Analysis

  • max time kernel
    114s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-03-2024 14:55

General

  • Target

    459fa5f48e6d8a3b33305863b39038a7e664e2b34e605f40c4f703e3d2555599.exe

  • Size

    1.8MB

  • MD5

    688dafd620f06e066f81bd4453bc41f9

  • SHA1

    6d85ef29a93f3aa590913f8fe2fa64d9af414260

  • SHA256

    459fa5f48e6d8a3b33305863b39038a7e664e2b34e605f40c4f703e3d2555599

  • SHA512

    34fa4bf6b6b55e3fa25425fe9e80790b5c368cfa1d16f511c36089858f4cace9e16ef215f375cd4128dc2f3c4e499daff8b68260784956759928847e7aaf3275

  • SSDEEP

    49152:CJWsp/GOtcK5C9nRtPfG9Vu0qiwG37YRsdun:F8+OtHCxDPuzPqitER

Malware Config

Extracted

Family

amadey

Version

4.17

C2

http://185.215.113.32

Attributes
  • install_dir

    00c07260dc

  • install_file

    explorgu.exe

  • strings_key

    461809bd97c251ba0c0c8450c7055f1d

  • url_paths

    /yandex/index.php

rc4.plain

Extracted

Family

redline

Botnet

LiveTraffic

C2

4.185.137.132:1632

Extracted

Family

amadey

Version

4.17

C2

http://185.215.113.32

Attributes
  • strings_key

    461809bd97c251ba0c0c8450c7055f1d

  • url_paths

    /yandex/index.php

rc4.plain

Extracted

Family

amadey

Version

4.18

C2

http://193.233.132.56

Attributes
  • install_dir

    09fd851a4f

  • install_file

    explorha.exe

  • strings_key

    443351145ece4966ded809641c77cfa8

  • url_paths

    /Pneh2sXQk0/index.php

rc4.plain

Extracted

Family

amadey

Version

4.18

C2

http://193.233.132.56

Attributes
  • strings_key

    443351145ece4966ded809641c77cfa8

  • url_paths

    /Pneh2sXQk0/index.php

rc4.plain

Extracted

Family

smokeloader

Version

2022

C2

http://selebration17io.io/index.php

http://vacantion18ffeu.cc/index.php

http://valarioulinity1.net/index.php

http://buriatiarutuhuob.net/index.php

http://cassiosssionunu.me/index.php

http://sulugilioiu19.net/index.php

http://goodfooggooftool.net/index.php

rc4.i32
rc4.i32

Extracted

Family

lumma

C2

https://resergvearyinitiani.shop/api

https://relevantvoicelesskw.shop/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect ZGRat V1 6 IoCs
  • Lumma Stealer

    An infostealer written in C++ first seen in August 2022.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 6 IoCs
  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
  • Blocklisted process makes network request 4 IoCs
  • Downloads MZ/PE file
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 16 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 8 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 23 IoCs
  • Identifies Wine through registry keys 2 TTPs 8 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 11 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 12 IoCs
  • Checks SCSI registry key(s) 3 TTPs 9 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 9 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\459fa5f48e6d8a3b33305863b39038a7e664e2b34e605f40c4f703e3d2555599.exe
    "C:\Users\Admin\AppData\Local\Temp\459fa5f48e6d8a3b33305863b39038a7e664e2b34e605f40c4f703e3d2555599.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    PID:2164
  • C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe
    C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Executes dropped EXE
    • Identifies Wine through registry keys
    • Adds Run key to start application
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4248
    • C:\Users\Admin\AppData\Local\Temp\1000836001\osminog.exe
      "C:\Users\Admin\AppData\Local\Temp\1000836001\osminog.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3872
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        3⤵
          PID:4784
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4784 -s 1220
            4⤵
            • Program crash
            PID:3716
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4784 -s 1228
            4⤵
            • Program crash
            PID:4144
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4784 -s 1144
            4⤵
            • Program crash
            PID:1008
      • C:\Users\Admin\AppData\Local\Temp\1000837001\goldprimeldlldf.exe
        "C:\Users\Admin\AppData\Local\Temp\1000837001\goldprimeldlldf.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4984
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4244
      • C:\Users\Admin\AppData\Local\Temp\1000873001\random.exe
        "C:\Users\Admin\AppData\Local\Temp\1000873001\random.exe"
        2⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        PID:2420
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main
        2⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:712
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main
          3⤵
          • Blocklisted process makes network request
          • Loads dropped DLL
          PID:1248
          • C:\Windows\system32\netsh.exe
            netsh wlan show profiles
            4⤵
              PID:4144
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\134859772495_Desktop.zip' -CompressionLevel Optimal
              4⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3348
        • C:\Users\Admin\AppData\Local\Temp\1000875001\amadka.exe
          "C:\Users\Admin\AppData\Local\Temp\1000875001\amadka.exe"
          2⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:1196
          • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
            "C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"
            3⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Adds Run key to start application
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:3924
            • C:\Users\Admin\AppData\Local\Temp\1000022001\e3e45246b5.exe
              "C:\Users\Admin\AppData\Local\Temp\1000022001\e3e45246b5.exe"
              4⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              PID:5080
            • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
              "C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"
              4⤵
                PID:3584
              • C:\Windows\SysWOW64\rundll32.exe
                "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
                4⤵
                • Loads dropped DLL
                PID:5468
                • C:\Windows\system32\rundll32.exe
                  "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
                  5⤵
                  • Blocklisted process makes network request
                  • Loads dropped DLL
                  • Suspicious behavior: EnumeratesProcesses
                  PID:5512
                  • C:\Windows\system32\netsh.exe
                    netsh wlan show profiles
                    6⤵
                      PID:5548
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\134859772495_Desktop.zip' -CompressionLevel Optimal
                      6⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:5236
                • C:\Windows\SysWOW64\rundll32.exe
                  "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
                  4⤵
                  • Blocklisted process makes network request
                  • Loads dropped DLL
                  PID:5028
            • C:\Users\Admin\AppData\Local\Temp\1000978001\fullwork.exe
              "C:\Users\Admin\AppData\Local\Temp\1000978001\fullwork.exe"
              2⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:4928
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                3⤵
                  PID:4880
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 4880 -s 1240
                    4⤵
                    • Program crash
                    PID:3012
              • C:\Users\Admin\AppData\Local\Temp\1000979001\TeamFour.exe
                "C:\Users\Admin\AppData\Local\Temp\1000979001\TeamFour.exe"
                2⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2908
              • C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe
                "C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe"
                2⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:4416
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                  3⤵
                  • Checks computer location settings
                  PID:4756
                  • C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe
                    "C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe"
                    4⤵
                    • Executes dropped EXE
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2776
                  • C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe
                    "C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe"
                    4⤵
                    • Executes dropped EXE
                    • Modifies system certificate store
                    • Suspicious use of AdjustPrivilegeToken
                    PID:940
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "RegAsm.exe"
                    4⤵
                      PID:208
                      • C:\Windows\SysWOW64\choice.exe
                        choice /C Y /N /D Y /T 3
                        5⤵
                          PID:5172
                  • C:\Windows\SysWOW64\rundll32.exe
                    "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                    2⤵
                    • Blocklisted process makes network request
                    • Loads dropped DLL
                    PID:2932
                  • C:\Users\Admin\AppData\Local\Temp\1000986001\987123.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000986001\987123.exe"
                    2⤵
                    • Executes dropped EXE
                    • Checks SCSI registry key(s)
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious behavior: MapViewOfSection
                    PID:3224
                  • C:\Users\Admin\AppData\Local\Temp\1001001001\yoffens_crypted_EASY.exe
                    "C:\Users\Admin\AppData\Local\Temp\1001001001\yoffens_crypted_EASY.exe"
                    2⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    PID:5184
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 5184 -s 784
                      3⤵
                      • Program crash
                      PID:5336
                  • C:\Users\Admin\AppData\Local\Temp\1001008001\lummalg.exe
                    "C:\Users\Admin\AppData\Local\Temp\1001008001\lummalg.exe"
                    2⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    PID:5708
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                      3⤵
                        PID:5992
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                        3⤵
                          PID:6032
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 6032 -s 1216
                            4⤵
                            • Program crash
                            PID:5572
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 6032 -s 1236
                            4⤵
                            • Program crash
                            PID:5836
                      • C:\Users\Admin\AppData\Local\Temp\1001010001\ISetup3.exe
                        "C:\Users\Admin\AppData\Local\Temp\1001010001\ISetup3.exe"
                        2⤵
                        • Checks computer location settings
                        • Executes dropped EXE
                        PID:6064
                        • C:\Users\Admin\AppData\Local\Temp\u4og.0.exe
                          "C:\Users\Admin\AppData\Local\Temp\u4og.0.exe"
                          3⤵
                          • Checks computer location settings
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Checks processor information in registry
                          PID:5692
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\AKKKFBGDHJ.exe"
                            4⤵
                              PID:5324
                              • C:\Users\Admin\AppData\Local\Temp\AKKKFBGDHJ.exe
                                "C:\Users\Admin\AppData\Local\Temp\AKKKFBGDHJ.exe"
                                5⤵
                                • Checks computer location settings
                                • Executes dropped EXE
                                • Adds Run key to start application
                                PID:4584
                                • C:\Windows\SysWOW64\cmd.exe
                                  "C:\Windows\System32\cmd.exe" /C ping 2.2.2.2 -n 1 -w 3000 > Nul & Del C:\Users\Admin\AppData\Local\Temp\AKKKFBGDHJ.exe
                                  6⤵
                                    PID:5956
                                    • C:\Windows\SysWOW64\PING.EXE
                                      ping 2.2.2.2 -n 1 -w 3000
                                      7⤵
                                      • Runs ping.exe
                                      PID:5592
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 5692 -s 2312
                                4⤵
                                • Program crash
                                PID:2800
                            • C:\Users\Admin\AppData\Local\Temp\u4og.1.exe
                              "C:\Users\Admin\AppData\Local\Temp\u4og.1.exe"
                              3⤵
                              • Checks computer location settings
                              • Executes dropped EXE
                              • Checks SCSI registry key(s)
                              • Suspicious use of FindShellTrayWindow
                              • Suspicious use of SendNotifyMessage
                              PID:6040
                              • C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe
                                "C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD1
                                4⤵
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2112
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 6064 -s 1440
                              3⤵
                              • Program crash
                              PID:6100
                          • C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe
                            "C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe"
                            2⤵
                              PID:5948
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4784 -ip 4784
                            1⤵
                              PID:2812
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 176 -p 4784 -ip 4784
                              1⤵
                                PID:2408
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4784 -ip 4784
                                1⤵
                                  PID:4664
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4880 -ip 4880
                                  1⤵
                                    PID:2944
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 5184 -ip 5184
                                    1⤵
                                      PID:5316
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 6032 -ip 6032
                                      1⤵
                                        PID:5480
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 6032 -ip 6032
                                        1⤵
                                          PID:5796
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 6064 -ip 6064
                                          1⤵
                                            PID:6096
                                          • C:\Windows\system32\svchost.exe
                                            C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV
                                            1⤵
                                              PID:5184
                                            • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                              C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                              1⤵
                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                              • Checks BIOS information in registry
                                              • Executes dropped EXE
                                              • Identifies Wine through registry keys
                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                              PID:5752
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 5692 -ip 5692
                                              1⤵
                                                PID:4572
                                              • C:\Windows\system32\regsvr32.exe
                                                regsvr32 /s C:\Users\Admin\AppData\Local\Temp\F5F4.dll
                                                1⤵
                                                  PID:1548
                                                  • C:\Windows\SysWOW64\regsvr32.exe
                                                    /s C:\Users\Admin\AppData\Local\Temp\F5F4.dll
                                                    2⤵
                                                    • Loads dropped DLL
                                                    PID:1848
                                                • C:\Users\Admin\AppData\Local\Temp\FD48.exe
                                                  C:\Users\Admin\AppData\Local\Temp\FD48.exe
                                                  1⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  PID:5752
                                                • C:\Users\Admin\AppData\Local\Temp\F2B.exe
                                                  C:\Users\Admin\AppData\Local\Temp\F2B.exe
                                                  1⤵
                                                  • Executes dropped EXE
                                                  • Checks SCSI registry key(s)
                                                  PID:4808
                                                • C:\Users\Admin\AppData\Local\Temp\199C.exe
                                                  C:\Users\Admin\AppData\Local\Temp\199C.exe
                                                  1⤵
                                                  • Executes dropped EXE
                                                  PID:6076
                                                  • C:\Users\Admin\AppData\Local\Temp\ISetup4.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\ISetup4.exe"
                                                    2⤵
                                                      PID:5384
                                                      • C:\Users\Admin\AppData\Local\Temp\u45k.0.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\u45k.0.exe"
                                                        3⤵
                                                          PID:1716
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 1716 -s 1016
                                                            4⤵
                                                            • Program crash
                                                            PID:3240
                                                        • C:\Users\Admin\AppData\Local\Temp\u45k.1.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\u45k.1.exe"
                                                          3⤵
                                                            PID:1876
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 5384 -s 1544
                                                            3⤵
                                                            • Program crash
                                                            PID:6112
                                                        • C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"
                                                          2⤵
                                                            PID:5696
                                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                              powershell -nologo -noprofile
                                                              3⤵
                                                                PID:6072
                                                              • C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"
                                                                3⤵
                                                                  PID:3264
                                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                    powershell -nologo -noprofile
                                                                    4⤵
                                                                      PID:1584
                                                                    • C:\Windows\system32\cmd.exe
                                                                      C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
                                                                      4⤵
                                                                        PID:5832
                                                                        • C:\Windows\system32\netsh.exe
                                                                          netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                                                                          5⤵
                                                                          • Modifies Windows Firewall
                                                                          PID:1032
                                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                        powershell -nologo -noprofile
                                                                        4⤵
                                                                          PID:2216
                                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                          powershell -nologo -noprofile
                                                                          4⤵
                                                                            PID:5204
                                                                          • C:\Windows\rss\csrss.exe
                                                                            C:\Windows\rss\csrss.exe
                                                                            4⤵
                                                                              PID:848
                                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                powershell -nologo -noprofile
                                                                                5⤵
                                                                                  PID:3224
                                                                                • C:\Windows\SYSTEM32\schtasks.exe
                                                                                  schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                                                                                  5⤵
                                                                                  • Creates scheduled task(s)
                                                                                  PID:5408
                                                                                • C:\Windows\SYSTEM32\schtasks.exe
                                                                                  schtasks /delete /tn ScheduledUpdate /f
                                                                                  5⤵
                                                                                    PID:2776
                                                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                    powershell -nologo -noprofile
                                                                                    5⤵
                                                                                      PID:3032
                                                                            • C:\Users\Admin\AppData\Local\Temp\299B.exe
                                                                              C:\Users\Admin\AppData\Local\Temp\299B.exe
                                                                              1⤵
                                                                                PID:3248
                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 3248 -s 704
                                                                                  2⤵
                                                                                  • Program crash
                                                                                  PID:6084
                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 1716 -ip 1716
                                                                                1⤵
                                                                                  PID:1128
                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3248 -ip 3248
                                                                                  1⤵
                                                                                    PID:3956
                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 5384 -ip 5384
                                                                                    1⤵
                                                                                      PID:5876
                                                                                    • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                                                      C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                                                      1⤵
                                                                                        PID:3108

                                                                                      Network

                                                                                      MITRE ATT&CK Enterprise v15

                                                                                      Replay Monitor

                                                                                      Loading Replay Monitor...

                                                                                      Downloads

                                                                                      • C:\ProgramData\Are.docx

                                                                                        Filesize

                                                                                        11KB

                                                                                        MD5

                                                                                        a33e5b189842c5867f46566bdbf7a095

                                                                                        SHA1

                                                                                        e1c06359f6a76da90d19e8fd95e79c832edb3196

                                                                                        SHA256

                                                                                        5abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454

                                                                                        SHA512

                                                                                        f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b

                                                                                      • C:\ProgramData\mozglue.dll

                                                                                        Filesize

                                                                                        593KB

                                                                                        MD5

                                                                                        c8fd9be83bc728cc04beffafc2907fe9

                                                                                        SHA1

                                                                                        95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                                                        SHA256

                                                                                        ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                                                        SHA512

                                                                                        fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                                                      • C:\ProgramData\nss3.dll

                                                                                        Filesize

                                                                                        2.0MB

                                                                                        MD5

                                                                                        1cc453cdf74f31e4d913ff9c10acdde2

                                                                                        SHA1

                                                                                        6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                                                                        SHA256

                                                                                        ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                                                                        SHA512

                                                                                        dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                        Filesize

                                                                                        3KB

                                                                                        MD5

                                                                                        fe3aab3ae544a134b68e881b82b70169

                                                                                        SHA1

                                                                                        926e9b4e527ae1bd9b3b25726e1f59d5a34d36a6

                                                                                        SHA256

                                                                                        bda499e3f69d8fe0227e734bbb935dc5bf0050d37adf03bc41356dfcb5bcca0b

                                                                                        SHA512

                                                                                        3fbd3499d98280b6c79c67b0ee183b27692dbc31acf103b4f8ca4dcdf392afff2b3aad500037f4288581ed37e85f45c3bbb5dcde11cddf3ef0609f44b2ecb280

                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\199C.exe.log

                                                                                        Filesize

                                                                                        425B

                                                                                        MD5

                                                                                        4eaca4566b22b01cd3bc115b9b0b2196

                                                                                        SHA1

                                                                                        e743e0792c19f71740416e7b3c061d9f1336bf94

                                                                                        SHA256

                                                                                        34ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb

                                                                                        SHA512

                                                                                        bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1

                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\MF25FY4A\random[1].exe

                                                                                        Filesize

                                                                                        3.0MB

                                                                                        MD5

                                                                                        006c492bf5363356c8dd9c9b15aa045e

                                                                                        SHA1

                                                                                        8be3a5c361914312b44fa3e8ad662b6337ba3891

                                                                                        SHA256

                                                                                        9e8fb107d378b681e49f3b07b034b7a288b57be9f6422fa09e8a5457dcae9cf1

                                                                                        SHA512

                                                                                        fe099b98d92b6f7f287b3628bb1490afcb7c31a7e5c2ec62d7202b09d45813e6ccea1caf7cd27ca4523812d325c713d4522ac5e169c9aaafecc2c1b4cbc850cc

                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                        Filesize

                                                                                        1KB

                                                                                        MD5

                                                                                        9b8cd5b67f091304dcc6dc753f884a85

                                                                                        SHA1

                                                                                        247182a63593f5d2113df5ecea863d28ec5a576d

                                                                                        SHA256

                                                                                        dac3eb5463b8b7ea45f7d2f44768c9e911d1b845f5ac88cbf7d4c88b7163baa5

                                                                                        SHA512

                                                                                        2d1cdd4d59f6a25819b7e94bcad9d532e78e477ca9fe1a9bcf37768514eb94be45c4becbc045246f7e0cd7c36491ee332774faabfec1f17c1e778d30fefbcb4c

                                                                                      • C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe

                                                                                        Filesize

                                                                                        1.8MB

                                                                                        MD5

                                                                                        688dafd620f06e066f81bd4453bc41f9

                                                                                        SHA1

                                                                                        6d85ef29a93f3aa590913f8fe2fa64d9af414260

                                                                                        SHA256

                                                                                        459fa5f48e6d8a3b33305863b39038a7e664e2b34e605f40c4f703e3d2555599

                                                                                        SHA512

                                                                                        34fa4bf6b6b55e3fa25425fe9e80790b5c368cfa1d16f511c36089858f4cace9e16ef215f375cd4128dc2f3c4e499daff8b68260784956759928847e7aaf3275

                                                                                      • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe

                                                                                        Filesize

                                                                                        1.3MB

                                                                                        MD5

                                                                                        ef866b611cbc8ded6112d4ef00804eee

                                                                                        SHA1

                                                                                        611d19656ef8737116657315c240ab19fef8292c

                                                                                        SHA256

                                                                                        7c33883a0575a3b7c665e0ac126c9a159978d202be7717dc3958f228ab045f8f

                                                                                        SHA512

                                                                                        9cb8249073340a6e4b8c260ba56baeb262002ba429694f3421af4e526e0de09ddb6438d1ade257752808e2a11d7f061cb15a89d11b9ed219d1f1b1cf48ab4d7e

                                                                                      • C:\Users\Admin\AppData\Local\Temp\1000022001\e3e45246b5.exe

                                                                                        Filesize

                                                                                        832KB

                                                                                        MD5

                                                                                        02a68eb1f1a414a723142ea1c9f9a2b3

                                                                                        SHA1

                                                                                        0c0ea6e23f1a0d57c0f16ed1a14f0d891922ea86

                                                                                        SHA256

                                                                                        fb685fcafa28d6fc6a613723d7779739589dacbae262f650dcdf877f86b2ba13

                                                                                        SHA512

                                                                                        dccb1fe0b6d25a0b816292c1a8152e24c5a27ae3fcbf37b286512d8bb31780f26fc87f00d20ecb1aae1d5fbdb016c9e9b38b687a5424512fc02b6aee7032d6fe

                                                                                      • C:\Users\Admin\AppData\Local\Temp\1000836001\osminog.exe

                                                                                        Filesize

                                                                                        534KB

                                                                                        MD5

                                                                                        a3f8b60a08da0f600cfce3bb600d5cb3

                                                                                        SHA1

                                                                                        b00d7721767b717b3337b5c6dade4ebf2d56345e

                                                                                        SHA256

                                                                                        0c608a9b1e70bf8b51a681a8390c8e4743501c45b84cf4d59727aba2fc33cadb

                                                                                        SHA512

                                                                                        14f63e415133ca438d3c217d5fb3ecf0ad76e19969c54d356f46282230230f1b254fbfc8ae5f78809dc189a9648be2dc1398927b3f089c525cd1105a3843f60d

                                                                                      • C:\Users\Admin\AppData\Local\Temp\1000837001\goldprimeldlldf.exe

                                                                                        Filesize

                                                                                        464KB

                                                                                        MD5

                                                                                        c084d6f6ba40534fbfc5a64b21ef99ab

                                                                                        SHA1

                                                                                        0b4a17da83c0a8abbc8fab321931d5447b32b720

                                                                                        SHA256

                                                                                        afd83290a2adb219c3f1b8fbf23c27b0994fe76dfbb7dc0b416530dc0e21f624

                                                                                        SHA512

                                                                                        a5384a2f7029cf946fde44e1ff30775754ce525ca5a6fdac14184872b6e684cb6e585053cb86d32f82cbd3db48eb195ba3a642d8ee3774be579fccd993938ca1

                                                                                      • C:\Users\Admin\AppData\Local\Temp\1000873001\random.exe

                                                                                        Filesize

                                                                                        500KB

                                                                                        MD5

                                                                                        11b7d40f7da57cbdc932963b1664876c

                                                                                        SHA1

                                                                                        eed68d3698be52c344cf1fa0a4290074ebea0690

                                                                                        SHA256

                                                                                        d185065bb6cc8d42043822305d4779829610829b2c0053087181b24e80cc466a

                                                                                        SHA512

                                                                                        387a83148b6de771a44f5695592b8e0e498811f6beb5ecfc107e8c0f111056aa0093b186f1b2981679976c6caf1cd0130f16119f2fb3f1b229977c470f790af5

                                                                                      • C:\Users\Admin\AppData\Local\Temp\1000873001\random.exe

                                                                                        Filesize

                                                                                        1.5MB

                                                                                        MD5

                                                                                        71913f716e9605100dba2b605abeb469

                                                                                        SHA1

                                                                                        f04aed38771c2b30df157782aa8399335c480608

                                                                                        SHA256

                                                                                        cda62ef1b7775ad3f02dd45231de3afb2c2b3d6f4e0e7ce42f095219958f8654

                                                                                        SHA512

                                                                                        f3376f64ef018630b1edc46c037132300b2bceffc597c56c587655c9520669e14310a5ec7d4b025525c3e80da664d87b7d61157875bca40e02eea4d8e42d8d56

                                                                                      • C:\Users\Admin\AppData\Local\Temp\1000873001\random.exe

                                                                                        Filesize

                                                                                        1.3MB

                                                                                        MD5

                                                                                        ac2a45f729aa9f34910e6757735567c1

                                                                                        SHA1

                                                                                        69c32c33f52ecf75094f77000a5f14374eef5a1b

                                                                                        SHA256

                                                                                        44368f032ef2fbb9dd9b1bdd32c4301cc8e3ad430fb7b9f9077a381232a458f4

                                                                                        SHA512

                                                                                        0db48a7b06a5721b1860c101ff9641d5b79185420c94408a9f1a4a801e779710f9bac8604693defa182c6451a78ab6dcc335c2effa4d263f784114843e6b93f8

                                                                                      • C:\Users\Admin\AppData\Local\Temp\1000875001\amadka.exe

                                                                                        Filesize

                                                                                        89KB

                                                                                        MD5

                                                                                        f6c799db2b867a8ddf38fab0411cc277

                                                                                        SHA1

                                                                                        dfcdf938062dc0881d485a4bbf4eb6cbf70ecdae

                                                                                        SHA256

                                                                                        c08c575dc98017a7a283550526225fb97dce01417579504d62819095a995a0c3

                                                                                        SHA512

                                                                                        60f8fccc72ed65f0e75b02ff5603c27ac232ae3ac177b2951732c3e06b69189250dedbd3ea95276af5d81d3678236018b12ab3040162022cdf2fcc7184fabe89

                                                                                      • C:\Users\Admin\AppData\Local\Temp\1000875001\amadka.exe

                                                                                        Filesize

                                                                                        1.8MB

                                                                                        MD5

                                                                                        a11afca60cd88e89a2f5aa480014d539

                                                                                        SHA1

                                                                                        a2bcf40e5217d5da76eae41cceae326e93cae01e

                                                                                        SHA256

                                                                                        7d913e7decf2a6ec70533e9af6b81bd693eee0260b32346bc44720e8148d4124

                                                                                        SHA512

                                                                                        49f94e6b2c5dfd27cb1fa96d0b2e4e56684e2f2c21f5324f6f7ef213d9c8c74b4325e4b17bf5a7b42cabdffe774f3489d0df208a2e34a3247545351a67d30b5e

                                                                                      • C:\Users\Admin\AppData\Local\Temp\1000978001\fullwork.exe

                                                                                        Filesize

                                                                                        451KB

                                                                                        MD5

                                                                                        b2b60c50903a73efffcb4e33ce49238f

                                                                                        SHA1

                                                                                        9b6f27fc410748ae1570978d7a6aba95a1041eea

                                                                                        SHA256

                                                                                        29d409af265261b204f6eeeedb5e9bb1f7a829b723a5d1d78384066744bddbe1

                                                                                        SHA512

                                                                                        2c66a1615de77157f57c662de2e3ec97deb8cb6aadc0a03ff0acc3b269affd5ae0d50dfef85939ca9c1a8c6d47ff915061157e7da92dc286cb6ddd9b06a88126

                                                                                      • C:\Users\Admin\AppData\Local\Temp\1000979001\TeamFour.exe

                                                                                        Filesize

                                                                                        541KB

                                                                                        MD5

                                                                                        3b069f3dd741e4360f26cb27cb10320a

                                                                                        SHA1

                                                                                        6a9503aaf1e297f2696482ddf1bd4605a8710101

                                                                                        SHA256

                                                                                        f63bdc068c453e7e22740681a0c280d02745807b1695ce86e5067069beca533e

                                                                                        SHA512

                                                                                        bda58c074f7bd5171d7e3188a48cbdc457607ff06045e64a9e8e33fcb6f66f941d75a7bf57eb0ef262491622b4a9936342384237fa61c1add3365d5006c6d0d9

                                                                                      • C:\Users\Admin\AppData\Local\Temp\1000979001\TeamFour.exe

                                                                                        Filesize

                                                                                        179KB

                                                                                        MD5

                                                                                        453215754312c4313f3f0a9c071b6425

                                                                                        SHA1

                                                                                        fbed31ae426d6334418d66848673dae7d3f07b70

                                                                                        SHA256

                                                                                        d7c06fb2412b7c22b7b5c417eef96eb368843cc512dc0babcd38626f95f38b52

                                                                                        SHA512

                                                                                        dc035862e5618e44913edc8419aa2fae53763f35e8044e9e5407ce78420549febb1c26658182ff18bc1915848e6e85aac7e0d4c533052ce1cf9c2c9da2dbf851

                                                                                      • C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe

                                                                                        Filesize

                                                                                        1.1MB

                                                                                        MD5

                                                                                        7a38d76606a4415e78120dfc8b30fc3d

                                                                                        SHA1

                                                                                        6b3cd359229f78377b551792267dc10fd42b9772

                                                                                        SHA256

                                                                                        196080f3a46c02560f261b84830b0ba5a42da1b13c90e6e5abcf6aab25ef032f

                                                                                        SHA512

                                                                                        179fd316b4878a0d4a38a6d11566fc4357f83a952f11620c8d79e69302daedbc93a04961c76428a9c7b8c48bf8a5116f0e612edd3c25cbd9e5cfce27320f505d

                                                                                      • C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe

                                                                                        Filesize

                                                                                        64KB

                                                                                        MD5

                                                                                        3f9c11d6040e389745a1ce7933dae8a9

                                                                                        SHA1

                                                                                        85b21ed68c79eebf658d10cd9098801575a38c46

                                                                                        SHA256

                                                                                        b670f3b22c900d03fd1f72378140c357b9623e01ad9d9172384de6349dcf6958

                                                                                        SHA512

                                                                                        5aca6a08eb55c0737dc7f57d95f9031a72124718a16e2c31d0eb743a6a22cbf62aaa03ee0abd502777a1d4e84ecc301f95c01953d0f236c4281babc9f76da4ec

                                                                                      • C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe

                                                                                        Filesize

                                                                                        1.7MB

                                                                                        MD5

                                                                                        85a15f080b09acace350ab30460c8996

                                                                                        SHA1

                                                                                        3fc515e60e4cfa5b3321f04a96c7fb463e4b9d02

                                                                                        SHA256

                                                                                        3a2006bc835a8ffe91b9ee9206f630b3172f42e090f4e8d90be620e540f5ef6b

                                                                                        SHA512

                                                                                        ade5e3531dfa1a01e6c2a69deb2962cbf619e766da3d6e8e3453f70ff55ccbcbe21381c7b97a53d67e1ca88975f4409b1a42a759e18f806171d29e4c3f250e9f

                                                                                      • C:\Users\Admin\AppData\Local\Temp\1000986001\987123.exe

                                                                                        Filesize

                                                                                        316KB

                                                                                        MD5

                                                                                        3c970ed4f7760ca59cf73e92cb3085bb

                                                                                        SHA1

                                                                                        5b05ed69970dbca8fbcd55abeee57f47b6c5cab3

                                                                                        SHA256

                                                                                        3c81277ccac8102cffb8756e1bab20483396dd663f2c1e982948d765ba4ce87d

                                                                                        SHA512

                                                                                        3f8861208e28389d462c0ff237c37a4893fec91c405037f1317bccb16ce3214ef84c63bd6238b2f95965535181e4671d5c213f171de9d041253b0288b2cd3c72

                                                                                      • C:\Users\Admin\AppData\Local\Temp\1001001001\yoffens_crypted_EASY.exe

                                                                                        Filesize

                                                                                        611KB

                                                                                        MD5

                                                                                        b6523a0cb4610640f31ccb33af688249

                                                                                        SHA1

                                                                                        e258824b31b5702a498dcc84f4fc74cc59e75954

                                                                                        SHA256

                                                                                        b656093530602471951130263d4622758d74c58a1f3e448ebd6c2c99262c2f2c

                                                                                        SHA512

                                                                                        401e1fd8d744044aaa9638b162ad8f252f50a50377b8038f9f618041d181a2ce160c90fa7f669de20f2073336c71a49f7a8b1a048fd830349fbd11c0bf3ca469

                                                                                      • C:\Users\Admin\AppData\Local\Temp\1001001001\yoffens_crypted_EASY.exe

                                                                                        Filesize

                                                                                        360KB

                                                                                        MD5

                                                                                        eb3d593267f9885b8024dcdac14e538a

                                                                                        SHA1

                                                                                        01c582e964fbd3037a6b38acd460b80b6dc0e311

                                                                                        SHA256

                                                                                        3767531d7f152ef71a8716d557228c40069c7ce9f16eca2b5c3efb8c0119c0d0

                                                                                        SHA512

                                                                                        105f3c04be1735dfa2fb154e2184742f414d49ab3928126764d6f04cbee012b9901cbf6c5679a71d5c6d8de11b31b2e21bb8717780439f57e014e7142d2a2393

                                                                                      • C:\Users\Admin\AppData\Local\Temp\1001001001\yoffens_crypted_EASY.exe

                                                                                        Filesize

                                                                                        832KB

                                                                                        MD5

                                                                                        e3c0b0533534c6517afc94790d7b760c

                                                                                        SHA1

                                                                                        4de96db92debb740d007422089bed0bcddf0e974

                                                                                        SHA256

                                                                                        198edf9613054f8a569ac804bf23081fbfa8566270fff05bba9dc3c9a32d9952

                                                                                        SHA512

                                                                                        d12631796afca877c710b9308d1236fca1bfe3abe6582445d9df1bbb404160cff220316e3f600b3a87b46dd3bfb859734008b5c668e410466e82be9dc033249e

                                                                                      • C:\Users\Admin\AppData\Local\Temp\1001008001\lummalg.exe

                                                                                        Filesize

                                                                                        350KB

                                                                                        MD5

                                                                                        04df085b57814d1a1accead4e153909e

                                                                                        SHA1

                                                                                        6d277da314ef185ba9072a9b677b599b1f46c35b

                                                                                        SHA256

                                                                                        91a36d137ebfa812b055728807e11338d15d3a5d869cb4babdf779266688e4dd

                                                                                        SHA512

                                                                                        f37678424e46e4f28e1047161db60ad737515558c8c8905ed598ca96b198304da7356e49e7bb9d1e77fe75372f0b5a7f670a353d093749c37bb85c40ec7fdafa

                                                                                      • C:\Users\Admin\AppData\Local\Temp\1001010001\ISetup3.exe

                                                                                        Filesize

                                                                                        464KB

                                                                                        MD5

                                                                                        7599133127d8efd9d32c0d7d23bb8d7e

                                                                                        SHA1

                                                                                        9ee25aef60cb92fc014ec8ff4591e938d29f41ff

                                                                                        SHA256

                                                                                        32b6c62576cf668b8735accafd271f8ed7250ca15fa1c3876ea82d359502b3b5

                                                                                        SHA512

                                                                                        1df87da263c834a98bb172f6e400d5c8d134a534ea00420858fbe28758cab2858d92f468648a66c4decae906ee34c5a237fc37fa5c7ee59eb71cef92edc41f18

                                                                                      • C:\Users\Admin\AppData\Local\Temp\199C.exe

                                                                                        Filesize

                                                                                        4.7MB

                                                                                        MD5

                                                                                        4645adc87acf83b55edff3c5ce2fc28e

                                                                                        SHA1

                                                                                        4953795cc90315cf7004b8f71718f117887b8c91

                                                                                        SHA256

                                                                                        5a03eb8534caf92f4c3d7896d1af7fe61292b5f0995567be8c783ab28c3b74f8

                                                                                        SHA512

                                                                                        3d8853dd1f28062f7554628565bc62e42296b0ab69da28665bf29771d78c50fdcdb2432aea09dbeb69d935e0dcf6d3b703af8ba1b7a0aed70b5be93b7959c602

                                                                                      • C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe

                                                                                        Filesize

                                                                                        4.2MB

                                                                                        MD5

                                                                                        43b4b9050e5b237de2d1412de8781f36

                                                                                        SHA1

                                                                                        125cd51af3ca81d4c3e517b8405b9afae92b86f2

                                                                                        SHA256

                                                                                        97bb5c78c753aa5e39ffc3d4c1058f584d0241e9b19aff20a248f1f159fdca6d

                                                                                        SHA512

                                                                                        24e90d5a5d4a06e0d62ff2b5bc91e686f5cdb2e77fb4c31ef3b6a59f62afae9fc6642bb57576c334e46e234d10300a2814cca747cc315b52ea63b0226a6695d3

                                                                                      • C:\Users\Admin\AppData\Local\Temp\AKKKFBGDHJ.exe

                                                                                        Filesize

                                                                                        101KB

                                                                                        MD5

                                                                                        42b838cf8bdf67400525e128d917f6e0

                                                                                        SHA1

                                                                                        a578f6faec738912dba8c41e7abe1502c46d0cae

                                                                                        SHA256

                                                                                        0e4ffba62ce9a464aa1b7ff9f1e55ace8f51ff1e15102d856f801a81f8b4607d

                                                                                        SHA512

                                                                                        f64b39d885375251ab7db72c57dc5b5095f0c6412169f1035d1f6a25b8415a2a01004d06bfa0267cf683ef7dea7a9f969ad43fde5a4376f1fcb65a57403433c0

                                                                                      • C:\Users\Admin\AppData\Local\Temp\F2B.exe

                                                                                        Filesize

                                                                                        316KB

                                                                                        MD5

                                                                                        186c557ac1202fbf5c3e7a3c59160dc2

                                                                                        SHA1

                                                                                        909596bf0058767d8bcdcf67f6bdc0ecf960ec90

                                                                                        SHA256

                                                                                        45adaf06099b3fe4b99755bfb693a7bc08bfd89e4f6697934c446c0d1f8bbf90

                                                                                        SHA512

                                                                                        94cfb5be5d43f8529a2223c1298d25c969f0818a2ff23b9b0cd9ce1a63a748daf3d881177d1fe344527c3983641d215fa127c62266fee51f49db1d5aa4ee6bfb

                                                                                      • C:\Users\Admin\AppData\Local\Temp\F5F4.dll

                                                                                        Filesize

                                                                                        2.2MB

                                                                                        MD5

                                                                                        e69125300a060d1eb870d352de33e4c3

                                                                                        SHA1

                                                                                        60f2c2e6f2a4289a05b5c6212cdaf0d02dad82ea

                                                                                        SHA256

                                                                                        009de0571eb77c7ed594b9e5cda731e2953fd2198e00b25a0e2c4c4ef7414355

                                                                                        SHA512

                                                                                        257d3b61b2c85c1e71d2a80a5fbf44436e9734785fe6b0a643c1939dd01c1d8b98f1c454695296f7137ff035ec6c0118f053e4833e0be91618f2a9066a8cace9

                                                                                      • C:\Users\Admin\AppData\Local\Temp\FD48.exe

                                                                                        Filesize

                                                                                        1.8MB

                                                                                        MD5

                                                                                        b8b5138dc6f97136cfebece16f80203d

                                                                                        SHA1

                                                                                        e020d3ac6d101791801e8ce8c921a5f54f78abf5

                                                                                        SHA256

                                                                                        7d1e736b876ad9f4effc5736323bbb1db9d53b49abda5a13d238cbe5f56e136c

                                                                                        SHA512

                                                                                        f26e295c0845b57520ee8392761c532527ca41974f68f189bb37637b45455edceb098ca23d2952e495635719a8da8a39d86d880467bc6ad79071afd870dd9877

                                                                                      • C:\Users\Admin\AppData\Local\Temp\Tmp3B7D.tmp

                                                                                        Filesize

                                                                                        2KB

                                                                                        MD5

                                                                                        1420d30f964eac2c85b2ccfe968eebce

                                                                                        SHA1

                                                                                        bdf9a6876578a3e38079c4f8cf5d6c79687ad750

                                                                                        SHA256

                                                                                        f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9

                                                                                        SHA512

                                                                                        6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8

                                                                                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ndvnoxfg.3lz.ps1

                                                                                        Filesize

                                                                                        60B

                                                                                        MD5

                                                                                        d17fe0a3f47be24a6453e9ef58c94641

                                                                                        SHA1

                                                                                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                        SHA256

                                                                                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                        SHA512

                                                                                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                      • C:\Users\Admin\AppData\Local\Temp\iolo\dm\ioloDMLog.txt

                                                                                        Filesize

                                                                                        2KB

                                                                                        MD5

                                                                                        023ab9f0462e53d600df8572d391167f

                                                                                        SHA1

                                                                                        81a55f3152cd04c00a432a12b3ae98eca2f2bae6

                                                                                        SHA256

                                                                                        e3d801710e9b879c8ae3b9a0e19ef2bdb3a5510578dfe609a56eab3d874ee380

                                                                                        SHA512

                                                                                        c743380cfa3e2ba28439402d07967d8f4de6780de4e17ae06c0836049d6e47f457be93ead0d8ae41d9d4ee2289284d7949de1a6f4bca250b81c63e5f61416752

                                                                                      • C:\Users\Admin\AppData\Local\Temp\iolo\dm\ioloDMLog.txt

                                                                                        Filesize

                                                                                        3KB

                                                                                        MD5

                                                                                        ef907965ba4bb8b677831ceef6c25be6

                                                                                        SHA1

                                                                                        e4758a545fd7c0463f4d95c8010a5c046d55e316

                                                                                        SHA256

                                                                                        64f7d9a05d8e20ad7872b6d9dbf36b5774adcb83f04d80d26f614118ae8a85ca

                                                                                        SHA512

                                                                                        799fedc4bb4237b3192d2410de5417b851d5edada1408f8f6c8c85c470a036b6dd51b8c3b7e0b17741e281b5a225bbd24d1feae146ec32098fe1a9af3d1f69df

                                                                                      • C:\Users\Admin\AppData\Local\Temp\iolo\dm\ioloDMLog.txt

                                                                                        Filesize

                                                                                        4KB

                                                                                        MD5

                                                                                        9ba8c34c67cba57da8596f999f31aaa7

                                                                                        SHA1

                                                                                        8be3297113b5549ea5c6683b8aa2a52c21fb04fc

                                                                                        SHA256

                                                                                        10e79b76455b14a663adbff797b959733906b512c2790be192ace5d5a1e85d3f

                                                                                        SHA512

                                                                                        065f0440b48101b236bd80c2c0fadc0327d40cbef2a760de9cb1d0b12591ca6924e184f10a6ab821ef8aae300c8011a8a20502edb1ad1bcaa5fd9c70ec6ea700

                                                                                      • C:\Users\Admin\AppData\Local\Temp\tmp4F56.tmp

                                                                                        Filesize

                                                                                        46KB

                                                                                        MD5

                                                                                        02d2c46697e3714e49f46b680b9a6b83

                                                                                        SHA1

                                                                                        84f98b56d49f01e9b6b76a4e21accf64fd319140

                                                                                        SHA256

                                                                                        522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

                                                                                        SHA512

                                                                                        60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

                                                                                      • C:\Users\Admin\AppData\Local\Temp\tmp5062.tmp

                                                                                        Filesize

                                                                                        48KB

                                                                                        MD5

                                                                                        349e6eb110e34a08924d92f6b334801d

                                                                                        SHA1

                                                                                        bdfb289daff51890cc71697b6322aa4b35ec9169

                                                                                        SHA256

                                                                                        c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a

                                                                                        SHA512

                                                                                        2a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574

                                                                                      • C:\Users\Admin\AppData\Local\Temp\u4og.0.exe

                                                                                        Filesize

                                                                                        315KB

                                                                                        MD5

                                                                                        ae2b67fe16f078fc5d8c242c0abf128b

                                                                                        SHA1

                                                                                        383059bcd455c8ae9d23e7f3679581ef54eca567

                                                                                        SHA256

                                                                                        1fc92b44f6be765911febe55ccad61e184f84ab651f49f4e7095ffbe134e1ea2

                                                                                        SHA512

                                                                                        f318aa58926c0c50a8f307b7592685897a8321ca5551efe7dc513946558455f0ffbf1554e81a6eaf76d3ebd9b057a77eeefc07a4c7a39905937d7bd00d4e7735

                                                                                      • C:\Users\Admin\AppData\Local\Temp\u4og.1.exe

                                                                                        Filesize

                                                                                        2.9MB

                                                                                        MD5

                                                                                        f15dba86e608dcb3ffde2ba6f816f3cb

                                                                                        SHA1

                                                                                        88c67a22b2be3bb08ad0e0cc502a4d45088da3ce

                                                                                        SHA256

                                                                                        4472cfcea09329e6f767078d0b7be5962e1e3c43e8a65326645111d780a1d3b4

                                                                                        SHA512

                                                                                        12c8a54cefcfef092e5c2e7766be927995a87b9c4c4f2de891b641e81dd822a91892a6aef5091477a88731c783a6bb60e68a8f9e279462a7f380ec445dbce361

                                                                                      • C:\Users\Admin\AppData\Local\Temp\u4og.1.exe

                                                                                        Filesize

                                                                                        1.5MB

                                                                                        MD5

                                                                                        1f0189d6d6f0e58a8ed2e988ab753ef0

                                                                                        SHA1

                                                                                        44c7f9e627e9771f978a41696590474a853debd6

                                                                                        SHA256

                                                                                        f637c3fb5710f0f58d4016480ff04a4a08bf1b7efd7dd762be69bb36a7f1306e

                                                                                        SHA512

                                                                                        39002e3edd3ac06aabc0dbf0a0154942781f1967f33183d87121727d3b0bb3ed8f54b97532994e4e950b38e0e4b3a46a955ca863f27a78caec34a64291fa5e36

                                                                                      • C:\Users\Admin\AppData\Local\Temp\u4og.1.exe

                                                                                        Filesize

                                                                                        1.5MB

                                                                                        MD5

                                                                                        a993d62aad1846d2969f51025a99bac6

                                                                                        SHA1

                                                                                        df41117fc6836fe15f646d36d23bbe62fcee3330

                                                                                        SHA256

                                                                                        8dc3cf8db2efb1192abb1a81e415e73abfddf1701c555bb1d582f68b6e2f8192

                                                                                        SHA512

                                                                                        4f4a9134a797390ccf1aa897f156fe84587e0c7b9ba1bbecb3bc0449cf6da5e0925557dc9fe0269d328327170fc1cae41a61330eef8f9edde65ef356af5ee65f

                                                                                      • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                                                                                        Filesize

                                                                                        109KB

                                                                                        MD5

                                                                                        2afdbe3b99a4736083066a13e4b5d11a

                                                                                        SHA1

                                                                                        4d4856cf02b3123ac16e63d4a448cdbcb1633546

                                                                                        SHA256

                                                                                        8d31b39170909595b518b1a03e9ec950540fabd545ed14817cac5c84b91599ee

                                                                                        SHA512

                                                                                        d89b3c46854153e60e3fa825b394344eee33936d7dbf186af9d95c9adae54428609e3bf21a18d38fce3d96f3e0b8e4e0ed25cb5004fbe288de3aef3a85b1d93f

                                                                                      • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                                                                                        Filesize

                                                                                        25KB

                                                                                        MD5

                                                                                        d56c2f270044d00c7030dab5646d291b

                                                                                        SHA1

                                                                                        410ab0f271c2924c6517b8845b2daf6ecc0bc119

                                                                                        SHA256

                                                                                        381a7b216203fe0d47caafdb2d0cf562b1345149ea80fdf2fa4cb806a8e70367

                                                                                        SHA512

                                                                                        a5c9d748d94eec46c21f2949ba3761c250a91776bf75a8195790b92bd71621bc9e0fea88b20e83a518af7b85442a604467818b99df9513e7da7887d1305bb585

                                                                                      • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                                                                                        Filesize

                                                                                        1.2MB

                                                                                        MD5

                                                                                        92fbdfccf6a63acef2743631d16652a7

                                                                                        SHA1

                                                                                        971968b1378dd89d59d7f84bf92f16fc68664506

                                                                                        SHA256

                                                                                        b4588feacc183cd5a089f9bb950827b75df04bd5a6e67c95ff258e4a34aa0d72

                                                                                        SHA512

                                                                                        b8ea216d4a59d8858fd4128abb555f8dcf3acca9138e663b488f09dc5200db6dc11ecc235a355e801145bbbb44d7beac6147949d75d78b32fe9cfd2fa200d117

                                                                                      • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                                                                                        Filesize

                                                                                        1KB

                                                                                        MD5

                                                                                        5881ee7d0d790539bcfd3037e0ac16a8

                                                                                        SHA1

                                                                                        fbd3990117e5ad0d66bf62253e924daeff516aa8

                                                                                        SHA256

                                                                                        5e566c8cb35e5c47eeb7bdb08f84553ca7249d43a5c15f200f3d0a3b0f5728b9

                                                                                        SHA512

                                                                                        fc9c759b6f1e436088bf20a8a9114737a1ba4af995ba82c6b0d8f015207fae85cab55bc8f9aa12aed6700ed2618fe265020b0bcd54937aad338e8e07f7be9a13

                                                                                      • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                                                                                        Filesize

                                                                                        109KB

                                                                                        MD5

                                                                                        726cd06231883a159ec1ce28dd538699

                                                                                        SHA1

                                                                                        404897e6a133d255ad5a9c26ac6414d7134285a2

                                                                                        SHA256

                                                                                        12fef2d5995d671ec0e91bdbdc91e2b0d3c90ed3a8b2b13ddaa8ad64727dcd46

                                                                                        SHA512

                                                                                        9ea82e7cb6c6a58446bd5033855947c3e2d475d2910f2b941235e0b96aa08eec822d2dd17cc86b2d3fce930f78b799291992408e309a6c63e3011266810ea83e

                                                                                      • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

                                                                                        Filesize

                                                                                        384KB

                                                                                        MD5

                                                                                        c735f4832ed95f2910bdda3a715d56ef

                                                                                        SHA1

                                                                                        6a70e0666441b32077196fbb9be4e374bcc0d120

                                                                                        SHA256

                                                                                        c4ce05978e7608dffa56e9499380a8b1dbc8307b600ecd0bc9e6a1068d82db36

                                                                                        SHA512

                                                                                        f40ff750330c4c4026a4f5dbd75ba3cd7a808ca15d88db01a4849e5a36873b77b22139c79e27dbdfe94c155443058612cdb2156c780c3f3e3d6156fc158c29bc

                                                                                      • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

                                                                                        Filesize

                                                                                        320KB

                                                                                        MD5

                                                                                        7231ad98e69d2ba58df80af3be66839a

                                                                                        SHA1

                                                                                        e55424cf6e8ca49e73267a7896e212608f7ebf7e

                                                                                        SHA256

                                                                                        2c75c357bcd4761f494cec669ef3425caa83998ebc2dbf96935527ca24c7c6bd

                                                                                        SHA512

                                                                                        981f199058668fb9b340165ff083405533e4e24c671442994e8a474d157873b96aa78932f126926071907da4f45debeac0dbdea1c27fc238de130546aec49cc0

                                                                                      • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

                                                                                        Filesize

                                                                                        1.2MB

                                                                                        MD5

                                                                                        15a42d3e4579da615a384c717ab2109b

                                                                                        SHA1

                                                                                        22aeedeb2307b1370cdab70d6a6b6d2c13ad2301

                                                                                        SHA256

                                                                                        3c97bb410e49b11af8116feb7240b7101e1967cae7538418c45c3d2e072e8103

                                                                                        SHA512

                                                                                        1eb7f126dccc88a2479e3818c36120f5af3caa0d632b9ea803485ee6531d6e2a1fd0805b1c4364983d280df23ea5ca3ad4a5fca558ac436efae36af9b795c444

                                                                                      • C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe

                                                                                        Filesize

                                                                                        541KB

                                                                                        MD5

                                                                                        1fc4b9014855e9238a361046cfbf6d66

                                                                                        SHA1

                                                                                        c17f18c8246026c9979ab595392a14fe65cc5e9f

                                                                                        SHA256

                                                                                        f38c27ecbeed9721f0885d3b2f2f767d60a5d1c0a5c98433357f570987da3e50

                                                                                        SHA512

                                                                                        2af234cac24ec4a508693d9affa7f759d4b29bb3c9ddffd9e6350959fd4da26501553399d2b02a8eeae8dace6bfe9b2ce50462ce3c6547497f5b0ea6ed226b12

                                                                                      • C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe

                                                                                        Filesize

                                                                                        304KB

                                                                                        MD5

                                                                                        cc90e3326d7b20a33f8037b9aab238e4

                                                                                        SHA1

                                                                                        236d173a6ac462d85de4e866439634db3b9eeba3

                                                                                        SHA256

                                                                                        bd73ee49a23901f9fb235f8a5b29adc72cc637ad4b62a9760c306900cb1678b7

                                                                                        SHA512

                                                                                        b5d197a05a267bf66509b6d976924cd6f5963532a9f9f22d1763701d4fba3dfa971e0058388249409884bc29216fb33a51846562a5650f81d99ce14554861521

                                                                                      • C:\Users\Admin\Desktop\Microsoft Edge.lnk

                                                                                        Filesize

                                                                                        2KB

                                                                                        MD5

                                                                                        b32b002de392a0a194f98097dc86255e

                                                                                        SHA1

                                                                                        0cbcbface9bdffe63ad459c911d456ba3b00d2b7

                                                                                        SHA256

                                                                                        a3199e45aab88e652fd0e1bc892ca03f6335964d881b2b409b0b6f131105c4f1

                                                                                        SHA512

                                                                                        50deefa1a3685b7b4caea545cf6b1e6021dacfc1c121280775567130a03e95d860e37c4bba86847fe240535ba5cab186e8196b82566750657327ae404f16006b

                                                                                      • memory/1196-173-0x0000000004A30000-0x0000000004A31000-memory.dmp

                                                                                        Filesize

                                                                                        4KB

                                                                                      • memory/1196-176-0x0000000000B90000-0x0000000001047000-memory.dmp

                                                                                        Filesize

                                                                                        4.7MB

                                                                                      • memory/1196-175-0x0000000004A90000-0x0000000004A91000-memory.dmp

                                                                                        Filesize

                                                                                        4KB

                                                                                      • memory/1196-171-0x0000000004A50000-0x0000000004A51000-memory.dmp

                                                                                        Filesize

                                                                                        4KB

                                                                                      • memory/1196-174-0x0000000004A40000-0x0000000004A41000-memory.dmp

                                                                                        Filesize

                                                                                        4KB

                                                                                      • memory/1196-248-0x0000000000B90000-0x0000000001047000-memory.dmp

                                                                                        Filesize

                                                                                        4.7MB

                                                                                      • memory/1196-172-0x0000000004AA0000-0x0000000004AA1000-memory.dmp

                                                                                        Filesize

                                                                                        4KB

                                                                                      • memory/1196-170-0x0000000004A70000-0x0000000004A71000-memory.dmp

                                                                                        Filesize

                                                                                        4KB

                                                                                      • memory/1196-154-0x0000000000B90000-0x0000000001047000-memory.dmp

                                                                                        Filesize

                                                                                        4.7MB

                                                                                      • memory/1196-169-0x0000000004A60000-0x0000000004A61000-memory.dmp

                                                                                        Filesize

                                                                                        4KB

                                                                                      • memory/2164-8-0x0000000004F40000-0x0000000004F41000-memory.dmp

                                                                                        Filesize

                                                                                        4KB

                                                                                      • memory/2164-4-0x0000000004F70000-0x0000000004F71000-memory.dmp

                                                                                        Filesize

                                                                                        4KB

                                                                                      • memory/2164-14-0x0000000000BB0000-0x0000000001068000-memory.dmp

                                                                                        Filesize

                                                                                        4.7MB

                                                                                      • memory/2164-1-0x00000000772C4000-0x00000000772C6000-memory.dmp

                                                                                        Filesize

                                                                                        8KB

                                                                                      • memory/2164-3-0x0000000004F60000-0x0000000004F61000-memory.dmp

                                                                                        Filesize

                                                                                        4KB

                                                                                      • memory/2164-2-0x0000000000BB0000-0x0000000001068000-memory.dmp

                                                                                        Filesize

                                                                                        4.7MB

                                                                                      • memory/2164-7-0x0000000004F30000-0x0000000004F31000-memory.dmp

                                                                                        Filesize

                                                                                        4KB

                                                                                      • memory/2164-6-0x0000000004F90000-0x0000000004F91000-memory.dmp

                                                                                        Filesize

                                                                                        4KB

                                                                                      • memory/2164-0-0x0000000000BB0000-0x0000000001068000-memory.dmp

                                                                                        Filesize

                                                                                        4.7MB

                                                                                      • memory/2164-9-0x0000000004FB0000-0x0000000004FB1000-memory.dmp

                                                                                        Filesize

                                                                                        4KB

                                                                                      • memory/2164-5-0x0000000004F50000-0x0000000004F51000-memory.dmp

                                                                                        Filesize

                                                                                        4KB

                                                                                      • memory/2420-610-0x00000000001C0000-0x0000000000567000-memory.dmp

                                                                                        Filesize

                                                                                        3.7MB

                                                                                      • memory/2420-734-0x00000000001C0000-0x0000000000567000-memory.dmp

                                                                                        Filesize

                                                                                        3.7MB

                                                                                      • memory/2420-705-0x00000000001C0000-0x0000000000567000-memory.dmp

                                                                                        Filesize

                                                                                        3.7MB

                                                                                      • memory/2420-123-0x00000000001C0000-0x0000000000567000-memory.dmp

                                                                                        Filesize

                                                                                        3.7MB

                                                                                      • memory/2420-120-0x00000000001C0000-0x0000000000567000-memory.dmp

                                                                                        Filesize

                                                                                        3.7MB

                                                                                      • memory/2420-421-0x00000000001C0000-0x0000000000567000-memory.dmp

                                                                                        Filesize

                                                                                        3.7MB

                                                                                      • memory/3224-518-0x0000000000400000-0x0000000002D4D000-memory.dmp

                                                                                        Filesize

                                                                                        41.3MB

                                                                                      • memory/3348-165-0x00007FF836B20000-0x00007FF8375E1000-memory.dmp

                                                                                        Filesize

                                                                                        10.8MB

                                                                                      • memory/3348-168-0x000001A5CE990000-0x000001A5CE9A0000-memory.dmp

                                                                                        Filesize

                                                                                        64KB

                                                                                      • memory/3348-167-0x000001A5CE990000-0x000001A5CE9A0000-memory.dmp

                                                                                        Filesize

                                                                                        64KB

                                                                                      • memory/3348-160-0x000001A5CE940000-0x000001A5CE962000-memory.dmp

                                                                                        Filesize

                                                                                        136KB

                                                                                      • memory/3392-516-0x0000000003520000-0x0000000003536000-memory.dmp

                                                                                        Filesize

                                                                                        88KB

                                                                                      • memory/3872-70-0x0000000005240000-0x0000000005250000-memory.dmp

                                                                                        Filesize

                                                                                        64KB

                                                                                      • memory/3872-56-0x0000000000880000-0x000000000090C000-memory.dmp

                                                                                        Filesize

                                                                                        560KB

                                                                                      • memory/3872-57-0x0000000072ED0000-0x0000000073680000-memory.dmp

                                                                                        Filesize

                                                                                        7.7MB

                                                                                      • memory/3872-91-0x0000000002C90000-0x0000000004C90000-memory.dmp

                                                                                        Filesize

                                                                                        32.0MB

                                                                                      • memory/3872-90-0x0000000072ED0000-0x0000000073680000-memory.dmp

                                                                                        Filesize

                                                                                        7.7MB

                                                                                      • memory/3924-611-0x0000000000070000-0x0000000000527000-memory.dmp

                                                                                        Filesize

                                                                                        4.7MB

                                                                                      • memory/3924-706-0x0000000000070000-0x0000000000527000-memory.dmp

                                                                                        Filesize

                                                                                        4.7MB

                                                                                      • memory/3924-422-0x0000000000070000-0x0000000000527000-memory.dmp

                                                                                        Filesize

                                                                                        4.7MB

                                                                                      • memory/3924-735-0x0000000000070000-0x0000000000527000-memory.dmp

                                                                                        Filesize

                                                                                        4.7MB

                                                                                      • memory/4244-88-0x0000000005180000-0x000000000518A000-memory.dmp

                                                                                        Filesize

                                                                                        40KB

                                                                                      • memory/4244-81-0x0000000004FF0000-0x0000000005082000-memory.dmp

                                                                                        Filesize

                                                                                        584KB

                                                                                      • memory/4244-74-0x0000000000400000-0x0000000000450000-memory.dmp

                                                                                        Filesize

                                                                                        320KB

                                                                                      • memory/4244-79-0x0000000072ED0000-0x0000000073680000-memory.dmp

                                                                                        Filesize

                                                                                        7.7MB

                                                                                      • memory/4244-80-0x00000000054C0000-0x0000000005A64000-memory.dmp

                                                                                        Filesize

                                                                                        5.6MB

                                                                                      • memory/4244-93-0x00000000063E0000-0x00000000069F8000-memory.dmp

                                                                                        Filesize

                                                                                        6.1MB

                                                                                      • memory/4244-95-0x0000000007E20000-0x0000000007F2A000-memory.dmp

                                                                                        Filesize

                                                                                        1.0MB

                                                                                      • memory/4244-186-0x0000000072ED0000-0x0000000073680000-memory.dmp

                                                                                        Filesize

                                                                                        7.7MB

                                                                                      • memory/4244-96-0x0000000007D50000-0x0000000007D62000-memory.dmp

                                                                                        Filesize

                                                                                        72KB

                                                                                      • memory/4244-137-0x0000000005F80000-0x0000000005FE6000-memory.dmp

                                                                                        Filesize

                                                                                        408KB

                                                                                      • memory/4244-97-0x0000000007DB0000-0x0000000007DEC000-memory.dmp

                                                                                        Filesize

                                                                                        240KB

                                                                                      • memory/4244-99-0x0000000007F30000-0x0000000007F7C000-memory.dmp

                                                                                        Filesize

                                                                                        304KB

                                                                                      • memory/4244-100-0x00000000051C0000-0x00000000051D0000-memory.dmp

                                                                                        Filesize

                                                                                        64KB

                                                                                      • memory/4248-17-0x00000000008C0000-0x0000000000D78000-memory.dmp

                                                                                        Filesize

                                                                                        4.7MB

                                                                                      • memory/4248-431-0x00000000008C0000-0x0000000000D78000-memory.dmp

                                                                                        Filesize

                                                                                        4.7MB

                                                                                      • memory/4248-121-0x00000000008C0000-0x0000000000D78000-memory.dmp

                                                                                        Filesize

                                                                                        4.7MB

                                                                                      • memory/4248-124-0x00000000008C0000-0x0000000000D78000-memory.dmp

                                                                                        Filesize

                                                                                        4.7MB

                                                                                      • memory/4248-20-0x0000000005320000-0x0000000005321000-memory.dmp

                                                                                        Filesize

                                                                                        4KB

                                                                                      • memory/4248-25-0x0000000005340000-0x0000000005341000-memory.dmp

                                                                                        Filesize

                                                                                        4KB

                                                                                      • memory/4248-19-0x0000000005310000-0x0000000005311000-memory.dmp

                                                                                        Filesize

                                                                                        4KB

                                                                                      • memory/4248-18-0x00000000008C0000-0x0000000000D78000-memory.dmp

                                                                                        Filesize

                                                                                        4.7MB

                                                                                      • memory/4248-27-0x0000000005360000-0x0000000005361000-memory.dmp

                                                                                        Filesize

                                                                                        4KB

                                                                                      • memory/4248-26-0x0000000005370000-0x0000000005371000-memory.dmp

                                                                                        Filesize

                                                                                        4KB

                                                                                      • memory/4248-709-0x00000000008C0000-0x0000000000D78000-memory.dmp

                                                                                        Filesize

                                                                                        4.7MB

                                                                                      • memory/4248-616-0x00000000008C0000-0x0000000000D78000-memory.dmp

                                                                                        Filesize

                                                                                        4.7MB

                                                                                      • memory/4248-98-0x00000000008C0000-0x0000000000D78000-memory.dmp

                                                                                        Filesize

                                                                                        4.7MB

                                                                                      • memory/4248-22-0x0000000005350000-0x0000000005351000-memory.dmp

                                                                                        Filesize

                                                                                        4KB

                                                                                      • memory/4248-21-0x0000000005300000-0x0000000005301000-memory.dmp

                                                                                        Filesize

                                                                                        4KB

                                                                                      • memory/4248-733-0x00000000008C0000-0x0000000000D78000-memory.dmp

                                                                                        Filesize

                                                                                        4.7MB

                                                                                      • memory/4248-24-0x00000000052F0000-0x00000000052F1000-memory.dmp

                                                                                        Filesize

                                                                                        4KB

                                                                                      • memory/4248-23-0x00000000052E0000-0x00000000052E1000-memory.dmp

                                                                                        Filesize

                                                                                        4KB

                                                                                      • memory/4248-254-0x00000000008C0000-0x0000000000D78000-memory.dmp

                                                                                        Filesize

                                                                                        4.7MB

                                                                                      • memory/4756-332-0x0000000000400000-0x0000000000592000-memory.dmp

                                                                                        Filesize

                                                                                        1.6MB

                                                                                      • memory/4784-122-0x0000000000400000-0x0000000000448000-memory.dmp

                                                                                        Filesize

                                                                                        288KB

                                                                                      • memory/4784-84-0x0000000000400000-0x0000000000448000-memory.dmp

                                                                                        Filesize

                                                                                        288KB

                                                                                      • memory/4784-92-0x0000000000400000-0x0000000000448000-memory.dmp

                                                                                        Filesize

                                                                                        288KB

                                                                                      • memory/4784-94-0x0000000000C90000-0x0000000000C91000-memory.dmp

                                                                                        Filesize

                                                                                        4KB

                                                                                      • memory/4784-87-0x0000000000400000-0x0000000000448000-memory.dmp

                                                                                        Filesize

                                                                                        288KB

                                                                                      • memory/4880-223-0x0000000000400000-0x000000000044B000-memory.dmp

                                                                                        Filesize

                                                                                        300KB

                                                                                      • memory/4880-216-0x0000000000400000-0x000000000044B000-memory.dmp

                                                                                        Filesize

                                                                                        300KB

                                                                                      • memory/4984-69-0x0000000072ED0000-0x0000000073680000-memory.dmp

                                                                                        Filesize

                                                                                        7.7MB

                                                                                      • memory/4984-71-0x0000000004C00000-0x0000000004C10000-memory.dmp

                                                                                        Filesize

                                                                                        64KB

                                                                                      • memory/4984-166-0x00000000026E0000-0x00000000046E0000-memory.dmp

                                                                                        Filesize

                                                                                        32.0MB

                                                                                      • memory/4984-68-0x0000000000330000-0x00000000003AA000-memory.dmp

                                                                                        Filesize

                                                                                        488KB

                                                                                      • memory/4984-77-0x00000000026E0000-0x00000000046E0000-memory.dmp

                                                                                        Filesize

                                                                                        32.0MB

                                                                                      • memory/4984-78-0x0000000072ED0000-0x0000000073680000-memory.dmp

                                                                                        Filesize

                                                                                        7.7MB

                                                                                      • memory/5080-707-0x0000000000A20000-0x0000000000DC7000-memory.dmp

                                                                                        Filesize

                                                                                        3.7MB

                                                                                      • memory/5080-473-0x0000000000A20000-0x0000000000DC7000-memory.dmp

                                                                                        Filesize

                                                                                        3.7MB

                                                                                      • memory/5080-760-0x0000000000A20000-0x0000000000DC7000-memory.dmp

                                                                                        Filesize

                                                                                        3.7MB

                                                                                      • memory/5080-730-0x0000000000A20000-0x0000000000DC7000-memory.dmp

                                                                                        Filesize

                                                                                        3.7MB

                                                                                      • memory/5184-449-0x00000000012D0000-0x000000000135C000-memory.dmp

                                                                                        Filesize

                                                                                        560KB

                                                                                      • memory/5692-655-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                                                        Filesize

                                                                                        972KB

                                                                                      • memory/5692-708-0x0000000000400000-0x0000000002D4D000-memory.dmp

                                                                                        Filesize

                                                                                        41.3MB

                                                                                      • memory/5692-737-0x0000000000400000-0x0000000002D4D000-memory.dmp

                                                                                        Filesize

                                                                                        41.3MB

                                                                                      • memory/5752-756-0x0000000000070000-0x0000000000527000-memory.dmp

                                                                                        Filesize

                                                                                        4.7MB

                                                                                      • memory/6032-552-0x0000000000400000-0x000000000044A000-memory.dmp

                                                                                        Filesize

                                                                                        296KB

                                                                                      • memory/6032-543-0x0000000000400000-0x000000000044A000-memory.dmp

                                                                                        Filesize

                                                                                        296KB

                                                                                      • memory/6040-731-0x0000000000400000-0x00000000008AD000-memory.dmp

                                                                                        Filesize

                                                                                        4.7MB

                                                                                      • memory/6064-662-0x0000000000400000-0x0000000002D72000-memory.dmp

                                                                                        Filesize

                                                                                        41.4MB