unicode.txt 3) rar cw arc d Delete files from archive. If this command removes all files from archive, the empty archive is removed. e Extract files without archived paths. Extract files excluding their path component, so all files are created in the same destination directory. Use 'x' command if you wish to extract full pathnames. Example: rar e -or html.rar *.css css\ extract all *.css files from html.rar archive to 'css' directory excluding archived paths. Rename extracted files automatically in case several files have the same name. f Freshen files in archive. Updates archived files older than files to add. This command will not add new files to the archive. i[i|c|h|t]=<string> Find string in archives. Supports following optional parameters: i - case insensitive search (default); c - case sensitive search; h - hexadecimal search; t - use ANSI, UTF-8, UTF-16 and OEM (Windows only) character tables; If no parameters are specified, it is possible to use the simplified command syntax i<string> instead of i=<string> It is allowed to specify 't' modifier with other parameters, for example, ict=string performs case sensitive search using all mentioned above character tables. Examples: 1) rar "ic=first level" -r c:\*.rar *.txt Perform case sensitive search of "first level" string in *.txt files in *.rar archives on the disk c: 2) rar ih=f0e0aeaeab2d83e3a9 -r e:\texts\*.rar Search for hex string f0 e0 ae ae ab 2d 83 e3 a9 in rar archives in e:\texts directory. k Lock archive. RAR cannot modify locked archives, so locking important archives prevents their accidental modification by RAR. Such protection might be especially useful in case of RAR commands processing archives in groups. This command is not intended or able to prevent modification by other tools or willful third party. It implements a safety measure only for accidental data change by RAR. Example: rar k final.rar l[t[a],b] List archive contents [technical [all], bare]. 'l' command lists archived file attributes, size, date, time and name, one file per line. If file is encrypted, line starts from '*' character. 'lt' displays the detailed file information in multiline mode. This information includes file checksum value, host OS, compression options and other parameters. 'lta' provide the detailed information not only for files, but also for service headers like NTFS streams or file security data. 'lb' lists bare file names with path, one per line, without any additional information. You can use -v switch to list contents of all volumes in volume set: rar l -v vol.part1.rar Commands 'lt', 'lta' and 'lb' are equal to 'vt', 'vta' and 'vb' correspondingly. m[f] Move to archive [files only]. Moving files and directories results in the files and directories being erased upon successful completion of the packing operation. Directories will not be removed if 'f' modifier is used and/or '-ed' switch is applied. p Print file to stdout. Send unpacked file data to stdout. Informational messages are suppressed with this command, so they are not mixed with file data. r Repair archive. Archive repairing is performed in two stages. First, the damaged archive is searched for a recovery record (see 'rr' command). If archive contains the previously added recovery record and if damaged data area is continuous and smaller than error correction code size in recovery record, chance of successful archive reconstruction is high. When this stage has been completed, a new archive is created, named as fixed.arcname.rar, where 'arcname' is the original (damaged) archive name. If broken archive does not contain a recovery record or if archive is not completely recovered due to major damage, second stage is performed. During this stage only the archive structure is reconstructed and it is impossible to recover files which fail checksum validation, it is still possible, however, to recover undamaged files, which were inaccessible due to the broken archive structure. Mostly this is useful for non-solid archives. This stage is never efficient for archives with encrypted file headers, which can be repaired only if recovery record is present. When the second stage is completed, the reconstructed archive is saved as rebuilt.arcname.rar, where 'arcname' is the original archive name. By default, repaired archives are created in the current directory, but you can append an optional destpath\ parameter to specify another destination directory. Example: rar r buggy.rar c:\fixed\ repair buggy.rar and place the result to 'c:\fixed' directory. rc Reconstruct missing and damaged volumes using recovery volumes (.rev files). You need to specify any existing .rar or .rev volume as the archive name. Example: rar rc backup.part03.rar Read 'rv' command description for information about recovery volumes. rn Rename archived files. The command syntax is: rar rn <arcname> <srcname1> <destname1> ... <srcnameN> <destnameN> For example, the following command: rar rn data.rar readme.txt readme.bak info.txt info.bak will rename readme.txt to readme.bak and info.txt to info.bak in the archive data.rar. It is allowed to use wildcards in the source and destination names for simple name transformations

Extracted

Path

C:\Program Files\WinRAR\WhatsNew.txt

Ransom Note
WinRAR - What's new in the latest version Version 6.11 1. Added support for Gz archives with large archive comments. Previously the extraction command failed to unpack gz archives if comment size exceeded 16 KB. 2. Archive comments in gz archives are displayed in the comment window and recognized by "Show information" command. Large comments are shown partially. Previous versions didn't display Gzip comments. 3. Reserved device names followed by file extension, such as aux.txt, are extracted as is in Windows 11 even without "Allow potentially incompatible names" option or -oni command line switch. Unlike previous Windows versions, Windows 11 treats such names as usual files. Device names without extension, such as aux, still require these options to be unpacked as is regardless of Windows version. 4. Switch -mes can be also used to suppress the password prompt and abort when adding files to encrypted solid archive. 5. Additional measures to prevent extracting insecure links are implemented. 6. Bugs fixed: a) if password exceeding 127 characters was entered when unpacking an encrypted archive with console RAR, text after 127th character could be erroneously recognized as user's input by different prompts issued later; b) wrong archived file time could be displayed in overwrite prompt when extracting a file from ZIP archive. It happened if such archive included extended file times and was created in another time zone. It didn't affect the actual file time, which was set properly upon extraction. Version 6.10 1. WinRAR can unpack contents of .zst and .zipx archives utilizing Zstandard algorithm. 2. Added support of Windows 11 Explorer context menus. Beginning from Windows 11, an application can add only a single top level command or submenu to Explorer context menu. If "Cascaded context menus" in "Integration settings" dialog is on, this single item is a submenu storing all necessary WinRAR commands. If this option is off, only one extraction command for archives and one archiving command for usual files are available. You can select these commands with "Context menu items..." button in "Integration settings" dialog. 3. "Legacy context menus" option in "Settings/Integration" dialog can be used in Windows 11 if WinRAR commands are missing in "Show more options" Windows legacy context menu or in context menus of third party file managers. If WinRAR commands are already present here, keep "Legacy context menus" option turned off to prevent duplicating them. This option is not available in Windows 10 and older. 4. Windows XP is not supported anymore. Minimum required operating system version is Windows Vista. 5. "Close" item is added to "When done" list on "Advanced" page of archiving dialog. It closes WinRAR window, when archiving is done. 6. "When done" list is added to "Options" page of extraction dialog. It allows to select an action like turning a computer off or closing WinRAR after completing extraction. 7. Switch -si can be used when extracting or testing to read archive data from stdin, such as: type docs.rar | rar x -si -o+ -pmypwd dummy docs\ Even though the archive name is ignored with this switch, an arbitrary dummy archive name has to specified in the command line. Operations requiring backward seeks are unavailable in this mode. It includes displaying archive comments, testing the recovery record, utilizing the quick open information, processing multivolume archives. Prompts requiring user interaction are not allowed. Use -o[+|-|r], -p<pwd> or -mes switches to suppress such prompts. 8. New -ep4<path> switch excludes the path prefix when archiving or extracting if this path is found in the beginning of archived name. Path is compared with names already prepared to store in archive, without drive letters and leading path separators. For example: rar a -ep4texts\books archive c:\texts\books\technical removes "text\books" from archived names, so they start from 'technical'. 9. New -mes switch skips encrypted files when extracting or testing. It replaces the former -p- switch. 10. New -op<path> switch sets the destination folder for 'x' and 'e' extraction commands. Unlike <path_to_extract\> command line parameter, this switch also accepts paths without trailing path separator character. 11. If 'p' command is used to print a file to stdout, informational messages are suppressed automatically to prevent them mixing with file data. 12. "Generate archive name by mask" option and switch -ag treat only first two 'M' characters after 'H' as minutes. Previously any amount of such characters was considered as minutes. It makes possible to place the time field before the date, like -agHHMM-DDMMYY. Previous versions considered all 'M' in this string as minutes. 13. Maximum allowed size of RAR5 recovery record is increased to 1000% of protected data size. Maximum number of RAR5 recovery volumes can be 10 times larger than protected RAR volumes. Previous WinRAR versions are not able to use the recovery record to repair broken archives if recovery record size exceeds 99%. Similarly, previous versions cannot use recovery volumes if their number is equal or larger than number of RAR volumes. 14. Warning is issued if entered password exceeds the allowed limit of 127 characters and is truncated. Previously such passwords had been truncated silently. 15. If archive includes reserved device names, the underscore character is inserted in the beginning of such names when extracting. For example, aux.txt is converted to _aux.txt. It is done to prevent compatibility problems with software unable to process such names. You can use "Allow potentially incompatible names" option in "Advanced" part of extraction dialog or command line -oni switch to avoid this conversion. 16. WinRAR attempts to reset the file cache before testing an archive. It helps to verify actual data written to disk instead of reading a cached copy. 17. Multiple -v<size> switches specifying different sizes for different volumes are now allowed also for ZIP archives: WinRAR a -v100k -v200k -v300k arcname.zip Previously multiple -v<size> switches were supported only for RAR archives. 18. Switches -sl<size> and -sm<size> can be used in WinRAR.exe command line mode when extracting archives in any supported formats, provided that such archive includes unpacked file sizes. Previously these switches could filter files by size only in RAR and ZIP archives. 19. Newer folder selection dialog is invoked when pressing "Browse" button in WinRAR "Settings/Paths" page, "Repair" and "Convert" commands, also as in few other similar places. Previously a simpler XP style folder selection dialog was opened. 20. When restoring from tray after completing an operation, WinRAR window is positioned under other opened windows, to not interfere with current user activities. 21. "650 MB CD" is removed and "2 GB volumes" is added to the list of predefined volume sizes in "Define volume sizes" dialog invoked from WinRAR "Settings/Compression". 22. "Rename" command selects the file name part up to the final dot. Previously it selected the entire name. 23. If SFX archive size exceeds 4 GB, an error message is issued during compression, immediately after exceeding this threshold. Previously this error was reported only after completing compression. Executables of such size cannot be started by Windows. 24. Command line -en switch is not supported anymore. It created RAR4 archives without the end of archive record. End of archive record permits to gracefully skip external data like digital signatures. 25. Bugs fixed: a) when editing a file inside of .rar or .zip archive, WinRAR created a new SFX archive instead of updating an existing archive if "Create SFX archive" option was set in the default compression profile; b) the total progress could be displayed incorrectly when using -oi, -f, -u switches or appropriate GUI options; c) "Find files" command with "Use all tables" option and command line "it" commands failed to find strings in UTF-16 encoding. Version 6.02 1. ZIP SFX module refuses to process SFX commands stored in archive comment if such comment is resided after beginning of Authenticode digital signature. It is done to prevent possible attacks with inclusion of ZIP archive into the signature body. We already prohibited extracting contents of such malformed archives in WinRAR 6.01. We are thankful to Jacob Thompson - Mandiant Advantage Labs for reporting this issue. 2. WinRAR uses https instead of http in the web notifier window, home page and themes links. It also implements additional checks within the web notifier. This is done to prevent a malicious web page from executing existing files on a user's computer. Such attack is only possible if the intruder has managed to spoof or otherwise control user's DNS records. Some other factors are also involved in limiting the practical application of this attack. We would like to express our gratitude to Igor Sak-Sakovskiy for bringing this issue to our attention. 3. Where appropriate, SFX archive displays the additional line with detailed error information provided by operating system. For example, previously such archive would display "Cannot create file" message alone. Now this message is followed by a detailed reason like access denied or file being used by another process. In the past this extended error information was available in WinRAR, but not in SFX archives. 4. Switch -idn hides archived names also in 'v' and 'l' commands. It can be useful if only the archive type or total information is needed. 5. If -ibck -ri<priority> switches are used together, WinRAR process sets the priority specified in -ri switch. Previous versions ignored -ri and set the priority to low in the presence of -ibck switch. 6. When using "File/Change drive" command, WinRAR saves the last folder of previous drive and restores it if that drive is selected again later. 7. Name of unpacking file is now included into WinRAR incorrect password warning for RAR5 archives. It can be helpful when unpacking a non-solid archive containing files encrypted with different passwords. 8. Bugs fixed: a) "Convert archives" command issued erroneous "The specified password is incorrect" message after succesfully converting RAR archive with encrypted file names if new password was set and archive was opened in WinRAR shell; b) if command progress window was resized up and then quickly resized down to original dimensions, window contents could be positioned incorrectly. Version 6.01 1. Ctrl+A keyboard shortcut selects the entire text in WinRAR comment window. 2. If -idn switch is used together with -t or -df in console RAR when archiving, it additionally disables "Deleting <filename>" or "Testing <filename>" messages, normally issued by these switches. Also -idn disables folder creation messages when extracting a file to non-existing folder. 3. WinRAR and ZIP SFX module refuse to extract contents of ZIP SFX archives if ZIP central directory is resided after beginning of Authenticode digital signature. It is done to prevent possible attacks with inclusion of ZIP archive into signature body. 4. Bugs fixed: a) "Convert archives" command could incorrectly convert Unicode comments in RAR archives. b) if two archive information windows had been opened from Explorer context menu, the compression ratio bar in the first window could erroneously display a value for second archive. It did not affect the ratio and other text details at the right of window. Only the vertical bar at the left could be updated to a wrong value; c) if "Wait if other WinRAR copies are active" option was enabled in extraction dialog, "Waiting for another WinRAR copy" title was not set in command progress window while waiting; d) when extracting a symbolic link, previous versions did not overwrite existing symbolic links even if user requested it in overwrite prompt. Version 6.00 1. "Ignore" and "Ignore All" options are added to read error prompt. "Ignore" allows to continue processing with already read file part only and "Ignore All" does it for all future read errors. For example, if you archive a file, which portion is locked by another process, and if "Ignore" is selected in read error prompt, only a part of file preceding the unreadable region will be saved into archive. It can help to avoid interrupting lengthy archiving operations, though be aware that files archived with "Ignore" are incomplete. If switch -y is specified, "Ignore" is applied to all files by default. Previously available "Retry" and "Quit" options are still present in read error prompt as well. 2. Exit code 12 is returned in the command line mode in case of read errors. This code is returned for all options in the read error prompt, including a newly introduced "Ignore" option. Previously more common fatal error code 2 was returned for read errors. 3. If several archives are selected, "Extract archives to" option group in "Options" page of extraction dialog can be used to place extracted files to specified destination folder, to separate subfolders in destination folder, to separate subfolders in archive folders and directly to archive folders. It replaces "Extract archives to subfolders" option and available only if multiple archives are selected. 4. New -ad2 switch places extracted files directly to archive's own folder. Unlike -ad1, it does not create a separate subfolder for each unpacked archive. 5. "Additional switches" option in "Options" page of archiving and extraction dialogs allows to specify WinRAR command line switches. It might be useful if there is no option in WinRAR graphical interface matching a switch. Use this feature only if you are familiar with WinRAR command line syntax and clearly understand what specified switches are intended for. 6. Compression parameters in "Benchmark" command are changed to 32 MB dictionary and "Normal" method. They match RAR5 default mode and more suitable to estimate the typical performance of recent WinRAR versions than former 4 MB "Best" intended for RAR4 format. Latest "Benchmark" results cannot be compared with previous versions directly. New parameters set produces different values, likely lower because of eight times larger dictionary size. 7. When unpacking a part of files from solid volume set, WinRAR attempts to skip volumes in the beginning and
URLs

https

http

http://weirdsgn.com

http://icondesignlab.com

https://rarlab.com/themes/WinRAR_Classic_48x36.theme.rar

Extracted

Family

quasar

Version

1.3.0.0

Botnet

Office04

C2

127.0.0.1:9018

Mutex

QSR_MUTEX_K7WFFxc2Bmagj3PE7K

Attributes
  • encryption_key

    XyxsIjqX01n2hT2xKY1j

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Signatures

  • Modifies system executable filetype association 2 TTPs 8 IoCs
  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar payload 1 IoCs
  • Suspicious use of NtCreateProcessExOtherParentProcess 4 IoCs
  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 8 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 40 IoCs
  • Modifies Windows Firewall 1 TTPs 2 IoCs
  • Registers COM server for autorun 1 TTPs 3 IoCs
  • Checks computer location settings 2 TTPs 12 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 5 IoCs
  • Loads dropped DLL 22 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 17 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 9 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 11 IoCs
  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 13 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 31 IoCs
  • Suspicious use of AdjustPrivilegeToken 32 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 31 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\hitho.lua
    1⤵
      PID:396
    • C:\Windows\system32\OpenWith.exe
      C:\Windows\system32\OpenWith.exe -Embedding
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:4344
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe"
      1⤵
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3120
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbaa074f50,0x7ffbaa074f60,0x7ffbaa074f70
        2⤵
          PID:3548
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1604 /prefetch:2
          2⤵
            PID:1204
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1980 /prefetch:8
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:1932
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2260 /prefetch:8
            2⤵
              PID:2384
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2932 /prefetch:1
              2⤵
                PID:3952
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3136 /prefetch:1
                2⤵
                  PID:540
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3756 /prefetch:1
                  2⤵
                    PID:2980
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4436 /prefetch:8
                    2⤵
                      PID:4336
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4616 /prefetch:8
                      2⤵
                        PID:308
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4592 /prefetch:8
                        2⤵
                          PID:208
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4904 /prefetch:8
                          2⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:3656
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:1
                          2⤵
                            PID:1260
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5168 /prefetch:8
                            2⤵
                              PID:3160
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5284 /prefetch:8
                              2⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:4612
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5244 /prefetch:8
                              2⤵
                                PID:2544
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4516 /prefetch:8
                                2⤵
                                  PID:220
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4580 /prefetch:8
                                  2⤵
                                    PID:4980
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:1
                                    2⤵
                                      PID:4816
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5432 /prefetch:1
                                      2⤵
                                        PID:1044
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:1
                                        2⤵
                                          PID:4676
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4920 /prefetch:8
                                          2⤵
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:4812
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4944 /prefetch:8
                                          2⤵
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:2544
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3256 /prefetch:8
                                          2⤵
                                            PID:4768
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4432 /prefetch:8
                                            2⤵
                                              PID:260
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5484 /prefetch:8
                                              2⤵
                                                PID:948
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3680 /prefetch:8
                                                2⤵
                                                  PID:4476
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2104 /prefetch:1
                                                  2⤵
                                                    PID:4864
                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4916 /prefetch:1
                                                    2⤵
                                                      PID:5020
                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5296 /prefetch:8
                                                      2⤵
                                                        PID:1272
                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5196 /prefetch:8
                                                        2⤵
                                                          PID:3884
                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=3028 /prefetch:8
                                                          2⤵
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          PID:3928
                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4624 /prefetch:8
                                                          2⤵
                                                            PID:3432
                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5756 /prefetch:8
                                                            2⤵
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            PID:2896
                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2380 /prefetch:8
                                                            2⤵
                                                              PID:3624
                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2368 /prefetch:8
                                                              2⤵
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              PID:3752
                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4604 /prefetch:8
                                                              2⤵
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              PID:4944
                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5492 /prefetch:8
                                                              2⤵
                                                                PID:4960
                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4448 /prefetch:2
                                                                2⤵
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                PID:5004
                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=39 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:1
                                                                2⤵
                                                                  PID:3420
                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=40 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:1
                                                                  2⤵
                                                                    PID:1248
                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5696 /prefetch:8
                                                                    2⤵
                                                                      PID:4384
                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5860 /prefetch:8
                                                                      2⤵
                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                      PID:2656
                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=43 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3756 /prefetch:1
                                                                      2⤵
                                                                        PID:3928
                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=44 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:1
                                                                        2⤵
                                                                          PID:4312
                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5552 /prefetch:8
                                                                          2⤵
                                                                            PID:3056
                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6184 /prefetch:8
                                                                            2⤵
                                                                              PID:2344
                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4792 /prefetch:8
                                                                              2⤵
                                                                                PID:4932
                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=48 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6452 /prefetch:1
                                                                                2⤵
                                                                                  PID:2908
                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=49 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6176 /prefetch:1
                                                                                  2⤵
                                                                                    PID:2124
                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6952 /prefetch:8
                                                                                    2⤵
                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                    PID:1556
                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=51 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6328 /prefetch:1
                                                                                    2⤵
                                                                                      PID:2068
                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=52 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6268 /prefetch:1
                                                                                      2⤵
                                                                                        PID:4136
                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6908 /prefetch:8
                                                                                        2⤵
                                                                                          PID:3092
                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6444 /prefetch:8
                                                                                          2⤵
                                                                                            PID:2208
                                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6964 /prefetch:8
                                                                                            2⤵
                                                                                              PID:628
                                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6632 /prefetch:8
                                                                                              2⤵
                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                              PID:4496
                                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2628 /prefetch:8
                                                                                              2⤵
                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                              PID:1328
                                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6608 /prefetch:8
                                                                                              2⤵
                                                                                                PID:3352
                                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6480 /prefetch:8
                                                                                                2⤵
                                                                                                  PID:2976
                                                                                                • C:\Users\Admin\Downloads\winrar-x64-611.exe
                                                                                                  "C:\Users\Admin\Downloads\winrar-x64-611.exe"
                                                                                                  2⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • Checks computer location settings
                                                                                                  • Drops file in Program Files directory
                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                  PID:4024
                                                                                                  • C:\Program Files\WinRAR\uninstall.exe
                                                                                                    "C:\Program Files\WinRAR\uninstall.exe" /setup
                                                                                                    3⤵
                                                                                                    • Modifies system executable filetype association
                                                                                                    • Executes dropped EXE
                                                                                                    • Registers COM server for autorun
                                                                                                    • Drops file in Program Files directory
                                                                                                    • Modifies registry class
                                                                                                    PID:664
                                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.FileUtilService --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5952 /prefetch:8
                                                                                                  2⤵
                                                                                                    PID:4372
                                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=61 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5524 /prefetch:1
                                                                                                    2⤵
                                                                                                      PID:4980
                                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5284 /prefetch:8
                                                                                                      2⤵
                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                      PID:2056
                                                                                                    • C:\Program Files\WinRAR\WinRAR.exe
                                                                                                      "C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\Admin\Downloads\Quasar 1.3 modified by Deos.zip"
                                                                                                      2⤵
                                                                                                      • Executes dropped EXE
                                                                                                      • Modifies Internet Explorer settings
                                                                                                      • Suspicious behavior: GetForegroundWindowSpam
                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                      PID:3400
                                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6808 /prefetch:8
                                                                                                      2⤵
                                                                                                        PID:2196
                                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.FileUtilService --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5160 /prefetch:8
                                                                                                        2⤵
                                                                                                          PID:4844
                                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5056 /prefetch:8
                                                                                                          2⤵
                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                          PID:4032
                                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5472 /prefetch:8
                                                                                                          2⤵
                                                                                                            PID:2184
                                                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2980 /prefetch:8
                                                                                                            2⤵
                                                                                                              PID:4868
                                                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=68 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4800 /prefetch:1
                                                                                                              2⤵
                                                                                                                PID:2808
                                                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=69 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6912 /prefetch:1
                                                                                                                2⤵
                                                                                                                  PID:4584
                                                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6204 /prefetch:8
                                                                                                                  2⤵
                                                                                                                    PID:3164
                                                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4600 /prefetch:8
                                                                                                                    2⤵
                                                                                                                      PID:4984
                                                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7140 /prefetch:8
                                                                                                                      2⤵
                                                                                                                        PID:3344
                                                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7132 /prefetch:8
                                                                                                                        2⤵
                                                                                                                          PID:3068
                                                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6036 /prefetch:8
                                                                                                                          2⤵
                                                                                                                            PID:212
                                                                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6592 /prefetch:8
                                                                                                                            2⤵
                                                                                                                              PID:456
                                                                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4744 /prefetch:8
                                                                                                                              2⤵
                                                                                                                                PID:1904
                                                                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5284 /prefetch:8
                                                                                                                                2⤵
                                                                                                                                  PID:4768
                                                                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=78 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5444 /prefetch:1
                                                                                                                                  2⤵
                                                                                                                                    PID:2880
                                                                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=79 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7160 /prefetch:1
                                                                                                                                    2⤵
                                                                                                                                      PID:3020
                                                                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=80 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4656 /prefetch:1
                                                                                                                                      2⤵
                                                                                                                                        PID:4092
                                                                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5860 /prefetch:8
                                                                                                                                        2⤵
                                                                                                                                          PID:1400
                                                                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5464 /prefetch:8
                                                                                                                                          2⤵
                                                                                                                                            PID:4268
                                                                                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5984 /prefetch:8
                                                                                                                                            2⤵
                                                                                                                                              PID:5008
                                                                                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6812 /prefetch:8
                                                                                                                                              2⤵
                                                                                                                                                PID:916
                                                                                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3004 /prefetch:8
                                                                                                                                                2⤵
                                                                                                                                                  PID:3400
                                                                                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5912 /prefetch:8
                                                                                                                                                  2⤵
                                                                                                                                                    PID:3516
                                                                                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6092 /prefetch:8
                                                                                                                                                    2⤵
                                                                                                                                                      PID:1608
                                                                                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7016 /prefetch:8
                                                                                                                                                      2⤵
                                                                                                                                                        PID:1936
                                                                                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6276 /prefetch:8
                                                                                                                                                        2⤵
                                                                                                                                                          PID:908
                                                                                                                                                        • C:\Program Files\WinRAR\WinRAR.exe
                                                                                                                                                          "C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\Admin\Downloads\MeGa-RAT-Pack-master.zip"
                                                                                                                                                          2⤵
                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                          • Checks computer location settings
                                                                                                                                                          • Modifies registry class
                                                                                                                                                          • Suspicious behavior: GetForegroundWindowSpam
                                                                                                                                                          PID:4940
                                                                                                                                                          • C:\Program Files\WinRAR\WinRAR.exe
                                                                                                                                                            "C:\Program Files\WinRAR\WinRAR.exe" C:\Users\Admin\AppData\Local\Temp\Rar$DIa4940.44300\VayneRat.zip
                                                                                                                                                            3⤵
                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                            • Modifies registry class
                                                                                                                                                            PID:3516
                                                                                                                                                          • C:\Program Files\WinRAR\WinRAR.exe
                                                                                                                                                            "C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\Admin\AppData\Local\Temp\Rar$DIa4940.20707\Shia Hacker School -Rat v1.0.zip"
                                                                                                                                                            3⤵
                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                            • Suspicious behavior: GetForegroundWindowSpam
                                                                                                                                                            PID:1400
                                                                                                                                                          • C:\Program Files\WinRAR\WinRAR.exe
                                                                                                                                                            "C:\Program Files\WinRAR\WinRAR.exe" C:\Users\Admin\AppData\Local\Temp\Rar$DIa4940.21868\SaherBlueEagle_Splitter[RAT].zip
                                                                                                                                                            3⤵
                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                            • Modifies registry class
                                                                                                                                                            • Suspicious behavior: GetForegroundWindowSpam
                                                                                                                                                            PID:5092
                                                                                                                                                          • C:\Program Files\WinRAR\WinRAR.exe
                                                                                                                                                            "C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\Admin\AppData\Local\Temp\Rar$DIa4940.37987\WARZONE 1.2 Cracked.zip"
                                                                                                                                                            3⤵
                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                            • Suspicious behavior: GetForegroundWindowSpam
                                                                                                                                                            PID:6100
                                                                                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6240 /prefetch:8
                                                                                                                                                          2⤵
                                                                                                                                                            PID:1296
                                                                                                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6376 /prefetch:8
                                                                                                                                                            2⤵
                                                                                                                                                              PID:4064
                                                                                                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2668 /prefetch:8
                                                                                                                                                              2⤵
                                                                                                                                                                PID:364
                                                                                                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1572,4316888642968382152,9698418959292873117,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5452 /prefetch:8
                                                                                                                                                                2⤵
                                                                                                                                                                  PID:180
                                                                                                                                                              • C:\Windows\System32\CompPkgSrv.exe
                                                                                                                                                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                                                                                1⤵
                                                                                                                                                                  PID:4184
                                                                                                                                                                • C:\Windows\system32\AUDIODG.EXE
                                                                                                                                                                  C:\Windows\system32\AUDIODG.EXE 0x324 0x4c8
                                                                                                                                                                  1⤵
                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                  PID:4036
                                                                                                                                                                • C:\Windows\System32\rundll32.exe
                                                                                                                                                                  C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                                                                                                                                  1⤵
                                                                                                                                                                    PID:116
                                                                                                                                                                  • C:\Users\Admin\Desktop\Quasar 1.3 modified by Deos\Quasarx.exe
                                                                                                                                                                    "C:\Users\Admin\Desktop\Quasar 1.3 modified by Deos\Quasarx.exe"
                                                                                                                                                                    1⤵
                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                    • Checks computer location settings
                                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                                                                                    PID:504
                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                      C:\Windows\system32\cmd.exe /c schtasks /End /TN "Microsoft\Windows\MUI\WindowsUpdate" & schtasks /End /TN "WindowsUpdate" & exit
                                                                                                                                                                      2⤵
                                                                                                                                                                        PID:308
                                                                                                                                                                        • C:\Windows\system32\schtasks.exe
                                                                                                                                                                          schtasks /End /TN "Microsoft\Windows\MUI\WindowsUpdate"
                                                                                                                                                                          3⤵
                                                                                                                                                                            PID:2216
                                                                                                                                                                          • C:\Windows\system32\schtasks.exe
                                                                                                                                                                            schtasks /End /TN "WindowsUpdate"
                                                                                                                                                                            3⤵
                                                                                                                                                                              PID:4384
                                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                                            C:\Windows\system32\cmd.exe /c schtasks /Delete /TN "WindowsUpdate" /F & exit
                                                                                                                                                                            2⤵
                                                                                                                                                                              PID:3088
                                                                                                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                schtasks /Delete /TN "WindowsUpdate" /F
                                                                                                                                                                                3⤵
                                                                                                                                                                                  PID:2280
                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                C:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="System" dir=out action=allow program="%windir%\SysWOW64\TiWorker.exe" enable=yes & exit
                                                                                                                                                                                2⤵
                                                                                                                                                                                  PID:2168
                                                                                                                                                                                  • C:\Windows\system32\netsh.exe
                                                                                                                                                                                    netsh advfirewall firewall add rule name="System" dir=out action=allow program="C:\Windows\SysWOW64\TiWorker.exe" enable=yes
                                                                                                                                                                                    3⤵
                                                                                                                                                                                    • Modifies Windows Firewall
                                                                                                                                                                                    PID:2816
                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                  C:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="System" dir=in action=allow program="%windir%\SysWOW64\TiWorker.exe" enable=yes & exit
                                                                                                                                                                                  2⤵
                                                                                                                                                                                    PID:1296
                                                                                                                                                                                    • C:\Windows\system32\netsh.exe
                                                                                                                                                                                      netsh advfirewall firewall add rule name="System" dir=in action=allow program="C:\Windows\SysWOW64\TiWorker.exe" enable=yes
                                                                                                                                                                                      3⤵
                                                                                                                                                                                      • Modifies Windows Firewall
                                                                                                                                                                                      PID:3612
                                                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                                                    C:\Windows\system32\cmd.exe /c schtasks /Create /XML "%windir%\SysWOW64\MicrosoftWindows.xml" /TN "Microsoft\Windows\MUI\WindowsUpdate" /F & exit
                                                                                                                                                                                    2⤵
                                                                                                                                                                                      PID:4940
                                                                                                                                                                                      • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                        schtasks /Create /XML "C:\Windows\SysWOW64\MicrosoftWindows.xml" /TN "Microsoft\Windows\MUI\WindowsUpdate" /F
                                                                                                                                                                                        3⤵
                                                                                                                                                                                        • Creates scheduled task(s)
                                                                                                                                                                                        PID:2328
                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                      C:\Windows\system32\cmd.exe /c schtasks /Change /TN "Microsoft\Windows\MUI\WindowsUpdate" /TR "%windir%\SysWOW64\TiWorker.exe" & schtasks /Run /TN "Microsoft\Windows\MUI\WindowsUpdate" & exit
                                                                                                                                                                                      2⤵
                                                                                                                                                                                        PID:2880
                                                                                                                                                                                        • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                          schtasks /Change /TN "Microsoft\Windows\MUI\WindowsUpdate" /TR "C:\Windows\SysWOW64\TiWorker.exe"
                                                                                                                                                                                          3⤵
                                                                                                                                                                                            PID:3592
                                                                                                                                                                                          • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                            schtasks /Run /TN "Microsoft\Windows\MUI\WindowsUpdate"
                                                                                                                                                                                            3⤵
                                                                                                                                                                                              PID:632
                                                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                                                            C:\Windows\system32\cmd.exe /c certutil –addstore –f root MicrosoftWindows.crt & exit
                                                                                                                                                                                            2⤵
                                                                                                                                                                                              PID:1260
                                                                                                                                                                                              • C:\Windows\system32\certutil.exe
                                                                                                                                                                                                certutil –addstore –f root MicrosoftWindows.crt
                                                                                                                                                                                                3⤵
                                                                                                                                                                                                  PID:4188
                                                                                                                                                                                              • C:\Users\Admin\Desktop\Quasar 1.3 modified by Deos\Quasar.exe
                                                                                                                                                                                                "C:\Users\Admin\Desktop\Quasar 1.3 modified by Deos\Quasar.exe"
                                                                                                                                                                                                2⤵
                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                • Suspicious use of SendNotifyMessage
                                                                                                                                                                                                PID:440
                                                                                                                                                                                            • C:\Windows\SysWOW64\TiWorker.exe
                                                                                                                                                                                              C:\Windows\SysWOW64\TiWorker.exe
                                                                                                                                                                                              1⤵
                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                              PID:5088
                                                                                                                                                                                            • C:\Users\Admin\Desktop\Quasar 1.3 modified by Deos\Quasarx.exe
                                                                                                                                                                                              "C:\Users\Admin\Desktop\Quasar 1.3 modified by Deos\Quasarx.exe"
                                                                                                                                                                                              1⤵
                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                              • Checks computer location settings
                                                                                                                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                              PID:3428
                                                                                                                                                                                              • C:\Users\Admin\Desktop\Quasar 1.3 modified by Deos\Quasar.exe
                                                                                                                                                                                                "C:\Users\Admin\Desktop\Quasar 1.3 modified by Deos\Quasar.exe"
                                                                                                                                                                                                2⤵
                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                • Modifies registry class
                                                                                                                                                                                                • Suspicious behavior: GetForegroundWindowSpam
                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                • Suspicious use of SendNotifyMessage
                                                                                                                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                PID:2236
                                                                                                                                                                                            • C:\Windows\system32\mspaint.exe
                                                                                                                                                                                              "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Desktop\Quasar 1.3 modified by Deos\Screenshot.png" /ForceBootstrapPaint3D
                                                                                                                                                                                              1⤵
                                                                                                                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                              PID:428
                                                                                                                                                                                            • C:\Windows\System32\svchost.exe
                                                                                                                                                                                              C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s DsSvc
                                                                                                                                                                                              1⤵
                                                                                                                                                                                              • Drops file in System32 directory
                                                                                                                                                                                              PID:700
                                                                                                                                                                                            • C:\Windows\system32\OpenWith.exe
                                                                                                                                                                                              C:\Windows\system32\OpenWith.exe -Embedding
                                                                                                                                                                                              1⤵
                                                                                                                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                              PID:3412
                                                                                                                                                                                            • C:\Windows\system32\taskmgr.exe
                                                                                                                                                                                              "C:\Windows\system32\taskmgr.exe" /4
                                                                                                                                                                                              1⤵
                                                                                                                                                                                              • Checks SCSI registry key(s)
                                                                                                                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                              • Suspicious use of SendNotifyMessage
                                                                                                                                                                                              PID:552
                                                                                                                                                                                            • C:\Users\Admin\Downloads\Client-built.exe
                                                                                                                                                                                              "C:\Users\Admin\Downloads\Client-built.exe"
                                                                                                                                                                                              1⤵
                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                              PID:4508
                                                                                                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\Downloads\Client-built.exe" /rl HIGHEST /f
                                                                                                                                                                                                2⤵
                                                                                                                                                                                                • Creates scheduled task(s)
                                                                                                                                                                                                PID:4532
                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
                                                                                                                                                                                                "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
                                                                                                                                                                                                2⤵
                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                PID:996
                                                                                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                  "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                  • Creates scheduled task(s)
                                                                                                                                                                                                  PID:2320
                                                                                                                                                                                            • C:\Windows\system32\taskmgr.exe
                                                                                                                                                                                              "C:\Windows\system32\taskmgr.exe" /4
                                                                                                                                                                                              1⤵
                                                                                                                                                                                              • Checks SCSI registry key(s)
                                                                                                                                                                                              • Suspicious behavior: GetForegroundWindowSpam
                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                              PID:4392
                                                                                                                                                                                            • C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe
                                                                                                                                                                                              "C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe"
                                                                                                                                                                                              1⤵
                                                                                                                                                                                              • Drops file in Program Files directory
                                                                                                                                                                                              PID:1360
                                                                                                                                                                                              • C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir1360_128786915\ChromeRecovery.exe
                                                                                                                                                                                                "C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir1360_128786915\ChromeRecovery.exe" --appguid={8A69D345-D564-463c-AFF1-A69D9E530F96} --browser-version=89.0.4389.114 --sessionid={d05485f9-0ca8-4147-b0df-34c3d819f7df} --system
                                                                                                                                                                                                2⤵
                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                PID:3436
                                                                                                                                                                                            • C:\Users\Admin\Desktop\VayneRat\Vayne Ratx.exe
                                                                                                                                                                                              "C:\Users\Admin\Desktop\VayneRat\Vayne Ratx.exe"
                                                                                                                                                                                              1⤵
                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                              • Checks computer location settings
                                                                                                                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                              PID:2196
                                                                                                                                                                                              • C:\Users\Admin\Desktop\VayneRat\Vayne Rat.exe
                                                                                                                                                                                                "C:\Users\Admin\Desktop\VayneRat\Vayne Rat.exe"
                                                                                                                                                                                                2⤵
                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                • Loads dropped DLL
                                                                                                                                                                                                • Suspicious behavior: GetForegroundWindowSpam
                                                                                                                                                                                                PID:1360
                                                                                                                                                                                            • C:\Users\Admin\Desktop\VayneRat\Vayne Ratx.exe
                                                                                                                                                                                              "C:\Users\Admin\Desktop\VayneRat\Vayne Ratx.exe"
                                                                                                                                                                                              1⤵
                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                              • Checks computer location settings
                                                                                                                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                              PID:3132
                                                                                                                                                                                              • C:\Users\Admin\Desktop\VayneRat\Vayne Rat.exe
                                                                                                                                                                                                "C:\Users\Admin\Desktop\VayneRat\Vayne Rat.exe"
                                                                                                                                                                                                2⤵
                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                • Loads dropped DLL
                                                                                                                                                                                                PID:1588
                                                                                                                                                                                            • C:\Users\Admin\Desktop\VayneRat\Vayne Rat.exe
                                                                                                                                                                                              "C:\Users\Admin\Desktop\VayneRat\Vayne Rat.exe"
                                                                                                                                                                                              1⤵
                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                              • Loads dropped DLL
                                                                                                                                                                                              PID:2392
                                                                                                                                                                                            • C:\Users\Admin\Desktop\VayneRat\armsvc.exe
                                                                                                                                                                                              "C:\Users\Admin\Desktop\VayneRat\armsvc.exe"
                                                                                                                                                                                              1⤵
                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                              PID:4052
                                                                                                                                                                                            • C:\Users\Admin\Desktop\VayneRat\Vayne Ratx.exe
                                                                                                                                                                                              "C:\Users\Admin\Desktop\VayneRat\Vayne Ratx.exe"
                                                                                                                                                                                              1⤵
                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                              • Checks computer location settings
                                                                                                                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                              PID:4256
                                                                                                                                                                                              • C:\Users\Admin\Desktop\VayneRat\Vayne Rat.exe
                                                                                                                                                                                                "C:\Users\Admin\Desktop\VayneRat\Vayne Rat.exe"
                                                                                                                                                                                                2⤵
                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                • Loads dropped DLL
                                                                                                                                                                                                PID:1592
                                                                                                                                                                                            • C:\Users\Admin\Desktop\Shia Hacker School -Rat v1.0\shia hacker -ratx.exe
                                                                                                                                                                                              "C:\Users\Admin\Desktop\Shia Hacker School -Rat v1.0\shia hacker -ratx.exe"
                                                                                                                                                                                              1⤵
                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                              • Checks computer location settings
                                                                                                                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                              PID:2580
                                                                                                                                                                                              • C:\Users\Admin\Desktop\Shia Hacker School -Rat v1.0\shia hacker -rat.exe
                                                                                                                                                                                                "C:\Users\Admin\Desktop\Shia Hacker School -Rat v1.0\shia hacker -rat.exe"
                                                                                                                                                                                                2⤵
                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                • Modifies registry class
                                                                                                                                                                                                • Suspicious behavior: GetForegroundWindowSpam
                                                                                                                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                PID:376
                                                                                                                                                                                            • C:\Users\Admin\Downloads\ded.exe
                                                                                                                                                                                              "C:\Users\Admin\Downloads\ded.exe"
                                                                                                                                                                                              1⤵
                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                              • Checks computer location settings
                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                              PID:2372
                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe
                                                                                                                                                                                                "C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"
                                                                                                                                                                                                2⤵
                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                PID:3808
                                                                                                                                                                                            • C:\Users\Admin\Desktop\Shia Hacker School -Rat v1.0\shia hacker -rat.exe
                                                                                                                                                                                              "C:\Users\Admin\Desktop\Shia Hacker School -Rat v1.0\shia hacker -rat.exe"
                                                                                                                                                                                              1⤵
                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                              • Modifies registry class
                                                                                                                                                                                              • Suspicious behavior: GetForegroundWindowSpam
                                                                                                                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                              PID:1000
                                                                                                                                                                                            • C:\Users\Admin\Downloads\dedd.exe
                                                                                                                                                                                              "C:\Users\Admin\Downloads\dedd.exe"
                                                                                                                                                                                              1⤵
                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                              PID:4008
                                                                                                                                                                                            • C:\Users\Admin\Desktop\SaherBlueEagle_Splitter[RAT]\BlueEagleSplitterx.exe
                                                                                                                                                                                              "C:\Users\Admin\Desktop\SaherBlueEagle_Splitter[RAT]\BlueEagleSplitterx.exe"
                                                                                                                                                                                              1⤵
                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                              • Checks computer location settings
                                                                                                                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                              PID:2988
                                                                                                                                                                                              • C:\Users\Admin\Desktop\SaherBlueEagle_Splitter[RAT]\BlueEagleSplitter.exe
                                                                                                                                                                                                C:\Users\Admin\Desktop\SaherBlueEagle_Splitter[RAT]\BlueEagleSplitter.exe
                                                                                                                                                                                                2⤵
                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                • Checks computer location settings
                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                PID:308
                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Blueeagle_Splitter.exe
                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\Blueeagle_Splitter.exe"
                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                  • Modifies registry class
                                                                                                                                                                                                  • Suspicious behavior: GetForegroundWindowSpam
                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                  PID:4504
                                                                                                                                                                                                  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
                                                                                                                                                                                                    dw20.exe -x -s 3164
                                                                                                                                                                                                    4⤵
                                                                                                                                                                                                    • Drops file in Windows directory
                                                                                                                                                                                                    • Checks processor information in registry
                                                                                                                                                                                                    • Enumerates system info in registry
                                                                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                    PID:544
                                                                                                                                                                                            • C:\Users\Admin\Downloads\wat.exe
                                                                                                                                                                                              "C:\Users\Admin\Downloads\wat.exe"
                                                                                                                                                                                              1⤵
                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                              • Drops startup file
                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                              PID:704
                                                                                                                                                                                            • C:\Users\Admin\Downloads\wat.exe
                                                                                                                                                                                              "C:\Users\Admin\Downloads\wat.exe"
                                                                                                                                                                                              1⤵
                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                              • Drops startup file
                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                              PID:4464
                                                                                                                                                                                            • C:\Users\Admin\Downloads\why.exe
                                                                                                                                                                                              "C:\Users\Admin\Downloads\why.exe"
                                                                                                                                                                                              1⤵
                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                              • Drops startup file
                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                              PID:4736
                                                                                                                                                                                            • C:\Windows\system32\taskmgr.exe
                                                                                                                                                                                              "C:\Windows\system32\taskmgr.exe" /4
                                                                                                                                                                                              1⤵
                                                                                                                                                                                                PID:2872
                                                                                                                                                                                              • C:\Windows\system32\taskmgr.exe
                                                                                                                                                                                                "C:\Windows\system32\taskmgr.exe" /4
                                                                                                                                                                                                1⤵
                                                                                                                                                                                                  PID:3268
                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                  "C:\Windows\system32\cmd.exe"
                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                    PID:5276
                                                                                                                                                                                                    • C:\Windows\system32\Taskmgr.exe
                                                                                                                                                                                                      taskmgr.exe
                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                      • Suspicious use of NtCreateProcessExOtherParentProcess
                                                                                                                                                                                                      • Loads dropped DLL
                                                                                                                                                                                                      • Checks SCSI registry key(s)
                                                                                                                                                                                                      • Modifies registry class
                                                                                                                                                                                                      • Suspicious behavior: GetForegroundWindowSpam
                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                      PID:5476
                                                                                                                                                                                                  • C:\Windows\system32\werfault.exe
                                                                                                                                                                                                    werfault.exe /h /shared Global\23dd2da8fb00448b98fd6e5d3e5bfe8c /t 1936 /p 4736
                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                      PID:5676
                                                                                                                                                                                                    • C:\Windows\system32\werfault.exe
                                                                                                                                                                                                      werfault.exe /h /shared Global\19c5f1e2fcb9468ca6ed09581754f3d0 /t 4500 /p 704
                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                        PID:5744
                                                                                                                                                                                                      • C:\Users\Admin\Desktop\WARZONE 1.2 Cracked\WARZONE RAT 1.2x.exe
                                                                                                                                                                                                        "C:\Users\Admin\Desktop\WARZONE 1.2 Cracked\WARZONE RAT 1.2x.exe"
                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                        • Checks computer location settings
                                                                                                                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                        PID:928
                                                                                                                                                                                                        • C:\Users\Admin\Desktop\WARZONE 1.2 Cracked\WARZONE RAT 1.2.exe
                                                                                                                                                                                                          "C:\Users\Admin\Desktop\WARZONE 1.2 Cracked\WARZONE RAT 1.2.exe"
                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                          • Loads dropped DLL
                                                                                                                                                                                                          • Modifies registry class
                                                                                                                                                                                                          • Suspicious behavior: GetForegroundWindowSpam
                                                                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                          PID:3016
                                                                                                                                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://xakfor.net/forum/
                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                            • Adds Run key to start application
                                                                                                                                                                                                            • Enumerates system info in registry
                                                                                                                                                                                                            • Modifies registry class
                                                                                                                                                                                                            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                                                                                                                                                                            PID:2208
                                                                                                                                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffba88d46f8,0x7ffba88d4708,0x7ffba88d4718
                                                                                                                                                                                                              4⤵
                                                                                                                                                                                                                PID:704
                                                                                                                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,11728857712244453322,5817232458252506304,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:2
                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                  PID:552
                                                                                                                                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,11728857712244453322,5817232458252506304,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:3
                                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                                    PID:1804
                                                                                                                                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,11728857712244453322,5817232458252506304,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2708 /prefetch:8
                                                                                                                                                                                                                    4⤵
                                                                                                                                                                                                                      PID:5368
                                                                                                                                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,11728857712244453322,5817232458252506304,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3468 /prefetch:1
                                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                                        PID:4292
                                                                                                                                                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,11728857712244453322,5817232458252506304,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3476 /prefetch:1
                                                                                                                                                                                                                        4⤵
                                                                                                                                                                                                                          PID:5036
                                                                                                                                                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2128,11728857712244453322,5817232458252506304,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4904 /prefetch:8
                                                                                                                                                                                                                          4⤵
                                                                                                                                                                                                                            PID:4920
                                                                                                                                                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,11728857712244453322,5817232458252506304,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4972 /prefetch:1
                                                                                                                                                                                                                            4⤵
                                                                                                                                                                                                                              PID:4916
                                                                                                                                                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://xakfor.net/forum/
                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                            • Adds Run key to start application
                                                                                                                                                                                                                            • Enumerates system info in registry
                                                                                                                                                                                                                            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                                                                                                                                                                                            PID:2152
                                                                                                                                                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffba88d46f8,0x7ffba88d4708,0x7ffba88d4718
                                                                                                                                                                                                                              4⤵
                                                                                                                                                                                                                                PID:2340
                                                                                                                                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2272,8365253307317037100,3192445141293994984,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2280 /prefetch:2
                                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                                  PID:312
                                                                                                                                                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2272,8365253307317037100,3192445141293994984,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2332 /prefetch:3
                                                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                                                    PID:4148
                                                                                                                                                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2272,8365253307317037100,3192445141293994984,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:8
                                                                                                                                                                                                                                    4⤵
                                                                                                                                                                                                                                      PID:1588
                                                                                                                                                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2272,8365253307317037100,3192445141293994984,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:1
                                                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                                                        PID:5288
                                                                                                                                                                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2272,8365253307317037100,3192445141293994984,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:1
                                                                                                                                                                                                                                        4⤵
                                                                                                                                                                                                                                          PID:5240
                                                                                                                                                                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2272,8365253307317037100,3192445141293994984,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4340 /prefetch:8
                                                                                                                                                                                                                                          4⤵
                                                                                                                                                                                                                                            PID:6140
                                                                                                                                                                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2272,8365253307317037100,3192445141293994984,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4856 /prefetch:1
                                                                                                                                                                                                                                            4⤵
                                                                                                                                                                                                                                              PID:4948
                                                                                                                                                                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2272,8365253307317037100,3192445141293994984,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4568 /prefetch:1
                                                                                                                                                                                                                                              4⤵
                                                                                                                                                                                                                                                PID:3640
                                                                                                                                                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2272,8365253307317037100,3192445141293994984,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4292 /prefetch:1
                                                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                                                  PID:5940
                                                                                                                                                                                                                                          • C:\Windows\System32\CompPkgSrv.exe
                                                                                                                                                                                                                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                              PID:756
                                                                                                                                                                                                                                            • C:\Windows\System32\CompPkgSrv.exe
                                                                                                                                                                                                                                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                PID:5860
                                                                                                                                                                                                                                              • C:\Users\Admin\Downloads\Notable.exe
                                                                                                                                                                                                                                                "C:\Users\Admin\Downloads\Notable.exe"
                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                • Adds Run key to start application
                                                                                                                                                                                                                                                PID:1548
                                                                                                                                                                                                                                                • C:\ProgramData\services.exe
                                                                                                                                                                                                                                                  "C:\ProgramData\services.exe"
                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                  PID:2272

                                                                                                                                                                                                                                              Network

                                                                                                                                                                                                                                              MITRE ATT&CK Enterprise v6

                                                                                                                                                                                                                                              Replay Monitor

                                                                                                                                                                                                                                              Loading Replay Monitor...

                                                                                                                                                                                                                                              Downloads

                                                                                                                                                                                                                                              • C:\Users\Admin\Desktop\CompleteUnlock.docx

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                270KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                a779a0c9793c7ec344234be41527f7cd

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                f2f9ab4aa78fe61e1fea9e03f7c9aef5477cd26e

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                799bf0d4729429b656c61f05aff1a02e8faf618be09294f7df4733b6955b5c27

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                fc3c30f455f3089bc02448a9366897c8a5e6d2726d754a5b261efe6c7ba84f19aceaf6e92ee24acc913566fc64cb63ba7d10bebf0f4c85240212dbc446eddb83

                                                                                                                                                                                                                                              • C:\Users\Admin\Desktop\ConfirmWatch.wmv

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                235KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                47ad55b434d1699e1f56c3b4af5e1ea8

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                fd51c452b725f5d8bb4cb0cb73f4597d95acd0c0

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                f394c8c683290b47907ba28d271d7e599d94b98429dc9cacc1c383fdb4d80398

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                3a1f69f3a98f23f2a37e69f10833e804245c14ebe9212e828434e3941ba2ffe4492856b60719db2bed53af9bcf60607b80d51503181e748a054c73e72ba0ee2d

                                                                                                                                                                                                                                              • C:\Users\Admin\Desktop\ConvertToWait.dotx

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                108KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                dc9af1a85a3f51d5a294a55936229cd9

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                e44cfac85f6ed161e6c7f6fede27128f4f851ea8

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                9dad52c89afe5a4b188bec9ae2c53e6ed8deb628810e1cf0ef6e529de8258498

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                cd199eb93482b86bd38a6e9d4216212db224fa67f34e502aa6a4733bc53a9d287ec80efec1c9798fc0f93e4401334a7b7e9d8a63efd1b33aec45e01c9c7e994e

                                                                                                                                                                                                                                              • C:\Users\Admin\Desktop\CopyExit.vb

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                158KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                a4a49b0e9abc43e5b92713da4fe788ed

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                a748cb7a1f5b9a914158a0d2dab4cb63bc98032b

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                12898ae9bc4db182a00c6fa488da457ea03af3f5b9bfc01a7eab2fa09c053189

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                d6423fde06151f798c3293832a82ae3d86cde7fa3d9cc9ec5afb5c847bca0e783f39abbe86fefb0f3eef308cbc5938d83171da5ff9081ac32860886dd9aaeae9

                                                                                                                                                                                                                                              • C:\Users\Admin\Desktop\DenyUpdate.mpeg

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                165KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                0997bef510a35e9a3d1c89c508f3a98b

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                b1dfba42e10c63682eb208cde413003e6072abbf

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                a31bdb13f44bd6e365c6b575de93fa0b88e2df662e1c4bcfeff27adc9835fa0a

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                92271983fbea3482e088621f95ab73ad819bc4f592c5b082b6466ffe06c9f35b4fdd86543be18524491c9216eda2673afd86c8598721e825b9f39e8ece675cd1

                                                                                                                                                                                                                                              • C:\Users\Admin\Desktop\DisconnectMerge.ps1

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                249KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                5e69191648cd244533fe39a61baf611a

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                757f5e7c24f8dbb883c4c6f5f70c3c467b86dd34

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                2a186eabfc1f4107e9c20ccda60500931c4f5e2405686c4a9c2c402e11b9cd92

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                09c31a8b76b2c3e68cdb115a74d93a5de1388ec1f9eb9832d6966728c484c3f4aad0770950ffa7667a37dd0220a9d1e96a17b9cdad2ea81a6b014a3691fca301

                                                                                                                                                                                                                                              • C:\Users\Admin\Desktop\DismountGrant.dll

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                172KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                c1e08bbefb136c347079e36b4afdac88

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                17d922c887d1e3a350f56657c55d229bcafb3238

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                499a4925d80e0fbb008f4b7ad92226352b6b0faa1fa8988976b9c51df0b3875a

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                5dafaead13365d2d520e878d0ce7f235c45bc11914cafcc783c1c45513b8bb000a354826a5e7aeef54820b24a84d8014b161b266527249117336d49e34a25845

                                                                                                                                                                                                                                              • C:\Users\Admin\Desktop\GroupDismount.jpg

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                221KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                7392fda1b5836bf2ad76f8f826df2d41

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                820b9ff15638ef14f9552a479adb361378ec6791

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                7183e436980fadb6847f1ace46bf6eab6f2d00f5f951ed024ca3bdcf1b493759

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                4dedbc85f955db871ad399e2bdd86f378040ac8b55eb8dd8b774ea8894c7901dd158b9ff8e34192c5067a6dfc50b7076d2181210242c4d687f0fb66f04dd0e63

                                                                                                                                                                                                                                              • C:\Users\Admin\Desktop\MergeAdd.3g2

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                193KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                ce90e53109f750cc2dc221e7eb864363

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                c19443feff8c44db1e4a3d62e38533d2fdfdbbcf

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                f2e370702c05ad3e137a57b58543644c069c99f71b032004ce132f3f11966ad6

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                2455446aa24e1561a31eba73842db4214e4c2ddc694be70818876f28d83d3748410d757dbc57344a1a2378d198bc02de436c56eced4e72455dda48b8c7ecff5e

                                                                                                                                                                                                                                              • C:\Users\Admin\Desktop\MoveGroup.xhtml

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                94KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                6a6c66f6059a37be386206df81303a63

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                f5f17a59a49a167ad4aa7498a96529e5c21db3da

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                eff34fd34e4c54692aadf8f3e7b931f697fd9ad1d4494944329391449cf30272

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                d0af526381e55b1cf82cbf66902310825adf067f164f86627a4388e40aa75cf31629a8ea98c67aa1cae047e5533984eef53b685932b243ed9bffd5542ea2c0fc

                                                                                                                                                                                                                                              • C:\Users\Admin\Desktop\OpenExport.doc

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                151KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                e693a6f7a85832e5e79377404236957c

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                3dc4eb8a3a1af03d82cc9b6d82ccef33b779d8e8

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                15d4a0f95e231960dba3df9da1387305dcedbf0e0d29b47df1322cc5e89b805b

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                fda4e755bd64352a545e83b5f19e7d8d77bbcdcc24a31b73f4dc264157283054cdb7c7e59274dd69d5576109f9811624f960e2e2d40ad3af4e32d4478e808a44

                                                                                                                                                                                                                                              • C:\Users\Admin\Desktop\OpenFind.vstx

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                101KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                bcde1bb25aaf69d34526693ed3cb63de

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                2b8a80223184efd4edc0f2350d7d1e233220173a

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                763a1c157a044d133dd7aff25bb7f40b2de3ece3da7ee8a51b61f3103767b63a

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                5a942631e56fbeee8788fc3538021d6b78fbbf4469701639ac7a068b911d684f658d5e8ca877bbfa452ea12f6f9ef3a490e894b4773e6a344d02bf900738cfde

                                                                                                                                                                                                                                              • C:\Users\Admin\Desktop\PublishUnblock.TS

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                372KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                a1b9bec2353d4db71c438a70de19b985

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                f791a4314560cad7c6cc211655f6df01ae613a30

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                c420edc657a45fbd7dc0abf09e9f417d39868300bd49e3c1df381e5b0eae9cf5

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                cdaf929bc3e5fbcda551b62378c7b6eecbb1ec0dfdd31ccc8855cbfca96f0c9d8964cb34f8e9a9e0b33e83313d8f1e7b9e30b6de9571210981da5fc82679fbdd

                                                                                                                                                                                                                                              • C:\Users\Admin\Desktop\ReceiveUnlock.contact

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                256KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                0a2a99eed1bb99045eb093a792b78948

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                2cce8c8522cffae99962187d70186784cac283b8

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                48a07dfb509f0b8787ac2f87eed4cd25a251e91dc20bd7c03a033ceb105955ea

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                a48a4ec8d0b70c34c9ffb47de7e63c224e764180125d72f24564e10c64edde7b64657c24e23ef6c412c430423eb51f8535008c9d6b2dd76d0fae8b6db9bd033e

                                                                                                                                                                                                                                              • C:\Users\Admin\Desktop\RenameCheckpoint.txt

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                228KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                8a9cae02a0887ac52493da61ab72355b

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                cfe05da54a268c53322e147201f2d7ee7f0d4536

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                f0fda0d7e526ff4cc82fe8c013cc8467e2e0e917180c7623840005b1247e0922

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                abe7c4b3d33bdb9ce2a096ee110a5be1d993ef709448ef51b9f97a3c95d9afc4997f2bab470088c8385ee1635620a476dccde7c877929ee41c5b2973b7f89bd0

                                                                                                                                                                                                                                              • C:\Users\Admin\Desktop\RepairWait.css

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                242KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                a72608775e9b273ed20989bf825e2d82

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                dbd5caa79f7b6c17f473540834bc0fbee59d4e05

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                bfdb130708a386325217176ee4a1800f2f1fad461a61da732cef29225540ec96

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                1f50657c9bda934aa6388190c9bad78203b3861ba5e70445fbe8e17729e53bf47c2684b743a56011c7beb403dffa46775fdcc160eec2e104ee2c99c1df942e1f

                                                                                                                                                                                                                                              • C:\Users\Admin\Desktop\ResetConvert.ogg

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                263KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                be636027f08a1eb98fd23aa342923072

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                42a2db89af936cc8de0c497a0b04c0fd35f26767

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                84ce77ae7afa8b8e971dc5d2e87a38d24966637c7aed4e54084de6518925b66f

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                f577e2f48f97261a27efbe30107d8406c518d043a0c5845d5e302e69ef70406ab1fa5cfb20cdaafcf709463286438a7ef59f2880c95b9c08fb7d2c20c778bd55

                                                                                                                                                                                                                                              • C:\Users\Admin\Desktop\ResetJoin.xhtml

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                122KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                bbbbae6860f0475c9ad659acad9d569e

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                9de8bd7f37d01192133864f5225a2239ee1aa19e

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                cee4cdeac7ef85e2f5124efaeb4cd8a43deaf54014ed8b490d3210e06344427c

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                d709dc6a41e0058f318fcd65c9803200dd833a6dff620f38cd0ea8e5d4f238897fde1c1ec10c0a8bc0850e300ae06ee6d1ec9c286ff216ff019c2db83ae92e2c

                                                                                                                                                                                                                                              • C:\Users\Admin\Desktop\ResumeExpand.docm

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                129KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                2c535d4d964758483c5b37c2ebf7b93b

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                559c5b5a95f960afc4817114c11df2e86ac717f9

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                0f4332fe0eeb0bf11f88409e866139fe4e4cf0d00b1f264c59230399eafbda13

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                5b872ec908228f80075d1b5670598731b2868241499f42df04d2d5cbf0a4f3ad7ea1f31a71a499fb540f09d8a522d233f8777abd41ee608dc2672fdf5ec4a99d

                                                                                                                                                                                                                                              • C:\Users\Admin\Desktop\SplitSubmit.odp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                115KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                558d8e32685dcf92110154f78e773b37

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                71b23f41356ed5adf09094bd9f187e4b0ce432bd

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                92644fb72426e94f88887d9eba28ceaad165e938cd9f7c791e33f3e0994b68db

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                74f21f562fe80777500820727c5beebb32be622bf39db41a4ec3dcc5f34d6169a71799c6e92b881ba247a6b13f86488926a142bfdf3df9c58cc8e0e9d9968bb3

                                                                                                                                                                                                                                              • C:\Users\Admin\Desktop\StartOptimize.jtx

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                136KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                3a14f4f7a8f8640d4b106fd0acd991bd

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                3fdb65d3c5647d2a957de6d7770a0af818df2171

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                c62eb6638b6fa2fc773ed62d90b5de4c94bedebd7f9b13262a859f69b5537b2d

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                5307284b8e3d1c4357d73c9cdf37b04f5c59795e1d69bd34b72c52c46fc9384cca293919e1d283a12997bee9fa86d12a9ed8d794111411861e8dd85dc7f9370c

                                                                                                                                                                                                                                              • C:\Users\Admin\Desktop\StopSplit.dll

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                186KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                54637253afa91d5ed5c35ce121ad0aa7

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                51d9fab15d0ba5d6775f8d0c8fade2af53311ffe

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                fded0a976afd0fcb9fc56c0c249f25b2a1a8f529c9a97b4b69e4b3cd710a9e0a

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                f6c2aaaefb65ea4d2764c09aa267ee7f0957065ed86e5426cec3f641a0a9cc1818162b855353a2720f50290792d129f45c8604444cc6abfee53f9c8e5cfde187

                                                                                                                                                                                                                                              • C:\Users\Admin\Desktop\SuspendExit.m3u

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                200KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                8d23cf6716cc8a559557fcb4150f1cfa

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                ebc26329c2ece06bf6963a03736534a9d67bddc0

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                c380036421fcbaf91ad0eb22dc5eb5deaf215601ab0fe8b72548fa82a349ac54

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                17186d3333e741b95f68779454ae4347c35c18b62b7a7e235007e4b9570370474ed0e28447b209c8e88892f4a0fb0e307ae9c41311a4426894c3a374ea9a6bfd

                                                                                                                                                                                                                                              • C:\Users\Admin\Desktop\UnblockProtect.txt

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                207KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                5bc7165a134f579ed2d310cec9a35c7e

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                ce7d7726a9a1d82929a92e70ec4b101a12c663bf

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                453528615ca397c9015f6d5099802dec8d5da0adea48ca177641c77e0f8dbf0a

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                fcff1554956297fdbe4784eba89eaa565510c127efcf46043047dba44e5096a7ca651cb48213fa30a8ef836ca2af9e0ebfd12542a04831bdafc67cfbfb154c5c

                                                                                                                                                                                                                                              • C:\Users\Admin\Desktop\UndoWatch.crw

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                143KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                e1863fff33f4a7bcc4e2793bb041a8a8

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                b033eefb1bd6d8a8f818cf7736b1129032d7a43c

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                cdbf7def6a71ecd7bf419df12545e1a0fb85b930febe211455014c3f211724a7

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                74d05dc9f8976f79a61488f393632bf30e9dfd0ff9aa6109f268fdbfffa10fd9bced64166cb963c41a5c282e737f26d2f90b1f0d3dc72070aa4259ac112487f6

                                                                                                                                                                                                                                              • C:\Users\Admin\Desktop\UnpublishMerge.cfg

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                214KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                f7e6ac77ffea61e7ec53af63f0e592d4

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                835a7f3c4b68b7509c69f8b01ad9d14ebf8672f5

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                64a9b75cdd59828919257f7922574cf529a40c9b0e33240c8162462fce3ff5d3

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                f4c198a45718c3a13bf559c32ea6114ef39925400db32222a4c2f30f1e0fbb85cec7e0c120ffe2b93598123d8799b08d8f966640dd15520718d822dd93d412e8

                                                                                                                                                                                                                                              • C:\Users\Admin\Desktop\UnregisterMove.tiff

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                179KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                a4ae099563e458c9c27b678780cef715

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                bd2d6b9523602d241f1b977c3530edb9951b55d6

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                48dea1d6027ff14b3717bdc471c317cdb92a9a0609fa2a9ed60dd9042243f44a

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                f5e49e4e8b068e2ce6720b7be28147600d4e009f1017f2ce72d80d3a3589d4f471a836610f6f6aedc5f9ae94d65f3481e12772ac7b7057f28dc43f42696fc5d2

                                                                                                                                                                                                                                              • memory/308-282-0x00000000011A0000-0x000000000150A000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                3.4MB

                                                                                                                                                                                                                                              • memory/308-273-0x00000000011A0000-0x000000000150A000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                3.4MB

                                                                                                                                                                                                                                              • memory/308-299-0x00000000011A0000-0x000000000150A000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                3.4MB

                                                                                                                                                                                                                                              • memory/308-298-0x00000000011A0000-0x000000000150A000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                3.4MB

                                                                                                                                                                                                                                              • memory/308-297-0x00000000011A0000-0x000000000150A000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                3.4MB

                                                                                                                                                                                                                                              • memory/308-296-0x00000000011A0000-0x000000000150A000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                3.4MB

                                                                                                                                                                                                                                              • memory/308-295-0x00000000011A0000-0x000000000150A000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                3.4MB

                                                                                                                                                                                                                                              • memory/308-294-0x00000000011A0000-0x000000000150A000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                3.4MB

                                                                                                                                                                                                                                              • memory/308-293-0x00000000011A0000-0x000000000150A000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                3.4MB

                                                                                                                                                                                                                                              • memory/308-292-0x00000000011A0000-0x000000000150A000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                3.4MB

                                                                                                                                                                                                                                              • memory/308-291-0x00000000011A0000-0x000000000150A000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                3.4MB

                                                                                                                                                                                                                                              • memory/308-290-0x00000000011A0000-0x000000000150A000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                3.4MB

                                                                                                                                                                                                                                              • memory/308-289-0x00000000011A0000-0x000000000150A000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                3.4MB

                                                                                                                                                                                                                                              • memory/308-288-0x00000000011A0000-0x000000000150A000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                3.4MB

                                                                                                                                                                                                                                              • memory/308-287-0x00000000011A0000-0x000000000150A000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                3.4MB

                                                                                                                                                                                                                                              • memory/308-307-0x0000000074BA0000-0x0000000075151000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                5.7MB

                                                                                                                                                                                                                                              • memory/308-286-0x00000000011A0000-0x000000000150A000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                3.4MB

                                                                                                                                                                                                                                              • memory/308-285-0x00000000011A0000-0x000000000150A000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                3.4MB

                                                                                                                                                                                                                                              • memory/308-284-0x00000000011A0000-0x000000000150A000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                3.4MB

                                                                                                                                                                                                                                              • memory/308-283-0x00000000011A0000-0x000000000150A000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                3.4MB

                                                                                                                                                                                                                                              • memory/308-281-0x00000000011A0000-0x000000000150A000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                3.4MB

                                                                                                                                                                                                                                              • memory/308-278-0x00000000011A0000-0x000000000150A000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                3.4MB

                                                                                                                                                                                                                                              • memory/308-280-0x00000000011A0000-0x000000000150A000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                3.4MB

                                                                                                                                                                                                                                              • memory/308-247-0x00000000011A0000-0x000000000150A000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                3.4MB

                                                                                                                                                                                                                                              • memory/308-279-0x00000000011A0000-0x000000000150A000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                3.4MB

                                                                                                                                                                                                                                              • memory/308-250-0x00000000011A0000-0x000000000150A000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                3.4MB

                                                                                                                                                                                                                                              • memory/308-251-0x00000000011A0000-0x000000000150A000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                3.4MB

                                                                                                                                                                                                                                              • memory/308-277-0x00000000011A0000-0x000000000150A000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                3.4MB

                                                                                                                                                                                                                                              • memory/308-276-0x00000000011A0000-0x000000000150A000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                3.4MB

                                                                                                                                                                                                                                              • memory/308-252-0x0000000074BA0000-0x0000000075151000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                5.7MB

                                                                                                                                                                                                                                              • memory/308-275-0x00000000011A0000-0x000000000150A000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                3.4MB

                                                                                                                                                                                                                                              • memory/308-253-0x00000000011A0000-0x000000000150A000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                3.4MB

                                                                                                                                                                                                                                              • memory/308-274-0x00000000011A0000-0x000000000150A000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                3.4MB

                                                                                                                                                                                                                                              • memory/308-254-0x00000000011A0000-0x000000000150A000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                3.4MB

                                                                                                                                                                                                                                              • memory/308-272-0x00000000011A0000-0x000000000150A000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                3.4MB

                                                                                                                                                                                                                                              • memory/308-255-0x00000000011A0000-0x000000000150A000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                3.4MB

                                                                                                                                                                                                                                              • memory/308-256-0x00000000011A0000-0x000000000150A000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                3.4MB

                                                                                                                                                                                                                                              • memory/308-258-0x00000000011A0000-0x000000000150A000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                3.4MB

                                                                                                                                                                                                                                              • memory/308-271-0x00000000011A0000-0x000000000150A000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                3.4MB

                                                                                                                                                                                                                                              • memory/308-270-0x00000000011A0000-0x000000000150A000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                3.4MB

                                                                                                                                                                                                                                              • memory/308-268-0x00000000011A0000-0x000000000150A000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                3.4MB

                                                                                                                                                                                                                                              • memory/308-259-0x00000000011A0000-0x000000000150A000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                3.4MB

                                                                                                                                                                                                                                              • memory/308-269-0x00000000011A0000-0x000000000150A000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                3.4MB

                                                                                                                                                                                                                                              • memory/308-267-0x00000000011A0000-0x000000000150A000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                3.4MB

                                                                                                                                                                                                                                              • memory/308-266-0x00000000011A0000-0x000000000150A000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                3.4MB

                                                                                                                                                                                                                                              • memory/308-265-0x00000000011A0000-0x000000000150A000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                3.4MB

                                                                                                                                                                                                                                              • memory/308-264-0x00000000011A0000-0x000000000150A000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                3.4MB

                                                                                                                                                                                                                                              • memory/308-260-0x00000000011A0000-0x000000000150A000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                3.4MB

                                                                                                                                                                                                                                              • memory/308-263-0x00000000011A0000-0x000000000150A000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                3.4MB

                                                                                                                                                                                                                                              • memory/308-262-0x00000000011A0000-0x000000000150A000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                3.4MB

                                                                                                                                                                                                                                              • memory/308-257-0x00000000011A0000-0x000000000150A000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                3.4MB

                                                                                                                                                                                                                                              • memory/308-261-0x00000000011A0000-0x000000000150A000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                3.4MB

                                                                                                                                                                                                                                              • memory/376-236-0x00007FFBA1690000-0x00007FFBA20C6000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                10.2MB

                                                                                                                                                                                                                                              • memory/440-191-0x00000000004C0000-0x0000000000632000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                1.4MB

                                                                                                                                                                                                                                              • memory/440-203-0x00007FFBA50D0000-0x00007FFBA5B91000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                10.8MB

                                                                                                                                                                                                                                              • memory/440-217-0x00007FFBA50D0000-0x00007FFBA5B91000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                10.8MB

                                                                                                                                                                                                                                              • memory/440-192-0x00007FFBA50D0000-0x00007FFBA5B91000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                10.8MB

                                                                                                                                                                                                                                              • memory/440-195-0x0000000000F10000-0x0000000000F4E000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                248KB

                                                                                                                                                                                                                                              • memory/440-197-0x000000001EA90000-0x000000001EAA0000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                64KB

                                                                                                                                                                                                                                              • memory/700-202-0x00000171411A0000-0x00000171411B0000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                64KB

                                                                                                                                                                                                                                              • memory/700-201-0x0000017141160000-0x0000017141170000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                64KB

                                                                                                                                                                                                                                              • memory/996-216-0x0000000006BB0000-0x0000000006BBA000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                40KB

                                                                                                                                                                                                                                              • memory/1000-242-0x00007FFBA1690000-0x00007FFBA20C6000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                10.2MB

                                                                                                                                                                                                                                              • memory/1360-226-0x00000000004A0000-0x00000000006CC000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                2.2MB

                                                                                                                                                                                                                                              • memory/1360-227-0x0000000004F90000-0x0000000004FD0000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                256KB

                                                                                                                                                                                                                                              • memory/1588-229-0x0000000008BB0000-0x0000000008BFC000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                304KB

                                                                                                                                                                                                                                              • memory/1588-230-0x00000000061C0000-0x00000000061CC000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                48KB

                                                                                                                                                                                                                                              • memory/2236-205-0x0000000021EA0000-0x0000000021EEC000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                304KB

                                                                                                                                                                                                                                              • memory/2236-206-0x000000001B710000-0x000000001B72A000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                104KB

                                                                                                                                                                                                                                              • memory/2236-221-0x000000001B139000-0x000000001B13F000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                24KB

                                                                                                                                                                                                                                              • memory/2236-219-0x000000001B139000-0x000000001B13F000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                24KB

                                                                                                                                                                                                                                              • memory/2236-218-0x000000001B139000-0x000000001B13F000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                24KB

                                                                                                                                                                                                                                              • memory/2236-222-0x00007FFBA50D0000-0x00007FFBA5B91000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                10.8MB

                                                                                                                                                                                                                                              • memory/2236-204-0x00007FFBA50D0000-0x00007FFBA5B91000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                10.8MB

                                                                                                                                                                                                                                              • memory/2236-198-0x00007FFBA50D0000-0x00007FFBA5B91000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                10.8MB

                                                                                                                                                                                                                                              • memory/2372-239-0x0000000074BA0000-0x0000000075151000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                5.7MB

                                                                                                                                                                                                                                              • memory/2372-237-0x0000000074BA0000-0x0000000075151000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                5.7MB

                                                                                                                                                                                                                                              • memory/3016-1587-0x0000000008E60000-0x0000000009E60000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                16.0MB

                                                                                                                                                                                                                                              • memory/3016-1564-0x0000000008E60000-0x0000000009E60000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                16.0MB

                                                                                                                                                                                                                                              • memory/3016-1584-0x0000000008E60000-0x0000000009E60000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                16.0MB

                                                                                                                                                                                                                                              • memory/3016-1585-0x0000000008E60000-0x0000000009E60000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                16.0MB

                                                                                                                                                                                                                                              • memory/3016-1586-0x0000000008E60000-0x0000000009E60000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                16.0MB

                                                                                                                                                                                                                                              • memory/3016-1545-0x0000000009790000-0x0000000009CBC000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                5.2MB

                                                                                                                                                                                                                                              • memory/3016-1588-0x0000000008E60000-0x0000000009E60000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                16.0MB

                                                                                                                                                                                                                                              • memory/3016-1589-0x0000000005787000-0x000000000578E000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                28KB

                                                                                                                                                                                                                                              • memory/3016-1590-0x0000000008E60000-0x0000000009E60000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                16.0MB

                                                                                                                                                                                                                                              • memory/3016-1591-0x0000000005787000-0x000000000578E000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                28KB

                                                                                                                                                                                                                                              • memory/3016-1546-0x0000000005789000-0x000000000578F000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                24KB

                                                                                                                                                                                                                                              • memory/3016-1592-0x0000000008E60000-0x0000000009E60000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                16.0MB

                                                                                                                                                                                                                                              • memory/3016-1593-0x0000000008E60000-0x0000000009E60000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                16.0MB

                                                                                                                                                                                                                                              • memory/3016-1544-0x0000000005E30000-0x0000000005F14000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                912KB

                                                                                                                                                                                                                                              • memory/3016-1543-0x00000000056F0000-0x00000000056FC000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                48KB

                                                                                                                                                                                                                                              • memory/3016-1594-0x0000000008E60000-0x0000000009E60000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                16.0MB

                                                                                                                                                                                                                                              • memory/3016-1595-0x0000000008E60000-0x0000000009E60000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                16.0MB

                                                                                                                                                                                                                                              • memory/3016-1547-0x0000000008E60000-0x0000000009E60000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                16.0MB

                                                                                                                                                                                                                                              • memory/3016-1542-0x0000000000C30000-0x000000000124A000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                6.1MB

                                                                                                                                                                                                                                              • memory/3016-1553-0x0000000005789000-0x000000000578F000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                24KB

                                                                                                                                                                                                                                              • memory/3808-240-0x0000000074BA0000-0x0000000075151000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                5.7MB

                                                                                                                                                                                                                                              • memory/3808-241-0x0000000074BA0000-0x0000000075151000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                5.7MB

                                                                                                                                                                                                                                              • memory/3808-245-0x0000000074BA0000-0x0000000075151000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                5.7MB

                                                                                                                                                                                                                                              • memory/4008-244-0x0000000074BA0000-0x0000000075151000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                5.7MB

                                                                                                                                                                                                                                              • memory/4008-243-0x0000000074BA0000-0x0000000075151000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                5.7MB

                                                                                                                                                                                                                                              • memory/4052-231-0x00007FFBA1690000-0x00007FFBA20C6000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                10.2MB

                                                                                                                                                                                                                                              • memory/4504-846-0x0000000074BA0000-0x0000000075151000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                5.7MB

                                                                                                                                                                                                                                              • memory/4504-338-0x0000000074BA0000-0x0000000075151000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                5.7MB

                                                                                                                                                                                                                                              • memory/4504-1538-0x0000000074BA0000-0x0000000075151000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                5.7MB

                                                                                                                                                                                                                                              • memory/4508-211-0x00000000064D0000-0x00000000064E2000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                72KB

                                                                                                                                                                                                                                              • memory/4508-208-0x0000000005B80000-0x0000000006124000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                5.6MB

                                                                                                                                                                                                                                              • memory/4508-212-0x0000000006900000-0x000000000693C000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                240KB

                                                                                                                                                                                                                                              • memory/4508-207-0x0000000000CA0000-0x0000000000CFE000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                376KB

                                                                                                                                                                                                                                              • memory/4508-210-0x00000000056C0000-0x0000000005726000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                408KB

                                                                                                                                                                                                                                              • memory/4508-209-0x0000000005740000-0x00000000057D2000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                584KB

                                                                                                                                                                                                                                              • memory/5088-182-0x0000000000400000-0x0000000000DCB000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                9.8MB

                                                                                                                                                                                                                                              • memory/5088-181-0x0000000000400000-0x0000000000DCB000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                9.8MB

                                                                                                                                                                                                                                              • memory/5088-185-0x0000000000400000-0x0000000000DCB000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                9.8MB

                                                                                                                                                                                                                                              • memory/5088-200-0x0000000000400000-0x0000000000DCB000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                9.8MB

                                                                                                                                                                                                                                              • memory/5088-199-0x0000000000400000-0x0000000000DCB000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                9.8MB

                                                                                                                                                                                                                                              • memory/5088-186-0x0000000000400000-0x0000000000DCB000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                9.8MB

                                                                                                                                                                                                                                              • memory/5088-194-0x0000000000400000-0x0000000000DCB000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                9.8MB

                                                                                                                                                                                                                                              • memory/5088-193-0x0000000000400000-0x0000000000DCB000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                9.8MB

                                                                                                                                                                                                                                              • memory/5088-189-0x0000000000400000-0x0000000000DCB000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                9.8MB

                                                                                                                                                                                                                                              • memory/5088-188-0x0000000000400000-0x0000000000DCB000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                9.8MB

                                                                                                                                                                                                                                              • memory/5088-187-0x0000000000400000-0x0000000000DCB000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                9.8MB