Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    157s
  • platform
    windows10-1703_x64
  • resource
    win10-20230915-en
  • resource tags

    arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system
  • submitted
    18/09/2023, 05:03

General

  • Target

    cac937cc0a22ebdaf3d48b71cc09ef8e0a171a191c5e5ec107e7b97f1770a681.exe

  • Size

    1.4MB

  • MD5

    eef4e2a2eab0126d6d18cf6ee72e8aac

  • SHA1

    6bbe865a2ae9ddd5360647c101c6f906b2691f4b

  • SHA256

    cac937cc0a22ebdaf3d48b71cc09ef8e0a171a191c5e5ec107e7b97f1770a681

  • SHA512

    3f44473339619e9ce098b54957ee9d225295435d37e2ca050708d9932cef8c26fdc0c80a60b95ca0ea6716d45fbe7417268c93e6240d70a197914d8edc2f8693

  • SSDEEP

    24576:C09xpUW51hhXWno0ynuOEkEL0l7JzSpLPdqBvyxwOiNI6LjkRSjE3iQ:C09LpLTRjnB1pxMpLFqBb5LjkRwQ

Malware Config

Extracted

Family

amadey

Version

3.89

C2

http://77.91.68.52/mac/index.php

http://77.91.68.78/help/index.php

Attributes
  • install_dir

    fefffe8cea

  • install_file

    explonde.exe

  • strings_key

    916aae73606d7a9e02a1d3b47c199688

rc4.plain
rc4.plain

Extracted

Family

redline

Botnet

monik

C2

77.91.124.82:19071

Attributes
  • auth_value

    da7d9ea0878f5901f1f8319d34bdccea

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Extracted

Family

smokeloader

Botnet

up3

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

0305

C2

185.215.113.25:10195

Attributes
  • auth_value

    c86205ff1cc37b2da12f0190adfda52c

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Detect Fabookie payload 2 IoCs
  • Detected google phishing page
  • Detects Healer an antivirus disabler dropper 1 IoCs
  • Fabookie

    Fabookie is facebook account info stealer.

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 13 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Windows security bypass 2 TTPs 7 IoCs
  • Downloads MZ/PE file
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 34 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 7 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 7 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Drops file in System32 directory 8 IoCs
  • Suspicious use of SetThreadContext 8 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 2 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 9 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 4 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\cac937cc0a22ebdaf3d48b71cc09ef8e0a171a191c5e5ec107e7b97f1770a681.exe
    "C:\Users\Admin\AppData\Local\Temp\cac937cc0a22ebdaf3d48b71cc09ef8e0a171a191c5e5ec107e7b97f1770a681.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4744
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
        PID:4132
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        2⤵
          PID:2848
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          2⤵
            PID:3412
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            2⤵
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:4416
            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1211543.exe
              C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1211543.exe
              3⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious use of WriteProcessMemory
              PID:628
              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8185761.exe
                C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8185761.exe
                4⤵
                • Executes dropped EXE
                • Adds Run key to start application
                • Suspicious use of WriteProcessMemory
                PID:4808
                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4860174.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4860174.exe
                  5⤵
                  • Executes dropped EXE
                  • Adds Run key to start application
                  • Suspicious use of WriteProcessMemory
                  PID:2164
                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z0283938.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z0283938.exe
                    6⤵
                    • Executes dropped EXE
                    • Adds Run key to start application
                    • Suspicious use of WriteProcessMemory
                    PID:3168
                    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9683739.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9683739.exe
                      7⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      • Suspicious use of WriteProcessMemory
                      PID:68
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                        8⤵
                          PID:704
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                          8⤵
                          • Modifies Windows Defender Real-time Protection settings
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4460
                      • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r5293859.exe
                        C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r5293859.exe
                        7⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        • Suspicious use of WriteProcessMemory
                        PID:3388
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                          8⤵
                            PID:3408
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 3408 -s 568
                              9⤵
                              • Program crash
                              PID:3728
                      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s9951352.exe
                        C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s9951352.exe
                        6⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        • Suspicious use of WriteProcessMemory
                        PID:1304
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                          7⤵
                          • Checks SCSI registry key(s)
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious behavior: MapViewOfSection
                          PID:4636
                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t5865263.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t5865263.exe
                      5⤵
                      • Executes dropped EXE
                      PID:1916
                      • C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe
                        "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"
                        6⤵
                        • Executes dropped EXE
                        PID:4420
                        • C:\Windows\SysWOW64\schtasks.exe
                          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explonde.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe" /F
                          7⤵
                          • Creates scheduled task(s)
                          PID:4348
                        • C:\Windows\SysWOW64\cmd.exe
                          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explonde.exe" /P "Admin:N"&&CACLS "explonde.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit
                          7⤵
                            PID:4168
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                              8⤵
                                PID:4436
                              • C:\Windows\SysWOW64\cacls.exe
                                CACLS "explonde.exe" /P "Admin:N"
                                8⤵
                                  PID:5092
                                • C:\Windows\SysWOW64\cacls.exe
                                  CACLS "explonde.exe" /P "Admin:R" /E
                                  8⤵
                                    PID:1484
                                  • C:\Windows\SysWOW64\cmd.exe
                                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                    8⤵
                                      PID:4476
                                    • C:\Windows\SysWOW64\cacls.exe
                                      CACLS "..\fefffe8cea" /P "Admin:N"
                                      8⤵
                                        PID:4452
                                      • C:\Windows\SysWOW64\cacls.exe
                                        CACLS "..\fefffe8cea" /P "Admin:R" /E
                                        8⤵
                                          PID:4052
                                      • C:\Windows\SysWOW64\rundll32.exe
                                        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                                        7⤵
                                        • Loads dropped DLL
                                        PID:2632
                                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u4171705.exe
                                  C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u4171705.exe
                                  4⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetThreadContext
                                  PID:4848
                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                                    5⤵
                                      PID:4232
                                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w6464131.exe
                                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w6464131.exe
                                  3⤵
                                  • Executes dropped EXE
                                  PID:3672
                                  • C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe
                                    "C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"
                                    4⤵
                                    • Executes dropped EXE
                                    PID:3400
                                    • C:\Windows\SysWOW64\schtasks.exe
                                      "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legota.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe" /F
                                      5⤵
                                      • Creates scheduled task(s)
                                      PID:4008
                                    • C:\Windows\SysWOW64\cmd.exe
                                      "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legota.exe" /P "Admin:N"&&CACLS "legota.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb378487cf" /P "Admin:N"&&CACLS "..\cb378487cf" /P "Admin:R" /E&&Exit
                                      5⤵
                                        PID:956
                                        • C:\Windows\SysWOW64\cmd.exe
                                          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                          6⤵
                                            PID:1472
                                          • C:\Windows\SysWOW64\cacls.exe
                                            CACLS "legota.exe" /P "Admin:N"
                                            6⤵
                                              PID:4200
                                            • C:\Windows\SysWOW64\cacls.exe
                                              CACLS "legota.exe" /P "Admin:R" /E
                                              6⤵
                                                PID:3764
                                              • C:\Windows\SysWOW64\cmd.exe
                                                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                6⤵
                                                  PID:4024
                                                • C:\Windows\SysWOW64\cacls.exe
                                                  CACLS "..\cb378487cf" /P "Admin:N"
                                                  6⤵
                                                    PID:2144
                                                  • C:\Windows\SysWOW64\cacls.exe
                                                    CACLS "..\cb378487cf" /P "Admin:R" /E
                                                    6⤵
                                                      PID:2680
                                                  • C:\Users\Admin\AppData\Local\Temp\1000048001\rockss.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\1000048001\rockss.exe"
                                                    5⤵
                                                    • Executes dropped EXE
                                                    PID:3928
                                                    • C:\Users\Admin\AppData\Local\Temp\ss41.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\ss41.exe"
                                                      6⤵
                                                      • Executes dropped EXE
                                                      PID:4844
                                                    • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"
                                                      6⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of SetThreadContext
                                                      PID:2492
                                                      • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"
                                                        7⤵
                                                        • Executes dropped EXE
                                                        • Checks SCSI registry key(s)
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious behavior: MapViewOfSection
                                                        PID:4328
                                                    • C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"
                                                      6⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:3992
                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        powershell -nologo -noprofile
                                                        7⤵
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:68
                                                      • C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"
                                                        7⤵
                                                        • Windows security bypass
                                                        • Executes dropped EXE
                                                        • Windows security modification
                                                        • Adds Run key to start application
                                                        • Checks for VirtualBox DLLs, possible anti-VM trick
                                                        • Drops file in Windows directory
                                                        • Modifies data under HKEY_USERS
                                                        PID:3856
                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                          powershell -nologo -noprofile
                                                          8⤵
                                                          • Drops file in System32 directory
                                                          • Modifies data under HKEY_USERS
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:4600
                                                        • C:\Windows\System32\cmd.exe
                                                          C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
                                                          8⤵
                                                            PID:3304
                                                            • C:\Windows\system32\netsh.exe
                                                              netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                                                              9⤵
                                                              • Modifies Windows Firewall
                                                              • Modifies data under HKEY_USERS
                                                              PID:2392
                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            powershell -nologo -noprofile
                                                            8⤵
                                                            • Drops file in System32 directory
                                                            • Modifies data under HKEY_USERS
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:1916
                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            powershell -nologo -noprofile
                                                            8⤵
                                                            • Drops file in System32 directory
                                                            • Modifies data under HKEY_USERS
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:4256
                                                          • C:\Windows\rss\csrss.exe
                                                            C:\Windows\rss\csrss.exe
                                                            8⤵
                                                            • Executes dropped EXE
                                                            • Adds Run key to start application
                                                            • Manipulates WinMonFS driver.
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:2096
                                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                              powershell -nologo -noprofile
                                                              9⤵
                                                              • Drops file in System32 directory
                                                              • Modifies data under HKEY_USERS
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:1104
                                                            • C:\Windows\SYSTEM32\schtasks.exe
                                                              schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                                                              9⤵
                                                              • Creates scheduled task(s)
                                                              PID:4880
                                                            • C:\Windows\SYSTEM32\schtasks.exe
                                                              schtasks /delete /tn ScheduledUpdate /f
                                                              9⤵
                                                                PID:4436
                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                powershell -nologo -noprofile
                                                                9⤵
                                                                • Drops file in System32 directory
                                                                • Modifies data under HKEY_USERS
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:3520
                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                powershell -nologo -noprofile
                                                                9⤵
                                                                • Drops file in System32 directory
                                                                • Modifies data under HKEY_USERS
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:4240
                                                              • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                                                                C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
                                                                9⤵
                                                                • Executes dropped EXE
                                                                PID:380
                                                              • C:\Windows\SYSTEM32\schtasks.exe
                                                                schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                                                                9⤵
                                                                • Creates scheduled task(s)
                                                                PID:2260
                                                      • C:\Windows\SysWOW64\rundll32.exe
                                                        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
                                                        5⤵
                                                        • Loads dropped DLL
                                                        PID:2028
                                              • C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe
                                                C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe
                                                1⤵
                                                • Executes dropped EXE
                                                PID:3940
                                              • C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe
                                                C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe
                                                1⤵
                                                • Executes dropped EXE
                                                PID:2836
                                              • C:\Users\Admin\AppData\Local\Temp\4A5D.exe
                                                C:\Users\Admin\AppData\Local\Temp\4A5D.exe
                                                1⤵
                                                • Executes dropped EXE
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:4840
                                              • C:\Users\Admin\AppData\Local\Temp\4CCF.exe
                                                C:\Users\Admin\AppData\Local\Temp\4CCF.exe
                                                1⤵
                                                • Executes dropped EXE
                                                PID:4968
                                              • C:\Users\Admin\AppData\Local\Temp\50F7.exe
                                                C:\Users\Admin\AppData\Local\Temp\50F7.exe
                                                1⤵
                                                • Executes dropped EXE
                                                PID:204
                                                • C:\Windows\SysWOW64\regsvr32.exe
                                                  "C:\Windows\System32\regsvr32.exe" /u .\Hhv95Iy.dDr -s
                                                  2⤵
                                                  • Loads dropped DLL
                                                  PID:4760
                                              • C:\Windows\system32\cmd.exe
                                                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\52AD.bat" "
                                                1⤵
                                                • Checks computer location settings
                                                PID:1940
                                              • C:\Users\Admin\AppData\Local\Temp\5790.exe
                                                C:\Users\Admin\AppData\Local\Temp\5790.exe
                                                1⤵
                                                • Executes dropped EXE
                                                • Suspicious use of SetThreadContext
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:3992
                                                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
                                                  C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
                                                  2⤵
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:3764
                                              • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
                                                "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
                                                1⤵
                                                • Drops file in Windows directory
                                                • Modifies registry class
                                                • Suspicious use of SetWindowsHookEx
                                                PID:4016
                                              • C:\Windows\system32\browser_broker.exe
                                                C:\Windows\system32\browser_broker.exe -Embedding
                                                1⤵
                                                • Modifies Internet Explorer settings
                                                PID:4896
                                              • C:\Users\Admin\AppData\Local\Temp\6685.exe
                                                C:\Users\Admin\AppData\Local\Temp\6685.exe
                                                1⤵
                                                • Executes dropped EXE
                                                PID:2680
                                                • C:\Users\Admin\AppData\Local\Temp\ss41.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\ss41.exe"
                                                  2⤵
                                                  • Executes dropped EXE
                                                  PID:3388
                                                • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"
                                                  2⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetThreadContext
                                                  PID:1392
                                                  • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"
                                                    3⤵
                                                    • Executes dropped EXE
                                                    • Checks SCSI registry key(s)
                                                    • Suspicious behavior: MapViewOfSection
                                                    PID:2268
                                                • C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"
                                                  2⤵
                                                  • Executes dropped EXE
                                                  PID:2208
                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                    powershell -nologo -noprofile
                                                    3⤵
                                                      PID:4316
                                                    • C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"
                                                      3⤵
                                                      • Executes dropped EXE
                                                      • Checks for VirtualBox DLLs, possible anti-VM trick
                                                      PID:2824
                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        powershell -nologo -noprofile
                                                        4⤵
                                                        • Drops file in System32 directory
                                                        • Modifies data under HKEY_USERS
                                                        PID:368
                                                • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                  "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                  1⤵
                                                  • Modifies registry class
                                                  • Suspicious behavior: MapViewOfSection
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:1644
                                                • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                  "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                  1⤵
                                                  • Drops file in Windows directory
                                                  • Modifies Internet Explorer settings
                                                  • Modifies registry class
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:3780
                                                • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                  "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                  1⤵
                                                  • Drops file in Windows directory
                                                  • Modifies registry class
                                                  PID:1124
                                                • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                  "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                  1⤵
                                                  • Drops file in Windows directory
                                                  • Modifies registry class
                                                  PID:2252
                                                • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                  "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                  1⤵
                                                  • Modifies registry class
                                                  PID:5908
                                                • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                  "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                  1⤵
                                                  • Drops file in Windows directory
                                                  • Modifies registry class
                                                  PID:984
                                                • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                  "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                  1⤵
                                                  • Drops file in Windows directory
                                                  • Modifies registry class
                                                  PID:5372
                                                • C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe
                                                  C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe
                                                  1⤵
                                                  • Executes dropped EXE
                                                  PID:1296
                                                • C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe
                                                  C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe
                                                  1⤵
                                                  • Executes dropped EXE
                                                  PID:1956
                                                • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                  "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                  1⤵
                                                  • Modifies registry class
                                                  PID:1912

                                                Network

                                                MITRE ATT&CK Enterprise v15

                                                Replay Monitor

                                                Loading Replay Monitor...

                                                Downloads

                                                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log

                                                  Filesize

                                                  226B

                                                  MD5

                                                  957779c42144282d8cd83192b8fbc7cf

                                                  SHA1

                                                  de83d08d2cca06b9ff3d1ef239d6b60b705d25fe

                                                  SHA256

                                                  0d7ca7ba65e2b465e4878e324ceab8f8981f5ec06dcf5bc32559a4467a9c7d51

                                                  SHA512

                                                  f1549c61b4f2906d13b2aabb74772c2bc826cd42373d7bb6c48cbb125d5aa2ec17617e6b5e67e8aae3bb5790cc831cdba48a45008ed01df4fba8be448cce39fd

                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\96DKDNLK\edgecompatviewlist[1].xml

                                                  Filesize

                                                  74KB

                                                  MD5

                                                  d4fc49dc14f63895d997fa4940f24378

                                                  SHA1

                                                  3efb1437a7c5e46034147cbbc8db017c69d02c31

                                                  SHA256

                                                  853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

                                                  SHA512

                                                  cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

                                                • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\4F7AG0H7\B8BxsscfVBr[1].ico

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  e508eca3eafcc1fc2d7f19bafb29e06b

                                                  SHA1

                                                  a62fc3c2a027870d99aedc241e7d5babba9a891f

                                                  SHA256

                                                  e6d1d77403cd9f14fd2377d07e84350cfe768e3353e402bf42ebdc8593a58c9a

                                                  SHA512

                                                  49e3f31fd73e52ba274db9c7d306cc188e09c3ae683827f420fbb17534d197a503460e7ec2f1af46065f8d0b33f37400659bfa2ae165e502f97a8150e184a38c

                                                • C:\Users\Admin\AppData\Local\Temp\1000048001\rockss.exe

                                                  Filesize

                                                  4.6MB

                                                  MD5

                                                  b32d5a382373d7df0c1fec9f15f0724a

                                                  SHA1

                                                  472fc4c27859f39e8b9a0bf784949f72944dc52b

                                                  SHA256

                                                  010fe481ba6275ebbf71e102e66d73f5d819252f2b4b1893d2acf53c04f4200f

                                                  SHA512

                                                  1320be23719f86e043beaeea8affa9ab125a68a1210f596c4424d4a5a2a9ef72eb572578897722842ad0586afe1d669ff816648ea3eeb3aa0b8379c9066da3a9

                                                • C:\Users\Admin\AppData\Local\Temp\1000048001\rockss.exe

                                                  Filesize

                                                  4.6MB

                                                  MD5

                                                  b32d5a382373d7df0c1fec9f15f0724a

                                                  SHA1

                                                  472fc4c27859f39e8b9a0bf784949f72944dc52b

                                                  SHA256

                                                  010fe481ba6275ebbf71e102e66d73f5d819252f2b4b1893d2acf53c04f4200f

                                                  SHA512

                                                  1320be23719f86e043beaeea8affa9ab125a68a1210f596c4424d4a5a2a9ef72eb572578897722842ad0586afe1d669ff816648ea3eeb3aa0b8379c9066da3a9

                                                • C:\Users\Admin\AppData\Local\Temp\1000048001\rockss.exe

                                                  Filesize

                                                  4.6MB

                                                  MD5

                                                  b32d5a382373d7df0c1fec9f15f0724a

                                                  SHA1

                                                  472fc4c27859f39e8b9a0bf784949f72944dc52b

                                                  SHA256

                                                  010fe481ba6275ebbf71e102e66d73f5d819252f2b4b1893d2acf53c04f4200f

                                                  SHA512

                                                  1320be23719f86e043beaeea8affa9ab125a68a1210f596c4424d4a5a2a9ef72eb572578897722842ad0586afe1d669ff816648ea3eeb3aa0b8379c9066da3a9

                                                • C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe

                                                  Filesize

                                                  4.1MB

                                                  MD5

                                                  637f73095de9f62dc6fcfbe9b3f6d3d6

                                                  SHA1

                                                  708771d9413e7df69189d2a0c283ec72bd63d99e

                                                  SHA256

                                                  6a678e471f24d7560be7cda7a49a34b4f0c2cb279b779984e5f002be3dfacf1d

                                                  SHA512

                                                  00d4d05c7b894d4c52dcbc75d555c76f966defed1934747ffe4a29d8dc1b426fad021a02a5e221dd583ac86d67661a6b9cddde13ad1465546439f52ed567aeb5

                                                • C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe

                                                  Filesize

                                                  4.1MB

                                                  MD5

                                                  637f73095de9f62dc6fcfbe9b3f6d3d6

                                                  SHA1

                                                  708771d9413e7df69189d2a0c283ec72bd63d99e

                                                  SHA256

                                                  6a678e471f24d7560be7cda7a49a34b4f0c2cb279b779984e5f002be3dfacf1d

                                                  SHA512

                                                  00d4d05c7b894d4c52dcbc75d555c76f966defed1934747ffe4a29d8dc1b426fad021a02a5e221dd583ac86d67661a6b9cddde13ad1465546439f52ed567aeb5

                                                • C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe

                                                  Filesize

                                                  4.1MB

                                                  MD5

                                                  637f73095de9f62dc6fcfbe9b3f6d3d6

                                                  SHA1

                                                  708771d9413e7df69189d2a0c283ec72bd63d99e

                                                  SHA256

                                                  6a678e471f24d7560be7cda7a49a34b4f0c2cb279b779984e5f002be3dfacf1d

                                                  SHA512

                                                  00d4d05c7b894d4c52dcbc75d555c76f966defed1934747ffe4a29d8dc1b426fad021a02a5e221dd583ac86d67661a6b9cddde13ad1465546439f52ed567aeb5

                                                • C:\Users\Admin\AppData\Local\Temp\4A5D.exe

                                                  Filesize

                                                  341KB

                                                  MD5

                                                  8669fe397a7225ede807202f6a9d8390

                                                  SHA1

                                                  04a806a5c4218cb703cba85d3e636d0c8cbae043

                                                  SHA256

                                                  1624a759791e49ce8f79dd249d3ac2aede589ffbe53db342e4c99e2fbbc1b90e

                                                  SHA512

                                                  29cad49434172a910ba7635058ecc02aacf43f648ee98b2c47c561332403a96847b5da817358095f7638295b238de8874bf34fb393670096bbf3caeb388a9c45

                                                • C:\Users\Admin\AppData\Local\Temp\4A5D.exe

                                                  Filesize

                                                  341KB

                                                  MD5

                                                  8669fe397a7225ede807202f6a9d8390

                                                  SHA1

                                                  04a806a5c4218cb703cba85d3e636d0c8cbae043

                                                  SHA256

                                                  1624a759791e49ce8f79dd249d3ac2aede589ffbe53db342e4c99e2fbbc1b90e

                                                  SHA512

                                                  29cad49434172a910ba7635058ecc02aacf43f648ee98b2c47c561332403a96847b5da817358095f7638295b238de8874bf34fb393670096bbf3caeb388a9c45

                                                • C:\Users\Admin\AppData\Local\Temp\4CCF.exe

                                                  Filesize

                                                  412KB

                                                  MD5

                                                  5200fbe07521eb001f145afb95d40283

                                                  SHA1

                                                  df6cfdf15b58a0bb24255b3902886dc375f3346f

                                                  SHA256

                                                  00c3f29f9a8aec0774256501c562275e2d866f0130a2b8a58d74003c6c77e812

                                                  SHA512

                                                  c38359959ce1083f94d2206d1b4b317e8c5d493168013b4e8c406acb5a55fd4f85ec7ce4d5e400b9105fd82eae3d6301d52346f040a64c09981185c66f2cbf75

                                                • C:\Users\Admin\AppData\Local\Temp\4CCF.exe

                                                  Filesize

                                                  412KB

                                                  MD5

                                                  5200fbe07521eb001f145afb95d40283

                                                  SHA1

                                                  df6cfdf15b58a0bb24255b3902886dc375f3346f

                                                  SHA256

                                                  00c3f29f9a8aec0774256501c562275e2d866f0130a2b8a58d74003c6c77e812

                                                  SHA512

                                                  c38359959ce1083f94d2206d1b4b317e8c5d493168013b4e8c406acb5a55fd4f85ec7ce4d5e400b9105fd82eae3d6301d52346f040a64c09981185c66f2cbf75

                                                • C:\Users\Admin\AppData\Local\Temp\50F7.exe

                                                  Filesize

                                                  1.8MB

                                                  MD5

                                                  fd21dbb499f9d4a86681c2237a1612b3

                                                  SHA1

                                                  e6aab9cbde64985c24facf38a040d202f2af163c

                                                  SHA256

                                                  e8aa4c14a791311df68010e7bfd1ecd88594a7a26e5a7bf9b96d75d3aad11d26

                                                  SHA512

                                                  ccb4a190c3777bf5c07d6e1ce13dff1f331c0b7bdcba5c2bddf890ab6922904560ae56d881d4c05aaeae6584a1f679dd486c5bdeab9c7b25b22fdf84146bfb32

                                                • C:\Users\Admin\AppData\Local\Temp\50F7.exe

                                                  Filesize

                                                  1.8MB

                                                  MD5

                                                  fd21dbb499f9d4a86681c2237a1612b3

                                                  SHA1

                                                  e6aab9cbde64985c24facf38a040d202f2af163c

                                                  SHA256

                                                  e8aa4c14a791311df68010e7bfd1ecd88594a7a26e5a7bf9b96d75d3aad11d26

                                                  SHA512

                                                  ccb4a190c3777bf5c07d6e1ce13dff1f331c0b7bdcba5c2bddf890ab6922904560ae56d881d4c05aaeae6584a1f679dd486c5bdeab9c7b25b22fdf84146bfb32

                                                • C:\Users\Admin\AppData\Local\Temp\52AD.bat

                                                  Filesize

                                                  79B

                                                  MD5

                                                  403991c4d18ac84521ba17f264fa79f2

                                                  SHA1

                                                  850cc068de0963854b0fe8f485d951072474fd45

                                                  SHA256

                                                  ef6e942aefe925fefac19fa816986ea25de6935c4f377c717e29b94e65f9019f

                                                  SHA512

                                                  a20aaa77065d30195e5893f2ff989979383c8d7f82d9e528d4833b1c1236aef4f85284f5250d0f190a174790b650280ffe1fbff7e00c98024ccf5ca746e5b576

                                                • C:\Users\Admin\AppData\Local\Temp\5790.exe

                                                  Filesize

                                                  896KB

                                                  MD5

                                                  7b4f90ff07d0fa2e763fd680b1e963c9

                                                  SHA1

                                                  47f1d9453dd31b2467f3f11580fba975ed69246d

                                                  SHA256

                                                  5228ff83506f82456b550462d53e68f7bc82b793d99c167b6674d853aa6b68b0

                                                  SHA512

                                                  5385fb7df409be3214a1de1b565694ed6e3491ff0f066709084673cc2975560895ab473dfc8a35ec25be999ea32abbc21c7732b99fa51792103f1e05f1e1ea9b

                                                • C:\Users\Admin\AppData\Local\Temp\5790.exe

                                                  Filesize

                                                  896KB

                                                  MD5

                                                  7b4f90ff07d0fa2e763fd680b1e963c9

                                                  SHA1

                                                  47f1d9453dd31b2467f3f11580fba975ed69246d

                                                  SHA256

                                                  5228ff83506f82456b550462d53e68f7bc82b793d99c167b6674d853aa6b68b0

                                                  SHA512

                                                  5385fb7df409be3214a1de1b565694ed6e3491ff0f066709084673cc2975560895ab473dfc8a35ec25be999ea32abbc21c7732b99fa51792103f1e05f1e1ea9b

                                                • C:\Users\Admin\AppData\Local\Temp\6685.exe

                                                  Filesize

                                                  4.6MB

                                                  MD5

                                                  b32d5a382373d7df0c1fec9f15f0724a

                                                  SHA1

                                                  472fc4c27859f39e8b9a0bf784949f72944dc52b

                                                  SHA256

                                                  010fe481ba6275ebbf71e102e66d73f5d819252f2b4b1893d2acf53c04f4200f

                                                  SHA512

                                                  1320be23719f86e043beaeea8affa9ab125a68a1210f596c4424d4a5a2a9ef72eb572578897722842ad0586afe1d669ff816648ea3eeb3aa0b8379c9066da3a9

                                                • C:\Users\Admin\AppData\Local\Temp\6685.exe

                                                  Filesize

                                                  4.6MB

                                                  MD5

                                                  b32d5a382373d7df0c1fec9f15f0724a

                                                  SHA1

                                                  472fc4c27859f39e8b9a0bf784949f72944dc52b

                                                  SHA256

                                                  010fe481ba6275ebbf71e102e66d73f5d819252f2b4b1893d2acf53c04f4200f

                                                  SHA512

                                                  1320be23719f86e043beaeea8affa9ab125a68a1210f596c4424d4a5a2a9ef72eb572578897722842ad0586afe1d669ff816648ea3eeb3aa0b8379c9066da3a9

                                                • C:\Users\Admin\AppData\Local\Temp\Hhv95Iy.dDr

                                                  Filesize

                                                  1.4MB

                                                  MD5

                                                  42b4dfe2a433586daaa9b71aabc290a5

                                                  SHA1

                                                  5f272486669bb3f24ee352490aeb2168a8b7325f

                                                  SHA256

                                                  a7cd29c87335f0f218043f91c42ec89cb4ec7aa410efccc062dd47254a30c616

                                                  SHA512

                                                  bafd697d82c75ee3431c6c990abad52d54a099a441cb5d17dc50dca8b3d73214472d64f53e1bc88f33e7aa4190229a3f7129cf0d33882bfec4e43459573745e0

                                                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w6464131.exe

                                                  Filesize

                                                  219KB

                                                  MD5

                                                  a427281ec99595c2a977a70e0009a30c

                                                  SHA1

                                                  c937c5d14127921f068a081bb3e8f450c9966852

                                                  SHA256

                                                  40ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3

                                                  SHA512

                                                  2a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976

                                                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w6464131.exe

                                                  Filesize

                                                  219KB

                                                  MD5

                                                  a427281ec99595c2a977a70e0009a30c

                                                  SHA1

                                                  c937c5d14127921f068a081bb3e8f450c9966852

                                                  SHA256

                                                  40ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3

                                                  SHA512

                                                  2a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976

                                                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1211543.exe

                                                  Filesize

                                                  1.0MB

                                                  MD5

                                                  309110d41d45e330b2fda12ae8a73f2e

                                                  SHA1

                                                  2eb7018203048398cb8f12e23d6bd57c82120879

                                                  SHA256

                                                  22f1d1eb4d724b084a6ce1ea6f7e00180e99a75f8472f422b34ebd14e0b5298e

                                                  SHA512

                                                  44cf2963903bd5c0b55b1be914720ab2b4dc9e7f4b506197fb376adfabc3cc4062f41324120daa077ad874e6e342dd6e6f40a2279f77ee741c5d64bb771c0546

                                                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1211543.exe

                                                  Filesize

                                                  1.0MB

                                                  MD5

                                                  309110d41d45e330b2fda12ae8a73f2e

                                                  SHA1

                                                  2eb7018203048398cb8f12e23d6bd57c82120879

                                                  SHA256

                                                  22f1d1eb4d724b084a6ce1ea6f7e00180e99a75f8472f422b34ebd14e0b5298e

                                                  SHA512

                                                  44cf2963903bd5c0b55b1be914720ab2b4dc9e7f4b506197fb376adfabc3cc4062f41324120daa077ad874e6e342dd6e6f40a2279f77ee741c5d64bb771c0546

                                                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u4171705.exe

                                                  Filesize

                                                  405KB

                                                  MD5

                                                  cd1d66c17456a82ceb11c0cc041cd8eb

                                                  SHA1

                                                  d2c948dd171eeec0dfc252f1b96ab1575bba2471

                                                  SHA256

                                                  dc46b7389ac68f8fddacf7c43fccab3870223b7776a95a7afad9bbd1f6c74d78

                                                  SHA512

                                                  7b073a33cb7baef0a30a7b132dae7515d8442f69c225ff48d6ff7a23472b5f4ce98ae68cc62255dfe56f16c61cea7fe7e55fcdb6697c25ab71ece2f55d4cff44

                                                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u4171705.exe

                                                  Filesize

                                                  405KB

                                                  MD5

                                                  cd1d66c17456a82ceb11c0cc041cd8eb

                                                  SHA1

                                                  d2c948dd171eeec0dfc252f1b96ab1575bba2471

                                                  SHA256

                                                  dc46b7389ac68f8fddacf7c43fccab3870223b7776a95a7afad9bbd1f6c74d78

                                                  SHA512

                                                  7b073a33cb7baef0a30a7b132dae7515d8442f69c225ff48d6ff7a23472b5f4ce98ae68cc62255dfe56f16c61cea7fe7e55fcdb6697c25ab71ece2f55d4cff44

                                                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8185761.exe

                                                  Filesize

                                                  775KB

                                                  MD5

                                                  2cca11c4cef94a75b92d162f31517e67

                                                  SHA1

                                                  2075149f8711291c4da85f271e2c81eebaad8fba

                                                  SHA256

                                                  659250d6a1260cae435c987ad819fffc494debd8101e5a46dcee7434106f9f89

                                                  SHA512

                                                  23d14f59e7c72fdfd881d9e65354a516cd6436e9a58880fbc347e7b737de93a120e0739754678810cc4d34431429b2aea23d85b1a4eba714b5f452cc1c510c10

                                                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8185761.exe

                                                  Filesize

                                                  775KB

                                                  MD5

                                                  2cca11c4cef94a75b92d162f31517e67

                                                  SHA1

                                                  2075149f8711291c4da85f271e2c81eebaad8fba

                                                  SHA256

                                                  659250d6a1260cae435c987ad819fffc494debd8101e5a46dcee7434106f9f89

                                                  SHA512

                                                  23d14f59e7c72fdfd881d9e65354a516cd6436e9a58880fbc347e7b737de93a120e0739754678810cc4d34431429b2aea23d85b1a4eba714b5f452cc1c510c10

                                                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t5865263.exe

                                                  Filesize

                                                  219KB

                                                  MD5

                                                  c256a814d3f9d02d73029580dfe882b3

                                                  SHA1

                                                  e11e9ea937183139753f3b0d5e71c8301d000896

                                                  SHA256

                                                  53f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c

                                                  SHA512

                                                  1f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a

                                                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t5865263.exe

                                                  Filesize

                                                  219KB

                                                  MD5

                                                  c256a814d3f9d02d73029580dfe882b3

                                                  SHA1

                                                  e11e9ea937183139753f3b0d5e71c8301d000896

                                                  SHA256

                                                  53f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c

                                                  SHA512

                                                  1f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a

                                                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4860174.exe

                                                  Filesize

                                                  593KB

                                                  MD5

                                                  53d999e55c25b8cc50c9976dd208e5bc

                                                  SHA1

                                                  bc392b325faa4f132c9d42605b561dc6842acc39

                                                  SHA256

                                                  4495cba6fc0964ca50e2e242d2ae5a003fd30c2ddadc3829c704d7fe6d6dbe1f

                                                  SHA512

                                                  76a46d43bd48fab005fbc292b43f191d5ea18d7c1396a5756beb91403c7d784413a7a2e6ac9e72c2fcf998916cc97a2323f5579c72824c1dd2b2f5d5dee41c06

                                                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4860174.exe

                                                  Filesize

                                                  593KB

                                                  MD5

                                                  53d999e55c25b8cc50c9976dd208e5bc

                                                  SHA1

                                                  bc392b325faa4f132c9d42605b561dc6842acc39

                                                  SHA256

                                                  4495cba6fc0964ca50e2e242d2ae5a003fd30c2ddadc3829c704d7fe6d6dbe1f

                                                  SHA512

                                                  76a46d43bd48fab005fbc292b43f191d5ea18d7c1396a5756beb91403c7d784413a7a2e6ac9e72c2fcf998916cc97a2323f5579c72824c1dd2b2f5d5dee41c06

                                                • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s9951352.exe

                                                  Filesize

                                                  261KB

                                                  MD5

                                                  49f2e3c66dbbc80bd22ac61d988b9a38

                                                  SHA1

                                                  d27c0fdb589ff09c0163a86274c4121d6818222b

                                                  SHA256

                                                  3e9463a41b007b3ad14de6cae9dcc70368c33f73435ae2db2f2fd3415ecb4f34

                                                  SHA512

                                                  21bb66195438980d6cdfd5fa12a6e64e56a3d9674576ca9ef5dc53faf30a7e2a5f9ed3d559050394e4791c9e29df03996b486c85e0cd16cea2f4d462866e0585

                                                • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s9951352.exe

                                                  Filesize

                                                  261KB

                                                  MD5

                                                  49f2e3c66dbbc80bd22ac61d988b9a38

                                                  SHA1

                                                  d27c0fdb589ff09c0163a86274c4121d6818222b

                                                  SHA256

                                                  3e9463a41b007b3ad14de6cae9dcc70368c33f73435ae2db2f2fd3415ecb4f34

                                                  SHA512

                                                  21bb66195438980d6cdfd5fa12a6e64e56a3d9674576ca9ef5dc53faf30a7e2a5f9ed3d559050394e4791c9e29df03996b486c85e0cd16cea2f4d462866e0585

                                                • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z0283938.exe

                                                  Filesize

                                                  350KB

                                                  MD5

                                                  f3d8781af4870c1a1e449395bf1c7428

                                                  SHA1

                                                  a5b09cb82e6d47d5e0a5ebc91dd455cdde0b06a8

                                                  SHA256

                                                  c5850f69106804db4891789ceda2bd8e8cb6295a294681c1ff9618d1517c20e4

                                                  SHA512

                                                  aacf83e3fdde83b1f7bebfa6371e9572abee04f54321b394b288ff880eeddf31040ea6d6b246a22c6952eff723d3ae8b24bd6affc9ab616b5d2a6097f15e1dcf

                                                • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z0283938.exe

                                                  Filesize

                                                  350KB

                                                  MD5

                                                  f3d8781af4870c1a1e449395bf1c7428

                                                  SHA1

                                                  a5b09cb82e6d47d5e0a5ebc91dd455cdde0b06a8

                                                  SHA256

                                                  c5850f69106804db4891789ceda2bd8e8cb6295a294681c1ff9618d1517c20e4

                                                  SHA512

                                                  aacf83e3fdde83b1f7bebfa6371e9572abee04f54321b394b288ff880eeddf31040ea6d6b246a22c6952eff723d3ae8b24bd6affc9ab616b5d2a6097f15e1dcf

                                                • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9683739.exe

                                                  Filesize

                                                  242KB

                                                  MD5

                                                  2e9f591626778ab4e281f3638d65650c

                                                  SHA1

                                                  81b0998e5e1b71a225ecb329194d80b2d125c0cf

                                                  SHA256

                                                  0c6bd49748af339ab7f89147d3ea3e5b31548b3615781504e26cb54f9d9ce881

                                                  SHA512

                                                  1b43c0f7c43db0bd0fcd9b3437baedac543253b18a341461d00aa42312ab99e890a732a5e31e22df02be21ed3fe584c0fd0a56f8405c6b3f957a9783f1377243

                                                • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9683739.exe

                                                  Filesize

                                                  242KB

                                                  MD5

                                                  2e9f591626778ab4e281f3638d65650c

                                                  SHA1

                                                  81b0998e5e1b71a225ecb329194d80b2d125c0cf

                                                  SHA256

                                                  0c6bd49748af339ab7f89147d3ea3e5b31548b3615781504e26cb54f9d9ce881

                                                  SHA512

                                                  1b43c0f7c43db0bd0fcd9b3437baedac543253b18a341461d00aa42312ab99e890a732a5e31e22df02be21ed3fe584c0fd0a56f8405c6b3f957a9783f1377243

                                                • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r5293859.exe

                                                  Filesize

                                                  371KB

                                                  MD5

                                                  c58705355f476fb47af21440a63f885e

                                                  SHA1

                                                  bf3f21300f7a5ed58c397eea400af554dcc94915

                                                  SHA256

                                                  569f54c0b0b3b8dbc4e185f8f0749e15cf22dbe631e87e463156763c9c212edf

                                                  SHA512

                                                  6d194d65a46923c76ee438a81c394ed554dde60a10f3147c071af243a18c206fd73b87de452f600e0b74223b67a095c556a68f7b05c4646ef42bf56f1202547c

                                                • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r5293859.exe

                                                  Filesize

                                                  371KB

                                                  MD5

                                                  c58705355f476fb47af21440a63f885e

                                                  SHA1

                                                  bf3f21300f7a5ed58c397eea400af554dcc94915

                                                  SHA256

                                                  569f54c0b0b3b8dbc4e185f8f0749e15cf22dbe631e87e463156763c9c212edf

                                                  SHA512

                                                  6d194d65a46923c76ee438a81c394ed554dde60a10f3147c071af243a18c206fd73b87de452f600e0b74223b67a095c556a68f7b05c4646ef42bf56f1202547c

                                                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_4scp0yqk.sse.ps1

                                                  Filesize

                                                  1B

                                                  MD5

                                                  c4ca4238a0b923820dcc509a6f75849b

                                                  SHA1

                                                  356a192b7913b04c54574d18c28d46e6395428ab

                                                  SHA256

                                                  6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

                                                  SHA512

                                                  4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

                                                • C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe

                                                  Filesize

                                                  219KB

                                                  MD5

                                                  a427281ec99595c2a977a70e0009a30c

                                                  SHA1

                                                  c937c5d14127921f068a081bb3e8f450c9966852

                                                  SHA256

                                                  40ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3

                                                  SHA512

                                                  2a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976

                                                • C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe

                                                  Filesize

                                                  219KB

                                                  MD5

                                                  a427281ec99595c2a977a70e0009a30c

                                                  SHA1

                                                  c937c5d14127921f068a081bb3e8f450c9966852

                                                  SHA256

                                                  40ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3

                                                  SHA512

                                                  2a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976

                                                • C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe

                                                  Filesize

                                                  219KB

                                                  MD5

                                                  a427281ec99595c2a977a70e0009a30c

                                                  SHA1

                                                  c937c5d14127921f068a081bb3e8f450c9966852

                                                  SHA256

                                                  40ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3

                                                  SHA512

                                                  2a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976

                                                • C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe

                                                  Filesize

                                                  219KB

                                                  MD5

                                                  a427281ec99595c2a977a70e0009a30c

                                                  SHA1

                                                  c937c5d14127921f068a081bb3e8f450c9966852

                                                  SHA256

                                                  40ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3

                                                  SHA512

                                                  2a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976

                                                • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

                                                  Filesize

                                                  281KB

                                                  MD5

                                                  d98e33b66343e7c96158444127a117f6

                                                  SHA1

                                                  bb716c5509a2bf345c6c1152f6e3e1452d39d50d

                                                  SHA256

                                                  5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

                                                  SHA512

                                                  705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

                                                • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

                                                  Filesize

                                                  281KB

                                                  MD5

                                                  d98e33b66343e7c96158444127a117f6

                                                  SHA1

                                                  bb716c5509a2bf345c6c1152f6e3e1452d39d50d

                                                  SHA256

                                                  5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

                                                  SHA512

                                                  705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

                                                • C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe

                                                  Filesize

                                                  219KB

                                                  MD5

                                                  c256a814d3f9d02d73029580dfe882b3

                                                  SHA1

                                                  e11e9ea937183139753f3b0d5e71c8301d000896

                                                  SHA256

                                                  53f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c

                                                  SHA512

                                                  1f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a

                                                • C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe

                                                  Filesize

                                                  219KB

                                                  MD5

                                                  c256a814d3f9d02d73029580dfe882b3

                                                  SHA1

                                                  e11e9ea937183139753f3b0d5e71c8301d000896

                                                  SHA256

                                                  53f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c

                                                  SHA512

                                                  1f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a

                                                • C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe

                                                  Filesize

                                                  219KB

                                                  MD5

                                                  c256a814d3f9d02d73029580dfe882b3

                                                  SHA1

                                                  e11e9ea937183139753f3b0d5e71c8301d000896

                                                  SHA256

                                                  53f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c

                                                  SHA512

                                                  1f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a

                                                • C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe

                                                  Filesize

                                                  219KB

                                                  MD5

                                                  c256a814d3f9d02d73029580dfe882b3

                                                  SHA1

                                                  e11e9ea937183139753f3b0d5e71c8301d000896

                                                  SHA256

                                                  53f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c

                                                  SHA512

                                                  1f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a

                                                • C:\Users\Admin\AppData\Local\Temp\ss41.exe

                                                  Filesize

                                                  298KB

                                                  MD5

                                                  8bd874c0500c7112d04cfad6fda75524

                                                  SHA1

                                                  d04a20e3bb7ffe5663f69c870457ad4edeb00192

                                                  SHA256

                                                  22aa36bd2f8ace8d959f22cf0e99bfe1d3fd655c075aa14a3232fb9e0f35adc2

                                                  SHA512

                                                  d6c43d5a5d1bfca1dddfb6283eafcd1f274e52812ccfee877298dfc74930fe6a8ec7035f95107600742ef19a630bee3ca3fab1fc7ab3ff717bea8f8c05e384d8

                                                • C:\Users\Admin\AppData\Local\Temp\ss41.exe

                                                  Filesize

                                                  298KB

                                                  MD5

                                                  8bd874c0500c7112d04cfad6fda75524

                                                  SHA1

                                                  d04a20e3bb7ffe5663f69c870457ad4edeb00192

                                                  SHA256

                                                  22aa36bd2f8ace8d959f22cf0e99bfe1d3fd655c075aa14a3232fb9e0f35adc2

                                                  SHA512

                                                  d6c43d5a5d1bfca1dddfb6283eafcd1f274e52812ccfee877298dfc74930fe6a8ec7035f95107600742ef19a630bee3ca3fab1fc7ab3ff717bea8f8c05e384d8

                                                • C:\Users\Admin\AppData\Local\Temp\ss41.exe

                                                  Filesize

                                                  298KB

                                                  MD5

                                                  8bd874c0500c7112d04cfad6fda75524

                                                  SHA1

                                                  d04a20e3bb7ffe5663f69c870457ad4edeb00192

                                                  SHA256

                                                  22aa36bd2f8ace8d959f22cf0e99bfe1d3fd655c075aa14a3232fb9e0f35adc2

                                                  SHA512

                                                  d6c43d5a5d1bfca1dddfb6283eafcd1f274e52812ccfee877298dfc74930fe6a8ec7035f95107600742ef19a630bee3ca3fab1fc7ab3ff717bea8f8c05e384d8

                                                • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

                                                  Filesize

                                                  227KB

                                                  MD5

                                                  fccd5785d54697b968ebe3c55641c4b3

                                                  SHA1

                                                  f3353f2cfb27100ea14ae6ad02a72f834694fbf3

                                                  SHA256

                                                  757568f5af7731014baf25b6941c179d14b2041d2aa8a43e482a942e99d86f82

                                                  SHA512

                                                  0360e3c3469219f6c13ab3bd0c47304c6bb1319463c4102433156400ebfbf468b88f9b469eeb01e78ed32021adb93d52e9dd410dcc9d44e5dbee67f9a51aed6d

                                                • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

                                                  Filesize

                                                  227KB

                                                  MD5

                                                  fccd5785d54697b968ebe3c55641c4b3

                                                  SHA1

                                                  f3353f2cfb27100ea14ae6ad02a72f834694fbf3

                                                  SHA256

                                                  757568f5af7731014baf25b6941c179d14b2041d2aa8a43e482a942e99d86f82

                                                  SHA512

                                                  0360e3c3469219f6c13ab3bd0c47304c6bb1319463c4102433156400ebfbf468b88f9b469eeb01e78ed32021adb93d52e9dd410dcc9d44e5dbee67f9a51aed6d

                                                • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

                                                  Filesize

                                                  227KB

                                                  MD5

                                                  fccd5785d54697b968ebe3c55641c4b3

                                                  SHA1

                                                  f3353f2cfb27100ea14ae6ad02a72f834694fbf3

                                                  SHA256

                                                  757568f5af7731014baf25b6941c179d14b2041d2aa8a43e482a942e99d86f82

                                                  SHA512

                                                  0360e3c3469219f6c13ab3bd0c47304c6bb1319463c4102433156400ebfbf468b88f9b469eeb01e78ed32021adb93d52e9dd410dcc9d44e5dbee67f9a51aed6d

                                                • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                                                  Filesize

                                                  89KB

                                                  MD5

                                                  2ac6d3fcf6913b1a1ac100407e97fccb

                                                  SHA1

                                                  809f7d4ed348951b79745074487956255d1d0a9a

                                                  SHA256

                                                  30f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe

                                                  SHA512

                                                  79ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6

                                                • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                                                  Filesize

                                                  273B

                                                  MD5

                                                  0c459e65bcc6d38574f0c0d63a87088a

                                                  SHA1

                                                  41e53d5f2b3e7ca859b842a1c7b677e0847e6d65

                                                  SHA256

                                                  871c61d5f7051d6ddcf787e92e92d9c7e36747e64ea17b8cffccac549196abc4

                                                  SHA512

                                                  be1ca1fa525dfea57bc14ba41d25fb904c8e4c1d5cb4a5981d3173143620fb8e08277c0dfc2287b792e365871cc6805034377060a84cfef81969cd3d3ba8f90d

                                                • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                                                  Filesize

                                                  89KB

                                                  MD5

                                                  ec41f740797d2253dc1902e71941bbdb

                                                  SHA1

                                                  407b75f07cb205fee94c4c6261641bd40c2c28e9

                                                  SHA256

                                                  47425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520

                                                  SHA512

                                                  e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33

                                                • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                                                  Filesize

                                                  89KB

                                                  MD5

                                                  ec41f740797d2253dc1902e71941bbdb

                                                  SHA1

                                                  407b75f07cb205fee94c4c6261641bd40c2c28e9

                                                  SHA256

                                                  47425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520

                                                  SHA512

                                                  e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33

                                                • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

                                                  Filesize

                                                  273B

                                                  MD5

                                                  6d5040418450624fef735b49ec6bffe9

                                                  SHA1

                                                  5fff6a1a620a5c4522aead8dbd0a5a52570e8773

                                                  SHA256

                                                  dbc5ab846d6c2b4a1d0f6da31adeaa6467e8c791708bf4a52ef43adbb6b6c0d3

                                                  SHA512

                                                  bdf1d85e5f91c4994c5a68f7a1289435fd47069bc8f844d498d7dfd19b5609086e32700205d0fd7d1eb6c65bcc5fab5382de8b912f7ce9b6f7f09db43e49f0b0

                                                • C:\Users\Admin\AppData\Roaming\fftbiwd

                                                  Filesize

                                                  227KB

                                                  MD5

                                                  fccd5785d54697b968ebe3c55641c4b3

                                                  SHA1

                                                  f3353f2cfb27100ea14ae6ad02a72f834694fbf3

                                                  SHA256

                                                  757568f5af7731014baf25b6941c179d14b2041d2aa8a43e482a942e99d86f82

                                                  SHA512

                                                  0360e3c3469219f6c13ab3bd0c47304c6bb1319463c4102433156400ebfbf468b88f9b469eeb01e78ed32021adb93d52e9dd410dcc9d44e5dbee67f9a51aed6d

                                                • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                  Filesize

                                                  2KB

                                                  MD5

                                                  1c19c16e21c97ed42d5beabc93391fc5

                                                  SHA1

                                                  8ad83f8e0b3acf8dfbbf87931e41f0d664c4df68

                                                  SHA256

                                                  1bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05

                                                  SHA512

                                                  7d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c

                                                • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                  Filesize

                                                  18KB

                                                  MD5

                                                  48d300948109317600079134cf2a90a5

                                                  SHA1

                                                  3461afed61b807cc65d93bc5ce595ba8dfef4cb5

                                                  SHA256

                                                  351c511e95cfdb3e09c8bc62e7d5d864e9a7a4bc508d58c97c04384ff94c54b5

                                                  SHA512

                                                  c4ec9f6b7dcef2151c355f6d71ed22222f831db23605045abd1a631078451e44f1c64fc3a6dfed4a4474f25ca5848115591a341dc433fdb894a6e0827b9c79bb

                                                • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                  Filesize

                                                  18KB

                                                  MD5

                                                  105a439f4359c8af1b2515c22766f093

                                                  SHA1

                                                  1f8c5a42cf159fe557ab44814dc85e2641768c9d

                                                  SHA256

                                                  33f55637f8a25f53cf69e5f5757f43b2ae09893fcf005fb7633d115648799eef

                                                  SHA512

                                                  11399f5a4d78560de09cddf9404036778f927f3e0ae12a281e1518e9a21e3874c286dc80e9970214c5b71164d8cf0d6ccdacfae2682cef585808043ac3975dfb

                                                • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                  Filesize

                                                  18KB

                                                  MD5

                                                  e5dce5dee385c75bfbc5a7b0ead18dd5

                                                  SHA1

                                                  85f5acd4e0080cc74ae65381d3abaaefb50a2645

                                                  SHA256

                                                  a580d29d27c917f5c4239e5c50ccb768b6ac40744796862be5a4d9c48c456ad7

                                                  SHA512

                                                  3b909b3d85584bda3157671c94cb729162b46241542ed7c04eca30e389c750baaf1fac76a1d8e4124ae65dc94fa1a501dc91fe427340a08fbc5661f5f0d63fa2

                                                • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                  Filesize

                                                  18KB

                                                  MD5

                                                  bec4a49f1397269f00e34c1058a7e8d3

                                                  SHA1

                                                  ff264cd9a124d5b10af4240fe2f8ef98b81a96c2

                                                  SHA256

                                                  a4b87fd438873dbe43d1f1da3ad968f50aadd9c1c86ac446853e3b28852613fa

                                                  SHA512

                                                  bd026cf494d8ae7efddcd7f1eceaa7a4fff936e44bda9194574aad8cacb66493d3fa2b99a76b3396007ee01c2e69314de8ce4b7ad567c309d049af4e165115cf

                                                • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                  Filesize

                                                  18KB

                                                  MD5

                                                  433ce2c6275b46141aab555e47a6b990

                                                  SHA1

                                                  80520c83f5dd134b942ee617068ebaa27479d45d

                                                  SHA256

                                                  cbd0f9d8d5ce5df68e29fc725ea6a6051cab7188755a5a6d0d453cbe52f03bc3

                                                  SHA512

                                                  c49a129ddb0aa4dfb3e148d1c18ac45215242f41aee87753a33342de2f7a9718976cb38afdfc32c17a69dfe8ef85688e7e1ff0cf4e92ca57df307b1688eb2088

                                                • C:\Windows\rss\csrss.exe

                                                  Filesize

                                                  4.1MB

                                                  MD5

                                                  637f73095de9f62dc6fcfbe9b3f6d3d6

                                                  SHA1

                                                  708771d9413e7df69189d2a0c283ec72bd63d99e

                                                  SHA256

                                                  6a678e471f24d7560be7cda7a49a34b4f0c2cb279b779984e5f002be3dfacf1d

                                                  SHA512

                                                  00d4d05c7b894d4c52dcbc75d555c76f966defed1934747ffe4a29d8dc1b426fad021a02a5e221dd583ac86d67661a6b9cddde13ad1465546439f52ed567aeb5

                                                • C:\Windows\rss\csrss.exe

                                                  Filesize

                                                  4.1MB

                                                  MD5

                                                  637f73095de9f62dc6fcfbe9b3f6d3d6

                                                  SHA1

                                                  708771d9413e7df69189d2a0c283ec72bd63d99e

                                                  SHA256

                                                  6a678e471f24d7560be7cda7a49a34b4f0c2cb279b779984e5f002be3dfacf1d

                                                  SHA512

                                                  00d4d05c7b894d4c52dcbc75d555c76f966defed1934747ffe4a29d8dc1b426fad021a02a5e221dd583ac86d67661a6b9cddde13ad1465546439f52ed567aeb5

                                                • C:\Windows\rss\csrss.exe

                                                  Filesize

                                                  4.1MB

                                                  MD5

                                                  637f73095de9f62dc6fcfbe9b3f6d3d6

                                                  SHA1

                                                  708771d9413e7df69189d2a0c283ec72bd63d99e

                                                  SHA256

                                                  6a678e471f24d7560be7cda7a49a34b4f0c2cb279b779984e5f002be3dfacf1d

                                                  SHA512

                                                  00d4d05c7b894d4c52dcbc75d555c76f966defed1934747ffe4a29d8dc1b426fad021a02a5e221dd583ac86d67661a6b9cddde13ad1465546439f52ed567aeb5

                                                • \Users\Admin\AppData\Local\Temp\Hhv95Iy.ddr

                                                  Filesize

                                                  1.4MB

                                                  MD5

                                                  42b4dfe2a433586daaa9b71aabc290a5

                                                  SHA1

                                                  5f272486669bb3f24ee352490aeb2168a8b7325f

                                                  SHA256

                                                  a7cd29c87335f0f218043f91c42ec89cb4ec7aa410efccc062dd47254a30c616

                                                  SHA512

                                                  bafd697d82c75ee3431c6c990abad52d54a099a441cb5d17dc50dca8b3d73214472d64f53e1bc88f33e7aa4190229a3f7129cf0d33882bfec4e43459573745e0

                                                • \Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                                                  Filesize

                                                  89KB

                                                  MD5

                                                  2ac6d3fcf6913b1a1ac100407e97fccb

                                                  SHA1

                                                  809f7d4ed348951b79745074487956255d1d0a9a

                                                  SHA256

                                                  30f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe

                                                  SHA512

                                                  79ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6

                                                • \Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                                                  Filesize

                                                  89KB

                                                  MD5

                                                  ec41f740797d2253dc1902e71941bbdb

                                                  SHA1

                                                  407b75f07cb205fee94c4c6261641bd40c2c28e9

                                                  SHA256

                                                  47425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520

                                                  SHA512

                                                  e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33

                                                • memory/68-196-0x0000000007E90000-0x0000000007EAC000-memory.dmp

                                                  Filesize

                                                  112KB

                                                • memory/68-488-0x0000000073580000-0x0000000073C6E000-memory.dmp

                                                  Filesize

                                                  6.9MB

                                                • memory/68-177-0x0000000006BF0000-0x0000000006C00000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/68-185-0x00000000070F0000-0x0000000007112000-memory.dmp

                                                  Filesize

                                                  136KB

                                                • memory/68-186-0x00000000071C0000-0x0000000007226000-memory.dmp

                                                  Filesize

                                                  408KB

                                                • memory/68-187-0x0000000007A50000-0x0000000007AB6000-memory.dmp

                                                  Filesize

                                                  408KB

                                                • memory/68-178-0x0000000006A30000-0x0000000006A66000-memory.dmp

                                                  Filesize

                                                  216KB

                                                • memory/68-191-0x0000000007AC0000-0x0000000007E10000-memory.dmp

                                                  Filesize

                                                  3.3MB

                                                • memory/68-176-0x0000000073580000-0x0000000073C6E000-memory.dmp

                                                  Filesize

                                                  6.9MB

                                                • memory/68-183-0x0000000006BF0000-0x0000000006C00000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/68-182-0x0000000007230000-0x0000000007858000-memory.dmp

                                                  Filesize

                                                  6.2MB

                                                • memory/68-470-0x0000000009F40000-0x0000000009F48000-memory.dmp

                                                  Filesize

                                                  32KB

                                                • memory/68-465-0x0000000009F50000-0x0000000009F6A000-memory.dmp

                                                  Filesize

                                                  104KB

                                                • memory/68-217-0x0000000006D40000-0x0000000006D7C000-memory.dmp

                                                  Filesize

                                                  240KB

                                                • memory/68-276-0x0000000006BF0000-0x0000000006C00000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/68-249-0x0000000009020000-0x0000000009096000-memory.dmp

                                                  Filesize

                                                  472KB

                                                • memory/68-270-0x000000000A050000-0x000000000A0E4000-memory.dmp

                                                  Filesize

                                                  592KB

                                                • memory/68-257-0x000000007EAE0000-0x000000007EAF0000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/68-258-0x0000000009E30000-0x0000000009E63000-memory.dmp

                                                  Filesize

                                                  204KB

                                                • memory/68-259-0x000000006DC00000-0x000000006DC4B000-memory.dmp

                                                  Filesize

                                                  300KB

                                                • memory/68-260-0x000000006B8A0000-0x000000006BBF0000-memory.dmp

                                                  Filesize

                                                  3.3MB

                                                • memory/68-261-0x0000000009E10000-0x0000000009E2E000-memory.dmp

                                                  Filesize

                                                  120KB

                                                • memory/68-266-0x0000000009E70000-0x0000000009F15000-memory.dmp

                                                  Filesize

                                                  660KB

                                                • memory/68-267-0x0000000073580000-0x0000000073C6E000-memory.dmp

                                                  Filesize

                                                  6.9MB

                                                • memory/68-269-0x0000000006BF0000-0x0000000006C00000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/68-268-0x0000000006BF0000-0x0000000006C00000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/2096-2032-0x0000000000400000-0x0000000000D1B000-memory.dmp

                                                  Filesize

                                                  9.1MB

                                                • memory/2096-2029-0x0000000000400000-0x0000000000D1B000-memory.dmp

                                                  Filesize

                                                  9.1MB

                                                • memory/2096-1632-0x0000000000400000-0x0000000000D1B000-memory.dmp

                                                  Filesize

                                                  9.1MB

                                                • memory/2492-156-0x00000000008E0000-0x00000000009E0000-memory.dmp

                                                  Filesize

                                                  1024KB

                                                • memory/2492-157-0x0000000000800000-0x0000000000809000-memory.dmp

                                                  Filesize

                                                  36KB

                                                • memory/2632-1879-0x0000000003290000-0x000000000333E000-memory.dmp

                                                  Filesize

                                                  696KB

                                                • memory/3252-188-0x0000000001110000-0x0000000001126000-memory.dmp

                                                  Filesize

                                                  88KB

                                                • memory/3252-104-0x0000000000E00000-0x0000000000E16000-memory.dmp

                                                  Filesize

                                                  88KB

                                                • memory/3408-57-0x0000000000400000-0x0000000000428000-memory.dmp

                                                  Filesize

                                                  160KB

                                                • memory/3408-56-0x0000000000400000-0x0000000000428000-memory.dmp

                                                  Filesize

                                                  160KB

                                                • memory/3408-53-0x0000000000400000-0x0000000000428000-memory.dmp

                                                  Filesize

                                                  160KB

                                                • memory/3408-62-0x0000000000400000-0x0000000000428000-memory.dmp

                                                  Filesize

                                                  160KB

                                                • memory/3764-2106-0x0000000000400000-0x00000000004B4000-memory.dmp

                                                  Filesize

                                                  720KB

                                                • memory/3856-493-0x0000000002E70000-0x000000000375B000-memory.dmp

                                                  Filesize

                                                  8.9MB

                                                • memory/3856-497-0x0000000000400000-0x0000000000D1B000-memory.dmp

                                                  Filesize

                                                  9.1MB

                                                • memory/3856-492-0x0000000002A60000-0x0000000002E67000-memory.dmp

                                                  Filesize

                                                  4.0MB

                                                • memory/3856-755-0x0000000000400000-0x0000000000D1B000-memory.dmp

                                                  Filesize

                                                  9.1MB

                                                • memory/3856-1248-0x0000000000400000-0x0000000000D1B000-memory.dmp

                                                  Filesize

                                                  9.1MB

                                                • memory/3992-165-0x0000000000400000-0x0000000000D1B000-memory.dmp

                                                  Filesize

                                                  9.1MB

                                                • memory/3992-208-0x0000000002EC0000-0x00000000037AB000-memory.dmp

                                                  Filesize

                                                  8.9MB

                                                • memory/3992-490-0x0000000000400000-0x0000000000D1B000-memory.dmp

                                                  Filesize

                                                  9.1MB

                                                • memory/3992-164-0x0000000002EC0000-0x00000000037AB000-memory.dmp

                                                  Filesize

                                                  8.9MB

                                                • memory/3992-163-0x0000000002AB0000-0x0000000002EB6000-memory.dmp

                                                  Filesize

                                                  4.0MB

                                                • memory/3992-252-0x0000000000400000-0x0000000000D1B000-memory.dmp

                                                  Filesize

                                                  9.1MB

                                                • memory/3992-207-0x0000000002AB0000-0x0000000002EB6000-memory.dmp

                                                  Filesize

                                                  4.0MB

                                                • memory/3992-240-0x0000000000400000-0x0000000000D1B000-memory.dmp

                                                  Filesize

                                                  9.1MB

                                                • memory/4016-2118-0x000002D737900000-0x000002D737910000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/4232-162-0x0000000073580000-0x0000000073C6E000-memory.dmp

                                                  Filesize

                                                  6.9MB

                                                • memory/4232-84-0x0000000000400000-0x0000000000430000-memory.dmp

                                                  Filesize

                                                  192KB

                                                • memory/4232-93-0x0000000073580000-0x0000000073C6E000-memory.dmp

                                                  Filesize

                                                  6.9MB

                                                • memory/4232-99-0x0000000005810000-0x0000000005816000-memory.dmp

                                                  Filesize

                                                  24KB

                                                • memory/4232-108-0x000000000EC60000-0x000000000ECAB000-memory.dmp

                                                  Filesize

                                                  300KB

                                                • memory/4232-101-0x000000000ED70000-0x000000000EE7A000-memory.dmp

                                                  Filesize

                                                  1.0MB

                                                • memory/4232-103-0x0000000009760000-0x000000000979E000-memory.dmp

                                                  Filesize

                                                  248KB

                                                • memory/4232-100-0x000000000F270000-0x000000000F876000-memory.dmp

                                                  Filesize

                                                  6.0MB

                                                • memory/4232-102-0x0000000009700000-0x0000000009712000-memory.dmp

                                                  Filesize

                                                  72KB

                                                • memory/4328-161-0x0000000000400000-0x0000000000409000-memory.dmp

                                                  Filesize

                                                  36KB

                                                • memory/4328-159-0x0000000000400000-0x0000000000409000-memory.dmp

                                                  Filesize

                                                  36KB

                                                • memory/4328-189-0x0000000000400000-0x0000000000409000-memory.dmp

                                                  Filesize

                                                  36KB

                                                • memory/4416-0-0x0000000000400000-0x000000000053A000-memory.dmp

                                                  Filesize

                                                  1.2MB

                                                • memory/4416-2-0x0000000000400000-0x000000000053A000-memory.dmp

                                                  Filesize

                                                  1.2MB

                                                • memory/4416-1-0x0000000000400000-0x000000000053A000-memory.dmp

                                                  Filesize

                                                  1.2MB

                                                • memory/4416-98-0x0000000000400000-0x000000000053A000-memory.dmp

                                                  Filesize

                                                  1.2MB

                                                • memory/4416-4-0x0000000000400000-0x000000000053A000-memory.dmp

                                                  Filesize

                                                  1.2MB

                                                • memory/4416-5-0x0000000000400000-0x000000000053A000-memory.dmp

                                                  Filesize

                                                  1.2MB

                                                • memory/4416-83-0x0000000000400000-0x000000000053A000-memory.dmp

                                                  Filesize

                                                  1.2MB

                                                • memory/4460-48-0x0000000073580000-0x0000000073C6E000-memory.dmp

                                                  Filesize

                                                  6.9MB

                                                • memory/4460-109-0x0000000073580000-0x0000000073C6E000-memory.dmp

                                                  Filesize

                                                  6.9MB

                                                • memory/4460-139-0x0000000073580000-0x0000000073C6E000-memory.dmp

                                                  Filesize

                                                  6.9MB

                                                • memory/4460-41-0x0000000000400000-0x000000000040A000-memory.dmp

                                                  Filesize

                                                  40KB

                                                • memory/4600-505-0x0000000004E20000-0x0000000004E30000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/4600-524-0x000000007EDD0000-0x000000007EDE0000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/4600-504-0x0000000004E20000-0x0000000004E30000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/4600-503-0x0000000073580000-0x0000000073C6E000-memory.dmp

                                                  Filesize

                                                  6.9MB

                                                • memory/4600-525-0x000000006DC00000-0x000000006DC4B000-memory.dmp

                                                  Filesize

                                                  300KB

                                                • memory/4600-526-0x000000006B8A0000-0x000000006BBF0000-memory.dmp

                                                  Filesize

                                                  3.3MB

                                                • memory/4636-71-0x0000000000400000-0x0000000000409000-memory.dmp

                                                  Filesize

                                                  36KB

                                                • memory/4636-63-0x0000000000400000-0x0000000000409000-memory.dmp

                                                  Filesize

                                                  36KB

                                                • memory/4636-105-0x0000000000400000-0x0000000000409000-memory.dmp

                                                  Filesize

                                                  36KB

                                                • memory/4760-2100-0x0000000001060000-0x0000000001159000-memory.dmp

                                                  Filesize

                                                  996KB

                                                • memory/4760-2113-0x0000000001160000-0x0000000001240000-memory.dmp

                                                  Filesize

                                                  896KB

                                                • memory/4760-2121-0x0000000001160000-0x0000000001240000-memory.dmp

                                                  Filesize

                                                  896KB

                                                • memory/4760-2068-0x0000000010000000-0x0000000010164000-memory.dmp

                                                  Filesize

                                                  1.4MB

                                                • memory/4844-184-0x0000000003570000-0x00000000036A1000-memory.dmp

                                                  Filesize

                                                  1.2MB

                                                • memory/4844-334-0x0000000003570000-0x00000000036A1000-memory.dmp

                                                  Filesize

                                                  1.2MB

                                                • memory/4844-151-0x00007FF7C9AD0000-0x00007FF7C9B1E000-memory.dmp

                                                  Filesize

                                                  312KB

                                                • memory/4844-181-0x00000000033F0000-0x0000000003561000-memory.dmp

                                                  Filesize

                                                  1.4MB

                                                • memory/4968-2053-0x0000000000CB0000-0x0000000000CE0000-memory.dmp

                                                  Filesize

                                                  192KB