Analysis

  • max time kernel
    126s
  • max time network
    151s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240221-en
  • resource tags

    arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    24-03-2024 15:01

General

  • Target

    5ff3c681a6968045dbbc7b116d8d09460ca5c3f06c5d76d9a57973339253b2ee.exe

  • Size

    1.9MB

  • MD5

    86e400c1b51b8b42204fbcdffbb8ec49

  • SHA1

    a64e365cbd139b59db26f6b6143f00a7eac04b14

  • SHA256

    5ff3c681a6968045dbbc7b116d8d09460ca5c3f06c5d76d9a57973339253b2ee

  • SHA512

    6cee1ff8ddff892a6a7f3a375ba78aec69367387834ab476cf970a5a227cd57d5c153fcd6980e1dcdcfee2e3e943deeb6f319c7e0e83e60727aef75958d94267

  • SSDEEP

    49152:H2+Sp59ZO6LzdtLnqmGhrX+oyZEhUv5+L2f5ZkkUYHZwMIU:W/59tJt9wrai0VogwRU

Malware Config

Extracted

Family

amadey

Version

4.17

C2

http://185.215.113.32

Attributes
  • install_dir

    00c07260dc

  • install_file

    explorgu.exe

  • strings_key

    461809bd97c251ba0c0c8450c7055f1d

  • url_paths

    /yandex/index.php

rc4.plain

Extracted

Family

redline

Botnet

LiveTraffic

C2

4.185.137.132:1632

Extracted

Family

amadey

Version

4.18

C2

http://193.233.132.56

Attributes
  • install_dir

    09fd851a4f

  • install_file

    explorha.exe

  • strings_key

    443351145ece4966ded809641c77cfa8

  • url_paths

    /Pneh2sXQk0/index.php

rc4.plain

Extracted

Family

smokeloader

Version

2022

C2

http://selebration17io.io/index.php

http://vacantion18ffeu.cc/index.php

http://valarioulinity1.net/index.php

http://buriatiarutuhuob.net/index.php

http://cassiosssionunu.me/index.php

http://sulugilioiu19.net/index.php

http://goodfooggooftool.net/index.php

rc4.i32
rc4.i32

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect ZGRat V1 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
  • Blocklisted process makes network request 4 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 16 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 25 IoCs
  • Identifies Wine through registry keys 2 TTPs 8 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 8 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 5 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 42 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5ff3c681a6968045dbbc7b116d8d09460ca5c3f06c5d76d9a57973339253b2ee.exe
    "C:\Users\Admin\AppData\Local\Temp\5ff3c681a6968045dbbc7b116d8d09460ca5c3f06c5d76d9a57973339253b2ee.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    PID:4852
  • C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe
    C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Executes dropped EXE
    • Identifies Wine through registry keys
    • Adds Run key to start application
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3856
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:3128
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main
        3⤵
        • Blocklisted process makes network request
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2572
        • C:\Windows\system32\netsh.exe
          netsh wlan show profiles
          4⤵
            PID:3704
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\280069375290_Desktop.zip' -CompressionLevel Optimal
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:676
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
        2⤵
        • Blocklisted process makes network request
        • Loads dropped DLL
        PID:3336
      • C:\Users\Admin\AppData\Local\Temp\1000837001\goldprimeldlldf.exe
        "C:\Users\Admin\AppData\Local\Temp\1000837001\goldprimeldlldf.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:496
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2668
      • C:\Users\Admin\AppData\Local\Temp\1000873001\random.exe
        "C:\Users\Admin\AppData\Local\Temp\1000873001\random.exe"
        2⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        PID:3796
      • C:\Users\Admin\AppData\Local\Temp\1000875001\amadka.exe
        "C:\Users\Admin\AppData\Local\Temp\1000875001\amadka.exe"
        2⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2748
        • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
          "C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Adds Run key to start application
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1548
          • C:\Users\Admin\AppData\Local\Temp\1000022001\97cbadb0c3.exe
            "C:\Users\Admin\AppData\Local\Temp\1000022001\97cbadb0c3.exe"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            PID:4688
          • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
            "C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"
            4⤵
              PID:3400
            • C:\Users\Admin\AppData\Local\Temp\1000035001\lumma21.exe
              "C:\Users\Admin\AppData\Local\Temp\1000035001\lumma21.exe"
              4⤵
              • Executes dropped EXE
              • Drops file in Windows directory
              PID:236
            • C:\Windows\SysWOW64\rundll32.exe
              "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
              4⤵
              • Loads dropped DLL
              PID:4944
              • C:\Windows\system32\rundll32.exe
                "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
                5⤵
                • Blocklisted process makes network request
                • Loads dropped DLL
                PID:236
                • C:\Windows\system32\netsh.exe
                  netsh wlan show profiles
                  6⤵
                    PID:2816
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\280069375290_Desktop.zip' -CompressionLevel Optimal
                    6⤵
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1336
              • C:\Windows\SysWOW64\rundll32.exe
                "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
                4⤵
                • Blocklisted process makes network request
                • Loads dropped DLL
                PID:1076
          • C:\Users\Admin\AppData\Local\Temp\1000979001\TeamFour.exe
            "C:\Users\Admin\AppData\Local\Temp\1000979001\TeamFour.exe"
            2⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2464
          • C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe
            "C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe"
            2⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:1756
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:2356
              • C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe
                "C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe"
                4⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:1720
              • C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe
                "C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe"
                4⤵
                • Executes dropped EXE
                • Modifies system certificate store
                • Suspicious use of AdjustPrivilegeToken
                PID:3404
          • C:\Users\Admin\AppData\Local\Temp\1000986001\987123.exe
            "C:\Users\Admin\AppData\Local\Temp\1000986001\987123.exe"
            2⤵
            • Executes dropped EXE
            • Checks SCSI registry key(s)
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            PID:4896
          • C:\Users\Admin\AppData\Local\Temp\1001008001\lummalg.exe
            "C:\Users\Admin\AppData\Local\Temp\1001008001\lummalg.exe"
            2⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            PID:3636
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
              3⤵
                PID:2560
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2560 -s 1164
                  4⤵
                  • Program crash
                  PID:4660
            • C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe
              "C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe"
              2⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              PID:2988
            • C:\Users\Admin\AppData\Local\Temp\1001022001\chckik.exe
              "C:\Users\Admin\AppData\Local\Temp\1001022001\chckik.exe"
              2⤵
              • Executes dropped EXE
              • Drops file in Windows directory
              PID:4888
              • C:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exe
                "C:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exe"
                3⤵
                • Executes dropped EXE
                • Adds Run key to start application
                PID:2400
                • C:\Users\Admin\AppData\Local\Temp\1000053001\random.exe
                  "C:\Users\Admin\AppData\Local\Temp\1000053001\random.exe"
                  4⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  PID:2656
                • C:\Users\Admin\AppData\Local\Temp\1000063001\lummalg.exe
                  "C:\Users\Admin\AppData\Local\Temp\1000063001\lummalg.exe"
                  4⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  PID:2088
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                    5⤵
                      PID:2264
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 2264 -s 824
                        6⤵
                        • Program crash
                        PID:1040
                  • C:\Users\Admin\AppData\Local\Temp\1000074001\Fullwork123.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000074001\Fullwork123.exe"
                    4⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    PID:1660
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                      5⤵
                        PID:1764
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 1764 -s 1160
                          6⤵
                          • Program crash
                          PID:2740
                    • C:\Users\Admin\AppData\Local\Temp\1000082001\boom8.exe
                      "C:\Users\Admin\AppData\Local\Temp\1000082001\boom8.exe"
                      4⤵
                      • Executes dropped EXE
                      PID:4088
                      • C:\Windows\SysWOW64\schtasks.exe
                        "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN boom8.exe /TR "C:\Users\Admin\AppData\Local\Temp\1000082001\boom8.exe" /F
                        5⤵
                        • Creates scheduled task(s)
                        PID:3812
                      • C:\Users\Admin\AppData\Local\Temp\1000172001\ISetup8.exe
                        "C:\Users\Admin\AppData\Local\Temp\1000172001\ISetup8.exe"
                        5⤵
                        • Executes dropped EXE
                        PID:1992
                        • C:\Users\Admin\AppData\Local\Temp\u1jc.0.exe
                          "C:\Users\Admin\AppData\Local\Temp\u1jc.0.exe"
                          6⤵
                          • Executes dropped EXE
                          PID:2312
                        • C:\Users\Admin\AppData\Local\Temp\u1jc.1.exe
                          "C:\Users\Admin\AppData\Local\Temp\u1jc.1.exe"
                          6⤵
                            PID:3752
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Task.bat" "
                              7⤵
                                PID:2644
                                • C:\Windows\SysWOW64\chcp.com
                                  chcp 1251
                                  8⤵
                                    PID:5380
                                  • C:\Windows\SysWOW64\schtasks.exe
                                    schtasks /create /tn "MalayamaraUpdate" /tr "'C:\Users\Admin\AppData\Local\Temp\Updater.exe'" /sc minute /mo 30 /F
                                    8⤵
                                    • Creates scheduled task(s)
                                    PID:5976
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 1992 -s 1644
                                6⤵
                                • Program crash
                                PID:1256
                            • C:\Users\Admin\AppData\Local\Temp\1000173001\toolspub1.exe
                              "C:\Users\Admin\AppData\Local\Temp\1000173001\toolspub1.exe"
                              5⤵
                              • Executes dropped EXE
                              • Checks SCSI registry key(s)
                              PID:3572
                            • C:\Users\Admin\AppData\Local\Temp\1000174001\4767d2e713f2021e8fe856e3ea638b58.exe
                              "C:\Users\Admin\AppData\Local\Temp\1000174001\4767d2e713f2021e8fe856e3ea638b58.exe"
                              5⤵
                                PID:3852
                            • C:\Windows\SysWOW64\rundll32.exe
                              "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll, Main
                              4⤵
                              • Loads dropped DLL
                              PID:1660
                              • C:\Windows\system32\rundll32.exe
                                "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll, Main
                                5⤵
                                • Loads dropped DLL
                                PID:344
                                • C:\Windows\system32\netsh.exe
                                  netsh wlan show profiles
                                  6⤵
                                    PID:1216
                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\280069375290_Desktop.zip' -CompressionLevel Optimal
                                    6⤵
                                      PID:5036
                                • C:\Windows\SysWOW64\rundll32.exe
                                  "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main
                                  4⤵
                                    PID:5436
                                  • C:\Users\Admin\AppData\Local\Temp\1000084001\file300un.exe
                                    "C:\Users\Admin\AppData\Local\Temp\1000084001\file300un.exe"
                                    4⤵
                                      PID:5592
                                      • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                        "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath $env:UserProfile
                                        5⤵
                                          PID:5612
                                        • C:\Windows\system32\cmd.exe
                                          "cmd" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\.BLRVzdv\svchost.exe"' & exit
                                          5⤵
                                            PID:5652
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\.BLRVzdv\svchost.exe"'
                                              6⤵
                                              • Creates scheduled task(s)
                                              PID:5988
                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe
                                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
                                            5⤵
                                              PID:5660
                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                                              5⤵
                                                PID:5680
                                                • C:\Users\Admin\Pictures\21QqeNd144MijCMaf3s2IRoN.exe
                                                  "C:\Users\Admin\Pictures\21QqeNd144MijCMaf3s2IRoN.exe"
                                                  6⤵
                                                    PID:3120
                                                  • C:\Users\Admin\Pictures\cVIBNUfrhJ4Ar7pknqKtTN6N.exe
                                                    "C:\Users\Admin\Pictures\cVIBNUfrhJ4Ar7pknqKtTN6N.exe"
                                                    6⤵
                                                      PID:3040
                                                    • C:\Users\Admin\Pictures\IlJ6Rw9S5tMWO4Zi8aCWP18H.exe
                                                      "C:\Users\Admin\Pictures\IlJ6Rw9S5tMWO4Zi8aCWP18H.exe"
                                                      6⤵
                                                        PID:2692
                                                      • C:\Users\Admin\Pictures\cZblFG09jfrABzcO0CxFEyOp.exe
                                                        "C:\Users\Admin\Pictures\cZblFG09jfrABzcO0CxFEyOp.exe"
                                                        6⤵
                                                          PID:4704
                                                        • C:\Users\Admin\Pictures\0R3lOUHRkmlUEr4xcujr7PPC.exe
                                                          "C:\Users\Admin\Pictures\0R3lOUHRkmlUEr4xcujr7PPC.exe"
                                                          6⤵
                                                            PID:5808
                                                  • C:\Users\Admin\AppData\Local\Temp\1001025001\mk.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\1001025001\mk.exe"
                                                    2⤵
                                                    • Executes dropped EXE
                                                    PID:988
                                                  • C:\Users\Admin\AppData\Local\Temp\1001030001\boom8.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\1001030001\boom8.exe"
                                                    2⤵
                                                    • Executes dropped EXE
                                                    PID:1516
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2560 -ip 2560
                                                  1⤵
                                                    PID:3056
                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 376 -p 2560 -ip 2560
                                                    1⤵
                                                      PID:1216
                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1764 -ip 1764
                                                      1⤵
                                                        PID:1884
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 200 -p 2264 -ip 2264
                                                        1⤵
                                                          PID:1964
                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1992 -ip 1992
                                                          1⤵
                                                            PID:1916
                                                          • C:\Windows\system32\regsvr32.exe
                                                            regsvr32 /s C:\Users\Admin\AppData\Local\Temp\4CBF.dll
                                                            1⤵
                                                              PID:1028
                                                              • C:\Windows\SysWOW64\regsvr32.exe
                                                                /s C:\Users\Admin\AppData\Local\Temp\4CBF.dll
                                                                2⤵
                                                                  PID:4772
                                                              • C:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exe
                                                                C:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exe
                                                                1⤵
                                                                  PID:3440
                                                                • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                                  1⤵
                                                                    PID:3612
                                                                  • C:\Users\Admin\AppData\Local\Temp\1000082001\boom8.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\1000082001\boom8.exe
                                                                    1⤵
                                                                      PID:4852
                                                                    • C:\Users\Admin\AppData\Local\Temp\5EE0.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\5EE0.exe
                                                                      1⤵
                                                                        PID:5276
                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                          C:\Windows\SysWOW64\WerFault.exe -u -p 5276 -s 832
                                                                          2⤵
                                                                          • Program crash
                                                                          PID:5784
                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 5276 -ip 5276
                                                                        1⤵
                                                                          PID:5708

                                                                        Network

                                                                        MITRE ATT&CK Enterprise v15

                                                                        Replay Monitor

                                                                        Loading Replay Monitor...

                                                                        Downloads

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                          Filesize

                                                                          3KB

                                                                          MD5

                                                                          ae626d9a72417b14570daa8fcd5d34a4

                                                                          SHA1

                                                                          c103ebaf4d760df722d620df87e6f07c0486439f

                                                                          SHA256

                                                                          52cc3f3028fab0d347a4a3fffef570b42f85748176d81a3344996d42fd1de32a

                                                                          SHA512

                                                                          a0690bda318bdf43d6f292f88d4ea2ebeec83b95e9ebca80083dbb08e7ddcdb9735cc58b89d369a34f10acf8a114d4a207ed8d0f070c5baf87c5798e9f35bc14

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegAsm.exe.log

                                                                          Filesize

                                                                          2KB

                                                                          MD5

                                                                          47b3bb3bf3bd31854ef77da134dc534f

                                                                          SHA1

                                                                          79f7ee98bfce765215cb9bc54d6c27a748af50f3

                                                                          SHA256

                                                                          27bd7f1def6afae36983285feba3f689c7a006617a7d48cdac752bbd8ca39683

                                                                          SHA512

                                                                          f0d52c49fe5de3abd83875dc52755fbdd7d70aa92d31abae733a8104742372cee2f2e59c5b71f6d667144e52c97c543b095a718ea63410e1709f55b73b4953d0

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\lummalg.exe.log

                                                                          Filesize

                                                                          42B

                                                                          MD5

                                                                          84cfdb4b995b1dbf543b26b86c863adc

                                                                          SHA1

                                                                          d2f47764908bf30036cf8248b9ff5541e2711fa2

                                                                          SHA256

                                                                          d8988d672d6915b46946b28c06ad8066c50041f6152a91d37ffa5cf129cc146b

                                                                          SHA512

                                                                          485f0ed45e13f00a93762cbf15b4b8f996553baa021152fae5aba051e3736bcd3ca8f4328f0e6d9e3e1f910c96c4a9ae055331123ee08e3c2ce3a99ac2e177ce

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\D7Q04MBQ\random[1].exe

                                                                          Filesize

                                                                          3.0MB

                                                                          MD5

                                                                          11901aa29f74ae89bb0810adf7d2808f

                                                                          SHA1

                                                                          fc044f40ab31c9430a29315c6911334fe9de5959

                                                                          SHA256

                                                                          22e5293a211722517cdafd32c27fe87b868459053f8215f1f2e6a58a1b259d42

                                                                          SHA512

                                                                          cc447a6a5ee34eb5366e0fac64a3ca1b57477f7732a2a467acbda7077fd5d7bc0a762f313efb623edf56c78918eac5a7cf760b86bdf9bb99f4a515369d19fe71

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                          Filesize

                                                                          1KB

                                                                          MD5

                                                                          0d0a491debdaef78b8d5662c9baa209d

                                                                          SHA1

                                                                          6aafccf0d3ec78adffd63419be80ecca1c504f79

                                                                          SHA256

                                                                          5699d20559e534de556496e6411b71394639777508c309354cc4754af1cb6840

                                                                          SHA512

                                                                          3a321d4149a878efc518cb4dab63427b4c3b963f7ae07653e2dfbfd9a01b25f9b9876098a093b4db69bdd4e2de6203ff7a1ac8afe298d9f764fb79729861e796

                                                                        • C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe

                                                                          Filesize

                                                                          1.9MB

                                                                          MD5

                                                                          86e400c1b51b8b42204fbcdffbb8ec49

                                                                          SHA1

                                                                          a64e365cbd139b59db26f6b6143f00a7eac04b14

                                                                          SHA256

                                                                          5ff3c681a6968045dbbc7b116d8d09460ca5c3f06c5d76d9a57973339253b2ee

                                                                          SHA512

                                                                          6cee1ff8ddff892a6a7f3a375ba78aec69367387834ab476cf970a5a227cd57d5c153fcd6980e1dcdcfee2e3e943deeb6f319c7e0e83e60727aef75958d94267

                                                                        • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe

                                                                          Filesize

                                                                          1.1MB

                                                                          MD5

                                                                          fc7f57529fcc70ed7c910a1dea3c67d4

                                                                          SHA1

                                                                          9ffa8daa8d3c6e3bf0a3db71145cc19782aa016f

                                                                          SHA256

                                                                          44ba6d68d84e23fe9464456f41a73c1f3f810be7c2c0a690759cec43952fc89c

                                                                          SHA512

                                                                          7247d38bc032cb9a7b22807385d66b4f8fd66b2a7a64854ac4e3b7327a091046854912adef2cd3a5638286173da0fd0e045a6c094760522adcd77db4a18f8e86

                                                                        • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe

                                                                          Filesize

                                                                          1.1MB

                                                                          MD5

                                                                          83f6417a272f7db693eb2e8c3c0059a8

                                                                          SHA1

                                                                          3a6ddc1afa140c9d36362890d988053cec6f1ba2

                                                                          SHA256

                                                                          a057111b986ea3491b9b2ef570582258d59260441b70d4441f74702c48b52eb6

                                                                          SHA512

                                                                          667656b0ffea6de561c1a4b716ec91cdf4d481f06f074548c0b70f23c511f98cfe6c35aec25e765ff6fa699af873ebae9865300a7b83bf648d02f1e763e9a19f

                                                                        • C:\Users\Admin\AppData\Local\Temp\1000022001\97cbadb0c3.exe

                                                                          Filesize

                                                                          1.4MB

                                                                          MD5

                                                                          a668b3dcdab254ea73534824890fd5ba

                                                                          SHA1

                                                                          db25f7d8929dbdce044dbb4018aec56ba80d2eea

                                                                          SHA256

                                                                          b5ccf585f56193b371a63dc16f84148cb383009ec5bf1464f1b0e4bd804b6beb

                                                                          SHA512

                                                                          479c6453b4a6b6bf4aab6dcc069b67ef8a5ef21f381b7b5b249c982b4d042cfb0e8b5e4eca8d01b2bf3cf1e720bf220fb1da667bd05fccc880a8aedb83515253

                                                                        • C:\Users\Admin\AppData\Local\Temp\1000022001\97cbadb0c3.exe

                                                                          Filesize

                                                                          1.4MB

                                                                          MD5

                                                                          c94e9cc890ed9e6bcb73453d587ceebd

                                                                          SHA1

                                                                          56de02b0cd95bfe7b9d9ed6a3347ca4a91734ceb

                                                                          SHA256

                                                                          61a0ba8167a7e89dea464a6d9a9ce477934ad7502d755b64eeb568925eaa126c

                                                                          SHA512

                                                                          18c1d576de27febb2b9364488a1acc919f5fe2e0f5d9807a376c5318c055473b9e2b49e41af9c5fdc7d25a5d4598dd3f9373e3f81451d395284a489cfeb3c0da

                                                                        • C:\Users\Admin\AppData\Local\Temp\1000035001\lumma21.exe

                                                                          Filesize

                                                                          413KB

                                                                          MD5

                                                                          d467222c3bd563cb72fa49302f80b079

                                                                          SHA1

                                                                          9335e2a36abb8309d8a2075faf78d66b968b2a91

                                                                          SHA256

                                                                          fedb08b3ec7034a15e9dee7ed4dec1a854fb78e74285e1ee05c90f9e9e4f8b3e

                                                                          SHA512

                                                                          484b6c427e28193ddb73dd7062e2bfbd132ddc72ce4811bfe08784669de30e4b92bc27140373f62a4ce651401000a3c505188620c43da410bf6b0799a0791fa7

                                                                        • C:\Users\Admin\AppData\Local\Temp\1000074001\Fullwork123.exe

                                                                          Filesize

                                                                          354KB

                                                                          MD5

                                                                          f72f6b9036a9273958dc09effeb0a10a

                                                                          SHA1

                                                                          88c6d3521a345c8fd688a7a35c25299cdf96c5cd

                                                                          SHA256

                                                                          5846798583be774901279b9bca21a8ef095d0f12e459a7a83535b5b0339046bc

                                                                          SHA512

                                                                          b5b72ff06efe22888ab2f8715b899477e73335fd04ae42a37a1e6da794a4e0b3d7ac6ad7f24e7dddaca91bc96484776bb1c49d5385096523e2cb380bed83f314

                                                                        • C:\Users\Admin\AppData\Local\Temp\1000082001\boom8.exe

                                                                          Filesize

                                                                          418KB

                                                                          MD5

                                                                          0099a99f5ffb3c3ae78af0084136fab3

                                                                          SHA1

                                                                          0205a065728a9ec1133e8a372b1e3864df776e8c

                                                                          SHA256

                                                                          919ae827ff59fcbe3dbaea9e62855a4d27690818189f696cfb5916a88c823226

                                                                          SHA512

                                                                          5ac4f3265c7dd7d172284fb28c94f8fc6428c27853e70989f4ec4208f9897be91720e8eee1906d8e843ab05798f3279a12492a32e8a118f5621ac5e1be2031b6

                                                                        • C:\Users\Admin\AppData\Local\Temp\1000172001\ISetup8.exe

                                                                          Filesize

                                                                          437KB

                                                                          MD5

                                                                          a6359e3def9488d7241cd3ae38f48f8f

                                                                          SHA1

                                                                          9887fa042b6619c535fc311b024d9b74cdc699aa

                                                                          SHA256

                                                                          5cd9e1d02e4b473ef293a5a9f4a1aa6b0f91fdfc2ad3b37175f82829e247a21b

                                                                          SHA512

                                                                          a26120634f7d413cc9d9140dabc66502c7a52c7d8586df75dcbda40da03273647c6472c3806f98c19aa68ebca8813c31f7fcb1c4fef1013fdcf2a341117f1fa0

                                                                        • C:\Users\Admin\AppData\Local\Temp\1000173001\toolspub1.exe

                                                                          Filesize

                                                                          293KB

                                                                          MD5

                                                                          5cd2922e6e7d2aeaea1ee725ae9b562e

                                                                          SHA1

                                                                          ea276e30f56d7bfff98c1f5480b0b565db42fa48

                                                                          SHA256

                                                                          b8fd930c7165a1a03b79bbc5c8bac3596a74271ea38b9bc5293d549852340cd2

                                                                          SHA512

                                                                          a3eb78aab3a0961d8a88e7a76eebfa678fb7858843ee12aac247c71f9c78f041f574fa9647b08f7aa96c3d212e45d765d0359fa6e98820a41c5bbf9ef99ce085

                                                                        • C:\Users\Admin\AppData\Local\Temp\1000174001\4767d2e713f2021e8fe856e3ea638b58.exe

                                                                          Filesize

                                                                          2.2MB

                                                                          MD5

                                                                          6366608a53bca9b9979d5b80280ea87b

                                                                          SHA1

                                                                          a5518b22075c71cb9495ea05633d115b29b87c78

                                                                          SHA256

                                                                          8a0989c968ec7e4654b64f8f8cac9642f45c4f03ac7c78cccc33c08d29809f0f

                                                                          SHA512

                                                                          c1fa75d82aa16ce522647542327e136e7892ee5f3b217fd844bee3d8ba47a3239cab51e86d754448cb0b2424fc32ae1e8a12f93555151eff52fd7e9916f7aaed

                                                                        • C:\Users\Admin\AppData\Local\Temp\1000837001\goldprimeldlldf.exe

                                                                          Filesize

                                                                          464KB

                                                                          MD5

                                                                          c084d6f6ba40534fbfc5a64b21ef99ab

                                                                          SHA1

                                                                          0b4a17da83c0a8abbc8fab321931d5447b32b720

                                                                          SHA256

                                                                          afd83290a2adb219c3f1b8fbf23c27b0994fe76dfbb7dc0b416530dc0e21f624

                                                                          SHA512

                                                                          a5384a2f7029cf946fde44e1ff30775754ce525ca5a6fdac14184872b6e684cb6e585053cb86d32f82cbd3db48eb195ba3a642d8ee3774be579fccd993938ca1

                                                                        • C:\Users\Admin\AppData\Local\Temp\1000873001\random.exe

                                                                          Filesize

                                                                          1.4MB

                                                                          MD5

                                                                          87390d2ec8a66c151d2861d943535700

                                                                          SHA1

                                                                          b675b6733866a38d9d93b64e2cc20f609c9ad3a8

                                                                          SHA256

                                                                          5a7be3123560af54f380fc195304b3623a446763f8445639505a4e1d943f7feb

                                                                          SHA512

                                                                          9f6509ddd470a7c32676ffb587c762b11399378f31a8eca26f9f765971b01942ffd4b9d3038a93654890fb143818fe2724f51732e758acb31cfc7f2cae973f9a

                                                                        • C:\Users\Admin\AppData\Local\Temp\1000873001\random.exe

                                                                          Filesize

                                                                          1.3MB

                                                                          MD5

                                                                          c09dbe79d2f2d8aef634341abdfa6d4a

                                                                          SHA1

                                                                          a146b4244d15c2d14d64de58fc353c7a5771454c

                                                                          SHA256

                                                                          d390dc7541bf3572e44a810d77f67f48a93630a4f40613fc8dc63b21cde3cf0b

                                                                          SHA512

                                                                          9cf2decff2ab1b3a2aecdd545ff975f0a1e501ed123e65b421ce0ce62b421237ad84393404b82950b27bd285bf4978f595c40c726dcd68999492a9c9ac94d21f

                                                                        • C:\Users\Admin\AppData\Local\Temp\1000873001\random.exe

                                                                          Filesize

                                                                          1.3MB

                                                                          MD5

                                                                          875aa4b197e52db6ba2f6c088b5e3538

                                                                          SHA1

                                                                          f1c8ee2a3a85e4fa035fdf805cecd88120c70bb0

                                                                          SHA256

                                                                          e1184b741717d7d545170c961be065242917b2a721b21be20dc3c12843871988

                                                                          SHA512

                                                                          284e00734df7b014c48306db61ee648e1f60c7cdc5a03482bf3a4974b0d760111f90ee582972233722737721dddda234875eace6b0b4a9afc804c52487fa35d8

                                                                        • C:\Users\Admin\AppData\Local\Temp\1000875001\amadka.exe

                                                                          Filesize

                                                                          780KB

                                                                          MD5

                                                                          659672a73259698206df4897b165658b

                                                                          SHA1

                                                                          5eb8d01558bf5a58bb507bdba841a77545051975

                                                                          SHA256

                                                                          c35694092ff513c3ac1b20b9e3dbd00a3dc610844127fbec88a14b046225ac8a

                                                                          SHA512

                                                                          9f5b904f2f3571563a03fab81598e8f8ad27164af05b3cebf23efaf9e3704ba5b44ab71adb61f1eda6d2b11032b5b42664debb784a164dc8af8e6d53382bae39

                                                                        • C:\Users\Admin\AppData\Local\Temp\1000875001\amadka.exe

                                                                          Filesize

                                                                          160KB

                                                                          MD5

                                                                          a2ff6e2857b3ed9f710ba94e653f4b93

                                                                          SHA1

                                                                          a2e6d305b6102d33b4256719bc27ba46a2592bb6

                                                                          SHA256

                                                                          02b3dbafa084861547604d095fb64af71b50254b9d735652138e804b4b3474ef

                                                                          SHA512

                                                                          937febbadf1352dd140a706d5adfca0c59f57d9eb57cae7d1d2a1c1d8ad4278c2c8f6735542b812d87ecf7841476bcce90b44fcb2179eb8ce94aaaae296ea94b

                                                                        • C:\Users\Admin\AppData\Local\Temp\1000875001\amadka.exe

                                                                          Filesize

                                                                          158KB

                                                                          MD5

                                                                          b5d8f1d9014f40aa8ed1a91871f8237e

                                                                          SHA1

                                                                          1e888df2bf31c455a12983483a47517b2b881049

                                                                          SHA256

                                                                          140a38835b18aa49f22af26e866212db54e529c2ae22bd4378c767ffea927aac

                                                                          SHA512

                                                                          2a26958c4b50f887f331ba5218555683b83fd169c48df0166d49e41f34a0aca1f015820ba257d95e2c9c17041ddf290d9ccc0d42d3a571c5459923cc17802d19

                                                                        • C:\Users\Admin\AppData\Local\Temp\1000979001\TeamFour.exe

                                                                          Filesize

                                                                          541KB

                                                                          MD5

                                                                          3b069f3dd741e4360f26cb27cb10320a

                                                                          SHA1

                                                                          6a9503aaf1e297f2696482ddf1bd4605a8710101

                                                                          SHA256

                                                                          f63bdc068c453e7e22740681a0c280d02745807b1695ce86e5067069beca533e

                                                                          SHA512

                                                                          bda58c074f7bd5171d7e3188a48cbdc457607ff06045e64a9e8e33fcb6f66f941d75a7bf57eb0ef262491622b4a9936342384237fa61c1add3365d5006c6d0d9

                                                                        • C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe

                                                                          Filesize

                                                                          1.7MB

                                                                          MD5

                                                                          85a15f080b09acace350ab30460c8996

                                                                          SHA1

                                                                          3fc515e60e4cfa5b3321f04a96c7fb463e4b9d02

                                                                          SHA256

                                                                          3a2006bc835a8ffe91b9ee9206f630b3172f42e090f4e8d90be620e540f5ef6b

                                                                          SHA512

                                                                          ade5e3531dfa1a01e6c2a69deb2962cbf619e766da3d6e8e3453f70ff55ccbcbe21381c7b97a53d67e1ca88975f4409b1a42a759e18f806171d29e4c3f250e9f

                                                                        • C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe

                                                                          Filesize

                                                                          1.3MB

                                                                          MD5

                                                                          f5dfe354e2f36ece3272dcfa9dfed319

                                                                          SHA1

                                                                          6ce4326794c8e1656cef0591cf72852474501f62

                                                                          SHA256

                                                                          316a06c383258c5acea225f23fd7261d66c1bd7380a54c24c8a20edb0fdf76ae

                                                                          SHA512

                                                                          d14b271a4d9a61233b38a5c5cbc18070181aea93bffa2b8a9d4d1d99220b15241139f097dd761c2b5505ed78adc51108ead5b9aac3ea1e3492c947a960f8c360

                                                                        • C:\Users\Admin\AppData\Local\Temp\1000986001\987123.exe

                                                                          Filesize

                                                                          315KB

                                                                          MD5

                                                                          5fe67781ffe47ec36f91991abf707432

                                                                          SHA1

                                                                          137e6d50387a837bf929b0da70ab6b1512e95466

                                                                          SHA256

                                                                          a8f1ae296787ddc24e0e7a241d0bc5829631c98a5eb186a8cfd5795c6d287db9

                                                                          SHA512

                                                                          0e32d9a72b562d4c4a8c4edbd3d0ece54b67ee87c8ac382c6508c62b04b11a2dcd1fba23c3a78004fcd0c2b623dc854fd2fd82eb372dc7becdcbdd7ec7fe1b68

                                                                        • C:\Users\Admin\AppData\Local\Temp\1001008001\lummalg.exe

                                                                          Filesize

                                                                          350KB

                                                                          MD5

                                                                          04df085b57814d1a1accead4e153909e

                                                                          SHA1

                                                                          6d277da314ef185ba9072a9b677b599b1f46c35b

                                                                          SHA256

                                                                          91a36d137ebfa812b055728807e11338d15d3a5d869cb4babdf779266688e4dd

                                                                          SHA512

                                                                          f37678424e46e4f28e1047161db60ad737515558c8c8905ed598ca96b198304da7356e49e7bb9d1e77fe75372f0b5a7f670a353d093749c37bb85c40ec7fdafa

                                                                        • C:\Users\Admin\AppData\Local\Temp\1001025001\mk.exe

                                                                          Filesize

                                                                          297KB

                                                                          MD5

                                                                          cc1e287519f78a28dab6bde8e1093829

                                                                          SHA1

                                                                          9262753386caa4054aa845d918364e964e5505aa

                                                                          SHA256

                                                                          dbcb61ce94c4d2d216de2b503937a2a964b984577f2d7730b7c6428b2b5e8db2

                                                                          SHA512

                                                                          527b6d905e2ca829369563baa7be9eaf4050ef9bbf438ccc98b9b821e76977aaebbda8471da8b81c0542395c5fc316b19d7034155f278640d0765bfc55dc1f43

                                                                        • C:\Users\Admin\AppData\Local\Temp\1001029001\file300un.exe

                                                                          Filesize

                                                                          1.1MB

                                                                          MD5

                                                                          fcc73bf640a98f3ad9a4bbdd7e2f1254

                                                                          SHA1

                                                                          7434a2e9da97ce6ab530af6d9f6d3ee7ec6438d7

                                                                          SHA256

                                                                          6bbf7d47411ee841d2e1d1d52bf43c6a90f7969cb1301527dc0a6023b43cc210

                                                                          SHA512

                                                                          c4ef98abe98a3bfba2f8e448c728c74d131f82bf805192ea2fe77a6e05f2dba8bc1cd57ea123274d9d65cae7408cab00a6e7c0977d89562549ed04b191ced525

                                                                        • C:\Users\Admin\AppData\Local\Temp\280069375290_Desktop.zip

                                                                          Filesize

                                                                          22B

                                                                          MD5

                                                                          76cdb2bad9582d23c1f6f4d868218d6c

                                                                          SHA1

                                                                          b04f3ee8f5e43fa3b162981b50bb72fe1acabb33

                                                                          SHA256

                                                                          8739c76e681f900923b900c9df0ef75cf421d39cabb54650c4b9ad19b6a76d85

                                                                          SHA512

                                                                          5e2f959f36b66df0580a94f384c5fc1ceeec4b2a3925f062d7b68f21758b86581ac2adcfdde73a171a28496e758ef1b23ca4951c05455cdae9357cc3b5a5825f

                                                                        • C:\Users\Admin\AppData\Local\Temp\TmpE153.tmp

                                                                          Filesize

                                                                          2KB

                                                                          MD5

                                                                          1420d30f964eac2c85b2ccfe968eebce

                                                                          SHA1

                                                                          bdf9a6876578a3e38079c4f8cf5d6c79687ad750

                                                                          SHA256

                                                                          f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9

                                                                          SHA512

                                                                          6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8

                                                                        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_3ps0xs5i.dag.ps1

                                                                          Filesize

                                                                          60B

                                                                          MD5

                                                                          d17fe0a3f47be24a6453e9ef58c94641

                                                                          SHA1

                                                                          6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                          SHA256

                                                                          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                          SHA512

                                                                          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                        • C:\Users\Admin\AppData\Local\Temp\u1jc.0.exe

                                                                          Filesize

                                                                          292KB

                                                                          MD5

                                                                          0d741321055d687fd67a4c638cfc579d

                                                                          SHA1

                                                                          e620a53802fc888c34eff90aa9783e064e6bfa8d

                                                                          SHA256

                                                                          0d7500dfaaac5fd44f989dcb0e6f337451baa2c39e47457493ab0990ae654e4b

                                                                          SHA512

                                                                          f2b902c980b4e61ed254e1f6561311aaf625d5279eb894c5d3507cb231f0b596ccf44b8d9caf3c3439057cc96df45704fa5aafe5ff6142b2f473ca47d34220c9

                                                                        • C:\Users\Admin\AppData\Local\Temp\u1jc.1.exe

                                                                          Filesize

                                                                          1.1MB

                                                                          MD5

                                                                          e19b3b425db44aedde0fa8424a79d0b8

                                                                          SHA1

                                                                          aaf565e1ef6a234b6edff158bab2c00497c282e5

                                                                          SHA256

                                                                          46bd41e6b6783529c0e22aea6c9174497b6eb1e9293c6453c1091c51e975bda7

                                                                          SHA512

                                                                          6798e1043951c6e131f1eff5404220fcf1d6021b5d281a1cdd51464e41e491c4b45c0a2bcdbd2ac10e197e4a2643c4388e9c0fa35b3ecd4380183d5ef394d119

                                                                        • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                                                                          Filesize

                                                                          109KB

                                                                          MD5

                                                                          2afdbe3b99a4736083066a13e4b5d11a

                                                                          SHA1

                                                                          4d4856cf02b3123ac16e63d4a448cdbcb1633546

                                                                          SHA256

                                                                          8d31b39170909595b518b1a03e9ec950540fabd545ed14817cac5c84b91599ee

                                                                          SHA512

                                                                          d89b3c46854153e60e3fa825b394344eee33936d7dbf186af9d95c9adae54428609e3bf21a18d38fce3d96f3e0b8e4e0ed25cb5004fbe288de3aef3a85b1d93f

                                                                        • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                                                                          Filesize

                                                                          1.2MB

                                                                          MD5

                                                                          92fbdfccf6a63acef2743631d16652a7

                                                                          SHA1

                                                                          971968b1378dd89d59d7f84bf92f16fc68664506

                                                                          SHA256

                                                                          b4588feacc183cd5a089f9bb950827b75df04bd5a6e67c95ff258e4a34aa0d72

                                                                          SHA512

                                                                          b8ea216d4a59d8858fd4128abb555f8dcf3acca9138e663b488f09dc5200db6dc11ecc235a355e801145bbbb44d7beac6147949d75d78b32fe9cfd2fa200d117

                                                                        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                                                                          Filesize

                                                                          109KB

                                                                          MD5

                                                                          726cd06231883a159ec1ce28dd538699

                                                                          SHA1

                                                                          404897e6a133d255ad5a9c26ac6414d7134285a2

                                                                          SHA256

                                                                          12fef2d5995d671ec0e91bdbdc91e2b0d3c90ed3a8b2b13ddaa8ad64727dcd46

                                                                          SHA512

                                                                          9ea82e7cb6c6a58446bd5033855947c3e2d475d2910f2b941235e0b96aa08eec822d2dd17cc86b2d3fce930f78b799291992408e309a6c63e3011266810ea83e

                                                                        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

                                                                          Filesize

                                                                          1.2MB

                                                                          MD5

                                                                          15a42d3e4579da615a384c717ab2109b

                                                                          SHA1

                                                                          22aeedeb2307b1370cdab70d6a6b6d2c13ad2301

                                                                          SHA256

                                                                          3c97bb410e49b11af8116feb7240b7101e1967cae7538418c45c3d2e072e8103

                                                                          SHA512

                                                                          1eb7f126dccc88a2479e3818c36120f5af3caa0d632b9ea803485ee6531d6e2a1fd0805b1c4364983d280df23ea5ca3ad4a5fca558ac436efae36af9b795c444

                                                                        • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll

                                                                          Filesize

                                                                          109KB

                                                                          MD5

                                                                          154c3f1334dd435f562672f2664fea6b

                                                                          SHA1

                                                                          51dd25e2ba98b8546de163b8f26e2972a90c2c79

                                                                          SHA256

                                                                          5f431129f97f3d56929f1e5584819e091bd6c854d7e18503074737fc6d79e33f

                                                                          SHA512

                                                                          1bca69bbcdb7ecd418769e9d4befc458f9f8e3cee81feb7316bb61e189e2904f4431e4cc7d291e179a5dec441b959d428d8e433f579036f763bbad6460222841

                                                                        • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll

                                                                          Filesize

                                                                          1.2MB

                                                                          MD5

                                                                          f35b671fda2603ec30ace10946f11a90

                                                                          SHA1

                                                                          059ad6b06559d4db581b1879e709f32f80850872

                                                                          SHA256

                                                                          83e3df5bec15d5333935bea8b719a6d677e2fb3dc1cf9e18e7b82fd0438285c7

                                                                          SHA512

                                                                          b5fa27d08c64727cef7fdda5e68054a4359cd697df50d70d1d90da583195959a139066a6214531bbc5f20cd4f9bc1ca3e4244396547381291a6a1d2df9cf8705

                                                                        • C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe

                                                                          Filesize

                                                                          541KB

                                                                          MD5

                                                                          1fc4b9014855e9238a361046cfbf6d66

                                                                          SHA1

                                                                          c17f18c8246026c9979ab595392a14fe65cc5e9f

                                                                          SHA256

                                                                          f38c27ecbeed9721f0885d3b2f2f767d60a5d1c0a5c98433357f570987da3e50

                                                                          SHA512

                                                                          2af234cac24ec4a508693d9affa7f759d4b29bb3c9ddffd9e6350959fd4da26501553399d2b02a8eeae8dace6bfe9b2ce50462ce3c6547497f5b0ea6ed226b12

                                                                        • C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe

                                                                          Filesize

                                                                          304KB

                                                                          MD5

                                                                          cc90e3326d7b20a33f8037b9aab238e4

                                                                          SHA1

                                                                          236d173a6ac462d85de4e866439634db3b9eeba3

                                                                          SHA256

                                                                          bd73ee49a23901f9fb235f8a5b29adc72cc637ad4b62a9760c306900cb1678b7

                                                                          SHA512

                                                                          b5d197a05a267bf66509b6d976924cd6f5963532a9f9f22d1763701d4fba3dfa971e0058388249409884bc29216fb33a51846562a5650f81d99ce14554861521

                                                                        • C:\Users\Admin\Pictures\0R3lOUHRkmlUEr4xcujr7PPC.exe

                                                                          Filesize

                                                                          522KB

                                                                          MD5

                                                                          b8616322186dcdf78032a74cf3497153

                                                                          SHA1

                                                                          bf1c1568d65422757cc88300df76a6740db6eab5

                                                                          SHA256

                                                                          43dda2be3813b81729b3d388f546838a36ee3471da5ed266fe958e2316f1f6ea

                                                                          SHA512

                                                                          7b1e4ad944960fc2aa661426f77e64ff151cd8d5860e584874da1c4f03c6d195d4ee9031c36c24a234a851176b003254d14f9334712e07babc6934cf19a7b2fb

                                                                        • C:\Users\Admin\Pictures\WEndnh4bvF7iFlZ8naJM8xEc.exe

                                                                          Filesize

                                                                          7KB

                                                                          MD5

                                                                          5b423612b36cde7f2745455c5dd82577

                                                                          SHA1

                                                                          0187c7c80743b44e9e0c193e993294e3b969cc3d

                                                                          SHA256

                                                                          e0840d2ea74a00dcc545d770b91d9d889e5a82c7bedf1b989e0a89db04685b09

                                                                          SHA512

                                                                          c26a1e7e96dbd178d961c630abd8e564ef69532f386fb198eb20119a88ecab2fe885d71ac0c90687c18910ce00c445f352a5e8fbf5328f3403964f7c7802414c

                                                                        • C:\Users\Admin\Pictures\y5Mo46rnMEACBjR0KJld3CBG.exe

                                                                          Filesize

                                                                          3KB

                                                                          MD5

                                                                          921c4c23a3749d7122259f8bd9efb865

                                                                          SHA1

                                                                          a26eb40a43b9283271ed0b31d02b81bc437024cc

                                                                          SHA256

                                                                          78ed967cd7bd3bd606b5552a03d9b7f766bd65f663985e0bacd4dd5fba4a9ed2

                                                                          SHA512

                                                                          2516ba8dfe2e1a85acf61fc4b87aad8675d157fc17b708e4e1262d9e7c41c28412b8c55946262a707c36a7e9823ee23e3e3450b066e1f3974454fa9cd4d214a6

                                                                        • C:\Windows\Tasks\chrosha.job

                                                                          Filesize

                                                                          286B

                                                                          MD5

                                                                          f05f30a5e54d17c0dec5286c56cef070

                                                                          SHA1

                                                                          d2a47d68ded5529c6c7c05f4520eaf885aea58c4

                                                                          SHA256

                                                                          ca3efb30eb2d2485dece744067a2ab9cfccfb2f015fa4187878b49dc8c00b0df

                                                                          SHA512

                                                                          757e8f8533ba32c784099c0571a74c2ad948ed6d423c03f85ca5c2ba5fd9ec39ea164946cb8c4c79b80efe3996a4c3b79c348a83b6843ff764e1e38d87f62747

                                                                        • memory/496-100-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

                                                                          Filesize

                                                                          64KB

                                                                        • memory/496-98-0x00000000000D0000-0x000000000014A000-memory.dmp

                                                                          Filesize

                                                                          488KB

                                                                        • memory/496-99-0x0000000072B70000-0x0000000073321000-memory.dmp

                                                                          Filesize

                                                                          7.7MB

                                                                        • memory/496-122-0x00000000025F0000-0x00000000045F0000-memory.dmp

                                                                          Filesize

                                                                          32.0MB

                                                                        • memory/496-106-0x0000000072B70000-0x0000000073321000-memory.dmp

                                                                          Filesize

                                                                          7.7MB

                                                                        • memory/496-108-0x00000000025F0000-0x00000000045F0000-memory.dmp

                                                                          Filesize

                                                                          32.0MB

                                                                        • memory/676-58-0x000001A068E60000-0x000001A068E72000-memory.dmp

                                                                          Filesize

                                                                          72KB

                                                                        • memory/676-54-0x000001A068BB0000-0x000001A068BD2000-memory.dmp

                                                                          Filesize

                                                                          136KB

                                                                        • memory/676-57-0x000001A068B70000-0x000001A068B80000-memory.dmp

                                                                          Filesize

                                                                          64KB

                                                                        • memory/676-56-0x000001A068B70000-0x000001A068B80000-memory.dmp

                                                                          Filesize

                                                                          64KB

                                                                        • memory/676-59-0x000001A068BA0000-0x000001A068BAA000-memory.dmp

                                                                          Filesize

                                                                          40KB

                                                                        • memory/676-65-0x00007FFB89BD0000-0x00007FFB8A692000-memory.dmp

                                                                          Filesize

                                                                          10.8MB

                                                                        • memory/676-55-0x00007FFB89BD0000-0x00007FFB8A692000-memory.dmp

                                                                          Filesize

                                                                          10.8MB

                                                                        • memory/1548-613-0x00000000003D0000-0x00000000008AB000-memory.dmp

                                                                          Filesize

                                                                          4.9MB

                                                                        • memory/1548-422-0x00000000003D0000-0x00000000008AB000-memory.dmp

                                                                          Filesize

                                                                          4.9MB

                                                                        • memory/1764-617-0x0000000000400000-0x000000000044B000-memory.dmp

                                                                          Filesize

                                                                          300KB

                                                                        • memory/1764-621-0x0000000000400000-0x000000000044B000-memory.dmp

                                                                          Filesize

                                                                          300KB

                                                                        • memory/2356-268-0x0000000000400000-0x0000000000592000-memory.dmp

                                                                          Filesize

                                                                          1.6MB

                                                                        • memory/2560-413-0x0000000000400000-0x000000000044A000-memory.dmp

                                                                          Filesize

                                                                          296KB

                                                                        • memory/2560-410-0x0000000000400000-0x000000000044A000-memory.dmp

                                                                          Filesize

                                                                          296KB

                                                                        • memory/2668-114-0x0000000007DC0000-0x0000000007ECA000-memory.dmp

                                                                          Filesize

                                                                          1.0MB

                                                                        • memory/2668-124-0x0000000072B70000-0x0000000073321000-memory.dmp

                                                                          Filesize

                                                                          7.7MB

                                                                        • memory/2668-148-0x000000000B370000-0x000000000B89C000-memory.dmp

                                                                          Filesize

                                                                          5.2MB

                                                                        • memory/2668-119-0x0000000008780000-0x00000000087E6000-memory.dmp

                                                                          Filesize

                                                                          408KB

                                                                        • memory/2668-120-0x0000000008A80000-0x0000000008AD0000-memory.dmp

                                                                          Filesize

                                                                          320KB

                                                                        • memory/2668-116-0x0000000007CF0000-0x0000000007D2C000-memory.dmp

                                                                          Filesize

                                                                          240KB

                                                                        • memory/2668-115-0x00000000064D0000-0x00000000064E2000-memory.dmp

                                                                          Filesize

                                                                          72KB

                                                                        • memory/2668-150-0x0000000072B70000-0x0000000073321000-memory.dmp

                                                                          Filesize

                                                                          7.7MB

                                                                        • memory/2668-113-0x00000000064F0000-0x0000000006B08000-memory.dmp

                                                                          Filesize

                                                                          6.1MB

                                                                        • memory/2668-117-0x0000000007D40000-0x0000000007D8C000-memory.dmp

                                                                          Filesize

                                                                          304KB

                                                                        • memory/2668-144-0x0000000005100000-0x0000000005110000-memory.dmp

                                                                          Filesize

                                                                          64KB

                                                                        • memory/2668-111-0x0000000072B70000-0x0000000073321000-memory.dmp

                                                                          Filesize

                                                                          7.7MB

                                                                        • memory/2668-147-0x000000000AC70000-0x000000000AE32000-memory.dmp

                                                                          Filesize

                                                                          1.8MB

                                                                        • memory/2668-112-0x0000000005100000-0x0000000005110000-memory.dmp

                                                                          Filesize

                                                                          64KB

                                                                        • memory/2668-103-0x0000000000400000-0x0000000000450000-memory.dmp

                                                                          Filesize

                                                                          320KB

                                                                        • memory/2668-107-0x00000000054A0000-0x0000000005A46000-memory.dmp

                                                                          Filesize

                                                                          5.6MB

                                                                        • memory/2668-110-0x00000000050A0000-0x00000000050AA000-memory.dmp

                                                                          Filesize

                                                                          40KB

                                                                        • memory/2668-109-0x0000000004FF0000-0x0000000005082000-memory.dmp

                                                                          Filesize

                                                                          584KB

                                                                        • memory/2748-209-0x0000000000CA0000-0x000000000117B000-memory.dmp

                                                                          Filesize

                                                                          4.9MB

                                                                        • memory/2748-185-0x0000000005450000-0x0000000005451000-memory.dmp

                                                                          Filesize

                                                                          4KB

                                                                        • memory/2748-168-0x0000000000CA0000-0x000000000117B000-memory.dmp

                                                                          Filesize

                                                                          4.9MB

                                                                        • memory/2748-169-0x00000000053F0000-0x00000000053F1000-memory.dmp

                                                                          Filesize

                                                                          4KB

                                                                        • memory/2748-170-0x0000000005400000-0x0000000005401000-memory.dmp

                                                                          Filesize

                                                                          4KB

                                                                        • memory/2748-171-0x00000000053E0000-0x00000000053E1000-memory.dmp

                                                                          Filesize

                                                                          4KB

                                                                        • memory/2748-172-0x0000000005430000-0x0000000005431000-memory.dmp

                                                                          Filesize

                                                                          4KB

                                                                        • memory/2748-173-0x00000000053C0000-0x00000000053C1000-memory.dmp

                                                                          Filesize

                                                                          4KB

                                                                        • memory/2748-174-0x00000000053D0000-0x00000000053D1000-memory.dmp

                                                                          Filesize

                                                                          4KB

                                                                        • memory/2748-175-0x0000000005420000-0x0000000005421000-memory.dmp

                                                                          Filesize

                                                                          4KB

                                                                        • memory/2748-167-0x0000000000CA0000-0x000000000117B000-memory.dmp

                                                                          Filesize

                                                                          4.9MB

                                                                        • memory/2988-445-0x0000000000400000-0x000000000091D000-memory.dmp

                                                                          Filesize

                                                                          5.1MB

                                                                        • memory/2988-477-0x0000000000400000-0x000000000091D000-memory.dmp

                                                                          Filesize

                                                                          5.1MB

                                                                        • memory/2988-483-0x0000000000400000-0x000000000091D000-memory.dmp

                                                                          Filesize

                                                                          5.1MB

                                                                        • memory/2988-482-0x0000000000400000-0x000000000091D000-memory.dmp

                                                                          Filesize

                                                                          5.1MB

                                                                        • memory/2988-481-0x0000000000400000-0x000000000091D000-memory.dmp

                                                                          Filesize

                                                                          5.1MB

                                                                        • memory/2988-480-0x0000000000400000-0x000000000091D000-memory.dmp

                                                                          Filesize

                                                                          5.1MB

                                                                        • memory/2988-479-0x0000000000400000-0x000000000091D000-memory.dmp

                                                                          Filesize

                                                                          5.1MB

                                                                        • memory/2988-469-0x0000000000400000-0x000000000091D000-memory.dmp

                                                                          Filesize

                                                                          5.1MB

                                                                        • memory/2988-478-0x0000000000400000-0x000000000091D000-memory.dmp

                                                                          Filesize

                                                                          5.1MB

                                                                        • memory/2988-476-0x0000000000400000-0x000000000091D000-memory.dmp

                                                                          Filesize

                                                                          5.1MB

                                                                        • memory/2988-475-0x0000000000400000-0x000000000091D000-memory.dmp

                                                                          Filesize

                                                                          5.1MB

                                                                        • memory/2988-474-0x0000000000400000-0x000000000091D000-memory.dmp

                                                                          Filesize

                                                                          5.1MB

                                                                        • memory/2988-471-0x0000000000400000-0x000000000091D000-memory.dmp

                                                                          Filesize

                                                                          5.1MB

                                                                        • memory/2988-433-0x0000000000400000-0x000000000091D000-memory.dmp

                                                                          Filesize

                                                                          5.1MB

                                                                        • memory/2988-437-0x0000000000400000-0x000000000091D000-memory.dmp

                                                                          Filesize

                                                                          5.1MB

                                                                        • memory/2988-440-0x0000000000400000-0x000000000091D000-memory.dmp

                                                                          Filesize

                                                                          5.1MB

                                                                        • memory/2988-442-0x0000000000400000-0x000000000091D000-memory.dmp

                                                                          Filesize

                                                                          5.1MB

                                                                        • memory/2988-441-0x0000000000400000-0x000000000091D000-memory.dmp

                                                                          Filesize

                                                                          5.1MB

                                                                        • memory/2988-443-0x0000000000400000-0x000000000091D000-memory.dmp

                                                                          Filesize

                                                                          5.1MB

                                                                        • memory/2988-444-0x0000000000400000-0x000000000091D000-memory.dmp

                                                                          Filesize

                                                                          5.1MB

                                                                        • memory/2988-464-0x0000000000400000-0x000000000091D000-memory.dmp

                                                                          Filesize

                                                                          5.1MB

                                                                        • memory/2988-446-0x0000000000400000-0x000000000091D000-memory.dmp

                                                                          Filesize

                                                                          5.1MB

                                                                        • memory/2988-447-0x0000000000400000-0x000000000091D000-memory.dmp

                                                                          Filesize

                                                                          5.1MB

                                                                        • memory/2988-448-0x0000000000400000-0x000000000091D000-memory.dmp

                                                                          Filesize

                                                                          5.1MB

                                                                        • memory/2988-449-0x0000000000400000-0x000000000091D000-memory.dmp

                                                                          Filesize

                                                                          5.1MB

                                                                        • memory/2988-450-0x0000000000400000-0x000000000091D000-memory.dmp

                                                                          Filesize

                                                                          5.1MB

                                                                        • memory/2988-451-0x0000000000400000-0x000000000091D000-memory.dmp

                                                                          Filesize

                                                                          5.1MB

                                                                        • memory/2988-453-0x0000000000400000-0x000000000091D000-memory.dmp

                                                                          Filesize

                                                                          5.1MB

                                                                        • memory/2988-452-0x0000000000400000-0x000000000091D000-memory.dmp

                                                                          Filesize

                                                                          5.1MB

                                                                        • memory/2988-463-0x0000000000400000-0x000000000091D000-memory.dmp

                                                                          Filesize

                                                                          5.1MB

                                                                        • memory/3284-423-0x0000000002E80000-0x0000000002E96000-memory.dmp

                                                                          Filesize

                                                                          88KB

                                                                        • memory/3796-370-0x0000000000DE0000-0x0000000001196000-memory.dmp

                                                                          Filesize

                                                                          3.7MB

                                                                        • memory/3796-518-0x0000000000DE0000-0x0000000001196000-memory.dmp

                                                                          Filesize

                                                                          3.7MB

                                                                        • memory/3796-146-0x0000000000DE0000-0x0000000001196000-memory.dmp

                                                                          Filesize

                                                                          3.7MB

                                                                        • memory/3796-145-0x0000000000DE0000-0x0000000001196000-memory.dmp

                                                                          Filesize

                                                                          3.7MB

                                                                        • memory/3856-19-0x00000000009C0000-0x0000000000E92000-memory.dmp

                                                                          Filesize

                                                                          4.8MB

                                                                        • memory/3856-517-0x00000000009C0000-0x0000000000E92000-memory.dmp

                                                                          Filesize

                                                                          4.8MB

                                                                        • memory/3856-20-0x0000000004DE0000-0x0000000004DE1000-memory.dmp

                                                                          Filesize

                                                                          4KB

                                                                        • memory/3856-23-0x0000000004E10000-0x0000000004E11000-memory.dmp

                                                                          Filesize

                                                                          4KB

                                                                        • memory/3856-24-0x0000000004DB0000-0x0000000004DB1000-memory.dmp

                                                                          Filesize

                                                                          4KB

                                                                        • memory/3856-121-0x00000000009C0000-0x0000000000E92000-memory.dmp

                                                                          Filesize

                                                                          4.8MB

                                                                        • memory/3856-300-0x00000000009C0000-0x0000000000E92000-memory.dmp

                                                                          Filesize

                                                                          4.8MB

                                                                        • memory/3856-118-0x00000000009C0000-0x0000000000E92000-memory.dmp

                                                                          Filesize

                                                                          4.8MB

                                                                        • memory/3856-22-0x0000000004DD0000-0x0000000004DD1000-memory.dmp

                                                                          Filesize

                                                                          4KB

                                                                        • memory/3856-25-0x0000000004DC0000-0x0000000004DC1000-memory.dmp

                                                                          Filesize

                                                                          4KB

                                                                        • memory/3856-26-0x0000000004E40000-0x0000000004E41000-memory.dmp

                                                                          Filesize

                                                                          4KB

                                                                        • memory/3856-31-0x00000000009C0000-0x0000000000E92000-memory.dmp

                                                                          Filesize

                                                                          4.8MB

                                                                        • memory/3856-27-0x0000000004E30000-0x0000000004E31000-memory.dmp

                                                                          Filesize

                                                                          4KB

                                                                        • memory/3856-641-0x00000000009C0000-0x0000000000E92000-memory.dmp

                                                                          Filesize

                                                                          4.8MB

                                                                        • memory/3856-21-0x0000000004DF0000-0x0000000004DF1000-memory.dmp

                                                                          Filesize

                                                                          4KB

                                                                        • memory/3856-123-0x00000000009C0000-0x0000000000E92000-memory.dmp

                                                                          Filesize

                                                                          4.8MB

                                                                        • memory/3856-18-0x00000000009C0000-0x0000000000E92000-memory.dmp

                                                                          Filesize

                                                                          4.8MB

                                                                        • memory/3856-28-0x00000000009C0000-0x0000000000E92000-memory.dmp

                                                                          Filesize

                                                                          4.8MB

                                                                        • memory/3856-29-0x00000000009C0000-0x0000000000E92000-memory.dmp

                                                                          Filesize

                                                                          4.8MB

                                                                        • memory/3856-30-0x00000000009C0000-0x0000000000E92000-memory.dmp

                                                                          Filesize

                                                                          4.8MB

                                                                        • memory/3856-67-0x00000000009C0000-0x0000000000E92000-memory.dmp

                                                                          Filesize

                                                                          4.8MB

                                                                        • memory/3856-32-0x00000000009C0000-0x0000000000E92000-memory.dmp

                                                                          Filesize

                                                                          4.8MB

                                                                        • memory/4688-519-0x0000000000CA0000-0x0000000001056000-memory.dmp

                                                                          Filesize

                                                                          3.7MB

                                                                        • memory/4852-10-0x0000000004DA0000-0x0000000004DA1000-memory.dmp

                                                                          Filesize

                                                                          4KB

                                                                        • memory/4852-2-0x0000000000160000-0x0000000000632000-memory.dmp

                                                                          Filesize

                                                                          4.8MB

                                                                        • memory/4852-1-0x0000000077466000-0x0000000077468000-memory.dmp

                                                                          Filesize

                                                                          8KB

                                                                        • memory/4852-0-0x0000000000160000-0x0000000000632000-memory.dmp

                                                                          Filesize

                                                                          4.8MB

                                                                        • memory/4852-15-0x0000000000160000-0x0000000000632000-memory.dmp

                                                                          Filesize

                                                                          4.8MB

                                                                        • memory/4852-8-0x0000000004D30000-0x0000000004D31000-memory.dmp

                                                                          Filesize

                                                                          4KB

                                                                        • memory/4852-3-0x0000000004D50000-0x0000000004D51000-memory.dmp

                                                                          Filesize

                                                                          4KB

                                                                        • memory/4852-9-0x0000000004DB0000-0x0000000004DB1000-memory.dmp

                                                                          Filesize

                                                                          4KB

                                                                        • memory/4852-7-0x0000000004D20000-0x0000000004D21000-memory.dmp

                                                                          Filesize

                                                                          4KB

                                                                        • memory/4852-4-0x0000000004D60000-0x0000000004D61000-memory.dmp

                                                                          Filesize

                                                                          4KB

                                                                        • memory/4852-6-0x0000000004D80000-0x0000000004D81000-memory.dmp

                                                                          Filesize

                                                                          4KB

                                                                        • memory/4852-5-0x0000000004D40000-0x0000000004D41000-memory.dmp

                                                                          Filesize

                                                                          4KB

                                                                        • memory/4896-427-0x0000000000400000-0x0000000002D4D000-memory.dmp

                                                                          Filesize

                                                                          41.3MB