Analysis

  • max time kernel
    114s
  • max time network
    160s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240221-en
  • resource tags

    arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    25-03-2024 09:55

General

  • Target

    91a3ef18527e726b4f65659774e6141bfb1a38f5bbee407143963de1bec3850b.exe

  • Size

    1.9MB

  • MD5

    1f59209462cea14c16e955af6c8bb13d

  • SHA1

    f4617169cc8bf7392497d5db9e3d6970ea8a6d49

  • SHA256

    91a3ef18527e726b4f65659774e6141bfb1a38f5bbee407143963de1bec3850b

  • SHA512

    12e69e188bbcee79608eccac3d7972e31cedbf207713e36d5eba7cc30b24f440e18daee182f2a7eddb56b2ee819fd588c9fa23b18d09a341902e6ad8bb45668c

  • SSDEEP

    49152:IyMS6zSWb9czXn7x0eDAmMVIDwx5RXcRFXYkXY8ReUIY:5kSWb91DiGXsnYkXZReU

Malware Config

Extracted

Family

amadey

Version

4.18

C2

http://193.233.132.56

Attributes
  • install_dir

    09fd851a4f

  • install_file

    explorha.exe

  • strings_key

    443351145ece4966ded809641c77cfa8

  • url_paths

    /Pneh2sXQk0/index.php

rc4.plain

Extracted

Family

amadey

Version

4.17

C2

http://193.233.132.167

Attributes
  • install_dir

    4d0ab15804

  • install_file

    chrosha.exe

  • strings_key

    1a9519d7b465e1f4880fa09a6162d768

  • url_paths

    /enigma/index.php

rc4.plain

Extracted

Family

stealc

C2

http://185.172.128.209

Attributes
  • url_path

    /3cd2b41cbde8fc9c.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect ZGRat V1 3 IoCs
  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 3 IoCs
  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Stealc

    Stealc is an infostealer written in C++.

  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
  • Blocklisted process makes network request 4 IoCs
  • Downloads MZ/PE file
  • Modifies Windows Firewall 2 TTPs 3 IoCs
  • Checks BIOS information in registry 2 TTPs 10 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 12 IoCs
  • Identifies Wine through registry keys 2 TTPs 5 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 6 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • Creates scheduled task(s) 1 TTPs 4 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\91a3ef18527e726b4f65659774e6141bfb1a38f5bbee407143963de1bec3850b.exe
    "C:\Users\Admin\AppData\Local\Temp\91a3ef18527e726b4f65659774e6141bfb1a38f5bbee407143963de1bec3850b.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:5028
    • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
      "C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3632
      • C:\Users\Admin\AppData\Local\Temp\1000022001\623fab914b.exe
        "C:\Users\Admin\AppData\Local\Temp\1000022001\623fab914b.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        PID:1576
      • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
        "C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"
        3⤵
          PID:2548
        • C:\Users\Admin\AppData\Local\Temp\1000035001\lumma21.exe
          "C:\Users\Admin\AppData\Local\Temp\1000035001\lumma21.exe"
          3⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of FindShellTrayWindow
          PID:4176
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
          3⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:3508
          • C:\Windows\system32\rundll32.exe
            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
            4⤵
            • Blocklisted process makes network request
            • Loads dropped DLL
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:4644
            • C:\Windows\system32\netsh.exe
              netsh wlan show profiles
              5⤵
                PID:2128
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\602636161432_Desktop.zip' -CompressionLevel Optimal
                5⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:344
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
            3⤵
            • Blocklisted process makes network request
            • Loads dropped DLL
            PID:5100
      • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
        C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
        1⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        PID:2240
      • C:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exe
        C:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exe
        1⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4580
        • C:\Users\Admin\AppData\Local\Temp\1000082001\boom8.exe
          "C:\Users\Admin\AppData\Local\Temp\1000082001\boom8.exe"
          2⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:2092
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN boom8.exe /TR "C:\Users\Admin\AppData\Local\Temp\1000082001\boom8.exe" /F
            3⤵
            • Creates scheduled task(s)
            PID:4120
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll, Main
          2⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:3448
          • C:\Windows\system32\rundll32.exe
            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll, Main
            3⤵
            • Blocklisted process makes network request
            • Loads dropped DLL
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:3028
            • C:\Windows\system32\netsh.exe
              netsh wlan show profiles
              4⤵
                PID:1620
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\602636161432_Desktop.zip' -CompressionLevel Optimal
                4⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1596
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main
            2⤵
            • Blocklisted process makes network request
            • Loads dropped DLL
            PID:3672
          • C:\Users\Admin\AppData\Local\Temp\1000085001\file300un.exe
            "C:\Users\Admin\AppData\Local\Temp\1000085001\file300un.exe"
            2⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:4548
            • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath $env:UserProfile
              3⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4512
            • C:\Windows\system32\cmd.exe
              "cmd" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\.BLRVzdv\svchost.exe"' & exit
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:3304
              • C:\Windows\system32\schtasks.exe
                schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\.BLRVzdv\svchost.exe"'
                4⤵
                • Creates scheduled task(s)
                PID:2640
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
              3⤵
                PID:4300
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                3⤵
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:3764
                • C:\Users\Admin\Pictures\UVo9PNEjFPB9lDMKAQ6KTsUc.exe
                  "C:\Users\Admin\Pictures\UVo9PNEjFPB9lDMKAQ6KTsUc.exe"
                  4⤵
                  • Executes dropped EXE
                  PID:4200
                  • C:\Users\Admin\AppData\Local\Temp\u38o.0.exe
                    "C:\Users\Admin\AppData\Local\Temp\u38o.0.exe"
                    5⤵
                      PID:1964
                  • C:\Users\Admin\Pictures\AGXfHBOKVkb2MCAsZ0fvwZEy.exe
                    "C:\Users\Admin\Pictures\AGXfHBOKVkb2MCAsZ0fvwZEy.exe"
                    4⤵
                    • Executes dropped EXE
                    PID:1408
                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      powershell -nologo -noprofile
                      5⤵
                        PID:2864
                      • C:\Users\Admin\Pictures\AGXfHBOKVkb2MCAsZ0fvwZEy.exe
                        "C:\Users\Admin\Pictures\AGXfHBOKVkb2MCAsZ0fvwZEy.exe"
                        5⤵
                          PID:3296
                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            powershell -nologo -noprofile
                            6⤵
                              PID:672
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
                              6⤵
                                PID:660
                                • C:\Windows\system32\netsh.exe
                                  netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                                  7⤵
                                  • Modifies Windows Firewall
                                  PID:3228
                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                powershell -nologo -noprofile
                                6⤵
                                  PID:4084
                            • C:\Users\Admin\Pictures\cIxwMhiu9Vcevbfar1cPYGWZ.exe
                              "C:\Users\Admin\Pictures\cIxwMhiu9Vcevbfar1cPYGWZ.exe"
                              4⤵
                              • Executes dropped EXE
                              PID:4780
                              • C:\Users\Admin\AppData\Local\Temp\u3os.0.exe
                                "C:\Users\Admin\AppData\Local\Temp\u3os.0.exe"
                                5⤵
                                  PID:3560
                                • C:\Users\Admin\AppData\Local\Temp\u3os.1.exe
                                  "C:\Users\Admin\AppData\Local\Temp\u3os.1.exe"
                                  5⤵
                                    PID:1932
                                    • C:\Windows\SysWOW64\cmd.exe
                                      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Task.bat" "
                                      6⤵
                                        PID:3020
                                        • C:\Windows\SysWOW64\chcp.com
                                          chcp 1251
                                          7⤵
                                            PID:2996
                                          • C:\Windows\SysWOW64\schtasks.exe
                                            schtasks /create /tn "MalayamaraUpdate" /tr "'C:\Users\Admin\AppData\Local\Temp\Updater.exe'" /sc minute /mo 30 /F
                                            7⤵
                                            • Creates scheduled task(s)
                                            PID:3184
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -u -p 4780 -s 724
                                        5⤵
                                        • Program crash
                                        PID:1592
                                    • C:\Users\Admin\Pictures\c7O6xrUKXgcImWm9Am20yGvj.exe
                                      "C:\Users\Admin\Pictures\c7O6xrUKXgcImWm9Am20yGvj.exe"
                                      4⤵
                                        PID:4684
                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          powershell -nologo -noprofile
                                          5⤵
                                            PID:440
                                          • C:\Users\Admin\Pictures\c7O6xrUKXgcImWm9Am20yGvj.exe
                                            "C:\Users\Admin\Pictures\c7O6xrUKXgcImWm9Am20yGvj.exe"
                                            5⤵
                                              PID:1384
                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                powershell -nologo -noprofile
                                                6⤵
                                                  PID:3308
                                                • C:\Windows\system32\cmd.exe
                                                  C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
                                                  6⤵
                                                    PID:4424
                                                    • C:\Windows\system32\netsh.exe
                                                      netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                                                      7⤵
                                                      • Modifies Windows Firewall
                                                      PID:5056
                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                    powershell -nologo -noprofile
                                                    6⤵
                                                      PID:1552
                                                • C:\Users\Admin\Pictures\DyxCLiiWrhJ437zbP35tX6wC.exe
                                                  "C:\Users\Admin\Pictures\DyxCLiiWrhJ437zbP35tX6wC.exe"
                                                  4⤵
                                                    PID:4184
                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      powershell -nologo -noprofile
                                                      5⤵
                                                        PID:3004
                                                      • C:\Users\Admin\Pictures\DyxCLiiWrhJ437zbP35tX6wC.exe
                                                        "C:\Users\Admin\Pictures\DyxCLiiWrhJ437zbP35tX6wC.exe"
                                                        5⤵
                                                          PID:2040
                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            powershell -nologo -noprofile
                                                            6⤵
                                                              PID:1788
                                                            • C:\Windows\system32\cmd.exe
                                                              C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
                                                              6⤵
                                                                PID:2776
                                                                • C:\Windows\system32\netsh.exe
                                                                  netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                                                                  7⤵
                                                                  • Modifies Windows Firewall
                                                                  PID:4064
                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                powershell -nologo -noprofile
                                                                6⤵
                                                                  PID:4492
                                                            • C:\Users\Admin\Pictures\tRnnCCK3cugNJiEappIwYsj2.exe
                                                              "C:\Users\Admin\Pictures\tRnnCCK3cugNJiEappIwYsj2.exe"
                                                              4⤵
                                                                PID:4464
                                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                                  5⤵
                                                                    PID:4492
                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 544
                                                                      6⤵
                                                                      • Program crash
                                                                      PID:4980
                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 536
                                                                      6⤵
                                                                      • Program crash
                                                                      PID:1348
                                                                • C:\Users\Admin\Pictures\kJMnsPLcBv6qxEl3DcjcVb5v.exe
                                                                  "C:\Users\Admin\Pictures\kJMnsPLcBv6qxEl3DcjcVb5v.exe"
                                                                  4⤵
                                                                    PID:3396
                                                                    • C:\Users\Admin\AppData\Local\Temp\7zSEC3B.tmp\Install.exe
                                                                      .\Install.exe
                                                                      5⤵
                                                                        PID:1724
                                                                        • C:\Users\Admin\AppData\Local\Temp\7zSF217.tmp\Install.exe
                                                                          .\Install.exe /AFCbsdidKR "385118" /S
                                                                          6⤵
                                                                            PID:4076
                                                                            • C:\Windows\SysWOW64\forfiles.exe
                                                                              "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"
                                                                              7⤵
                                                                                PID:1012
                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                  /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&
                                                                                  8⤵
                                                                                    PID:3476
                                                                                    • \??\c:\windows\SysWOW64\reg.exe
                                                                                      REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32
                                                                                      9⤵
                                                                                        PID:696
                                                                                      • \??\c:\windows\SysWOW64\reg.exe
                                                                                        REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64
                                                                                        9⤵
                                                                                          PID:3020
                                                                                    • C:\Windows\SysWOW64\forfiles.exe
                                                                                      "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"
                                                                                      7⤵
                                                                                        PID:4752
                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                          /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&
                                                                                          8⤵
                                                                                            PID:4584
                                                                                            • \??\c:\windows\SysWOW64\reg.exe
                                                                                              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32
                                                                                              9⤵
                                                                                                PID:4596
                                                                                              • \??\c:\windows\SysWOW64\reg.exe
                                                                                                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64
                                                                                                9⤵
                                                                                                  PID:3228
                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                              schtasks /CREATE /TN "gqbgVQdvL" /SC once /ST 07:03:51 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                                              7⤵
                                                                                              • Creates scheduled task(s)
                                                                                              PID:3116
                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                              schtasks /run /I /tn "gqbgVQdvL"
                                                                                              7⤵
                                                                                                PID:4752
                                                                                        • C:\Users\Admin\Pictures\KH3pym3XRDhezgbLYwKdOTVq.exe
                                                                                          "C:\Users\Admin\Pictures\KH3pym3XRDhezgbLYwKdOTVq.exe" --silent --allusers=0
                                                                                          4⤵
                                                                                            PID:1944
                                                                                            • C:\Users\Admin\Pictures\KH3pym3XRDhezgbLYwKdOTVq.exe
                                                                                              C:\Users\Admin\Pictures\KH3pym3XRDhezgbLYwKdOTVq.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=108.0.5067.40 --initial-client-data=0x310,0x314,0x318,0x2ec,0x31c,0x6d6d21f8,0x6d6d2204,0x6d6d2210
                                                                                              5⤵
                                                                                                PID:4400
                                                                                              • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\KH3pym3XRDhezgbLYwKdOTVq.exe
                                                                                                "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\KH3pym3XRDhezgbLYwKdOTVq.exe" --version
                                                                                                5⤵
                                                                                                  PID:1480
                                                                                                • C:\Users\Admin\Pictures\KH3pym3XRDhezgbLYwKdOTVq.exe
                                                                                                  "C:\Users\Admin\Pictures\KH3pym3XRDhezgbLYwKdOTVq.exe" --backend --install --import-browser-data=0 --enable-stats=1 --enable-installer-stats=1 --consent-given=0 --general-interests=0 --general-location=0 --personalized-content=0 --personalized-ads=0 --launchopera=1 --installfolder="C:\Users\Admin\AppData\Local\Programs\Opera" --profile-folder --language=en --singleprofile=0 --copyonly=0 --allusers=0 --setdefaultbrowser=1 --pintotaskbar=1 --pintostartmenu=0 --run-at-startup=1 --show-intro-overlay --server-tracking-data=server_tracking_data --initial-pid=1944 --package-dir-prefix="C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_20240325095734" --session-guid=4d7ca8ee-b984-440c-b1b9-bb33ba342aee --server-tracking-blob=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 --silent --desktopshortcut=1 --wait-for-package --initial-proc-handle=7805000000000000
                                                                                                  5⤵
                                                                                                    PID:2864
                                                                                                    • C:\Users\Admin\Pictures\KH3pym3XRDhezgbLYwKdOTVq.exe
                                                                                                      C:\Users\Admin\Pictures\KH3pym3XRDhezgbLYwKdOTVq.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=108.0.5067.40 --initial-client-data=0x304,0x308,0x30c,0x2e0,0x31c,0x6cb821f8,0x6cb82204,0x6cb82210
                                                                                                      6⤵
                                                                                                        PID:4520
                                                                                              • C:\Users\Admin\AppData\Local\Temp\1000087001\amadka.exe
                                                                                                "C:\Users\Admin\AppData\Local\Temp\1000087001\amadka.exe"
                                                                                                2⤵
                                                                                                  PID:696
                                                                                              • C:\Users\Admin\AppData\Local\Temp\1000082001\boom8.exe
                                                                                                C:\Users\Admin\AppData\Local\Temp\1000082001\boom8.exe
                                                                                                1⤵
                                                                                                • Executes dropped EXE
                                                                                                PID:3292
                                                                                              • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                                                                C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                                                                1⤵
                                                                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                • Checks BIOS information in registry
                                                                                                • Executes dropped EXE
                                                                                                • Identifies Wine through registry keys
                                                                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                PID:2484
                                                                                              • C:\Windows\SysWOW64\dialer.exe
                                                                                                "C:\Windows\system32\dialer.exe"
                                                                                                1⤵
                                                                                                  PID:4340
                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4492 -ip 4492
                                                                                                  1⤵
                                                                                                    PID:1936
                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4492 -ip 4492
                                                                                                    1⤵
                                                                                                      PID:4692
                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4780 -ip 4780
                                                                                                      1⤵
                                                                                                        PID:4456

                                                                                                      Network

                                                                                                      MITRE ATT&CK Enterprise v15

                                                                                                      Replay Monitor

                                                                                                      Loading Replay Monitor...

                                                                                                      Downloads

                                                                                                      • C:\ProgramData\mozglue.dll

                                                                                                        Filesize

                                                                                                        593KB

                                                                                                        MD5

                                                                                                        c8fd9be83bc728cc04beffafc2907fe9

                                                                                                        SHA1

                                                                                                        95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                                                                        SHA256

                                                                                                        ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                                                                        SHA512

                                                                                                        fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                                                                      • C:\ProgramData\nss3.dll

                                                                                                        Filesize

                                                                                                        1.1MB

                                                                                                        MD5

                                                                                                        ac48436d389db26393637a11a95bdd02

                                                                                                        SHA1

                                                                                                        bab6970df73fc413687f6888c56493c5df6afb02

                                                                                                        SHA256

                                                                                                        3f349ae78c4e78ea5e49ea261d3707dba72e528bd33e4cb2c4655d53c5c63958

                                                                                                        SHA512

                                                                                                        c3ef6626d84215d1c4e23a12ac8bb1c9e90ca0f9ea9d73511084037ba3d7932af1f82611d1f535582bb41c1718c2aa4b56122b1b152bdafa1f55d6a797303d0d

                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                        Filesize

                                                                                                        3KB

                                                                                                        MD5

                                                                                                        ae626d9a72417b14570daa8fcd5d34a4

                                                                                                        SHA1

                                                                                                        c103ebaf4d760df722d620df87e6f07c0486439f

                                                                                                        SHA256

                                                                                                        52cc3f3028fab0d347a4a3fffef570b42f85748176d81a3344996d42fd1de32a

                                                                                                        SHA512

                                                                                                        a0690bda318bdf43d6f292f88d4ea2ebeec83b95e9ebca80083dbb08e7ddcdb9735cc58b89d369a34f10acf8a114d4a207ed8d0f070c5baf87c5798e9f35bc14

                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                                        Filesize

                                                                                                        2KB

                                                                                                        MD5

                                                                                                        d0c46cad6c0778401e21910bd6b56b70

                                                                                                        SHA1

                                                                                                        7be418951ea96326aca445b8dfe449b2bfa0dca6

                                                                                                        SHA256

                                                                                                        9600b3fdf0565ccb49e21656aa4b24d7c18f776bfd04d9ee984b134707550f02

                                                                                                        SHA512

                                                                                                        057531b468f7fbbb2175a696a8aab274dec0d17d9f71df309edcff35e064f3378050066a3df47ccd03048fac461594ec75e3d4fe64f9dd79949d129f51e02949

                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                        Filesize

                                                                                                        1KB

                                                                                                        MD5

                                                                                                        b3a83d0196afc480a90a1e7444210036

                                                                                                        SHA1

                                                                                                        6376ef283df20976769287b3bdc6bcd5d5ce371f

                                                                                                        SHA256

                                                                                                        3ac4190b1c447f3b5365b056150575ec779ffba10b82d940c93009e2f6809a07

                                                                                                        SHA512

                                                                                                        dfff8f23370ae8ab390b8a3dd675dd71ca6a8d0fac0f0c9a8b43453763ba5fa96a79a4b5a8891bcac86996471b912ca51dfc6b877d647391d14e355191d77370

                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                        Filesize

                                                                                                        1KB

                                                                                                        MD5

                                                                                                        ba9bb5dc1115c3a5068ca32bf3a079ba

                                                                                                        SHA1

                                                                                                        0df36683e636ee783a56b8faca5cd15b2884644d

                                                                                                        SHA256

                                                                                                        93d3db76dfa3cb4a83393e1ab77826e1470a1cbed812e22a2f86b423a123713a

                                                                                                        SHA512

                                                                                                        18c1b21536d7d14b048f9f1a8e2af2605d54b51f7bd971706b1cb9330e30689a5edc42b16d0ab5e95a8b1113acf20a94928175d913123c58503d479cf14bb3ba

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe

                                                                                                        Filesize

                                                                                                        1.9MB

                                                                                                        MD5

                                                                                                        1f59209462cea14c16e955af6c8bb13d

                                                                                                        SHA1

                                                                                                        f4617169cc8bf7392497d5db9e3d6970ea8a6d49

                                                                                                        SHA256

                                                                                                        91a3ef18527e726b4f65659774e6141bfb1a38f5bbee407143963de1bec3850b

                                                                                                        SHA512

                                                                                                        12e69e188bbcee79608eccac3d7972e31cedbf207713e36d5eba7cc30b24f440e18daee182f2a7eddb56b2ee819fd588c9fa23b18d09a341902e6ad8bb45668c

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1000022001\623fab914b.exe

                                                                                                        Filesize

                                                                                                        2.9MB

                                                                                                        MD5

                                                                                                        cbf747defc47d83fd86a7b8ce1a02dcf

                                                                                                        SHA1

                                                                                                        044f100aa7b9924f0e8d644517e937661c7095c7

                                                                                                        SHA256

                                                                                                        55d65019d25496007d6b25e58b2a68c49335e42c8f17a328dde7cc5310ff6365

                                                                                                        SHA512

                                                                                                        a6992b8bcc06815834209564684e40b5907b6de83e999a5ac86cc37f82f3fec15448988856af0dca02f88ef9dcd3f51d0b0845b33f88212d6cb2357f1378741c

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1000022001\623fab914b.exe

                                                                                                        Filesize

                                                                                                        1.9MB

                                                                                                        MD5

                                                                                                        c049f14d1cda97113cf195c562ea57ba

                                                                                                        SHA1

                                                                                                        b6aff664060c36b54476a697e8f9f77a23d2fabd

                                                                                                        SHA256

                                                                                                        41e1d3e50640c745372aff6737ba06e65c05b023276567eead3464ec225652cb

                                                                                                        SHA512

                                                                                                        2ef8d643e75e01ed042ca00c7164ab955a3c6ac5d162cbb95000b7132be75415004b6ed32637c17220c7db67fc5567ee3ccec9e80904db5a5ca4d8697dc80cb6

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1000022001\623fab914b.exe

                                                                                                        Filesize

                                                                                                        1.8MB

                                                                                                        MD5

                                                                                                        7c36ba91527c481fb729fcaa2b3003aa

                                                                                                        SHA1

                                                                                                        13e894f54e32d14166ae04c32451dea25c5e3ca9

                                                                                                        SHA256

                                                                                                        84f1a56a9f6e960afc14c58f7c12bc1547ce255f28076b434c2a4655862baa31

                                                                                                        SHA512

                                                                                                        ea2f8b690c5d3ffcabd5cdc3b39166ae77c1b6feefe6d6fca8b455e04eebef43f66e18958a294d8acaa9cab8442fde8514166e8b82b7e1055cf226cfde3c8260

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1000035001\lumma21.exe

                                                                                                        Filesize

                                                                                                        413KB

                                                                                                        MD5

                                                                                                        d467222c3bd563cb72fa49302f80b079

                                                                                                        SHA1

                                                                                                        9335e2a36abb8309d8a2075faf78d66b968b2a91

                                                                                                        SHA256

                                                                                                        fedb08b3ec7034a15e9dee7ed4dec1a854fb78e74285e1ee05c90f9e9e4f8b3e

                                                                                                        SHA512

                                                                                                        484b6c427e28193ddb73dd7062e2bfbd132ddc72ce4811bfe08784669de30e4b92bc27140373f62a4ce651401000a3c505188620c43da410bf6b0799a0791fa7

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1000082001\boom8.exe

                                                                                                        Filesize

                                                                                                        418KB

                                                                                                        MD5

                                                                                                        0099a99f5ffb3c3ae78af0084136fab3

                                                                                                        SHA1

                                                                                                        0205a065728a9ec1133e8a372b1e3864df776e8c

                                                                                                        SHA256

                                                                                                        919ae827ff59fcbe3dbaea9e62855a4d27690818189f696cfb5916a88c823226

                                                                                                        SHA512

                                                                                                        5ac4f3265c7dd7d172284fb28c94f8fc6428c27853e70989f4ec4208f9897be91720e8eee1906d8e843ab05798f3279a12492a32e8a118f5621ac5e1be2031b6

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1000085001\file300un.exe

                                                                                                        Filesize

                                                                                                        4.1MB

                                                                                                        MD5

                                                                                                        c59b5442a81703579cded755bddcc63e

                                                                                                        SHA1

                                                                                                        c3e36a8ed0952db30676d5cf77b3671238c19272

                                                                                                        SHA256

                                                                                                        cac7fc4ae9c97eba7455992b2d41449ee257ec485c562bfc7245a90033b1d774

                                                                                                        SHA512

                                                                                                        c9c834860982652e7ec1db085e534f6b1c35298ce75b29c2cbb0ac04ff40cd64363b458bcbd8c0983cf1ed778a4269372c6bc4ce7f831a6e1e70ee5f4a0772f9

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exe

                                                                                                        Filesize

                                                                                                        388KB

                                                                                                        MD5

                                                                                                        059fff50846ea5415c6ed3ac6c543a54

                                                                                                        SHA1

                                                                                                        d705e256bc29f9f68ced57080660b386d9153a79

                                                                                                        SHA256

                                                                                                        bb29b4dc8b3aca11988cd30354d9f55f4c083e5a9fd298424c19b3c7bc9da542

                                                                                                        SHA512

                                                                                                        d929ef134d15e2e5817c37b87f06c7742994f619c7a04583737b23ed0718d460b0378afa680a76e1413c9379ae9a6748b7a6b3678bc94a58b8c986bd9afe3e52

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\7zSEC3B.tmp\Install.exe

                                                                                                        Filesize

                                                                                                        1.2MB

                                                                                                        MD5

                                                                                                        240b8697bac4526cabae49ac64a81d58

                                                                                                        SHA1

                                                                                                        30b64600b0bb91b1d9bb55bd2f713add11c12b9c

                                                                                                        SHA256

                                                                                                        18ad0681d55e36dc169a800d5edb2b3cf5399a98db2b2eabdf0f95d58d1a2a82

                                                                                                        SHA512

                                                                                                        62a2ff4f00ef746cb409ff94e603567512e5b9d74ab2330dd3bbe84bbba24dcd65041e47d45b980096636421bfbe3fb51aa51e33fdb6ecfd5cfc500829b47ce0

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\7zSEC3B.tmp\Install.exe

                                                                                                        Filesize

                                                                                                        1.4MB

                                                                                                        MD5

                                                                                                        1ae382dc06a93772a387e45733a68d05

                                                                                                        SHA1

                                                                                                        63b140426093846b467e5e1b3596bc1527bb8ae5

                                                                                                        SHA256

                                                                                                        c5bbe1fd27248c55b22ca74e21416f2f011ba25ca7a31bc1c352ee5da508dae8

                                                                                                        SHA512

                                                                                                        b105cbb345e11dc8941a321842c1ad5ee159ee941033daf3e7f1c73dd1683579e2fbd35c5ff44b1ce1580665f3a732035eec5eb6f17b6a705dfbdf961901173f

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Opera_installer_2403250957323741944.dll

                                                                                                        Filesize

                                                                                                        64KB

                                                                                                        MD5

                                                                                                        d5af635ef12e3ebf7fd3ec3848475be6

                                                                                                        SHA1

                                                                                                        8d21dda11d639586fd0f321e5f5f05afe775e678

                                                                                                        SHA256

                                                                                                        94b2a77cef9a2e668f69251da0b17e4e3bfa6de092e320cff809d3794e737cfe

                                                                                                        SHA512

                                                                                                        6deb09b052c11e8488082aaf346768e4f31724785f67e4d519c4d0a4c4e582cefe3b4c2859db3cbbed7a3dbe7f33c1ecb80f89ead2111811119dd379beb854f6

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Opera_installer_2403250957331404400.dll

                                                                                                        Filesize

                                                                                                        3.7MB

                                                                                                        MD5

                                                                                                        888cb4710a97abfa63fdf3675e5a0f00

                                                                                                        SHA1

                                                                                                        cbabdcfaa4bb4da6ffac84e03832e412faf8b0fe

                                                                                                        SHA256

                                                                                                        ab2c5194710a1f631e3b790aeaa5967ca0621e07f2d90b5f413df07bc0353190

                                                                                                        SHA512

                                                                                                        731178eb4615ad084eefbfdcd222df6370309b22b1d6481fa890ea2652aeb94c25ac56bef6866f1ec42892623c6854e3cbbbb9a58e3d072feb2397b69ad8ee99

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Opera_installer_2403250957339991480.dll

                                                                                                        Filesize

                                                                                                        512KB

                                                                                                        MD5

                                                                                                        6fd523da9abad033b1dbe344345de9f2

                                                                                                        SHA1

                                                                                                        365ebdebd36803a84d990c00c45a636f45321d3c

                                                                                                        SHA256

                                                                                                        bf045e62fdcd50f87583b2e0098b6ddd4f894277afe68b06ecf2adf734cad52b

                                                                                                        SHA512

                                                                                                        ffb9da96662c552d691dcfb1c7b5705bbd737ed254440c1c9277e448963a4aa88e7c7df5354f7051ba74f09776e7f5f5236484b4fb1ec62193a8de9f372eb1a8

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_rloyppcy.rdb.ps1

                                                                                                        Filesize

                                                                                                        60B

                                                                                                        MD5

                                                                                                        d17fe0a3f47be24a6453e9ef58c94641

                                                                                                        SHA1

                                                                                                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                        SHA256

                                                                                                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                        SHA512

                                                                                                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\u38o.0.exe

                                                                                                        Filesize

                                                                                                        298KB

                                                                                                        MD5

                                                                                                        19be923313c497dab7d82847c04cbc7e

                                                                                                        SHA1

                                                                                                        b7c253d383c9c44b12973278f7ae5a16040dacf9

                                                                                                        SHA256

                                                                                                        0073a30288e51d3adc55fe86dc134e9ace7ea974211729deb1a43d39d1ae4a46

                                                                                                        SHA512

                                                                                                        e1a17e08249a69988e64cb3d1f328b341d08094394889cf90720e7dc7851417ff17f6d546eccc4a030d02e14cd4b3e29f82dde772c7fbfddb7d533bc99e6a0b3

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\u3os.1.exe

                                                                                                        Filesize

                                                                                                        1.7MB

                                                                                                        MD5

                                                                                                        6a5b6c7c3b3e4c90dcfa552bb2dc97cc

                                                                                                        SHA1

                                                                                                        b182599620423dc1cde0d248cf06e92691cd3343

                                                                                                        SHA256

                                                                                                        0f9a553035de3059c9f0571b638df4fd9881fd0007ec455a1abd5ac796dcd91f

                                                                                                        SHA512

                                                                                                        62fbf9d3d5ff607cc7134ec3050a3b77366ff496fdb540b95faac1966290f6ccecee4a4ddfbb2f8b96e31b8cc9b40d05d3cab4d8ec8787cb32d1762e953f197c

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\u3os.1.exe

                                                                                                        Filesize

                                                                                                        768KB

                                                                                                        MD5

                                                                                                        0bc65d7b4e83685d29c391465d768f46

                                                                                                        SHA1

                                                                                                        a8fdcba0dfce7cd4f387acecdcaec3bca8d857d1

                                                                                                        SHA256

                                                                                                        1ecf511f5c651f8e4ba230c67aeb893c7010f3d7fa22485f858481e6ee749b98

                                                                                                        SHA512

                                                                                                        f4c7e2b23e243562278c1e2d70c8714d4c343833f286ee68c4e4ff21c4681d0e2608943317cf57e8a5016e065c825fd1865873d9a323b225cee76a9cb4fe7a43

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\u3os.1.exe

                                                                                                        Filesize

                                                                                                        640KB

                                                                                                        MD5

                                                                                                        8aed89e9f7adb27ce03afca946ef438d

                                                                                                        SHA1

                                                                                                        ae680bcca15d75d35564897766953adbbceb6f8d

                                                                                                        SHA256

                                                                                                        81380769a7a89a2205003a03ae3365eda5734508abb45bbfb21b84c7d081d439

                                                                                                        SHA512

                                                                                                        f64a61f8bc0ff44d3cd929ca8b2c074776776c620e7ab7fe6dce2dc286502d5fdf675bf69832f714d65d4e51341df1555c06de2c8c531b9e6c35bc2c3952d7df

                                                                                                      • C:\Users\Admin\AppData\Roaming\Temp\Task.bat

                                                                                                        Filesize

                                                                                                        128B

                                                                                                        MD5

                                                                                                        11bb3db51f701d4e42d3287f71a6a43e

                                                                                                        SHA1

                                                                                                        63a4ee82223be6a62d04bdfe40ef8ba91ae49a86

                                                                                                        SHA256

                                                                                                        6be22058abfb22b40a42fb003f86b89e204a83024c03eb82cd53e2a0a047c331

                                                                                                        SHA512

                                                                                                        907ad2c070cc1db89f43459a94d7f48985d939d749c9648b78572a266f0d3fde47813a129e9151dbf4a7d96d36f588172f57c88b8b947b56ed818d7d068abab2

                                                                                                      • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                                                                                                        Filesize

                                                                                                        109KB

                                                                                                        MD5

                                                                                                        726cd06231883a159ec1ce28dd538699

                                                                                                        SHA1

                                                                                                        404897e6a133d255ad5a9c26ac6414d7134285a2

                                                                                                        SHA256

                                                                                                        12fef2d5995d671ec0e91bdbdc91e2b0d3c90ed3a8b2b13ddaa8ad64727dcd46

                                                                                                        SHA512

                                                                                                        9ea82e7cb6c6a58446bd5033855947c3e2d475d2910f2b941235e0b96aa08eec822d2dd17cc86b2d3fce930f78b799291992408e309a6c63e3011266810ea83e

                                                                                                      • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

                                                                                                        Filesize

                                                                                                        1.2MB

                                                                                                        MD5

                                                                                                        15a42d3e4579da615a384c717ab2109b

                                                                                                        SHA1

                                                                                                        22aeedeb2307b1370cdab70d6a6b6d2c13ad2301

                                                                                                        SHA256

                                                                                                        3c97bb410e49b11af8116feb7240b7101e1967cae7538418c45c3d2e072e8103

                                                                                                        SHA512

                                                                                                        1eb7f126dccc88a2479e3818c36120f5af3caa0d632b9ea803485ee6531d6e2a1fd0805b1c4364983d280df23ea5ca3ad4a5fca558ac436efae36af9b795c444

                                                                                                      • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll

                                                                                                        Filesize

                                                                                                        109KB

                                                                                                        MD5

                                                                                                        154c3f1334dd435f562672f2664fea6b

                                                                                                        SHA1

                                                                                                        51dd25e2ba98b8546de163b8f26e2972a90c2c79

                                                                                                        SHA256

                                                                                                        5f431129f97f3d56929f1e5584819e091bd6c854d7e18503074737fc6d79e33f

                                                                                                        SHA512

                                                                                                        1bca69bbcdb7ecd418769e9d4befc458f9f8e3cee81feb7316bb61e189e2904f4431e4cc7d291e179a5dec441b959d428d8e433f579036f763bbad6460222841

                                                                                                      • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll

                                                                                                        Filesize

                                                                                                        1.2MB

                                                                                                        MD5

                                                                                                        f35b671fda2603ec30ace10946f11a90

                                                                                                        SHA1

                                                                                                        059ad6b06559d4db581b1879e709f32f80850872

                                                                                                        SHA256

                                                                                                        83e3df5bec15d5333935bea8b719a6d677e2fb3dc1cf9e18e7b82fd0438285c7

                                                                                                        SHA512

                                                                                                        b5fa27d08c64727cef7fdda5e68054a4359cd697df50d70d1d90da583195959a139066a6214531bbc5f20cd4f9bc1ca3e4244396547381291a6a1d2df9cf8705

                                                                                                      • C:\Users\Admin\Pictures\AGXfHBOKVkb2MCAsZ0fvwZEy.exe

                                                                                                        Filesize

                                                                                                        3.1MB

                                                                                                        MD5

                                                                                                        712584f9719bfa4f49886d7e7b2e1e14

                                                                                                        SHA1

                                                                                                        dc9842dcc54355ed03ebe0fb3744eb99ba3424a8

                                                                                                        SHA256

                                                                                                        f3d6cd0bb23373baee06168068c7bd0346ef7aa5e2342837d6117181d47eb579

                                                                                                        SHA512

                                                                                                        a8ee1ef8b5c2867d8903672b0efd0190964e0505da166f8787d06389a9cd2fdc52cae96b0946f80671859c84f7940a9b74dd82e06547de0595ced23052005dd2

                                                                                                      • C:\Users\Admin\Pictures\AGXfHBOKVkb2MCAsZ0fvwZEy.exe

                                                                                                        Filesize

                                                                                                        3.0MB

                                                                                                        MD5

                                                                                                        f30a69e18d076326c932597d2b0fb80b

                                                                                                        SHA1

                                                                                                        07626fc08322d9316fbfb6f6c3b5a409454475e3

                                                                                                        SHA256

                                                                                                        5a6ed020177093be842fed8be81a816c8ef235abe7eb5d67cb53a225f726513e

                                                                                                        SHA512

                                                                                                        f94515c83d8e0dad3850a3c5568246fccdc773bd826960372b572f662e11553efff6c6a704e29568873973c2773519f7d3bdb0409c386b02f610bf36976d09b3

                                                                                                      • C:\Users\Admin\Pictures\AGXfHBOKVkb2MCAsZ0fvwZEy.exe

                                                                                                        Filesize

                                                                                                        3.1MB

                                                                                                        MD5

                                                                                                        17eecc88ae021b6908360c05b0b14f79

                                                                                                        SHA1

                                                                                                        07b6e57d4fbe82c860e78a9fd827a2fe4344a726

                                                                                                        SHA256

                                                                                                        6ffceaf8f080a1af133cb16cc617c6dd041e7559d615405cc0ca92a06b5d55b8

                                                                                                        SHA512

                                                                                                        87f14a38887daad3a081194e54e6833a77c0356319520ed6dc928854a9aaf9616e476ab95eb7dfc4b7aa1bcd3064ed6b54676d1de2444b4c2e107b696af431a8

                                                                                                      • C:\Users\Admin\Pictures\AGXfHBOKVkb2MCAsZ0fvwZEy.exe

                                                                                                        Filesize

                                                                                                        4.2MB

                                                                                                        MD5

                                                                                                        8976038c7c15a9ab977e4070a6cb51c8

                                                                                                        SHA1

                                                                                                        9c0c676a22df3d2f3580d9c148d61e02ff0e17ff

                                                                                                        SHA256

                                                                                                        59c043cb78ee555357dc247d29e729d54831fdc3583156b07e3eafaf861ad1aa

                                                                                                        SHA512

                                                                                                        7b13a774087936456372bc54068f9a36b3a4064692497991f0a1b2e51a3c66ca4b7ac08e5d7082700c70a3e25efab7f60a5453da579ef41ec23dd5bfd798f23b

                                                                                                      • C:\Users\Admin\Pictures\CbDTQnFgYAjHgZ7icMa3tCcH.exe

                                                                                                        Filesize

                                                                                                        7KB

                                                                                                        MD5

                                                                                                        5b423612b36cde7f2745455c5dd82577

                                                                                                        SHA1

                                                                                                        0187c7c80743b44e9e0c193e993294e3b969cc3d

                                                                                                        SHA256

                                                                                                        e0840d2ea74a00dcc545d770b91d9d889e5a82c7bedf1b989e0a89db04685b09

                                                                                                        SHA512

                                                                                                        c26a1e7e96dbd178d961c630abd8e564ef69532f386fb198eb20119a88ecab2fe885d71ac0c90687c18910ce00c445f352a5e8fbf5328f3403964f7c7802414c

                                                                                                      • C:\Users\Admin\Pictures\DyxCLiiWrhJ437zbP35tX6wC.exe

                                                                                                        Filesize

                                                                                                        1.2MB

                                                                                                        MD5

                                                                                                        a9d8fa99fece5b946488f1f7255e3049

                                                                                                        SHA1

                                                                                                        26dcf8b70806e5192edc6b98c7cb609c0688af4b

                                                                                                        SHA256

                                                                                                        456c7556ce13e1676e18886b1febed72305dd6259813bc52c893532abbc2e014

                                                                                                        SHA512

                                                                                                        394e81cbd2ad071ecbc844898e0e109466842237919e74d771c8f29286c64de473d720bb2dd6d0e01a2cadf1d79d107a28914d5466ec782040774710412b128e

                                                                                                      • C:\Users\Admin\Pictures\DyxCLiiWrhJ437zbP35tX6wC.exe

                                                                                                        Filesize

                                                                                                        1.1MB

                                                                                                        MD5

                                                                                                        9bb1bf56bc12ec094bd5d7053bb7688d

                                                                                                        SHA1

                                                                                                        32ac1e8b1c1552bfae616d23dd4b259be306fea0

                                                                                                        SHA256

                                                                                                        3e8011658cca85f853e1ab2e12e202b5600313dabd5bc8b1100b3c56f52c89bc

                                                                                                        SHA512

                                                                                                        7dbc089721dd011f07afbed168e03f93357b547fbd210264bb57ed6aa84359235cb57517e1aabf73ec73b2eda78c55e117e0b4e879c87c8e658e7ab3b7453cc3

                                                                                                      • C:\Users\Admin\Pictures\KH3pym3XRDhezgbLYwKdOTVq.exe

                                                                                                        Filesize

                                                                                                        1.5MB

                                                                                                        MD5

                                                                                                        cf9f055af5b4a49e6640868d0a99d716

                                                                                                        SHA1

                                                                                                        554743f656db850525d0651a1b6f9047d933487b

                                                                                                        SHA256

                                                                                                        aca94b2142ef312de9f350c1298f1076da92d4b5fbda63f65bd49c7015864387

                                                                                                        SHA512

                                                                                                        426ef8311cb33bd94defff3cebbc4a2c256690f84da31c55e541dfae7355678957d2bff6d3665d6f4e163db2999d8bb2939567112e7025896c4fa50ffc03c419

                                                                                                      • C:\Users\Admin\Pictures\KH3pym3XRDhezgbLYwKdOTVq.exe

                                                                                                        Filesize

                                                                                                        1.7MB

                                                                                                        MD5

                                                                                                        026d10e19950f1063090e070956157ca

                                                                                                        SHA1

                                                                                                        89d8a546bcdad6d91bfbb1cddaaa01255fcd43e3

                                                                                                        SHA256

                                                                                                        67935dc2b2202ff09d738089e86976e43d5dfe7a56bacffcc05b060d0897ab44

                                                                                                        SHA512

                                                                                                        f940378207fa28757b6a14ebf33b1bebfb21d4c1aaeb03eb3c92005c9c488a4f80fc9a48b4f8ba6fdd73cd08e1d565eed890fd37254809c1deeeeb2f02657ec3

                                                                                                      • C:\Users\Admin\Pictures\KH3pym3XRDhezgbLYwKdOTVq.exe

                                                                                                        Filesize

                                                                                                        2.8MB

                                                                                                        MD5

                                                                                                        eefa4a85cf96a22e55d94af12d110787

                                                                                                        SHA1

                                                                                                        d8567712a68a26abfbbed1152ebc8abd42968cee

                                                                                                        SHA256

                                                                                                        3a0b2b86c9dc868338fd1250999af55ab88b8e0cfd031b068401bec3fa27b3b7

                                                                                                        SHA512

                                                                                                        f348bdfb4fa6d9518147ca6b9ae4221fc4363f63c38851d43380aeae428976bd31d690c2ab9be69900f1922c041ad1780846a8026070e077358d3c465c82d88e

                                                                                                      • C:\Users\Admin\Pictures\UVo9PNEjFPB9lDMKAQ6KTsUc.exe

                                                                                                        Filesize

                                                                                                        442KB

                                                                                                        MD5

                                                                                                        21c485927180ad048b462aef38bfbc62

                                                                                                        SHA1

                                                                                                        a4b3525e0bca81479870d1d809ac01329c6c3c83

                                                                                                        SHA256

                                                                                                        554f1e60bae432a64aaf74680702e47b402b36d37b4dfa75e1772013fecbaf23

                                                                                                        SHA512

                                                                                                        97482df755abc8aa3fd4c1a82d98daf643feaec94eea111614a3f08fe0775d62f1ec68b7a00fb560215df11e38fdf36bb2309a3e687beb91fac8b5f5d82b4bf5

                                                                                                      • C:\Users\Admin\Pictures\c7O6xrUKXgcImWm9Am20yGvj.exe

                                                                                                        Filesize

                                                                                                        2.9MB

                                                                                                        MD5

                                                                                                        614836bc37fd6d81feb0d652b5dc44e8

                                                                                                        SHA1

                                                                                                        88f0e32305f7a4c9dd9ec74469b7116133871ecf

                                                                                                        SHA256

                                                                                                        c4c89d6de1bf07ac4ee2b7733b6f5ebc7e8cf41ca04d0cfc14e11bf1ed154cb7

                                                                                                        SHA512

                                                                                                        a5e103f7f301ecc017a34d08c47f4f7bbbec42e41a7fda6bd9d98e33a596049bf42cb4da380728ce4824e4b12ab40f9c7351cca78ef74689b2962197e10a80a4

                                                                                                      • C:\Users\Admin\Pictures\c7O6xrUKXgcImWm9Am20yGvj.exe

                                                                                                        Filesize

                                                                                                        2.1MB

                                                                                                        MD5

                                                                                                        8108218a85b08f3c1dfa17ac20b38da2

                                                                                                        SHA1

                                                                                                        3e9a194ac288f68e47ce8b451219f52d531cc6a1

                                                                                                        SHA256

                                                                                                        423da7b1077e2cc2ed29dca15fec4d7bbaa44fdadcbc5880631f7062d77e5ff6

                                                                                                        SHA512

                                                                                                        a43dd86dca8a187e29d5ed626b8fe844d97ec744189c8ec878ff4a37c5a046af16824c3359f5a0aa7a54a8f33d2366ff197de9ae4427f4ca84bdecee73ccb3a6

                                                                                                      • C:\Users\Admin\Pictures\c7O6xrUKXgcImWm9Am20yGvj.exe

                                                                                                        Filesize

                                                                                                        4.2MB

                                                                                                        MD5

                                                                                                        f8163f4d04919c7b6c3f9fb58adbf27a

                                                                                                        SHA1

                                                                                                        f0bfaacc71e4c1cb6ef1fa997a3258adc6d306fa

                                                                                                        SHA256

                                                                                                        a351a882a02d7c0ce91c6cc05d2477373d629584fc2c022973e70af20d9d1fdb

                                                                                                        SHA512

                                                                                                        e51b95623dd47a9c4d43a1e9456577401bd065a9d71ef882a79e12a76c8c727090ce391d72e4ee3d428097cc7ec3368ffa79e26b4df924bffc2efd70a989ccf0

                                                                                                      • C:\Users\Admin\Pictures\cIxwMhiu9Vcevbfar1cPYGWZ.exe

                                                                                                        Filesize

                                                                                                        442KB

                                                                                                        MD5

                                                                                                        874f29e109b798ff1a0508809141ce2d

                                                                                                        SHA1

                                                                                                        0768a2df1e30ecaec93dd19558a2f61e5ec57ca2

                                                                                                        SHA256

                                                                                                        a579527db63e78ac82c6b8fb46249f96a33e46933c07abcdf191ae984fbce943

                                                                                                        SHA512

                                                                                                        67c92f02780ca8f451638ce0f2f3c5fb77b11b56e82a11e96aafa421f009309ce0646af4701e1f3118deaf594698939db51cfecd0c2540c151c2167cd34dce5a

                                                                                                      • C:\Users\Admin\Pictures\gKTho0rj0PzJNmLtQ8R2RAwH.exe

                                                                                                        Filesize

                                                                                                        3KB

                                                                                                        MD5

                                                                                                        15c8ba1cea8b21a585ae8fac2c1bd084

                                                                                                        SHA1

                                                                                                        561901eb2e7a190dd000602d3daeb51fdc72cadf

                                                                                                        SHA256

                                                                                                        bde7c42765efac0dc1aca4c431d22f2c8f0d485e56e165bcce47bf5b90206639

                                                                                                        SHA512

                                                                                                        69b1ac40d47ca69d24d37e646924507cb04e812e6bf0f3c5f7e8e939803f166743a5331b7232dfcdab6ddcb18ddba89c7fdb3b074322376218230dda8a4c7774

                                                                                                      • C:\Users\Admin\Pictures\kJMnsPLcBv6qxEl3DcjcVb5v.exe

                                                                                                        Filesize

                                                                                                        2.6MB

                                                                                                        MD5

                                                                                                        ba48df2658c933327e3237afcfa41514

                                                                                                        SHA1

                                                                                                        aa16261165638509644548662892ec98133fff00

                                                                                                        SHA256

                                                                                                        1301faff3ac737a4bd62b72a156cfd7e89b10b4c0e25f1754283b3855ec13b69

                                                                                                        SHA512

                                                                                                        f27ab40a6354a8621657164e257092754c0e45b9e48e794edce62854de4acb9c9bca7404bb3c33969f15370ad0757726bd01ba25775a58a01d5db255f47648dd

                                                                                                      • C:\Users\Admin\Pictures\kJMnsPLcBv6qxEl3DcjcVb5v.exe

                                                                                                        Filesize

                                                                                                        2.3MB

                                                                                                        MD5

                                                                                                        4429bb9d0f6858c5779d8705766b2945

                                                                                                        SHA1

                                                                                                        ba308a293745b31279488d96d3d3d83aad39cae1

                                                                                                        SHA256

                                                                                                        b985fcfb7081a49477253c3bfe3409200ed7a28cce1d5b3058d4a501e1efeb36

                                                                                                        SHA512

                                                                                                        8e3cfe7df3e342e98dc3fdc9ea6dbdc4f5847f4abf9d8518927468dbc8627724f852d9d56638c4c8036577a0974306fd0ddfc07ade4715a8a2a36de341a5fc54

                                                                                                      • C:\Users\Admin\Pictures\kJMnsPLcBv6qxEl3DcjcVb5v.exe

                                                                                                        Filesize

                                                                                                        2.9MB

                                                                                                        MD5

                                                                                                        bd885a540a0193981094300a16093bf7

                                                                                                        SHA1

                                                                                                        be7cd0e08a6397abda125632a8f265977e4f96b5

                                                                                                        SHA256

                                                                                                        f76bee858dd947f3c556398bd1eaa488e78f481fbe1323009a48675afd832ef2

                                                                                                        SHA512

                                                                                                        7a88afe745639b1049d7596894f86e934cbb9fa8a6905a3c81a1984ba869d14a701ca32a364f557a265fd9dadbd81d4e029491bfe7fe56a0ab44ef11736be9d0

                                                                                                      • C:\Users\Admin\Pictures\tRnnCCK3cugNJiEappIwYsj2.exe

                                                                                                        Filesize

                                                                                                        512KB

                                                                                                        MD5

                                                                                                        d14f9a4c9394b2f51049196e98db0843

                                                                                                        SHA1

                                                                                                        e3cffe738a0367d22cd1728c50a703ab8b19c5d9

                                                                                                        SHA256

                                                                                                        08645c1646afde532e529b6391f607de606b35a0c3aa9b895b89c9795cd75243

                                                                                                        SHA512

                                                                                                        e7d3995e1cc86c4f1e682beca06dfd4ef5fefeea0ebcf56374cc461ffb3260052c50cc5813f2b06fc7a0235d4c163fddecd6b724283be594a82740ce3a4cd519

                                                                                                      • C:\Users\Admin\Pictures\tRnnCCK3cugNJiEappIwYsj2.exe

                                                                                                        Filesize

                                                                                                        522KB

                                                                                                        MD5

                                                                                                        b8616322186dcdf78032a74cf3497153

                                                                                                        SHA1

                                                                                                        bf1c1568d65422757cc88300df76a6740db6eab5

                                                                                                        SHA256

                                                                                                        43dda2be3813b81729b3d388f546838a36ee3471da5ed266fe958e2316f1f6ea

                                                                                                        SHA512

                                                                                                        7b1e4ad944960fc2aa661426f77e64ff151cd8d5860e584874da1c4f03c6d195d4ee9031c36c24a234a851176b003254d14f9334712e07babc6934cf19a7b2fb

                                                                                                      • C:\Users\Admin\Pictures\tRnnCCK3cugNJiEappIwYsj2.exe

                                                                                                        Filesize

                                                                                                        64KB

                                                                                                        MD5

                                                                                                        edd6f638d51865117a090ab6804c4bf1

                                                                                                        SHA1

                                                                                                        3bf1ea031aa84a13a467f04aa50e23a213ddbea5

                                                                                                        SHA256

                                                                                                        761d516a78efa6dae429653d98b5191f2467f4a9a63f55525d14b30bb9adc361

                                                                                                        SHA512

                                                                                                        996944ac79b41efad3fd9edb36f0de3bfc8a9cab5f808a7d9fea4e972724d28a0e804fb721061aa715f7c66f4b7fc848a6dbaaa09745917696ce06880d51428e

                                                                                                      • memory/344-101-0x000002F0C5BD0000-0x000002F0C5BE0000-memory.dmp

                                                                                                        Filesize

                                                                                                        64KB

                                                                                                      • memory/344-103-0x000002F0C5BD0000-0x000002F0C5BE0000-memory.dmp

                                                                                                        Filesize

                                                                                                        64KB

                                                                                                      • memory/344-100-0x00007FF99A6B0000-0x00007FF99B172000-memory.dmp

                                                                                                        Filesize

                                                                                                        10.8MB

                                                                                                      • memory/344-105-0x000002F0C61E0000-0x000002F0C61EA000-memory.dmp

                                                                                                        Filesize

                                                                                                        40KB

                                                                                                      • memory/344-99-0x000002F0DE300000-0x000002F0DE322000-memory.dmp

                                                                                                        Filesize

                                                                                                        136KB

                                                                                                      • memory/344-111-0x00007FF99A6B0000-0x00007FF99B172000-memory.dmp

                                                                                                        Filesize

                                                                                                        10.8MB

                                                                                                      • memory/344-104-0x000002F0DE470000-0x000002F0DE482000-memory.dmp

                                                                                                        Filesize

                                                                                                        72KB

                                                                                                      • memory/1408-489-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                                                                                        Filesize

                                                                                                        9.1MB

                                                                                                      • memory/1408-314-0x0000000002A60000-0x0000000002E65000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.0MB

                                                                                                      • memory/1576-113-0x0000000000D30000-0x00000000010C8000-memory.dmp

                                                                                                        Filesize

                                                                                                        3.6MB

                                                                                                      • memory/1576-54-0x0000000000D30000-0x00000000010C8000-memory.dmp

                                                                                                        Filesize

                                                                                                        3.6MB

                                                                                                      • memory/1576-155-0x0000000000D30000-0x00000000010C8000-memory.dmp

                                                                                                        Filesize

                                                                                                        3.6MB

                                                                                                      • memory/1576-499-0x0000000000D30000-0x00000000010C8000-memory.dmp

                                                                                                        Filesize

                                                                                                        3.6MB

                                                                                                      • memory/1576-157-0x0000000000D30000-0x00000000010C8000-memory.dmp

                                                                                                        Filesize

                                                                                                        3.6MB

                                                                                                      • memory/1576-102-0x0000000000D30000-0x00000000010C8000-memory.dmp

                                                                                                        Filesize

                                                                                                        3.6MB

                                                                                                      • memory/1576-159-0x0000000000D30000-0x00000000010C8000-memory.dmp

                                                                                                        Filesize

                                                                                                        3.6MB

                                                                                                      • memory/1576-59-0x0000000000D30000-0x00000000010C8000-memory.dmp

                                                                                                        Filesize

                                                                                                        3.6MB

                                                                                                      • memory/1576-161-0x0000000000D30000-0x00000000010C8000-memory.dmp

                                                                                                        Filesize

                                                                                                        3.6MB

                                                                                                      • memory/1576-125-0x0000000000D30000-0x00000000010C8000-memory.dmp

                                                                                                        Filesize

                                                                                                        3.6MB

                                                                                                      • memory/1576-53-0x0000000000D30000-0x00000000010C8000-memory.dmp

                                                                                                        Filesize

                                                                                                        3.6MB

                                                                                                      • memory/1576-207-0x0000000000D30000-0x00000000010C8000-memory.dmp

                                                                                                        Filesize

                                                                                                        3.6MB

                                                                                                      • memory/1576-329-0x0000000000D30000-0x00000000010C8000-memory.dmp

                                                                                                        Filesize

                                                                                                        3.6MB

                                                                                                      • memory/1576-194-0x0000000000D30000-0x00000000010C8000-memory.dmp

                                                                                                        Filesize

                                                                                                        3.6MB

                                                                                                      • memory/1596-175-0x00007FF99A6B0000-0x00007FF99B172000-memory.dmp

                                                                                                        Filesize

                                                                                                        10.8MB

                                                                                                      • memory/1596-187-0x000001AD6EBE0000-0x000001AD6EBF0000-memory.dmp

                                                                                                        Filesize

                                                                                                        64KB

                                                                                                      • memory/1596-192-0x00007FF99A6B0000-0x00007FF99B172000-memory.dmp

                                                                                                        Filesize

                                                                                                        10.8MB

                                                                                                      • memory/1596-176-0x000001AD6EBE0000-0x000001AD6EBF0000-memory.dmp

                                                                                                        Filesize

                                                                                                        64KB

                                                                                                      • memory/1596-177-0x000001AD6EBE0000-0x000001AD6EBF0000-memory.dmp

                                                                                                        Filesize

                                                                                                        64KB

                                                                                                      • memory/1964-474-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                                                                        Filesize

                                                                                                        972KB

                                                                                                      • memory/1964-571-0x0000000000400000-0x000000000063B000-memory.dmp

                                                                                                        Filesize

                                                                                                        2.2MB

                                                                                                      • memory/2240-135-0x0000000004CF0000-0x0000000004CF1000-memory.dmp

                                                                                                        Filesize

                                                                                                        4KB

                                                                                                      • memory/2240-134-0x0000000004D50000-0x0000000004D51000-memory.dmp

                                                                                                        Filesize

                                                                                                        4KB

                                                                                                      • memory/2240-133-0x0000000004D10000-0x0000000004D11000-memory.dmp

                                                                                                        Filesize

                                                                                                        4KB

                                                                                                      • memory/2240-129-0x00000000005B0000-0x0000000000A80000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.8MB

                                                                                                      • memory/2240-131-0x0000000004D20000-0x0000000004D21000-memory.dmp

                                                                                                        Filesize

                                                                                                        4KB

                                                                                                      • memory/2240-132-0x0000000004D30000-0x0000000004D31000-memory.dmp

                                                                                                        Filesize

                                                                                                        4KB

                                                                                                      • memory/2240-137-0x00000000005B0000-0x0000000000A80000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.8MB

                                                                                                      • memory/2240-130-0x00000000005B0000-0x0000000000A80000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.8MB

                                                                                                      • memory/2240-136-0x0000000004D00000-0x0000000004D01000-memory.dmp

                                                                                                        Filesize

                                                                                                        4KB

                                                                                                      • memory/2484-217-0x00000000005B0000-0x0000000000A80000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.8MB

                                                                                                      • memory/2484-216-0x0000000005030000-0x0000000005031000-memory.dmp

                                                                                                        Filesize

                                                                                                        4KB

                                                                                                      • memory/2484-215-0x0000000005020000-0x0000000005021000-memory.dmp

                                                                                                        Filesize

                                                                                                        4KB

                                                                                                      • memory/2484-214-0x0000000005080000-0x0000000005081000-memory.dmp

                                                                                                        Filesize

                                                                                                        4KB

                                                                                                      • memory/2484-210-0x00000000005B0000-0x0000000000A80000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.8MB

                                                                                                      • memory/2484-213-0x0000000005040000-0x0000000005041000-memory.dmp

                                                                                                        Filesize

                                                                                                        4KB

                                                                                                      • memory/2484-211-0x0000000005050000-0x0000000005051000-memory.dmp

                                                                                                        Filesize

                                                                                                        4KB

                                                                                                      • memory/2484-212-0x0000000005060000-0x0000000005061000-memory.dmp

                                                                                                        Filesize

                                                                                                        4KB

                                                                                                      • memory/3632-193-0x00000000005B0000-0x0000000000A80000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.8MB

                                                                                                      • memory/3632-28-0x0000000004EE0000-0x0000000004EE1000-memory.dmp

                                                                                                        Filesize

                                                                                                        4KB

                                                                                                      • memory/3632-22-0x00000000005B0000-0x0000000000A80000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.8MB

                                                                                                      • memory/3632-24-0x00000000005B0000-0x0000000000A80000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.8MB

                                                                                                      • memory/3632-26-0x0000000004EB0000-0x0000000004EB1000-memory.dmp

                                                                                                        Filesize

                                                                                                        4KB

                                                                                                      • memory/3632-25-0x0000000004EA0000-0x0000000004EA1000-memory.dmp

                                                                                                        Filesize

                                                                                                        4KB

                                                                                                      • memory/3632-27-0x0000000004E90000-0x0000000004E91000-memory.dmp

                                                                                                        Filesize

                                                                                                        4KB

                                                                                                      • memory/3632-154-0x00000000005B0000-0x0000000000A80000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.8MB

                                                                                                      • memory/3632-156-0x00000000005B0000-0x0000000000A80000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.8MB

                                                                                                      • memory/3632-60-0x00000000005B0000-0x0000000000A80000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.8MB

                                                                                                      • memory/3632-158-0x00000000005B0000-0x0000000000A80000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.8MB

                                                                                                      • memory/3632-313-0x00000000005B0000-0x0000000000A80000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.8MB

                                                                                                      • memory/3632-160-0x00000000005B0000-0x0000000000A80000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.8MB

                                                                                                      • memory/3632-29-0x0000000004E70000-0x0000000004E71000-memory.dmp

                                                                                                        Filesize

                                                                                                        4KB

                                                                                                      • memory/3632-58-0x00000000005B0000-0x0000000000A80000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.8MB

                                                                                                      • memory/3632-206-0x00000000005B0000-0x0000000000A80000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.8MB

                                                                                                      • memory/3632-55-0x00000000005B0000-0x0000000000A80000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.8MB

                                                                                                      • memory/3632-112-0x00000000005B0000-0x0000000000A80000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.8MB

                                                                                                      • memory/3632-124-0x00000000005B0000-0x0000000000A80000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.8MB

                                                                                                      • memory/3632-52-0x00000000005B0000-0x0000000000A80000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.8MB

                                                                                                      • memory/3632-33-0x0000000004EF0000-0x0000000004EF1000-memory.dmp

                                                                                                        Filesize

                                                                                                        4KB

                                                                                                      • memory/3632-477-0x00000000005B0000-0x0000000000A80000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.8MB

                                                                                                      • memory/3632-32-0x0000000004F00000-0x0000000004F01000-memory.dmp

                                                                                                        Filesize

                                                                                                        4KB

                                                                                                      • memory/3632-30-0x0000000004E80000-0x0000000004E81000-memory.dmp

                                                                                                        Filesize

                                                                                                        4KB

                                                                                                      • memory/3632-31-0x0000000004ED0000-0x0000000004ED1000-memory.dmp

                                                                                                        Filesize

                                                                                                        4KB

                                                                                                      • memory/3764-252-0x0000000000400000-0x0000000000408000-memory.dmp

                                                                                                        Filesize

                                                                                                        32KB

                                                                                                      • memory/3764-255-0x0000000072430000-0x0000000072BE1000-memory.dmp

                                                                                                        Filesize

                                                                                                        7.7MB

                                                                                                      • memory/4184-497-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                                                                                        Filesize

                                                                                                        9.1MB

                                                                                                      • memory/4200-309-0x0000000000400000-0x0000000000573000-memory.dmp

                                                                                                        Filesize

                                                                                                        1.4MB

                                                                                                      • memory/4200-306-0x0000000000700000-0x0000000000800000-memory.dmp

                                                                                                        Filesize

                                                                                                        1024KB

                                                                                                      • memory/4200-307-0x0000000002330000-0x000000000239E000-memory.dmp

                                                                                                        Filesize

                                                                                                        440KB

                                                                                                      • memory/4340-449-0x0000000000840000-0x0000000000849000-memory.dmp

                                                                                                        Filesize

                                                                                                        36KB

                                                                                                      • memory/4340-452-0x00000000025E0000-0x00000000029E0000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.0MB

                                                                                                      • memory/4340-456-0x00007FF9BB7C0000-0x00007FF9BB9C9000-memory.dmp

                                                                                                        Filesize

                                                                                                        2.0MB

                                                                                                      • memory/4340-460-0x00000000756E0000-0x0000000075932000-memory.dmp

                                                                                                        Filesize

                                                                                                        2.3MB

                                                                                                      • memory/4492-372-0x0000000000400000-0x000000000046D000-memory.dmp

                                                                                                        Filesize

                                                                                                        436KB

                                                                                                      • memory/4492-364-0x0000000000400000-0x000000000046D000-memory.dmp

                                                                                                        Filesize

                                                                                                        436KB

                                                                                                      • memory/4492-443-0x0000000003FF0000-0x00000000043F0000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.0MB

                                                                                                      • memory/4492-440-0x0000000003FF0000-0x00000000043F0000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.0MB

                                                                                                      • memory/4492-447-0x00000000756E0000-0x0000000075932000-memory.dmp

                                                                                                        Filesize

                                                                                                        2.3MB

                                                                                                      • memory/4492-445-0x00007FF9BB7C0000-0x00007FF9BB9C9000-memory.dmp

                                                                                                        Filesize

                                                                                                        2.0MB

                                                                                                      • memory/4512-238-0x0000022613780000-0x0000022613790000-memory.dmp

                                                                                                        Filesize

                                                                                                        64KB

                                                                                                      • memory/4512-237-0x00007FF99A6B0000-0x00007FF99B172000-memory.dmp

                                                                                                        Filesize

                                                                                                        10.8MB

                                                                                                      • memory/4512-239-0x0000022613780000-0x0000022613790000-memory.dmp

                                                                                                        Filesize

                                                                                                        64KB

                                                                                                      • memory/4512-251-0x0000022613780000-0x0000022613790000-memory.dmp

                                                                                                        Filesize

                                                                                                        64KB

                                                                                                      • memory/4512-254-0x00007FF99A6B0000-0x00007FF99B172000-memory.dmp

                                                                                                        Filesize

                                                                                                        10.8MB

                                                                                                      • memory/4684-494-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                                                                                        Filesize

                                                                                                        9.1MB

                                                                                                      • memory/4780-492-0x0000000000400000-0x0000000000573000-memory.dmp

                                                                                                        Filesize

                                                                                                        1.4MB

                                                                                                      • memory/5028-23-0x00000000008C0000-0x0000000000D90000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.8MB

                                                                                                      • memory/5028-0-0x00000000008C0000-0x0000000000D90000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.8MB

                                                                                                      • memory/5028-10-0x0000000004DF0000-0x0000000004DF1000-memory.dmp

                                                                                                        Filesize

                                                                                                        4KB

                                                                                                      • memory/5028-9-0x0000000004E00000-0x0000000004E01000-memory.dmp

                                                                                                        Filesize

                                                                                                        4KB

                                                                                                      • memory/5028-8-0x0000000004DB0000-0x0000000004DB1000-memory.dmp

                                                                                                        Filesize

                                                                                                        4KB

                                                                                                      • memory/5028-7-0x0000000004D80000-0x0000000004D81000-memory.dmp

                                                                                                        Filesize

                                                                                                        4KB

                                                                                                      • memory/5028-6-0x0000000004D70000-0x0000000004D71000-memory.dmp

                                                                                                        Filesize

                                                                                                        4KB

                                                                                                      • memory/5028-5-0x0000000004DD0000-0x0000000004DD1000-memory.dmp

                                                                                                        Filesize

                                                                                                        4KB

                                                                                                      • memory/5028-4-0x0000000004D90000-0x0000000004D91000-memory.dmp

                                                                                                        Filesize

                                                                                                        4KB

                                                                                                      • memory/5028-3-0x0000000004DA0000-0x0000000004DA1000-memory.dmp

                                                                                                        Filesize

                                                                                                        4KB

                                                                                                      • memory/5028-2-0x00000000008C0000-0x0000000000D90000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.8MB

                                                                                                      • memory/5028-1-0x0000000077006000-0x0000000077008000-memory.dmp

                                                                                                        Filesize

                                                                                                        8KB