Resubmissions

22-03-2024 00:30

240322-att4ssdf42 10

21-03-2024 22:25

240321-2cbdxaca43 10

Analysis

  • max time kernel
    295s
  • max time network
    300s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    21-03-2024 22:25

General

  • Target

    43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe

  • Size

    1.8MB

  • MD5

    ed77409c8f8b66f81fae0754ee9d86f7

  • SHA1

    d2500b7585bed8dd179e84f73644a5b2afd8c8e1

  • SHA256

    43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825

  • SHA512

    1208c9dbc61325d2110ba9057ed1a0b4f94103d82fe172a5f40614c3a8d5621f8e04b73784bb70965acd6e38e9fb604e29f52cb8f04f66e5923cd4a06cc9fe92

  • SSDEEP

    24576:GqS02nN1gZ5woLL7hI+b31tDiiMBp9fHfyk21adtXUzXZKktlrfCNK20x2+MI9pN:Wg5wABzD1gf6FIdtXUNDfCN10lV

Malware Config

Extracted

Family

amadey

Version

4.12

C2

http://185.172.128.19

Attributes
  • install_dir

    cd1f156d67

  • install_file

    Utsysc.exe

  • strings_key

    0dd3e5ee91b367c60c9e575983554b30

  • url_paths

    /ghsdh39s/index.php

rc4.plain

Extracted

Family

stealc

C2

http://185.172.128.209

Attributes
  • url_path

    /3cd2b41cbde8fc9c.php

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

smokeloader

Version

2022

C2

http://trad-einmyus.com/index.php

http://tradein-myus.com/index.php

http://trade-inmyus.com/index.php

rc4.i32
rc4.i32

Extracted

Family

djvu

C2

http://sajdfue.com/test1/get.php

Attributes
  • extension

    .vook

  • offline_id

    1eSPzWRaNslCgtjBZfL5pzvovoiaVI4IZSnvAwt1

  • payload_url

    http://sdfjhuz.com/dl/build2.exe

    http://sajdfue.com/files/1/build3.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. Do not ask assistants from youtube and recovery data sites for help in recovering your data. They can use your free decryption quota and scam you. Our contact is emails in this text document only. You can get and look video overview decrypt tool: https://wetransfer.com/downloads/3ed7a617738550b0a00c5aa231c0752020240316170955/d71ce1 Price of private key and decrypt software is $999. Discount 50% available if you contact us first 72 hours, that's price for you is $499. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0857PsawqS

rsa_pubkey.plain

Extracted

Family

vidar

Version

8.4

Botnet

95002d0a9d65ffced363a8f35f42a529

C2

https://steamcommunity.com/profiles/76561199654112719

https://t.me/r2d0s

Attributes
  • profile_id_v2

    95002d0a9d65ffced363a8f35f42a529

  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:123.0) Gecko/20100101 Firefox/123.0

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • DcRat 6 IoCs

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Detect Vidar Stealer 1 IoCs
  • Detect ZGRat V1 5 IoCs
  • Detected Djvu ransomware 10 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Stealc

    Stealc is an infostealer written in C++.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Windows security bypass 2 TTPs 7 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 13 IoCs
  • Modifies boot configuration data using bcdedit 1 TTPs 14 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Drops file in Drivers directory 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Possible attempt to disable PatchGuard 2 TTPs

    Rootkits can use kernel patching to embed themselves in an operating system.

  • Checks BIOS information in registry 2 TTPs 26 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 40 IoCs
  • Identifies Wine through registry keys 2 TTPs 13 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 60 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 7 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Manipulates WinMon driver. 1 IoCs

    Roottkits write to WinMon to hide PIDs from being detected.

  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
  • Suspicious use of SetThreadContext 10 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 8 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 4 IoCs
  • Checks SCSI registry key(s) 3 TTPs 9 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 5 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 5 IoCs
  • Modifies system certificate store 2 TTPs 14 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 39 IoCs
  • Suspicious use of FindShellTrayWindow 38 IoCs
  • Suspicious use of SendNotifyMessage 25 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe
    "C:\Users\Admin\AppData\Local\Temp\43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe"
    1⤵
    • DcRat
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1904
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe /TR "C:\Users\Admin\AppData\Local\Temp\43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe" /F
      2⤵
      • DcRat
      • Creates scheduled task(s)
      PID:2636
    • C:\Users\Admin\AppData\Local\Temp\1000167001\ISetup8.exe
      "C:\Users\Admin\AppData\Local\Temp\1000167001\ISetup8.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2380
      • C:\Users\Admin\AppData\Local\Temp\u1u4.0.exe
        "C:\Users\Admin\AppData\Local\Temp\u1u4.0.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2540
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\FHJKKECFIE.exe"
          4⤵
          • Loads dropped DLL
          PID:1632
          • C:\Users\Admin\AppData\Local\Temp\FHJKKECFIE.exe
            "C:\Users\Admin\AppData\Local\Temp\FHJKKECFIE.exe"
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of AdjustPrivilegeToken
            PID:1668
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /C ping 2.2.2.2 -n 1 -w 3000 > Nul & Del C:\Users\Admin\AppData\Local\Temp\FHJKKECFIE.exe
              6⤵
                PID:2536
                • C:\Windows\SysWOW64\PING.EXE
                  ping 2.2.2.2 -n 1 -w 3000
                  7⤵
                  • Runs ping.exe
                  PID:888
        • C:\Users\Admin\AppData\Local\Temp\u1u4.1.exe
          "C:\Users\Admin\AppData\Local\Temp\u1u4.1.exe"
          3⤵
          • Executes dropped EXE
          • Checks SCSI registry key(s)
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:1468
          • C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe
            "C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD1
            4⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1284
      • C:\Users\Admin\AppData\Local\Temp\1000168001\toolspub1.exe
        "C:\Users\Admin\AppData\Local\Temp\1000168001\toolspub1.exe"
        2⤵
        • Executes dropped EXE
        • Checks SCSI registry key(s)
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        PID:2084
    • C:\Windows\system32\taskeng.exe
      taskeng.exe {1530F0A0-D672-46EE-871F-6348A7240810} S-1-5-21-2297530677-1229052932-2803917579-1000:HKULBIBU\Admin:Interactive:[1]
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:1624
      • C:\Users\Admin\AppData\Local\Temp\43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe
        C:\Users\Admin\AppData\Local\Temp\43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe
        2⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        PID:2348
      • C:\Users\Admin\AppData\Local\Temp\43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe
        C:\Users\Admin\AppData\Local\Temp\43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe
        2⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        PID:2180
      • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        PID:1596
        • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
          C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
          3⤵
          • Executes dropped EXE
          PID:2592
          • C:\Windows\SysWOW64\schtasks.exe
            /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
            4⤵
            • DcRat
            • Creates scheduled task(s)
            PID:2196
      • C:\Users\Admin\AppData\Local\Temp\43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe
        C:\Users\Admin\AppData\Local\Temp\43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe
        2⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        PID:380
      • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        PID:2624
        • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
          C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
          3⤵
          • Executes dropped EXE
          PID:544
      • C:\Users\Admin\AppData\Local\Temp\43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe
        C:\Users\Admin\AppData\Local\Temp\43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe
        2⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        PID:3068
      • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        PID:2408
        • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
          C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
          3⤵
          • Executes dropped EXE
          PID:2880
      • C:\Users\Admin\AppData\Roaming\eariwvd
        C:\Users\Admin\AppData\Roaming\eariwvd
        2⤵
        • Executes dropped EXE
        • Checks SCSI registry key(s)
        • Suspicious behavior: MapViewOfSection
        PID:944
      • C:\Users\Admin\AppData\Local\Temp\43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe
        C:\Users\Admin\AppData\Local\Temp\43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe
        2⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        PID:1180
    • C:\Windows\system32\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\A045.bat" "
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:2528
      • C:\Windows\system32\reg.exe
        reg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 1
        2⤵
          PID:1180
      • C:\Users\Admin\AppData\Local\Temp\C8AD.exe
        C:\Users\Admin\AppData\Local\Temp\C8AD.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:700
        • C:\Users\Admin\AppData\Local\Temp\C8AD.exe
          C:\Users\Admin\AppData\Local\Temp\C8AD.exe
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2072
          • C:\Windows\SysWOW64\icacls.exe
            icacls "C:\Users\Admin\AppData\Local\b0796dcd-0a95-43ab-a9e8-2014e9796f21" /deny *S-1-1-0:(OI)(CI)(DE,DC)
            3⤵
            • Modifies file permissions
            PID:1256
          • C:\Users\Admin\AppData\Local\Temp\C8AD.exe
            "C:\Users\Admin\AppData\Local\Temp\C8AD.exe" --Admin IsNotAutoStart IsNotTask
            3⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            PID:920
            • C:\Users\Admin\AppData\Local\Temp\C8AD.exe
              "C:\Users\Admin\AppData\Local\Temp\C8AD.exe" --Admin IsNotAutoStart IsNotTask
              4⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:1620
              • C:\Users\Admin\AppData\Local\d9a3a3dd-dacb-467e-bd5b-3686245ba905\build2.exe
                "C:\Users\Admin\AppData\Local\d9a3a3dd-dacb-467e-bd5b-3686245ba905\build2.exe"
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                PID:1380
                • C:\Users\Admin\AppData\Local\d9a3a3dd-dacb-467e-bd5b-3686245ba905\build2.exe
                  "C:\Users\Admin\AppData\Local\d9a3a3dd-dacb-467e-bd5b-3686245ba905\build2.exe"
                  6⤵
                  • Executes dropped EXE
                  • Modifies system certificate store
                  PID:2028
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 2028 -s 1416
                    7⤵
                    • Loads dropped DLL
                    • Program crash
                    PID:1888
              • C:\Users\Admin\AppData\Local\d9a3a3dd-dacb-467e-bd5b-3686245ba905\build3.exe
                "C:\Users\Admin\AppData\Local\d9a3a3dd-dacb-467e-bd5b-3686245ba905\build3.exe"
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                PID:3012
                • C:\Users\Admin\AppData\Local\d9a3a3dd-dacb-467e-bd5b-3686245ba905\build3.exe
                  "C:\Users\Admin\AppData\Local\d9a3a3dd-dacb-467e-bd5b-3686245ba905\build3.exe"
                  6⤵
                  • Executes dropped EXE
                  PID:2388
                  • C:\Windows\SysWOW64\schtasks.exe
                    /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
                    7⤵
                    • DcRat
                    • Creates scheduled task(s)
                    PID:284
      • C:\Users\Admin\AppData\Local\Temp\13B.exe
        C:\Users\Admin\AppData\Local\Temp\13B.exe
        1⤵
        • Executes dropped EXE
        PID:2136
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2136 -s 124
          2⤵
          • Loads dropped DLL
          • Program crash
          PID:2112
      • C:\Windows\system32\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\3CB.bat" "
        1⤵
          PID:1892
          • C:\Windows\system32\reg.exe
            reg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 1
            2⤵
              PID:2264
          • C:\Users\Admin\AppData\Local\Temp\3029.exe
            C:\Users\Admin\AppData\Local\Temp\3029.exe
            1⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:2332
            • C:\Users\Admin\AppData\Local\Temp\3029.exe
              "C:\Users\Admin\AppData\Local\Temp\3029.exe"
              2⤵
              • Windows security bypass
              • Executes dropped EXE
              • Loads dropped DLL
              • Windows security modification
              • Adds Run key to start application
              • Checks for VirtualBox DLLs, possible anti-VM trick
              • Drops file in Windows directory
              • Modifies data under HKEY_USERS
              PID:3036
              • C:\Windows\system32\cmd.exe
                C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
                3⤵
                  PID:2816
                  • C:\Windows\system32\netsh.exe
                    netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                    4⤵
                    • Modifies Windows Firewall
                    • Modifies data under HKEY_USERS
                    PID:2656
                • C:\Windows\rss\csrss.exe
                  C:\Windows\rss\csrss.exe
                  3⤵
                  • Drops file in Drivers directory
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Adds Run key to start application
                  • Manipulates WinMon driver.
                  • Manipulates WinMonFS driver.
                  • Drops file in Windows directory
                  • Modifies data under HKEY_USERS
                  • Modifies system certificate store
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2276
                  • C:\Windows\system32\schtasks.exe
                    schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                    4⤵
                    • DcRat
                    • Creates scheduled task(s)
                    PID:2684
                  • C:\Windows\system32\schtasks.exe
                    schtasks /delete /tn ScheduledUpdate /f
                    4⤵
                      PID:2680
                    • C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe
                      "C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"
                      4⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Modifies system certificate store
                      PID:344
                      • C:\Windows\system32\bcdedit.exe
                        C:\Windows\system32\bcdedit.exe -create {71A3C7FC-F751-4982-AEC1-E958357E6813} -d "Windows Fast Mode" -application OSLOADER
                        5⤵
                        • Modifies boot configuration data using bcdedit
                        PID:1648
                      • C:\Windows\system32\bcdedit.exe
                        C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} device partition=C:
                        5⤵
                        • Modifies boot configuration data using bcdedit
                        PID:1240
                      • C:\Windows\system32\bcdedit.exe
                        C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} osdevice partition=C:
                        5⤵
                        • Modifies boot configuration data using bcdedit
                        PID:2460
                      • C:\Windows\system32\bcdedit.exe
                        C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} systemroot \Windows
                        5⤵
                        • Modifies boot configuration data using bcdedit
                        PID:2384
                      • C:\Windows\system32\bcdedit.exe
                        C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} path \Windows\system32\osloader.exe
                        5⤵
                        • Modifies boot configuration data using bcdedit
                        PID:2540
                      • C:\Windows\system32\bcdedit.exe
                        C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} kernel ntkrnlmp.exe
                        5⤵
                        • Modifies boot configuration data using bcdedit
                        PID:1484
                      • C:\Windows\system32\bcdedit.exe
                        C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} recoveryenabled 0
                        5⤵
                        • Modifies boot configuration data using bcdedit
                        PID:2612
                      • C:\Windows\system32\bcdedit.exe
                        C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nx OptIn
                        5⤵
                        • Modifies boot configuration data using bcdedit
                        PID:2148
                      • C:\Windows\system32\bcdedit.exe
                        C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nointegritychecks 1
                        5⤵
                        • Modifies boot configuration data using bcdedit
                        PID:608
                      • C:\Windows\system32\bcdedit.exe
                        C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} inherit {bootloadersettings}
                        5⤵
                        • Modifies boot configuration data using bcdedit
                        PID:2804
                      • C:\Windows\system32\bcdedit.exe
                        C:\Windows\system32\bcdedit.exe -displayorder {71A3C7FC-F751-4982-AEC1-E958357E6813} -addlast
                        5⤵
                        • Modifies boot configuration data using bcdedit
                        PID:2676
                      • C:\Windows\system32\bcdedit.exe
                        C:\Windows\system32\bcdedit.exe -timeout 0
                        5⤵
                        • Modifies boot configuration data using bcdedit
                        PID:1880
                      • C:\Windows\system32\bcdedit.exe
                        C:\Windows\system32\bcdedit.exe -default {71A3C7FC-F751-4982-AEC1-E958357E6813}
                        5⤵
                        • Modifies boot configuration data using bcdedit
                        PID:2580
                    • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                      C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
                      4⤵
                      • Executes dropped EXE
                      PID:1048
                    • C:\Windows\system32\bcdedit.exe
                      C:\Windows\Sysnative\bcdedit.exe /v
                      4⤵
                      • Modifies boot configuration data using bcdedit
                      PID:556
                    • C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe
                      C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe
                      4⤵
                      • Executes dropped EXE
                      PID:1876
                    • C:\Windows\system32\schtasks.exe
                      schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                      4⤵
                      • DcRat
                      • Creates scheduled task(s)
                      PID:3048
                    • C:\Windows\windefender.exe
                      "C:\Windows\windefender.exe"
                      4⤵
                      • Executes dropped EXE
                      PID:756
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                        5⤵
                          PID:588
                          • C:\Windows\SysWOW64\sc.exe
                            sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                            6⤵
                            • Launches sc.exe
                            • Suspicious use of AdjustPrivilegeToken
                            PID:292
                • C:\Windows\explorer.exe
                  explorer.exe
                  1⤵
                  • Modifies Installed Components in the registry
                  • Loads dropped DLL
                  • Modifies registry class
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  PID:1796
                  • C:\Users\Admin\AppData\Local\Temp\2A4B.exe
                    C:\Users\Admin\AppData\Local\Temp\2A4B.exe
                    2⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • Drops file in Windows directory
                    • Suspicious use of FindShellTrayWindow
                    PID:2176
                  • C:\Users\Admin\AppData\Local\Temp\30E1.exe
                    C:\Users\Admin\AppData\Local\Temp\30E1.exe
                    2⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Loads dropped DLL
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • Drops file in Windows directory
                    PID:1056
                    • C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe
                      "C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe"
                      3⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Loads dropped DLL
                      • Adds Run key to start application
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      PID:2608
                      • C:\Users\Admin\AppData\Local\Temp\1000836001\osminog.exe
                        "C:\Users\Admin\AppData\Local\Temp\1000836001\osminog.exe"
                        4⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        • Suspicious use of AdjustPrivilegeToken
                        PID:500
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                          5⤵
                            PID:2076
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 2076 -s 252
                              6⤵
                              • Program crash
                              PID:1676
                        • C:\Users\Admin\AppData\Local\Temp\1000837001\goldprimeldlldf.exe
                          "C:\Users\Admin\AppData\Local\Temp\1000837001\goldprimeldlldf.exe"
                          4⤵
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          PID:2644
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                            5⤵
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2460
                        • C:\Windows\SysWOW64\rundll32.exe
                          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main
                          4⤵
                          • Loads dropped DLL
                          PID:2692
                          • C:\Windows\system32\rundll32.exe
                            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main
                            5⤵
                            • Blocklisted process makes network request
                            • Loads dropped DLL
                            PID:2432
                            • C:\Windows\system32\netsh.exe
                              netsh wlan show profiles
                              6⤵
                                PID:2392
                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\297530677122_Desktop.zip' -CompressionLevel Optimal
                                6⤵
                                • Suspicious use of AdjustPrivilegeToken
                                PID:884
                          • C:\Users\Admin\AppData\Local\Temp\1000873001\random.exe
                            "C:\Users\Admin\AppData\Local\Temp\1000873001\random.exe"
                            4⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            PID:996
                          • C:\Users\Admin\AppData\Local\Temp\1000875001\amadka.exe
                            "C:\Users\Admin\AppData\Local\Temp\1000875001\amadka.exe"
                            4⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Loads dropped DLL
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • Drops file in Windows directory
                            • Suspicious use of FindShellTrayWindow
                            PID:556
                            • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                              "C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"
                              5⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Loads dropped DLL
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              PID:2380
                              • C:\Users\Admin\AppData\Local\Temp\1000022001\1af57d3123.exe
                                "C:\Users\Admin\AppData\Local\Temp\1000022001\1af57d3123.exe"
                                6⤵
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                PID:1836
                          • C:\Users\Admin\AppData\Local\Temp\1000978001\fullwork.exe
                            "C:\Users\Admin\AppData\Local\Temp\1000978001\fullwork.exe"
                            4⤵
                            • Executes dropped EXE
                            • Suspicious use of SetThreadContext
                            PID:2424
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                              5⤵
                                PID:1464
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -u -p 1464 -s 256
                                  6⤵
                                  • Program crash
                                  PID:2616
                        • C:\Users\Admin\AppData\Local\Temp\3574.exe
                          C:\Users\Admin\AppData\Local\Temp\3574.exe
                          2⤵
                          • Executes dropped EXE
                          PID:2332
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            "powershell" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"
                            3⤵
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2772
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            "powershell" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData"
                            3⤵
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3008
                      • C:\Windows\system32\AUDIODG.EXE
                        C:\Windows\system32\AUDIODG.EXE 0x534
                        1⤵
                        • Suspicious use of AdjustPrivilegeToken
                        PID:660
                      • C:\Windows\system32\makecab.exe
                        "C:\Windows\system32\makecab.exe" C:\Windows\Logs\CBS\CbsPersist_20240321222808.log C:\Windows\Logs\CBS\CbsPersist_20240321222808.cab
                        1⤵
                        • Drops file in Windows directory
                        PID:2328
                      • C:\Windows\windefender.exe
                        C:\Windows\windefender.exe
                        1⤵
                        • Executes dropped EXE
                        • Modifies data under HKEY_USERS
                        PID:1468

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

                        Filesize

                        1KB

                        MD5

                        608881bccd83bd848d8e1c5e44052740

                        SHA1

                        ef6b2e8c88544fc767f62c5e6479929a414faca4

                        SHA256

                        fe4388c8a609d41bf65a8925f7002372fd327de30af9cbf98c0cdd93d395f7d5

                        SHA512

                        fa978bb43a9a5a2a5489be9911a0b2c0ea1dc0a3756844a42246121bda728a6cdf5120b0890eb921f8ddf57ab4b07e1d86764566e4ab56dc4bb1191f91974cf3

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

                        Filesize

                        67KB

                        MD5

                        753df6889fd7410a2e9fe333da83a429

                        SHA1

                        3c425f16e8267186061dd48ac1c77c122962456e

                        SHA256

                        b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

                        SHA512

                        9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

                        Filesize

                        724B

                        MD5

                        8202a1cd02e7d69597995cabbe881a12

                        SHA1

                        8858d9d934b7aa9330ee73de6c476acf19929ff6

                        SHA256

                        58f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5

                        SHA512

                        97ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

                        Filesize

                        1KB

                        MD5

                        a266bb7dcc38a562631361bbf61dd11b

                        SHA1

                        3b1efd3a66ea28b16697394703a72ca340a05bd5

                        SHA256

                        df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

                        SHA512

                        0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

                        Filesize

                        410B

                        MD5

                        85ef91907f91663fd9e9c38fa77b4f40

                        SHA1

                        aec1822c007421e2b4b24033af3c0f7a4785459b

                        SHA256

                        b7ed2515269ada8d3dea03c9122ea24708ab92fecd73df74b9889eb343558b79

                        SHA512

                        d4cd3be2d7a99ec9d9ea9881ba5512a0dfca121288d7c2279bac3b6f5e88ce59fb41f4ad79acf976fee5943abe83d34ccd2c5b0a9f6fbfb74d17a5cf00ff5994

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                        Filesize

                        344B

                        MD5

                        1efde057b3201a0210000e6e2f497f6f

                        SHA1

                        95e533274f2e3ddcf65c31bf798065bc564830ae

                        SHA256

                        4793796d4a018bdcbe1245b0a95b068fc6bd74f1ca46d70a4b583140b40b5fe8

                        SHA512

                        aac6419ce7471559ecdeb2a5e032d8d64b3df6fe5ed91d25e43b9d2c65ec62cfa107f084ad50577f395113e4989e14d1f8c834780db585537f8a4e670fcfbdac

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                        Filesize

                        344B

                        MD5

                        bd74c7b9b736699d48fe7bef948a8d87

                        SHA1

                        29bffa07adb3286cc96367b17ad7c0e85b3c2dd2

                        SHA256

                        b88210a91866daeb88dbe1212af4579f261723bfbe7236d319be3e2cbb081e95

                        SHA512

                        223e1db974c7f606337d79bc90ecbd277baaca5c4d00b02f11ad7207b8edbdcbae5074f2662834b60bdcc7db5d9709e61e58d706a4a92c5893f185452282cd19

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                        Filesize

                        344B

                        MD5

                        6b4bd59d8f10c50018a72104ea35308c

                        SHA1

                        97eaae464ff1d15d885a63260f6d0c04ec2e67d4

                        SHA256

                        417192ab05f778674c347b4467afce129c0d3d994e19f48e9e29aa5138461d19

                        SHA512

                        b8da4ff3942e9133b0d17d1bc4bece1c7ac9b22b1d99c952afb99a75d7e28c1c825e14e020981425f468183d8a6a29da669bf421660eab13233e19d94feedfe7

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

                        Filesize

                        392B

                        MD5

                        937b8b08b69a27942456420c9ecfc9df

                        SHA1

                        141c595232a22d4ac188cca5b62d61564fd0448a

                        SHA256

                        8a8fe3d4c588c518df40420f81b6e0ac15356367a32fbb1eddae6f2c4e5f860d

                        SHA512

                        89ed4e9a7b0b3ecf2497527355bbeb3846fef25e694ae2751d79ae7fbc1fd8e342a5f4befbd15566fc5ac7ae22149d15235fb19d8e79d1c58382e9e9196eccff

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

                        Filesize

                        242B

                        MD5

                        fd965ff0c6bddfa042e90dcf89ab7c26

                        SHA1

                        0466d98585f1e28310593d11246260d5608bff4c

                        SHA256

                        abac14c56958256257f5e502b57a7d75897b19618dbfffc7e2da238b4bab89b2

                        SHA512

                        cb9dd838947ecd2dafe604ca5f81cb0f610785ae0d7f0df66f85f8f01e3c40fd440890b7378ab5726daaa21762e1531ae33f177e881266e16d2b95447d9fb022

                      • C:\Users\Admin\AppData\Local\Microsoft\ApplicationInsights\f40fa09571ae3e4604ca1ef5093c12d04345052412cd199086553bfab6d3b7c7\86ffde9755da4701a321d5dc35f64729.tmp

                        Filesize

                        1KB

                        MD5

                        a8a8c7a7a3a6a33d31ba06b48ed2dd7d

                        SHA1

                        641d7d7df6513d89ceb729f44b02543f867ad606

                        SHA256

                        281532ff18e7a49a8f66ba7fc998a1b876fbb40ee0191dd797f60d4ebd34c0e6

                        SHA512

                        52dfcda6ddef61e9b7cc2121367030adbd0be0f9512481e96f24029cd0432ca7bdd84918c305b67288e3670ed82a6fa6fd98ae7c9bb8ed06b720812c0a5733e3

                      • C:\Users\Admin\AppData\Local\Temp\1000167001\ISetup8.exe

                        Filesize

                        410KB

                        MD5

                        c0411ffee313c4de470f1ec2ed970af7

                        SHA1

                        cdb8fcc80b2e723322b20e0d520d10a7536061fa

                        SHA256

                        b5628490cabe4a886c6bc86ac2880d853569cecca6cf054c7fb7ae86b7f4d20c

                        SHA512

                        a0750cecbbde3c91315eaefb5c0d4925cd558a1d10d3c97ec9656084659d521fb26980520ef735a97b959806cdffaf8d48bedfb39119a8ab2ebcbed5bb6ccad1

                      • C:\Users\Admin\AppData\Local\Temp\1000168001\toolspub1.exe

                        Filesize

                        231KB

                        MD5

                        8ad1f09f9bd6d1e486898d9b0c60b5f7

                        SHA1

                        e6c0b8e8a15ee4ed8ed21fc0be618cd39927f225

                        SHA256

                        d640e24c44544c63b539f4c1ea7bf77b117356fafa1287de0dde8ebd52297f68

                        SHA512

                        f399f70d552bf0d64f9ba9847d59e229eb50b73ed8082b4056cff99e2e2206a3d26d66d2f36481c90d5fec568ab491e35a65675a1499c5270041a8f88227e4aa

                      • C:\Users\Admin\AppData\Local\Temp\1000836001\osminog.exe

                        Filesize

                        534KB

                        MD5

                        a3f8b60a08da0f600cfce3bb600d5cb3

                        SHA1

                        b00d7721767b717b3337b5c6dade4ebf2d56345e

                        SHA256

                        0c608a9b1e70bf8b51a681a8390c8e4743501c45b84cf4d59727aba2fc33cadb

                        SHA512

                        14f63e415133ca438d3c217d5fb3ecf0ad76e19969c54d356f46282230230f1b254fbfc8ae5f78809dc189a9648be2dc1398927b3f089c525cd1105a3843f60d

                      • C:\Users\Admin\AppData\Local\Temp\1000837001\goldprimeldlldf.exe

                        Filesize

                        464KB

                        MD5

                        c084d6f6ba40534fbfc5a64b21ef99ab

                        SHA1

                        0b4a17da83c0a8abbc8fab321931d5447b32b720

                        SHA256

                        afd83290a2adb219c3f1b8fbf23c27b0994fe76dfbb7dc0b416530dc0e21f624

                        SHA512

                        a5384a2f7029cf946fde44e1ff30775754ce525ca5a6fdac14184872b6e684cb6e585053cb86d32f82cbd3db48eb195ba3a642d8ee3774be579fccd993938ca1

                      • C:\Users\Admin\AppData\Local\Temp\1000873001\random.exe

                        Filesize

                        2.9MB

                        MD5

                        aafc00662f8c68cbd45a08c885a2d6fc

                        SHA1

                        bd1f70f190579debb213bf3022a304c0d9ce6a9f

                        SHA256

                        8003cded35a962784da90078ec690fa1a6ee9d565d1d9da457811e292745d955

                        SHA512

                        20a61dbfa4ab76de740fea6d976e3ff3f48f7b2649dbe10c2f545c0c45a272652b951c6e7ca5a9d31a90ac157498a2368f0f0b72657348d23614d75da4207774

                      • C:\Users\Admin\AppData\Local\Temp\1000875001\amadka.exe

                        Filesize

                        1.8MB

                        MD5

                        444532fcd858195a7e6e08dc42d9b119

                        SHA1

                        d6648434771b3072314ae6f170a771f0f1e9408d

                        SHA256

                        3c0f5360b66ae1e40769081558167c5dbc9cd849998c1cc49d921a74acd610d1

                        SHA512

                        4f39c26eba4edfa95129f11ab43e38d54a259955b353788d57e820986fbe5fddf84f5e43436e5e1a99bfdb75898aa2f977d77a48cd6bf6e153feb2cecc5f89b2

                      • C:\Users\Admin\AppData\Local\Temp\1000978001\fullwork.exe

                        Filesize

                        451KB

                        MD5

                        b2b60c50903a73efffcb4e33ce49238f

                        SHA1

                        9b6f27fc410748ae1570978d7a6aba95a1041eea

                        SHA256

                        29d409af265261b204f6eeeedb5e9bb1f7a829b723a5d1d78384066744bddbe1

                        SHA512

                        2c66a1615de77157f57c662de2e3ec97deb8cb6aadc0a03ff0acc3b269affd5ae0d50dfef85939ca9c1a8c6d47ff915061157e7da92dc286cb6ddd9b06a88126

                      • C:\Users\Admin\AppData\Local\Temp\13B.exe

                        Filesize

                        6.5MB

                        MD5

                        9e52aa572f0afc888c098db4c0f687ff

                        SHA1

                        ef7c2bb222e69ad0e10c8686eb03dcbee7933c2b

                        SHA256

                        4a40f9d491f09521f4b0c6076a0eb488f6d8e1cf4b67aa6569c2ccce13556443

                        SHA512

                        d0991e682ae8c954721e905753b56c01f91b85313beb9996331793c3efa8acc13d574ef5ba44853ecc3e05822931ed655bad1924fa11b774a43e015f42185f62

                      • C:\Users\Admin\AppData\Local\Temp\2A4B.exe

                        Filesize

                        1.8MB

                        MD5

                        3c44bfe54c1233d8645cb87101be526d

                        SHA1

                        dd7d94832980c162e5793dd27d2024e8aa1af18d

                        SHA256

                        990d288499b6945af3246331757db918f78d9d94889b973836b1289fa6cd1123

                        SHA512

                        c365a25e7c906458b960743a3221a632c0cf59d5b9bd73681444f1b6797973c1098953d50deaeee315f42aaa6949890cc281024e30258350f74a7959e2de80a3

                      • C:\Users\Admin\AppData\Local\Temp\3029.exe

                        Filesize

                        4.1MB

                        MD5

                        105f3de24a97884559ba933061f7c46c

                        SHA1

                        3088f13998ee97020394f584a76c05a48c3ca073

                        SHA256

                        c59efa3d6fe0d425b42bfc950fa83b307058c704eb896376e93f346c2cb818be

                        SHA512

                        69420543ee5cecd1cb98e34e6293238394a01118ff94b324dc48ccc2c3d060f6d0002fa805d05611c99892c6769e095fdf3093f53cc8f3f320912baad07102d3

                      • C:\Users\Admin\AppData\Local\Temp\A045.bat

                        Filesize

                        77B

                        MD5

                        55cc761bf3429324e5a0095cab002113

                        SHA1

                        2cc1ef4542a4e92d4158ab3978425d517fafd16d

                        SHA256

                        d6cceb3c71b80403364bf142f2fa4624ee0be36a49bac25ed45a497cf1ce9c3a

                        SHA512

                        33f9f5cad22d291077787c7df510806e4ac31f453d288712595af6debe579fabed6cdf4662e46e6fa94de135b161e739f55cfae05c36c87af85ed6a6ad1c9155

                      • C:\Users\Admin\AppData\Local\Temp\C8AD.exe

                        Filesize

                        727KB

                        MD5

                        5dc36ffbdf9face7d614560922f3691a

                        SHA1

                        e228e19cb15b9b2048b16712f72bd7e366be60cc

                        SHA256

                        b325992b3e758b5f8bc5b38d5ff26d7f05708ff720f49d5ce3963a7bc738ef3d

                        SHA512

                        de51660bdd4021268b9d08b8de45487880588ef5fa4b684ef7a844933fb82e157c0f5b23641781add8dcea16c3753a92f75261e59af0c6065de2ea15ed2209f3

                      • C:\Users\Admin\AppData\Local\Temp\CabF538.tmp

                        Filesize

                        65KB

                        MD5

                        ac05d27423a85adc1622c714f2cb6184

                        SHA1

                        b0fe2b1abddb97837ea0195be70ab2ff14d43198

                        SHA256

                        c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

                        SHA512

                        6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

                      • C:\Users\Admin\AppData\Local\Temp\FHJKKECFIE.exe

                        Filesize

                        101KB

                        MD5

                        42b838cf8bdf67400525e128d917f6e0

                        SHA1

                        a578f6faec738912dba8c41e7abe1502c46d0cae

                        SHA256

                        0e4ffba62ce9a464aa1b7ff9f1e55ace8f51ff1e15102d856f801a81f8b4607d

                        SHA512

                        f64b39d885375251ab7db72c57dc5b5095f0c6412169f1035d1f6a25b8415a2a01004d06bfa0267cf683ef7dea7a9f969ad43fde5a4376f1fcb65a57403433c0

                      • C:\Users\Admin\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\AAF33CF37E194E98957768CF9C02DE8E2\download.error

                        Filesize

                        558KB

                        MD5

                        9773ff948729b73a8e12abc9543cd0ce

                        SHA1

                        5371bacd1f64aafdf0572ee636617abb394ce8dc

                        SHA256

                        13e699ff9255e0771d567a4ff5e2e1776f1bcf2443ffbcd6531e88548416b584

                        SHA512

                        e642a575a1f19287fc26a1d93996939dafbb74943479d51447fad25441e050b41a77454c3b9cd28ef9802104671331596dc612da47bf7328f6f3849c4fb200cb

                      • C:\Users\Admin\AppData\Local\Temp\Symbols\winload_prod.pdb\768283CA443847FB8822F9DB1F36ECC51\download.error

                        Filesize

                        209KB

                        MD5

                        0d42de7455d04dd82766067def4c1cb0

                        SHA1

                        2341b9166de42ee8d3716a6c739101a35c13a139

                        SHA256

                        e5829248802e027b5d1e57a749dc5af8db7cc734e78b55e204ea6afcf12f1ede

                        SHA512

                        188b73e8ad76be196482de75d1170168b1ef95e72df3563657d4ed4df52e1f991a2ca40fbed75c7bce29f2c14742ee30ffc78c05a9d996617011a3cb1ad28c89

                      • C:\Users\Admin\AppData\Local\Temp\Tar2D97.tmp

                        Filesize

                        171KB

                        MD5

                        9c0c641c06238516f27941aa1166d427

                        SHA1

                        64cd549fb8cf014fcd9312aa7a5b023847b6c977

                        SHA256

                        4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

                        SHA512

                        936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

                      • C:\Users\Admin\AppData\Local\Temp\Tar2F61.tmp

                        Filesize

                        175KB

                        MD5

                        dd73cead4b93366cf3465c8cd32e2796

                        SHA1

                        74546226dfe9ceb8184651e920d1dbfb432b314e

                        SHA256

                        a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

                        SHA512

                        ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63

                      • C:\Users\Admin\AppData\Local\Temp\iolo\dm\ioloDMLog.txt

                        Filesize

                        2KB

                        MD5

                        08c6cc8d50634b50e77fbf3458fe7ea6

                        SHA1

                        78408feeeca2ca515309440d7aa7151bef673306

                        SHA256

                        f275e5de26ffe5b2fa9f78405a2bc9177e0462f88e848a09f62ad4c1b8004d62

                        SHA512

                        db049b17cd1305ea50526ac96405caf3d0cc0a4e870ca2a9ce1c97629a184841fbab05550eb73dff18d4903202dcfedb80e4cd7fdcd2ab5b54ee3cd505407524

                      • C:\Users\Admin\AppData\Local\Temp\ntkrnlmp.exe

                        Filesize

                        5.3MB

                        MD5

                        1afff8d5352aecef2ecd47ffa02d7f7d

                        SHA1

                        8b115b84efdb3a1b87f750d35822b2609e665bef

                        SHA256

                        c41acc53cde89b94d55d6932ddd55a212ba910e1fade3da138670bb5b18ae4e1

                        SHA512

                        e5dc54c60be702e11772dc729eec5ec7140f293545aa3d57282adacddf686483393b0c940bbd397a9d50a6cda093865b143ae00c51ce3bf5d6b00241f97b3cdb

                      • C:\Users\Admin\AppData\Local\Temp\osloader.exe

                        Filesize

                        228KB

                        MD5

                        f20fb4a7f457ccaa95cfb94679b826da

                        SHA1

                        d894fb6bfa15065e2edfce778c42604914f50ad3

                        SHA256

                        41d20787826b7a650f66d551b4095b14e2998a39b1a6a0e9a703a1f085e3037b

                        SHA512

                        8988271a8add94a39dbd299902d1ca3199854c920311f6f2570bc2dcf33a194263f9286b062be8c44b5346c822b1d0936889844c6c74610ed8a75c029a295b79

                      • C:\Users\Admin\AppData\Local\Temp\u1u4.0.exe

                        Filesize

                        193KB

                        MD5

                        578499b5c73b9dd84e80f31e42e72528

                        SHA1

                        e875e38ccca756a14a6c1083e8054b8b1af05565

                        SHA256

                        c0c3fff2150deddfdcf4c891a88a9cfc7d662438da07caad2fb0648a716c7e2a

                        SHA512

                        d3c3890cb98d02b65a5fae1f4d3e95701866a1e9d08424b9e475257fab1cc28941d72ae3f29393219c3398b46c84c6d6cd29ee25198d8f55f04c63a7dc16e0de

                      • C:\Users\Admin\AppData\Local\Temp\u1u4.1.exe

                        Filesize

                        364KB

                        MD5

                        bbd82bf2376559f3334c0f8d85da940c

                        SHA1

                        721ea7303cf2fb70f2f6b57591e25b7bb41bbec5

                        SHA256

                        d440a0e06023f0932657547cd2e82c79e6840131502f99aefc1159262f7063ac

                        SHA512

                        c761e0b49645ecccf7259214a61b9d2589385f6bfa9acaddbc5d16c82263ef95ead0d2d1fed1a95c46ff71582e1150ebf605fda83af1e317c4b49ece30711780

                      • C:\Users\Admin\AppData\Local\Temp\u1u4.1.exe

                        Filesize

                        45KB

                        MD5

                        469dbf70f0de5314022b6b50ba15a16b

                        SHA1

                        33cc63ce1c1f12414e0ad1079cb123a1a94c8ad2

                        SHA256

                        de3277d438db9854ed187428afa264dec8444cd0cefdae6e28fcd913083b76e7

                        SHA512

                        118ea88231a25983c623d845ff081f702705d5e14bee9589ddaa41065560cfacbfe349a75cba870ad99ba9d68903c2f93019b5f4ac4f48b240c09150bb0b8987

                      • C:\Users\Admin\AppData\Local\d9a3a3dd-dacb-467e-bd5b-3686245ba905\build2.exe

                        Filesize

                        342KB

                        MD5

                        26544ec9adc1864de80222fb0b38e6dc

                        SHA1

                        2ca52374bb468a8e2c10d39b64d1e4e9d7d0adee

                        SHA256

                        03b38ccf2c3145839d5ea7c5ccec609de3a67a7e435e94ca05c8c080d9df4411

                        SHA512

                        f7eb99db8eb4df15ac252bd4523a407b32089d22c435303499bc3813ecdf1ffbc8483417bb97e901fba3e3f36c6e9e47eb30fa78b7c461d3f78f5d5899fae730

                      • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                        Filesize

                        1.2MB

                        MD5

                        92fbdfccf6a63acef2743631d16652a7

                        SHA1

                        971968b1378dd89d59d7f84bf92f16fc68664506

                        SHA256

                        b4588feacc183cd5a089f9bb950827b75df04bd5a6e67c95ff258e4a34aa0d72

                        SHA512

                        b8ea216d4a59d8858fd4128abb555f8dcf3acca9138e663b488f09dc5200db6dc11ecc235a355e801145bbbb44d7beac6147949d75d78b32fe9cfd2fa200d117

                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\4S2DFP4FUW4OTGNKFCOR.temp

                        Filesize

                        7KB

                        MD5

                        97591baec46f7adc9f3a4d6deaff5d5c

                        SHA1

                        adac9e07b67d5906330f2297d2b692d8266964b8

                        SHA256

                        638a11a8b867f82ef68a326a0a15d7d9cde3a84555b13f8b11970ce465aa7c46

                        SHA512

                        15e2f99b12341e109b5adc10a186443c735a49c65bb3960582dd203fef5690a594586665fdb3017c51382420223f2cb37cad54657a44f47dfeb41a39767066b6

                      • \ProgramData\mozglue.dll

                        Filesize

                        272KB

                        MD5

                        17ba7dfb767f18ff3c001842fe020cf6

                        SHA1

                        1491eeefddb1610136f6d1a00d2e676866ccf241

                        SHA256

                        0fa5677447e0086879ae3bbeea9a6eea9502f44c0fd3eb7d8cb19b394f1a7267

                        SHA512

                        282754e8007f3525a6ed51922b4820f6dfe80ce59a97ca51b9e3e6f394c0d59cc3f6a8621d881be032624bf4fb9981b139a79924468affc63c9d15327cc68d40

                      • \ProgramData\nss3.dll

                        Filesize

                        389KB

                        MD5

                        643c85822c8dc79d1d145ed38f9ca00a

                        SHA1

                        3b991447c39ed8c0fce036db108742ffd8c256a2

                        SHA256

                        c6ab589faa26679e6ebe124131fa895aa5b6da53e7d20e63e6756490b4e413d7

                        SHA512

                        1d311253a2cd6039e27877e9c1d1d4ef642cb8f41db3fa6ed16aad974859b9fa13b2004ba31ce3022e8e61ab9b1ae838c019484599c0ebb01fbb98195fe3f400

                      • \Users\Admin\AppData\Local\Temp\C8AD.exe

                        Filesize

                        640KB

                        MD5

                        cfec9f6ac8357c5671c34fca88eb1118

                        SHA1

                        91bfdfb908daf4a105e034459033218d0047f9d8

                        SHA256

                        75665ab285a7b2cffcbdbf77926ac18cb35385ff359c93af3f9506d943e5db60

                        SHA512

                        568b35a65e34afb1bb0234994c9d27ba66a95ba57c87c78a046df4b2059d4f12761d832198eec5b0b7ba68b3343b855ec87cca99117b11492c3dc3c27b007964

                      • \Users\Admin\AppData\Local\Temp\u1u4.0.exe

                        Filesize

                        261KB

                        MD5

                        606625739201aa74813d211613b2aa82

                        SHA1

                        4409efa953358e31d940d698470bd0e2d952e8a7

                        SHA256

                        848e37628e8301c0845cab2eab491e49995db81fec86dec3841af2fc6ee584e2

                        SHA512

                        d6c1dff70bec93e54a1fa4dc420a2e1ca78955d9b5e1f25324732cb55dbe79642a949d5ffe7218d3b9e6534287f9924286d0eaa765cfd73b5f52f84924ef99f1

                      • \Users\Admin\AppData\Local\Temp\u1u4.1.exe

                        Filesize

                        1.2MB

                        MD5

                        4141025fead27b4040cc5aeb56b721cc

                        SHA1

                        dd1c19423218ec171010aa4255a879bab4c5a232

                        SHA256

                        9deeb95af6bbe254f8365e3df7541a52b012c7fd492fe29b874ccf11bcaa7f7a

                        SHA512

                        1d90df90132b91fcb86c12b89cc82829c1afb2841736f5a36809157d80b0a26b87b11aef643f402f8f196eb0d64885ecca73333a945c490694a7c48a56176f02

                      • \Users\Admin\AppData\Local\Temp\u1u4.1.exe

                        Filesize

                        276KB

                        MD5

                        54d0e2131daef2b41a2169660058469c

                        SHA1

                        516935b75ec5457e0b9478ca4b2a3c09c5a39476

                        SHA256

                        fc14491db3698a4c46839a90acbac2094776162e968e052288c6ad5cf45ee372

                        SHA512

                        f836557ecff9dd169e17a568e3239dbc7b08272a4532eb3d1d3e35dd6786685451b8156c347091be49808518a3056bb98d160c6c9739caadc6d4a4e5c7be712b

                      • \Users\Admin\AppData\Local\Temp\u1u4.1.exe

                        Filesize

                        314KB

                        MD5

                        56c8183f691a8a1aa4e5a1ffc839b6e8

                        SHA1

                        f5125317f9fe57018e7ec42a9b7cee99845d91a5

                        SHA256

                        b1b463375abf8bf7871d8e4ff6f429fa8803f426352ef345d82aa5130fdee709

                        SHA512

                        a5c09a0056b58361d6010194b1a3cd611fbfa4aabd8f21190b01cbae0a76737adac6441444861cb2378edf8c7ff93ab055967c53e4e6b15499129ad5bca01950

                      • \Users\Admin\AppData\Local\Temp\u1u4.1.exe

                        Filesize

                        192KB

                        MD5

                        67649f670972f4f86127948c86db6065

                        SHA1

                        eb2f58d62e49341a451f56a00b1c280bf38523fe

                        SHA256

                        4b3f155666368a446ad91723ef98305e78dabd987e38862c12372508189ac79a

                        SHA512

                        8f334c3013b628fc709f37d7f701d655172302573a71c766d33dd9746c1d7587f5b0d911c47757a28e4fbd87e2f1010516f9bb2d2442f0486c56dd31e7c23292

                      • \Users\Admin\AppData\Local\d9a3a3dd-dacb-467e-bd5b-3686245ba905\build3.exe

                        Filesize

                        299KB

                        MD5

                        41b883a061c95e9b9cb17d4ca50de770

                        SHA1

                        1daf96ec21d53d9a4699cea9b4db08cda6fbb5ad

                        SHA256

                        fef2c8ca07c500e416fd7700a381c39899ee26ce1119f62e7c65cf922ce8b408

                        SHA512

                        cdd1bb3a36182575cd715a52815765161eeaa3849e72c1c2a9a4e84cc43af9f8ec4997e642702bb3de41f162d2e8fd8717f6f8302bba5306821ee4d155626319

                      • memory/700-270-0x0000000000360000-0x00000000003F2000-memory.dmp

                        Filesize

                        584KB

                      • memory/920-306-0x0000000000220000-0x00000000002B2000-memory.dmp

                        Filesize

                        584KB

                      • memory/1188-108-0x0000000002ED0000-0x0000000002EE6000-memory.dmp

                        Filesize

                        88KB

                      • memory/1284-207-0x0000000005A20000-0x0000000005A2A000-memory.dmp

                        Filesize

                        40KB

                      • memory/1284-198-0x000000001E660000-0x000000001E712000-memory.dmp

                        Filesize

                        712KB

                      • memory/1284-257-0x000000001E490000-0x000000001E510000-memory.dmp

                        Filesize

                        512KB

                      • memory/1284-255-0x000000001E490000-0x000000001E510000-memory.dmp

                        Filesize

                        512KB

                      • memory/1284-240-0x0000000005A20000-0x0000000005A2A000-memory.dmp

                        Filesize

                        40KB

                      • memory/1284-241-0x0000000005A20000-0x0000000005A2A000-memory.dmp

                        Filesize

                        40KB

                      • memory/1284-187-0x000007FEF5B00000-0x000007FEF64EC000-memory.dmp

                        Filesize

                        9.9MB

                      • memory/1284-188-0x0000000000A10000-0x00000000042E2000-memory.dmp

                        Filesize

                        56.8MB

                      • memory/1284-189-0x000000001E490000-0x000000001E510000-memory.dmp

                        Filesize

                        512KB

                      • memory/1284-190-0x000000001EED0000-0x000000001EFDE000-memory.dmp

                        Filesize

                        1.1MB

                      • memory/1284-192-0x0000000005990000-0x000000000599C000-memory.dmp

                        Filesize

                        48KB

                      • memory/1284-191-0x00000000005E0000-0x00000000005F0000-memory.dmp

                        Filesize

                        64KB

                      • memory/1284-193-0x0000000000A00000-0x0000000000A14000-memory.dmp

                        Filesize

                        80KB

                      • memory/1284-194-0x000000001E570000-0x000000001E594000-memory.dmp

                        Filesize

                        144KB

                      • memory/1284-225-0x000000001E490000-0x000000001E510000-memory.dmp

                        Filesize

                        512KB

                      • memory/1284-197-0x000000001E590000-0x000000001E5BA000-memory.dmp

                        Filesize

                        168KB

                      • memory/1284-196-0x0000000005BD0000-0x0000000005BDA000-memory.dmp

                        Filesize

                        40KB

                      • memory/1284-199-0x000000001F5B0000-0x000000001F62A000-memory.dmp

                        Filesize

                        488KB

                      • memory/1284-200-0x0000000005930000-0x0000000005992000-memory.dmp

                        Filesize

                        392KB

                      • memory/1284-258-0x000000001E490000-0x000000001E510000-memory.dmp

                        Filesize

                        512KB

                      • memory/1284-201-0x0000000005900000-0x000000000590A000-memory.dmp

                        Filesize

                        40KB

                      • memory/1284-205-0x000000001FCC0000-0x000000001FFC0000-memory.dmp

                        Filesize

                        3.0MB

                      • memory/1284-221-0x000007FEF5B00000-0x000007FEF64EC000-memory.dmp

                        Filesize

                        9.9MB

                      • memory/1284-208-0x0000000005A20000-0x0000000005A2A000-memory.dmp

                        Filesize

                        40KB

                      • memory/1284-209-0x000000001E490000-0x000000001E510000-memory.dmp

                        Filesize

                        512KB

                      • memory/1284-210-0x000000001E490000-0x000000001E510000-memory.dmp

                        Filesize

                        512KB

                      • memory/1284-211-0x000000001DFE0000-0x000000001DFEA000-memory.dmp

                        Filesize

                        40KB

                      • memory/1284-212-0x000000001DFF0000-0x000000001E012000-memory.dmp

                        Filesize

                        136KB

                      • memory/1284-216-0x000000001E010000-0x000000001E01C000-memory.dmp

                        Filesize

                        48KB

                      • memory/1284-215-0x000000001E490000-0x000000001E510000-memory.dmp

                        Filesize

                        512KB

                      • memory/1468-145-0x0000000000230000-0x0000000000231000-memory.dmp

                        Filesize

                        4KB

                      • memory/1468-185-0x0000000000400000-0x00000000008AD000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/1620-356-0x0000000000400000-0x0000000000537000-memory.dmp

                        Filesize

                        1.2MB

                      • memory/1620-343-0x0000000000400000-0x0000000000537000-memory.dmp

                        Filesize

                        1.2MB

                      • memory/1620-352-0x0000000000400000-0x0000000000537000-memory.dmp

                        Filesize

                        1.2MB

                      • memory/1620-344-0x0000000000400000-0x0000000000537000-memory.dmp

                        Filesize

                        1.2MB

                      • memory/1620-320-0x0000000000400000-0x0000000000537000-memory.dmp

                        Filesize

                        1.2MB

                      • memory/1620-355-0x0000000000400000-0x0000000000537000-memory.dmp

                        Filesize

                        1.2MB

                      • memory/1620-354-0x0000000000400000-0x0000000000537000-memory.dmp

                        Filesize

                        1.2MB

                      • memory/1904-6-0x0000000002890000-0x0000000002891000-memory.dmp

                        Filesize

                        4KB

                      • memory/1904-259-0x00000000003C0000-0x000000000088B000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/1904-4-0x0000000002550000-0x0000000002551000-memory.dmp

                        Filesize

                        4KB

                      • memory/1904-11-0x0000000002840000-0x0000000002841000-memory.dmp

                        Filesize

                        4KB

                      • memory/1904-118-0x00000000003C0000-0x000000000088B000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/1904-10-0x00000000023E0000-0x00000000023E1000-memory.dmp

                        Filesize

                        4KB

                      • memory/1904-14-0x0000000002AB0000-0x0000000002AB1000-memory.dmp

                        Filesize

                        4KB

                      • memory/1904-15-0x00000000028A0000-0x00000000028A1000-memory.dmp

                        Filesize

                        4KB

                      • memory/1904-13-0x0000000000AC0000-0x0000000000AC1000-memory.dmp

                        Filesize

                        4KB

                      • memory/1904-284-0x00000000003C0000-0x000000000088B000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/1904-12-0x0000000000A50000-0x0000000000A51000-memory.dmp

                        Filesize

                        4KB

                      • memory/1904-16-0x0000000000AB0000-0x0000000000AB1000-memory.dmp

                        Filesize

                        4KB

                      • memory/1904-9-0x0000000000B10000-0x0000000000B11000-memory.dmp

                        Filesize

                        4KB

                      • memory/1904-8-0x0000000000A60000-0x0000000000A61000-memory.dmp

                        Filesize

                        4KB

                      • memory/1904-5-0x0000000000B60000-0x0000000000B61000-memory.dmp

                        Filesize

                        4KB

                      • memory/1904-3-0x00000000023F0000-0x00000000023F1000-memory.dmp

                        Filesize

                        4KB

                      • memory/1904-107-0x00000000003C0000-0x000000000088B000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/1904-106-0x00000000003C0000-0x000000000088B000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/1904-17-0x0000000000A40000-0x0000000000A41000-memory.dmp

                        Filesize

                        4KB

                      • memory/1904-124-0x00000000003C0000-0x000000000088B000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/1904-372-0x00000000003C0000-0x000000000088B000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/1904-0-0x00000000003C0000-0x000000000088B000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/1904-7-0x00000000008B0000-0x00000000008B1000-memory.dmp

                        Filesize

                        4KB

                      • memory/1904-186-0x00000000003C0000-0x000000000088B000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/1904-348-0x00000000003C0000-0x000000000088B000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/1904-2-0x00000000003C0000-0x000000000088B000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/1904-1-0x0000000077780000-0x0000000077782000-memory.dmp

                        Filesize

                        8KB

                      • memory/2028-374-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                        Filesize

                        4KB

                      • memory/2028-378-0x0000000000400000-0x0000000000644000-memory.dmp

                        Filesize

                        2.3MB

                      • memory/2072-274-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                        Filesize

                        4KB

                      • memory/2072-277-0x0000000000400000-0x0000000000537000-memory.dmp

                        Filesize

                        1.2MB

                      • memory/2072-280-0x0000000000400000-0x0000000000537000-memory.dmp

                        Filesize

                        1.2MB

                      • memory/2072-305-0x0000000000400000-0x0000000000537000-memory.dmp

                        Filesize

                        1.2MB

                      • memory/2084-109-0x0000000000400000-0x000000000053E000-memory.dmp

                        Filesize

                        1.2MB

                      • memory/2084-82-0x00000000009A0000-0x0000000000AA0000-memory.dmp

                        Filesize

                        1024KB

                      • memory/2084-83-0x0000000000220000-0x000000000022B000-memory.dmp

                        Filesize

                        44KB

                      • memory/2084-85-0x0000000000400000-0x000000000053E000-memory.dmp

                        Filesize

                        1.2MB

                      • memory/2348-117-0x00000000003C0000-0x000000000088B000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/2348-116-0x00000000003C0000-0x000000000088B000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/2380-115-0x0000000000400000-0x000000000056B000-memory.dmp

                        Filesize

                        1.4MB

                      • memory/2380-123-0x00000000006D0000-0x00000000007D0000-memory.dmp

                        Filesize

                        1024KB

                      • memory/2380-144-0x0000000000400000-0x000000000056B000-memory.dmp

                        Filesize

                        1.4MB

                      • memory/2380-34-0x00000000006D0000-0x00000000007D0000-memory.dmp

                        Filesize

                        1024KB

                      • memory/2380-36-0x0000000000400000-0x000000000056B000-memory.dmp

                        Filesize

                        1.4MB

                      • memory/2380-35-0x0000000000270000-0x00000000002DF000-memory.dmp

                        Filesize

                        444KB

                      • memory/2540-54-0x00000000003C0000-0x00000000003E7000-memory.dmp

                        Filesize

                        156KB

                      • memory/2540-73-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                        Filesize

                        972KB

                      • memory/2540-55-0x0000000000400000-0x000000000063B000-memory.dmp

                        Filesize

                        2.2MB

                      • memory/2540-119-0x0000000000400000-0x000000000063B000-memory.dmp

                        Filesize

                        2.2MB

                      • memory/2540-260-0x0000000000400000-0x000000000063B000-memory.dmp

                        Filesize

                        2.2MB

                      • memory/2540-53-0x0000000000250000-0x0000000000350000-memory.dmp

                        Filesize

                        1024KB

                      • memory/2540-125-0x0000000000250000-0x0000000000350000-memory.dmp

                        Filesize

                        1024KB

                      • memory/2540-126-0x0000000000400000-0x000000000063B000-memory.dmp

                        Filesize

                        2.2MB

                      • memory/2540-169-0x0000000000400000-0x000000000063B000-memory.dmp

                        Filesize

                        2.2MB

                      • memory/2540-307-0x0000000000400000-0x000000000063B000-memory.dmp

                        Filesize

                        2.2MB