Analysis

  • max time kernel
    64s
  • max time network
    117s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240221-en
  • resource tags

    arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    31-03-2024 21:56

General

  • Target

    de89bbe444a588489c2bd7bd97d86bd37b219c3b3d70831011520baa38b195e8.exe

  • Size

    1.8MB

  • MD5

    db26bb5b8f2da6153298eb7494d8bf55

  • SHA1

    84d3b9db00ecc465d69d61d3875f73ef0f3802e3

  • SHA256

    de89bbe444a588489c2bd7bd97d86bd37b219c3b3d70831011520baa38b195e8

  • SHA512

    14dff596f19262601b8655f15f5944f60f261c8f48d000edc0f6288bd0f3e1d9d96c38cc08e79d172af4ba8e9ebffb45c511116a3b90016e1985be25c2d35eef

  • SSDEEP

    24576:LLbqqOF2qPafjgGeh5KzkDv12jhXfngns8NsSDBLuxviYstPREaKVsA8LCcLHuc0:vCXa4RDv8fgL1dSGEbyLLL4rDwh/M

Malware Config

Extracted

Family

amadey

Version

4.18

C2

http://193.233.132.56

Attributes
  • install_dir

    09fd851a4f

  • install_file

    explorha.exe

  • strings_key

    443351145ece4966ded809641c77cfa8

  • url_paths

    /Pneh2sXQk0/index.php

rc4.plain

Extracted

Family

amadey

Version

4.17

C2

http://185.215.113.32

Attributes
  • install_dir

    00c07260dc

  • install_file

    explorgu.exe

  • strings_key

    461809bd97c251ba0c0c8450c7055f1d

  • url_paths

    /yandex/index.php

rc4.plain

Extracted

Family

redline

Botnet

LiveTraffic

C2

4.185.137.132:1632

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect ZGRat V1 3 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 18 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 15 IoCs
  • Identifies Wine through registry keys 2 TTPs 9 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 3 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 39 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 28 IoCs
  • Suspicious use of SendNotifyMessage 15 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\de89bbe444a588489c2bd7bd97d86bd37b219c3b3d70831011520baa38b195e8.exe
    "C:\Users\Admin\AppData\Local\Temp\de89bbe444a588489c2bd7bd97d86bd37b219c3b3d70831011520baa38b195e8.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4372
    • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
      "C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3784
      • C:\Users\Admin\AppData\Local\Temp\1000042001\a676c9467d.exe
        "C:\Users\Admin\AppData\Local\Temp\1000042001\a676c9467d.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        PID:3428
      • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
        "C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        PID:2632
      • C:\Users\Admin\AppData\Local\Temp\1000044001\go.exe
        "C:\Users\Admin\AppData\Local\Temp\1000044001\go.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:708
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/account
          4⤵
          • Enumerates system info in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:2520
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fffca423cb8,0x7fffca423cc8,0x7fffca423cd8
            5⤵
              PID:904
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1912,657544981576906215,6750600962855854597,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1920 /prefetch:2
              5⤵
                PID:1668
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1912,657544981576906215,6750600962855854597,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2360 /prefetch:3
                5⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:1580
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1912,657544981576906215,6750600962855854597,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2540 /prefetch:8
                5⤵
                  PID:2784
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,657544981576906215,6750600962855854597,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:1
                  5⤵
                    PID:1020
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,657544981576906215,6750600962855854597,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:1
                    5⤵
                      PID:4596
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,657544981576906215,6750600962855854597,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3868 /prefetch:1
                      5⤵
                        PID:1624
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,657544981576906215,6750600962855854597,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4612 /prefetch:1
                        5⤵
                          PID:3148
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,657544981576906215,6750600962855854597,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4912 /prefetch:1
                          5⤵
                            PID:5072
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,657544981576906215,6750600962855854597,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:1
                            5⤵
                              PID:1464
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,657544981576906215,6750600962855854597,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:1
                              5⤵
                                PID:3928
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,657544981576906215,6750600962855854597,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5364 /prefetch:1
                                5⤵
                                  PID:5236
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1912,657544981576906215,6750600962855854597,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5124 /prefetch:8
                                  5⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:2384
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,657544981576906215,6750600962855854597,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5676 /prefetch:1
                                  5⤵
                                    PID:3444
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,657544981576906215,6750600962855854597,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5336 /prefetch:1
                                    5⤵
                                      PID:4088
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1912,657544981576906215,6750600962855854597,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6136 /prefetch:8
                                      5⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:5880
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,657544981576906215,6750600962855854597,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:1
                                      5⤵
                                        PID:5148
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,657544981576906215,6750600962855854597,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4848 /prefetch:1
                                        5⤵
                                          PID:3224
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,657544981576906215,6750600962855854597,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2504 /prefetch:1
                                          5⤵
                                            PID:3172
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/video
                                          4⤵
                                          • Suspicious use of WriteProcessMemory
                                          PID:5008
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fffca423cb8,0x7fffca423cc8,0x7fffca423cd8
                                            5⤵
                                              PID:1496
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1468,9613467083078091585,5543163020441441370,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2040 /prefetch:3
                                              5⤵
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:4432
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/
                                            4⤵
                                            • Suspicious use of WriteProcessMemory
                                            PID:5084
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0x80,0x10c,0x7fffca423cb8,0x7fffca423cc8,0x7fffca423cd8
                                              5⤵
                                                PID:4588
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1984,16166227877927446435,8966391543544369980,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1996 /prefetch:2
                                                5⤵
                                                  PID:1956
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1984,16166227877927446435,8966391543544369980,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2044 /prefetch:3
                                                  5⤵
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  PID:1932
                                            • C:\Windows\SysWOW64\rundll32.exe
                                              "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
                                              3⤵
                                              • Loads dropped DLL
                                              PID:3548
                                              • C:\Windows\system32\rundll32.exe
                                                "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
                                                4⤵
                                                • Blocklisted process makes network request
                                                • Loads dropped DLL
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:4980
                                                • C:\Windows\system32\netsh.exe
                                                  netsh wlan show profiles
                                                  5⤵
                                                    PID:2444
                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\280069375290_Desktop.zip' -CompressionLevel Optimal
                                                    5⤵
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:5784
                                              • C:\Users\Admin\AppData\Local\Temp\1000046001\amert.exe
                                                "C:\Users\Admin\AppData\Local\Temp\1000046001\amert.exe"
                                                3⤵
                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                • Checks BIOS information in registry
                                                • Executes dropped EXE
                                                • Identifies Wine through registry keys
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                • Drops file in Windows directory
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:5524
                                              • C:\Windows\SysWOW64\rundll32.exe
                                                "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
                                                3⤵
                                                • Blocklisted process makes network request
                                                • Loads dropped DLL
                                                PID:5544
                                          • C:\Windows\System32\CompPkgSrv.exe
                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                            1⤵
                                              PID:1348
                                            • C:\Windows\System32\CompPkgSrv.exe
                                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                                              1⤵
                                                PID:4900
                                              • C:\Windows\System32\CompPkgSrv.exe
                                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                1⤵
                                                  PID:4892
                                                • C:\Windows\System32\CompPkgSrv.exe
                                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                  1⤵
                                                    PID:1840
                                                  • C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe
                                                    C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe
                                                    1⤵
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Checks BIOS information in registry
                                                    • Executes dropped EXE
                                                    • Identifies Wine through registry keys
                                                    • Adds Run key to start application
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:2824
                                                    • C:\Users\Admin\AppData\Local\Temp\1000873001\random.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\1000873001\random.exe"
                                                      2⤵
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Checks BIOS information in registry
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      PID:6088
                                                    • C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe"
                                                      2⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of SetThreadContext
                                                      PID:4224
                                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                        3⤵
                                                          PID:5948
                                                          • C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe
                                                            "C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe"
                                                            4⤵
                                                            • Executes dropped EXE
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:5680
                                                          • C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe
                                                            "C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe"
                                                            4⤵
                                                            • Executes dropped EXE
                                                            • Modifies system certificate store
                                                            PID:5720
                                                      • C:\Users\Admin\AppData\Local\Temp\1001031001\amadka.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\1001031001\amadka.exe"
                                                        2⤵
                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                        • Checks BIOS information in registry
                                                        • Executes dropped EXE
                                                        • Identifies Wine through registry keys
                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        PID:5188
                                                      • C:\Users\Admin\AppData\Local\Temp\1001039001\redlinepanel.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\1001039001\redlinepanel.exe"
                                                        2⤵
                                                        • Executes dropped EXE
                                                        PID:5984
                                                      • C:\Users\Admin\AppData\Local\Temp\1001040001\32456.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\1001040001\32456.exe"
                                                        2⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:3124
                                                      • C:\Users\Admin\AppData\Local\Temp\1001053001\goldprimeldlldf.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\1001053001\goldprimeldlldf.exe"
                                                        2⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of SetThreadContext
                                                        PID:5220
                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                          3⤵
                                                            PID:2416
                                                        • C:\Windows\SysWOW64\rundll32.exe
                                                          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main
                                                          2⤵
                                                            PID:5856
                                                            • C:\Windows\system32\rundll32.exe
                                                              "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main
                                                              3⤵
                                                                PID:5188
                                                                • C:\Windows\system32\netsh.exe
                                                                  netsh wlan show profiles
                                                                  4⤵
                                                                    PID:3960
                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\280069375290_Desktop.zip' -CompressionLevel Optimal
                                                                    4⤵
                                                                      PID:3500
                                                                • C:\Users\Admin\AppData\Local\Temp\1001059001\NewB.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\1001059001\NewB.exe"
                                                                  2⤵
                                                                    PID:5136
                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                      "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN NewB.exe /TR "C:\Users\Admin\AppData\Local\Temp\1001059001\NewB.exe" /F
                                                                      3⤵
                                                                      • Creates scheduled task(s)
                                                                      PID:3500
                                                                    • C:\Users\Admin\AppData\Local\Temp\1000183001\Uni400uni.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\1000183001\Uni400uni.exe"
                                                                      3⤵
                                                                        PID:3548
                                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe
                                                                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"
                                                                          4⤵
                                                                            PID:3980
                                                                            • C:\Users\Admin\Pictures\7LmB5rINVXUwZKV1DkS323UG.exe
                                                                              "C:\Users\Admin\Pictures\7LmB5rINVXUwZKV1DkS323UG.exe"
                                                                              5⤵
                                                                                PID:1928
                                                                              • C:\Users\Admin\Pictures\4gGLbGTd7SONFNPAU0QYUgHS.exe
                                                                                "C:\Users\Admin\Pictures\4gGLbGTd7SONFNPAU0QYUgHS.exe"
                                                                                5⤵
                                                                                  PID:5080
                                                                                • C:\Users\Admin\Pictures\U27g2tKPD2tqepIa6t33lMBJ.exe
                                                                                  "C:\Users\Admin\Pictures\U27g2tKPD2tqepIa6t33lMBJ.exe"
                                                                                  5⤵
                                                                                    PID:4592
                                                                                  • C:\Users\Admin\Pictures\ONPy6gmHtT4uMYRaDyrQRj85.exe
                                                                                    "C:\Users\Admin\Pictures\ONPy6gmHtT4uMYRaDyrQRj85.exe"
                                                                                    5⤵
                                                                                      PID:4572
                                                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe
                                                                                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"
                                                                                    4⤵
                                                                                      PID:3220
                                                                                • C:\Users\Admin\AppData\Local\Temp\1001073001\swiiiii.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\1001073001\swiiiii.exe"
                                                                                  2⤵
                                                                                    PID:5220
                                                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                                                      3⤵
                                                                                        PID:3556
                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 5220 -s 900
                                                                                        3⤵
                                                                                        • Program crash
                                                                                        PID:8
                                                                                    • C:\Users\Admin\AppData\Local\Temp\1001078001\koooooo.exe
                                                                                      "C:\Users\Admin\AppData\Local\Temp\1001078001\koooooo.exe"
                                                                                      2⤵
                                                                                        PID:1624
                                                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                                                          3⤵
                                                                                            PID:3044
                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 1624 -s 864
                                                                                            3⤵
                                                                                            • Program crash
                                                                                            PID:5476
                                                                                      • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                                                        C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                                                        1⤵
                                                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                        • Checks BIOS information in registry
                                                                                        • Executes dropped EXE
                                                                                        • Identifies Wine through registry keys
                                                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                        PID:2920
                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5220 -ip 5220
                                                                                        1⤵
                                                                                          PID:2560
                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1624 -ip 1624
                                                                                          1⤵
                                                                                            PID:4032

                                                                                          Network

                                                                                          MITRE ATT&CK Enterprise v15

                                                                                          Replay Monitor

                                                                                          Loading Replay Monitor...

                                                                                          Downloads

                                                                                          • C:\Users\Admin\AppData\Local\HHsCwQ5jbKHSspgYaynYH2Dz.exe

                                                                                            Filesize

                                                                                            4.2MB

                                                                                            MD5

                                                                                            c27185efd2c337dfa83a781103117732

                                                                                            SHA1

                                                                                            f7e89ef0ccc7d06588030d56a2169267fb5ccab3

                                                                                            SHA256

                                                                                            08e362a44761fc858ac60184bbe7a0ad1ac6b73030b1afd2169f6ffb12c3a0c2

                                                                                            SHA512

                                                                                            3cbcac7943eb2c00a9573f794331bde1d191e5cdc83dfa3a1b82c428513f366761bf4b79007f0c7ba540b4a40ae6fc6cbe8fb9c381d839655af4e1bd3fb781d3

                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                            Filesize

                                                                                            152B

                                                                                            MD5

                                                                                            ded21ddc295846e2b00e1fd766c807db

                                                                                            SHA1

                                                                                            497eb7c9c09cb2a247b4a3663ce808869872b410

                                                                                            SHA256

                                                                                            26025f86effef56caa2ee50a64e219c762944b1e50e465be3a6b454bc0ed7305

                                                                                            SHA512

                                                                                            ddfaa73032590de904bba398331fdbf188741d96a17116ada50298b42d6eb7b20d6e50b0cfae8b17e2f145997b8ebce6c8196e6f46fbe11f133d3d82ce3656db

                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                            Filesize

                                                                                            152B

                                                                                            MD5

                                                                                            a0407c5de270b9ae0ceee6cb9b61bbf1

                                                                                            SHA1

                                                                                            fb2bb8184c1b8e680bf873e5537e1260f057751e

                                                                                            SHA256

                                                                                            a56989933628f6a677ad09f634fc9b7dd9cf7d06c72a76ddbb8221bc4a62ffcd

                                                                                            SHA512

                                                                                            65162bf07705dfdd348d4eaf0a3feba08dc2c0942a3a052b4492d0675ab803b104c03c945f5608fac9544681e0fe8b81d1aaca859663e79aa87fcb591ddb8136

                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                            Filesize

                                                                                            648B

                                                                                            MD5

                                                                                            62a94316b1b6e569a9344c6fb09f4b04

                                                                                            SHA1

                                                                                            3038e722fc3a4e86ea101e2edfd88f8bea2b8973

                                                                                            SHA256

                                                                                            bb0ba1957df5c0551451328638b376db2c327a0c72a1211053ce39810b450b72

                                                                                            SHA512

                                                                                            9bad3785e37e5c51e97092e110948e8450c971bf7331a913cfcf1c9aa63f50c2dfd47a9ecc9a1cd501ab936d74d607310ddb61a3438fc2abd326aac650629ec4

                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                            Filesize

                                                                                            5KB

                                                                                            MD5

                                                                                            852200a3d75eede77c955c7037496ae6

                                                                                            SHA1

                                                                                            9a2899f21834a17632541a7c7c288f21ee94d70f

                                                                                            SHA256

                                                                                            bfb77fe304a83dbb8d3b01e0b1834d7503c917bd7c57fd8493f22173d5aedcc0

                                                                                            SHA512

                                                                                            77be77f1104ff4a28c3610f28e7ebf40bffa4286b8b3dbf5da417a15b1219332b529bcec4cef623907b45d6c104d4a4b36aa656921ff5d36ef4338253429b4bf

                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                            Filesize

                                                                                            6KB

                                                                                            MD5

                                                                                            26b8c37c0f5f8719ecef61dd59b00cac

                                                                                            SHA1

                                                                                            922b9723e35b8dee4d04030c44b7015b79fa9f32

                                                                                            SHA256

                                                                                            79b44b44bff4c86ecf703df0949bfd065b2ad812757023b9a527b279e9b03a40

                                                                                            SHA512

                                                                                            94b92ef92ad63ca099fccec0f68e346c77fcdd71cebc1b77a3632a35efc35606c6095b6ff93a83872e310cdde4d31dcbea5c57ed3e7c6fdb0f277dd486d46566

                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                            Filesize

                                                                                            540B

                                                                                            MD5

                                                                                            f41d7fefec1d4897c49d88dfa8195c7a

                                                                                            SHA1

                                                                                            f51bded3d85ebd3c6cdd4c154ebc0877a6d37a76

                                                                                            SHA256

                                                                                            34b4ea009a17e995196181aa7b41834c1f330f8f533fc9ffb7a87ed22687305d

                                                                                            SHA512

                                                                                            84822578797149e7d5868b57af2c7055c48edd9c0cff7f2541ba2b8c1f275f739ebaf42f9765c8a8ea496aac85bdce4b2aeba7508c1933f179dabe8a65fab67c

                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                            Filesize

                                                                                            540B

                                                                                            MD5

                                                                                            40bd3b846ce4bc40d85d5ee8eb9086ce

                                                                                            SHA1

                                                                                            d0e0e8553e26152aad26fe023a3a02e7e88e7ddc

                                                                                            SHA256

                                                                                            998e5ee001ce124f95436ff44732043d4cfea08ca50ece74c899b64cd1ea0a7b

                                                                                            SHA512

                                                                                            d0244c95ae34dbd542a16068ba9a041cdd85bbfa5c4e78f989a1449cca7f8fd7dfbbd9785721288bf98844ee8db05f71430ecca58dbe85679f4f9ae95318619c

                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe57c8fd.TMP

                                                                                            Filesize

                                                                                            540B

                                                                                            MD5

                                                                                            1c38dc258933baa399297d92a0a8bf67

                                                                                            SHA1

                                                                                            ca55dd2fbcc16f5d1a3bae4752217694ec37bccd

                                                                                            SHA256

                                                                                            9e234c8e5d0ac9d5dd9400c900b81ea88c46ddd230a199c6b8e7ee3867b4222c

                                                                                            SHA512

                                                                                            525e371fde8abe5b5797a2b1cc65205c0a4158b59e55d8f6d37175e4d4b1ac604f2f448e02b4a06bb6684ea1fcc35f772157937cbaedd2b99db861bfbdb8424d

                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                            Filesize

                                                                                            16B

                                                                                            MD5

                                                                                            206702161f94c5cd39fadd03f4014d98

                                                                                            SHA1

                                                                                            bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                                                                            SHA256

                                                                                            1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                                                                            SHA512

                                                                                            0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                            Filesize

                                                                                            16B

                                                                                            MD5

                                                                                            46295cac801e5d4857d09837238a6394

                                                                                            SHA1

                                                                                            44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                                            SHA256

                                                                                            0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                                            SHA512

                                                                                            8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                            Filesize

                                                                                            11KB

                                                                                            MD5

                                                                                            2f708bec4182f6e170aa4ac32faae0df

                                                                                            SHA1

                                                                                            648c9d76b4eb847bd147675f96a2b4089d824161

                                                                                            SHA256

                                                                                            12e4e09043503e43f62f48b089ee3789a54fd70e803d90bd41c3b6669635a4e8

                                                                                            SHA512

                                                                                            6cc5a50c409820766fb94ee5751daef50c8809f207e5779153a51ddc4401360818e9cd22b0dac077427ee17876303fbf0e6a86b00255a51f77db9a3e4b7cd654

                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                            Filesize

                                                                                            8KB

                                                                                            MD5

                                                                                            2003131e3cffdf68b4e2c7393568bb69

                                                                                            SHA1

                                                                                            7d8463e289f1273363bc6fc16518f1f7527a8c28

                                                                                            SHA256

                                                                                            4e11c2cf58b47210113c977c05e891d646588b1084943289a2cd8784eeb702dd

                                                                                            SHA512

                                                                                            2b23eee45f404ebee47009cb3ff4b201f33c72167e1e45528f66935db36782e1ee38fbb43a3f7841a9c8cdd01977b1013d0339c2c073eb4234536b36f645537c

                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                            Filesize

                                                                                            11KB

                                                                                            MD5

                                                                                            127e2057f43fa121822dc3ec1634b866

                                                                                            SHA1

                                                                                            578e1ec797a139ffa2bb6f10d46c3adcc41cae04

                                                                                            SHA256

                                                                                            77f736244a54fc55b88716def1f00cba45aa6dc3b38bf2ef818d9cd7213cc1e3

                                                                                            SHA512

                                                                                            b50804f6da548c1b2593ed190a9897d8ac80d8dea4fb4fe7c0c22cc064baadf70334e7ea991dabe41a07b10fd1c0497fdea24839d807fd459427914f97ae0be2

                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                            Filesize

                                                                                            8KB

                                                                                            MD5

                                                                                            c6b79299b6b0cc0d23675c8dedd56bf4

                                                                                            SHA1

                                                                                            7d0ea953b7e9c99dfa29225f33ed6f0c592e91c0

                                                                                            SHA256

                                                                                            29b6a9da465d63b4eee49175aa539556e714e8d3fecde8ea2690cae7b8f5082e

                                                                                            SHA512

                                                                                            4ea27abac8e1eebd17dab7485548311a5aafbdfa460e43de332667a35dd5e9b5877ba752cdf6f1c8b9becf33fcee59f5067aabba8c565873ef43b5951eee0df6

                                                                                          • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe

                                                                                            Filesize

                                                                                            1.8MB

                                                                                            MD5

                                                                                            db26bb5b8f2da6153298eb7494d8bf55

                                                                                            SHA1

                                                                                            84d3b9db00ecc465d69d61d3875f73ef0f3802e3

                                                                                            SHA256

                                                                                            de89bbe444a588489c2bd7bd97d86bd37b219c3b3d70831011520baa38b195e8

                                                                                            SHA512

                                                                                            14dff596f19262601b8655f15f5944f60f261c8f48d000edc0f6288bd0f3e1d9d96c38cc08e79d172af4ba8e9ebffb45c511116a3b90016e1985be25c2d35eef

                                                                                          • C:\Users\Admin\AppData\Local\Temp\1000042001\a676c9467d.exe

                                                                                            Filesize

                                                                                            3.1MB

                                                                                            MD5

                                                                                            f26e4bf5883810d4107c9f9bb8951b41

                                                                                            SHA1

                                                                                            e941ba19ec8515715cdfed9008112d961bd5f7ac

                                                                                            SHA256

                                                                                            2296081c0c608e5b92be1da4affa13869da6974a21247ffca4b9353e3f1e6faa

                                                                                            SHA512

                                                                                            74481ab2840bb5a7dcb27f689e0fe8c99b46b4d50cf5eb322e47eb8bb3bee3bf024d8a46defaa042ae92e8a730859bca93625ec517675e212bf596c3c9c9ddca

                                                                                          • C:\Users\Admin\AppData\Local\Temp\1000044001\go.exe

                                                                                            Filesize

                                                                                            894KB

                                                                                            MD5

                                                                                            2f8912af892c160c1c24c9f38a60c1ab

                                                                                            SHA1

                                                                                            d2deae508e262444a8f15c29ebcc7ebbe08a3fdb

                                                                                            SHA256

                                                                                            59ff8e0aa665fbbf749c7548906a655cb1869bb58a3b7546efa5b416d19e6308

                                                                                            SHA512

                                                                                            0395383bde98d358b0a7f2224f903dff026ce0c6d90feb49ac0e6993ef692143b0eb25da84d9cdc9e7b373a7b75a6dbaef14746eda1bff165d59f07ca51a16bb

                                                                                          • C:\Users\Admin\AppData\Local\Temp\1000046001\amert.exe

                                                                                            Filesize

                                                                                            1.9MB

                                                                                            MD5

                                                                                            99d87d15808682f890b59112a17d2be2

                                                                                            SHA1

                                                                                            83671e751cc4412dae847fb338fd2d816517fabf

                                                                                            SHA256

                                                                                            c56be2bf1b0aa2b313d51bea802b4679d799dfab2ecf20c06ccb9dfbad1542ce

                                                                                            SHA512

                                                                                            a56ab85e878549faed67bd959b2c060ecd8f6e0e70c8135b3a634233d64ad10615ceb45a4c4f74d9b175eaa078af8ae220e660562fd1851812d0fece33b843b0

                                                                                          • C:\Users\Admin\AppData\Local\Temp\1000183001\Uni400uni.exe

                                                                                            Filesize

                                                                                            379KB

                                                                                            MD5

                                                                                            b264fee6ed0c634983be2b7ea4f854e6

                                                                                            SHA1

                                                                                            f125a58da078e64b0bccc7012e341eefbe67ed0b

                                                                                            SHA256

                                                                                            b443e71c000e0750a88e821dfcc804c8357a5017c12fa3e71256c486d93c6362

                                                                                            SHA512

                                                                                            0ee197acf5e2c46657ab85959baf5b3d194b28bc266c3dd1373a331654d7ab7b5abfe796910a6856d4833d26ddcbfa45a3d00a03664f349cc47c0f31dcfcc1ee

                                                                                          • C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe

                                                                                            Filesize

                                                                                            1.7MB

                                                                                            MD5

                                                                                            85a15f080b09acace350ab30460c8996

                                                                                            SHA1

                                                                                            3fc515e60e4cfa5b3321f04a96c7fb463e4b9d02

                                                                                            SHA256

                                                                                            3a2006bc835a8ffe91b9ee9206f630b3172f42e090f4e8d90be620e540f5ef6b

                                                                                            SHA512

                                                                                            ade5e3531dfa1a01e6c2a69deb2962cbf619e766da3d6e8e3453f70ff55ccbcbe21381c7b97a53d67e1ca88975f4409b1a42a759e18f806171d29e4c3f250e9f

                                                                                          • C:\Users\Admin\AppData\Local\Temp\1001039001\redlinepanel.exe

                                                                                            Filesize

                                                                                            301KB

                                                                                            MD5

                                                                                            832eb4dc3ed8ceb9a1735bd0c7acaf1b

                                                                                            SHA1

                                                                                            b622a406927fbb8f6cd5081bd4455fb831948fca

                                                                                            SHA256

                                                                                            2a82243697e2eec45bedc754adcdc1f6f41724a40c6d7d96fd41ad144899b6f7

                                                                                            SHA512

                                                                                            3ab8b25732a7152608be101a3daf0d55833c554ab968be8b3b79a49e1831f3ee0eeeb9586a3334fa387b1f160fd15e98a80dcfece559c9c257b44ef962874894

                                                                                          • C:\Users\Admin\AppData\Local\Temp\1001040001\32456.exe

                                                                                            Filesize

                                                                                            499KB

                                                                                            MD5

                                                                                            83d0b41c7a3a0d29a268b49a313c5de5

                                                                                            SHA1

                                                                                            46f3251c771b67b40b1f3268caef8046174909a5

                                                                                            SHA256

                                                                                            09cc3364d5e1c15228822926bc65ce290c487dc3b7c0345bf265538110fa9cc9

                                                                                            SHA512

                                                                                            705ecc7c421338e37ed0d58c2d9fad03fb3565db422a0c9d895e75a399bf5f2a70cfe3ffdc860ffe010d4d1a213e0a844aeadb89ea8e0c830a2fc8c03b7669b5

                                                                                          • C:\Users\Admin\AppData\Local\Temp\1001053001\goldprimeldlldf.exe

                                                                                            Filesize

                                                                                            464KB

                                                                                            MD5

                                                                                            c084d6f6ba40534fbfc5a64b21ef99ab

                                                                                            SHA1

                                                                                            0b4a17da83c0a8abbc8fab321931d5447b32b720

                                                                                            SHA256

                                                                                            afd83290a2adb219c3f1b8fbf23c27b0994fe76dfbb7dc0b416530dc0e21f624

                                                                                            SHA512

                                                                                            a5384a2f7029cf946fde44e1ff30775754ce525ca5a6fdac14184872b6e684cb6e585053cb86d32f82cbd3db48eb195ba3a642d8ee3774be579fccd993938ca1

                                                                                          • C:\Users\Admin\AppData\Local\Temp\1001059001\NewB.exe

                                                                                            Filesize

                                                                                            418KB

                                                                                            MD5

                                                                                            0099a99f5ffb3c3ae78af0084136fab3

                                                                                            SHA1

                                                                                            0205a065728a9ec1133e8a372b1e3864df776e8c

                                                                                            SHA256

                                                                                            919ae827ff59fcbe3dbaea9e62855a4d27690818189f696cfb5916a88c823226

                                                                                            SHA512

                                                                                            5ac4f3265c7dd7d172284fb28c94f8fc6428c27853e70989f4ec4208f9897be91720e8eee1906d8e843ab05798f3279a12492a32e8a118f5621ac5e1be2031b6

                                                                                          • C:\Users\Admin\AppData\Local\Temp\1001073001\swiiiii.exe

                                                                                            Filesize

                                                                                            321KB

                                                                                            MD5

                                                                                            1c7d0f34bb1d85b5d2c01367cc8f62ef

                                                                                            SHA1

                                                                                            33aedadb5361f1646cffd68791d72ba5f1424114

                                                                                            SHA256

                                                                                            e9e09c5e5d03d21fca820bd9b0a0ea7b86ab9e85cdc9996f8f1dc822b0cc801c

                                                                                            SHA512

                                                                                            53bf85d2b004f69bbbf7b6dc78e5f021aba71b6f814101c55d3bf76e6d058a973bc58270b6b621b2100c6e02d382f568d1e96024464e8ea81e6db8ccd948679d

                                                                                          • C:\Users\Admin\AppData\Local\Temp\1001078001\koooooo.exe

                                                                                            Filesize

                                                                                            379KB

                                                                                            MD5

                                                                                            90f41880d631e243cec086557cb74d63

                                                                                            SHA1

                                                                                            cb385e4172cc227ba72baf29ca1c4411fa99a26d

                                                                                            SHA256

                                                                                            23b62a27e3f5c424b16f31e5009af4f24c8bd13b1f035f87879e2a29236be7a0

                                                                                            SHA512

                                                                                            eeb85b34aa66a7e9a1b1807012999ee439433df23126a52ffa8d4b3cb2026be3bcf63ca25f143de58ba929c0d4feeaf2a603fd6ec6b5379fc48147c22f3783e3

                                                                                          • C:\Users\Admin\AppData\Local\Temp\280069375290_Desktop.zip

                                                                                            Filesize

                                                                                            193KB

                                                                                            MD5

                                                                                            1dfaa6ba81b9349d0bedc06a69131f64

                                                                                            SHA1

                                                                                            59dc4b2c1a74278a7d306d0ccd22b27f4d12d360

                                                                                            SHA256

                                                                                            f09e4840ed625a1a5c4930d45bda2b1ce782f4c003e5c1b26364274138b4ca32

                                                                                            SHA512

                                                                                            3ab8ec4346c1f75abaf55a3a86251d743f2601405b41f934027bce4ebb9c2c8a85b3910b47815373e74c46aaadbd7e687bfc94a9892ff64ddf3fb41b8b1953e2

                                                                                          • C:\Users\Admin\AppData\Local\Temp\Tmp11AE.tmp

                                                                                            Filesize

                                                                                            2KB

                                                                                            MD5

                                                                                            1420d30f964eac2c85b2ccfe968eebce

                                                                                            SHA1

                                                                                            bdf9a6876578a3e38079c4f8cf5d6c79687ad750

                                                                                            SHA256

                                                                                            f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9

                                                                                            SHA512

                                                                                            6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8

                                                                                          • C:\Users\Admin\AppData\Local\Temp\_Files_\ImportUndo.txt

                                                                                            Filesize

                                                                                            193KB

                                                                                            MD5

                                                                                            ae69dbb257e97be5c2389281d684d7f2

                                                                                            SHA1

                                                                                            ec6de51264b535c924d1ba000d52385d1660ba02

                                                                                            SHA256

                                                                                            699ab6393d9a9aa834155b8903da858ac8fa7c873adec0ae58d7e310c350d474

                                                                                            SHA512

                                                                                            ec2fb21f98f7314d35a370a76ad80e06e8a9b116e91ba18744f5251a1533f7eb4e04269f557beb6766053379f6e4f5b57dbe61e77814841acf16464fe2ffd6d4

                                                                                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_wfjguhbd.s5n.ps1

                                                                                            Filesize

                                                                                            60B

                                                                                            MD5

                                                                                            d17fe0a3f47be24a6453e9ef58c94641

                                                                                            SHA1

                                                                                            6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                            SHA256

                                                                                            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                            SHA512

                                                                                            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                          • C:\Users\Admin\AppData\Local\Temp\tmp315E.tmp

                                                                                            Filesize

                                                                                            46KB

                                                                                            MD5

                                                                                            02d2c46697e3714e49f46b680b9a6b83

                                                                                            SHA1

                                                                                            84f98b56d49f01e9b6b76a4e21accf64fd319140

                                                                                            SHA256

                                                                                            522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

                                                                                            SHA512

                                                                                            60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

                                                                                          • C:\Users\Admin\AppData\Local\Temp\tmp322D.tmp

                                                                                            Filesize

                                                                                            46KB

                                                                                            MD5

                                                                                            14ccc9293153deacbb9a20ee8f6ff1b7

                                                                                            SHA1

                                                                                            46b4d7b004ff4f1f40ad9f107fe7c7e3abc9a9f3

                                                                                            SHA256

                                                                                            3195ce0f7aa2eae2b21c447f264e2bd4e1dc5208353ac72d964a750de9a83511

                                                                                            SHA512

                                                                                            916f2178be05dc329461d2739271972238b22052b5935883da31e6c98d2697bd2435c9f6a2d1fcafb4811a1d867c761055532669aac2ea1a3a78c346cdeba765

                                                                                          • C:\Users\Admin\AppData\Local\Temp\tmp326E.tmp

                                                                                            Filesize

                                                                                            112KB

                                                                                            MD5

                                                                                            87210e9e528a4ddb09c6b671937c79c6

                                                                                            SHA1

                                                                                            3c75314714619f5b55e25769e0985d497f0062f2

                                                                                            SHA256

                                                                                            eeb23424586eb7bc62b51b19f1719c6571b71b167f4d63f25984b7f5c5436db1

                                                                                            SHA512

                                                                                            f8cb8098dc8d478854cddddeac3396bc7b602c4d0449491ecacea7b9106672f36b55b377c724dc6881bee407c6b6c5c3352495ed4b852dd578aa3643a43e37c0

                                                                                          • C:\Users\Admin\AppData\Local\Temp\u1hk.0.exe

                                                                                            Filesize

                                                                                            268KB

                                                                                            MD5

                                                                                            ef751b80a42cd2fc3698cf8bceda78a4

                                                                                            SHA1

                                                                                            70b20c0706a1721709cec6e9d20addf820f63911

                                                                                            SHA256

                                                                                            e652752dd282605cafbb129f0cae5dc95e6f67e27502cdf11a872b451328cc9f

                                                                                            SHA512

                                                                                            7d3ba7189dd34a15dddec8e96273f0107f28d818ff6ec3fd7b61631421e3f0f1b095816703684399ad59deae8418ac36791d4983aac815987fd64509f656e32e

                                                                                          • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                                                                                            Filesize

                                                                                            1.2MB

                                                                                            MD5

                                                                                            92fbdfccf6a63acef2743631d16652a7

                                                                                            SHA1

                                                                                            971968b1378dd89d59d7f84bf92f16fc68664506

                                                                                            SHA256

                                                                                            b4588feacc183cd5a089f9bb950827b75df04bd5a6e67c95ff258e4a34aa0d72

                                                                                            SHA512

                                                                                            b8ea216d4a59d8858fd4128abb555f8dcf3acca9138e663b488f09dc5200db6dc11ecc235a355e801145bbbb44d7beac6147949d75d78b32fe9cfd2fa200d117

                                                                                          • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                                                                                            Filesize

                                                                                            109KB

                                                                                            MD5

                                                                                            726cd06231883a159ec1ce28dd538699

                                                                                            SHA1

                                                                                            404897e6a133d255ad5a9c26ac6414d7134285a2

                                                                                            SHA256

                                                                                            12fef2d5995d671ec0e91bdbdc91e2b0d3c90ed3a8b2b13ddaa8ad64727dcd46

                                                                                            SHA512

                                                                                            9ea82e7cb6c6a58446bd5033855947c3e2d475d2910f2b941235e0b96aa08eec822d2dd17cc86b2d3fce930f78b799291992408e309a6c63e3011266810ea83e

                                                                                          • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

                                                                                            Filesize

                                                                                            1.2MB

                                                                                            MD5

                                                                                            15a42d3e4579da615a384c717ab2109b

                                                                                            SHA1

                                                                                            22aeedeb2307b1370cdab70d6a6b6d2c13ad2301

                                                                                            SHA256

                                                                                            3c97bb410e49b11af8116feb7240b7101e1967cae7538418c45c3d2e072e8103

                                                                                            SHA512

                                                                                            1eb7f126dccc88a2479e3818c36120f5af3caa0d632b9ea803485ee6531d6e2a1fd0805b1c4364983d280df23ea5ca3ad4a5fca558ac436efae36af9b795c444

                                                                                          • C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe

                                                                                            Filesize

                                                                                            541KB

                                                                                            MD5

                                                                                            1fc4b9014855e9238a361046cfbf6d66

                                                                                            SHA1

                                                                                            c17f18c8246026c9979ab595392a14fe65cc5e9f

                                                                                            SHA256

                                                                                            f38c27ecbeed9721f0885d3b2f2f767d60a5d1c0a5c98433357f570987da3e50

                                                                                            SHA512

                                                                                            2af234cac24ec4a508693d9affa7f759d4b29bb3c9ddffd9e6350959fd4da26501553399d2b02a8eeae8dace6bfe9b2ce50462ce3c6547497f5b0ea6ed226b12

                                                                                          • C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe

                                                                                            Filesize

                                                                                            304KB

                                                                                            MD5

                                                                                            cc90e3326d7b20a33f8037b9aab238e4

                                                                                            SHA1

                                                                                            236d173a6ac462d85de4e866439634db3b9eeba3

                                                                                            SHA256

                                                                                            bd73ee49a23901f9fb235f8a5b29adc72cc637ad4b62a9760c306900cb1678b7

                                                                                            SHA512

                                                                                            b5d197a05a267bf66509b6d976924cd6f5963532a9f9f22d1763701d4fba3dfa971e0058388249409884bc29216fb33a51846562a5650f81d99ce14554861521

                                                                                          • C:\Users\Admin\Pictures\7LmB5rINVXUwZKV1DkS323UG.exe

                                                                                            Filesize

                                                                                            409KB

                                                                                            MD5

                                                                                            7221048962d30904a07f1d4b2fd8558b

                                                                                            SHA1

                                                                                            107a70afb5a0716747cc9a4685d1f9363e07e07e

                                                                                            SHA256

                                                                                            2039109bfac96d1adcbbf0e8a08d3ac9e161de4b8cce5b26efef0894f4f46d8d

                                                                                            SHA512

                                                                                            c1fea24f1dfc41e192d6302aec25af9e3146cfa84b03fc01d09caaf6d60a9879e9581987dee74683fbc6328b1845143dd9f492a3a0fb907c3b749f4919e737cf

                                                                                          • C:\Users\Admin\Pictures\IDUKcATpjpJJOgXKqfHPzBcr.exe

                                                                                            Filesize

                                                                                            3KB

                                                                                            MD5

                                                                                            fc50a20840d051860fe827f1a1948b6c

                                                                                            SHA1

                                                                                            bfb817be97b8aef1439b1ebf684c40aa6622092b

                                                                                            SHA256

                                                                                            421858ccb526575e47ca9f97ceda0f06d5c727ee50ed13337a7c0fef3c62e1c7

                                                                                            SHA512

                                                                                            e9672a6a009a1babdc4aaace8ab95266f2d360c0b0bec4c3c97fb839e89b393f4cc7fb8a44144f40001473f0f7a38a4b3a466add5b13e687cbf3aface20e872b

                                                                                          • C:\Users\Admin\Pictures\oc4S2i6JMsRBXhW6eLMT4xyk.exe

                                                                                            Filesize

                                                                                            3KB

                                                                                            MD5

                                                                                            d52b8b9e131de97f31366f4dbad40005

                                                                                            SHA1

                                                                                            137f76ca08e5e09e88f7ef2fdb078e2b023f6953

                                                                                            SHA256

                                                                                            4000b3d6094cc815ab3e0da6733e349698dadfa3920635ffaac34e62481c1990

                                                                                            SHA512

                                                                                            ffe0b72e548a18a4451dbdfb5f30142b252f5dfa691caa0870f2a77e5c78c48a06788189a99e1d01e814865d4e735ebacd2ee276ad40644d7210bac2f1a05ccc

                                                                                          • C:\Users\Admin\Pictures\pWrp5B1K7Sn6R5dhLCUuZr16.exe

                                                                                            Filesize

                                                                                            7KB

                                                                                            MD5

                                                                                            5b423612b36cde7f2745455c5dd82577

                                                                                            SHA1

                                                                                            0187c7c80743b44e9e0c193e993294e3b969cc3d

                                                                                            SHA256

                                                                                            e0840d2ea74a00dcc545d770b91d9d889e5a82c7bedf1b989e0a89db04685b09

                                                                                            SHA512

                                                                                            c26a1e7e96dbd178d961c630abd8e564ef69532f386fb198eb20119a88ecab2fe885d71ac0c90687c18910ce00c445f352a5e8fbf5328f3403964f7c7802414c

                                                                                          • \??\pipe\LOCAL\crashpad_2520_EEKEGFSNKIKCOBRY

                                                                                            MD5

                                                                                            d41d8cd98f00b204e9800998ecf8427e

                                                                                            SHA1

                                                                                            da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                                                            SHA256

                                                                                            e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                                                            SHA512

                                                                                            cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                                                                          • memory/2416-704-0x0000000000400000-0x0000000000450000-memory.dmp

                                                                                            Filesize

                                                                                            320KB

                                                                                          • memory/2632-65-0x0000000000400000-0x00000000007C3000-memory.dmp

                                                                                            Filesize

                                                                                            3.8MB

                                                                                          • memory/2632-68-0x0000000000400000-0x00000000007C3000-memory.dmp

                                                                                            Filesize

                                                                                            3.8MB

                                                                                          • memory/2632-79-0x0000000000400000-0x00000000007C3000-memory.dmp

                                                                                            Filesize

                                                                                            3.8MB

                                                                                          • memory/2632-77-0x0000000000400000-0x00000000007C3000-memory.dmp

                                                                                            Filesize

                                                                                            3.8MB

                                                                                          • memory/2632-75-0x0000000000400000-0x00000000007C3000-memory.dmp

                                                                                            Filesize

                                                                                            3.8MB

                                                                                          • memory/2632-89-0x0000000000400000-0x00000000007C3000-memory.dmp

                                                                                            Filesize

                                                                                            3.8MB

                                                                                          • memory/2632-80-0x0000000000400000-0x00000000007C3000-memory.dmp

                                                                                            Filesize

                                                                                            3.8MB

                                                                                          • memory/2632-90-0x0000000000400000-0x00000000007C3000-memory.dmp

                                                                                            Filesize

                                                                                            3.8MB

                                                                                          • memory/2632-93-0x0000000000400000-0x00000000007C3000-memory.dmp

                                                                                            Filesize

                                                                                            3.8MB

                                                                                          • memory/2632-99-0x0000000000400000-0x00000000007C3000-memory.dmp

                                                                                            Filesize

                                                                                            3.8MB

                                                                                          • memory/2632-103-0x0000000000400000-0x00000000007C3000-memory.dmp

                                                                                            Filesize

                                                                                            3.8MB

                                                                                          • memory/2632-76-0x0000000000400000-0x00000000007C3000-memory.dmp

                                                                                            Filesize

                                                                                            3.8MB

                                                                                          • memory/2632-111-0x0000000000400000-0x00000000007C3000-memory.dmp

                                                                                            Filesize

                                                                                            3.8MB

                                                                                          • memory/2632-112-0x0000000000400000-0x00000000007C3000-memory.dmp

                                                                                            Filesize

                                                                                            3.8MB

                                                                                          • memory/2632-113-0x0000000000400000-0x00000000007C3000-memory.dmp

                                                                                            Filesize

                                                                                            3.8MB

                                                                                          • memory/2632-115-0x0000000000400000-0x00000000007C3000-memory.dmp

                                                                                            Filesize

                                                                                            3.8MB

                                                                                          • memory/2632-116-0x0000000000400000-0x00000000007C3000-memory.dmp

                                                                                            Filesize

                                                                                            3.8MB

                                                                                          • memory/2632-74-0x0000000000400000-0x00000000007C3000-memory.dmp

                                                                                            Filesize

                                                                                            3.8MB

                                                                                          • memory/2632-72-0x0000000000400000-0x00000000007C3000-memory.dmp

                                                                                            Filesize

                                                                                            3.8MB

                                                                                          • memory/2632-73-0x0000000000400000-0x00000000007C3000-memory.dmp

                                                                                            Filesize

                                                                                            3.8MB

                                                                                          • memory/2632-71-0x0000000000400000-0x00000000007C3000-memory.dmp

                                                                                            Filesize

                                                                                            3.8MB

                                                                                          • memory/2632-70-0x0000000000400000-0x00000000007C3000-memory.dmp

                                                                                            Filesize

                                                                                            3.8MB

                                                                                          • memory/2632-69-0x0000000000400000-0x00000000007C3000-memory.dmp

                                                                                            Filesize

                                                                                            3.8MB

                                                                                          • memory/2632-78-0x0000000000400000-0x00000000007C3000-memory.dmp

                                                                                            Filesize

                                                                                            3.8MB

                                                                                          • memory/2632-67-0x0000000000400000-0x00000000007C3000-memory.dmp

                                                                                            Filesize

                                                                                            3.8MB

                                                                                          • memory/2632-54-0x0000000000400000-0x00000000007C3000-memory.dmp

                                                                                            Filesize

                                                                                            3.8MB

                                                                                          • memory/2632-66-0x0000000000400000-0x00000000007C3000-memory.dmp

                                                                                            Filesize

                                                                                            3.8MB

                                                                                          • memory/2632-58-0x0000000000400000-0x00000000007C3000-memory.dmp

                                                                                            Filesize

                                                                                            3.8MB

                                                                                          • memory/2632-59-0x0000000000DB0000-0x000000000127B000-memory.dmp

                                                                                            Filesize

                                                                                            4.8MB

                                                                                          • memory/2632-60-0x0000000000400000-0x00000000007C3000-memory.dmp

                                                                                            Filesize

                                                                                            3.8MB

                                                                                          • memory/2632-424-0x0000000000400000-0x00000000007C3000-memory.dmp

                                                                                            Filesize

                                                                                            3.8MB

                                                                                          • memory/2632-426-0x0000000000400000-0x00000000007C3000-memory.dmp

                                                                                            Filesize

                                                                                            3.8MB

                                                                                          • memory/2632-61-0x0000000000400000-0x00000000007C3000-memory.dmp

                                                                                            Filesize

                                                                                            3.8MB

                                                                                          • memory/2632-64-0x0000000000400000-0x00000000007C3000-memory.dmp

                                                                                            Filesize

                                                                                            3.8MB

                                                                                          • memory/2632-63-0x0000000000400000-0x00000000007C3000-memory.dmp

                                                                                            Filesize

                                                                                            3.8MB

                                                                                          • memory/2632-62-0x0000000000400000-0x00000000007C3000-memory.dmp

                                                                                            Filesize

                                                                                            3.8MB

                                                                                          • memory/2824-457-0x0000000000270000-0x000000000073C000-memory.dmp

                                                                                            Filesize

                                                                                            4.8MB

                                                                                          • memory/2824-458-0x0000000000270000-0x000000000073C000-memory.dmp

                                                                                            Filesize

                                                                                            4.8MB

                                                                                          • memory/2824-459-0x0000000004D40000-0x0000000004D41000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/2824-460-0x0000000004D30000-0x0000000004D31000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/2824-461-0x0000000004D70000-0x0000000004D71000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/2824-990-0x0000000000270000-0x000000000073C000-memory.dmp

                                                                                            Filesize

                                                                                            4.8MB

                                                                                          • memory/2824-463-0x0000000004D20000-0x0000000004D21000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/2824-462-0x0000000004D10000-0x0000000004D11000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/2824-664-0x0000000000270000-0x000000000073C000-memory.dmp

                                                                                            Filesize

                                                                                            4.8MB

                                                                                          • memory/2920-471-0x0000000004F40000-0x0000000004F41000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/2920-473-0x0000000004EF0000-0x0000000004EF1000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/2920-466-0x0000000000DB0000-0x000000000127B000-memory.dmp

                                                                                            Filesize

                                                                                            4.8MB

                                                                                          • memory/2920-467-0x0000000000DB0000-0x000000000127B000-memory.dmp

                                                                                            Filesize

                                                                                            4.8MB

                                                                                          • memory/2920-469-0x0000000004F20000-0x0000000004F21000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/2920-468-0x0000000004F10000-0x0000000004F11000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/2920-470-0x0000000004F00000-0x0000000004F01000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/2920-485-0x0000000000DB0000-0x000000000127B000-memory.dmp

                                                                                            Filesize

                                                                                            4.8MB

                                                                                          • memory/2920-472-0x0000000004EE0000-0x0000000004EE1000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/3044-917-0x0000000000400000-0x000000000044C000-memory.dmp

                                                                                            Filesize

                                                                                            304KB

                                                                                          • memory/3044-912-0x0000000000400000-0x000000000044C000-memory.dmp

                                                                                            Filesize

                                                                                            304KB

                                                                                          • memory/3428-1015-0x0000000000D10000-0x00000000010D3000-memory.dmp

                                                                                            Filesize

                                                                                            3.8MB

                                                                                          • memory/3428-53-0x0000000000D10000-0x00000000010D3000-memory.dmp

                                                                                            Filesize

                                                                                            3.8MB

                                                                                          • memory/3428-425-0x0000000000D10000-0x00000000010D3000-memory.dmp

                                                                                            Filesize

                                                                                            3.8MB

                                                                                          • memory/3428-51-0x0000000000D10000-0x00000000010D3000-memory.dmp

                                                                                            Filesize

                                                                                            3.8MB

                                                                                          • memory/3428-377-0x0000000000D10000-0x00000000010D3000-memory.dmp

                                                                                            Filesize

                                                                                            3.8MB

                                                                                          • memory/3428-376-0x0000000000D10000-0x00000000010D3000-memory.dmp

                                                                                            Filesize

                                                                                            3.8MB

                                                                                          • memory/3428-453-0x0000000000D10000-0x00000000010D3000-memory.dmp

                                                                                            Filesize

                                                                                            3.8MB

                                                                                          • memory/3428-662-0x0000000000D10000-0x00000000010D3000-memory.dmp

                                                                                            Filesize

                                                                                            3.8MB

                                                                                          • memory/3428-465-0x0000000000D10000-0x00000000010D3000-memory.dmp

                                                                                            Filesize

                                                                                            3.8MB

                                                                                          • memory/3556-836-0x0000000000400000-0x000000000044C000-memory.dmp

                                                                                            Filesize

                                                                                            304KB

                                                                                          • memory/3556-828-0x0000000000400000-0x000000000044C000-memory.dmp

                                                                                            Filesize

                                                                                            304KB

                                                                                          • memory/3784-56-0x0000000000DB0000-0x000000000127B000-memory.dmp

                                                                                            Filesize

                                                                                            4.8MB

                                                                                          • memory/3784-31-0x0000000004AF0000-0x0000000004AF1000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/3784-26-0x0000000004AB0000-0x0000000004AB1000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/3784-27-0x0000000004A90000-0x0000000004A91000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/3784-247-0x0000000000DB0000-0x000000000127B000-memory.dmp

                                                                                            Filesize

                                                                                            4.8MB

                                                                                          • memory/3784-24-0x0000000000DB0000-0x000000000127B000-memory.dmp

                                                                                            Filesize

                                                                                            4.8MB

                                                                                          • memory/3784-454-0x0000000000DB0000-0x000000000127B000-memory.dmp

                                                                                            Filesize

                                                                                            4.8MB

                                                                                          • memory/3784-28-0x0000000004AD0000-0x0000000004AD1000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/3784-427-0x0000000000DB0000-0x000000000127B000-memory.dmp

                                                                                            Filesize

                                                                                            4.8MB

                                                                                          • memory/3784-25-0x0000000004AA0000-0x0000000004AA1000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/3784-681-0x0000000000DB0000-0x000000000127B000-memory.dmp

                                                                                            Filesize

                                                                                            4.8MB

                                                                                          • memory/3784-29-0x0000000004A70000-0x0000000004A71000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/3784-30-0x0000000004A80000-0x0000000004A81000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/3784-1075-0x0000000000DB0000-0x000000000127B000-memory.dmp

                                                                                            Filesize

                                                                                            4.8MB

                                                                                          • memory/3784-396-0x0000000000DB0000-0x000000000127B000-memory.dmp

                                                                                            Filesize

                                                                                            4.8MB

                                                                                          • memory/3784-496-0x0000000000DB0000-0x000000000127B000-memory.dmp

                                                                                            Filesize

                                                                                            4.8MB

                                                                                          • memory/3784-230-0x0000000000DB0000-0x000000000127B000-memory.dmp

                                                                                            Filesize

                                                                                            4.8MB

                                                                                          • memory/3784-32-0x0000000004B00000-0x0000000004B01000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/3784-23-0x0000000000DB0000-0x000000000127B000-memory.dmp

                                                                                            Filesize

                                                                                            4.8MB

                                                                                          • memory/3980-873-0x0000000000400000-0x0000000000408000-memory.dmp

                                                                                            Filesize

                                                                                            32KB

                                                                                          • memory/4372-22-0x0000000000020000-0x00000000004EB000-memory.dmp

                                                                                            Filesize

                                                                                            4.8MB

                                                                                          • memory/4372-2-0x0000000000020000-0x00000000004EB000-memory.dmp

                                                                                            Filesize

                                                                                            4.8MB

                                                                                          • memory/4372-9-0x0000000004C60000-0x0000000004C61000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/4372-0-0x0000000000020000-0x00000000004EB000-memory.dmp

                                                                                            Filesize

                                                                                            4.8MB

                                                                                          • memory/4372-1-0x0000000076ED6000-0x0000000076ED8000-memory.dmp

                                                                                            Filesize

                                                                                            8KB

                                                                                          • memory/4372-4-0x0000000004C10000-0x0000000004C11000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/4372-5-0x0000000004BF0000-0x0000000004BF1000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/4372-3-0x0000000004C00000-0x0000000004C01000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/4372-7-0x0000000004BD0000-0x0000000004BD1000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/4372-6-0x0000000004C30000-0x0000000004C31000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/4372-10-0x0000000004C50000-0x0000000004C51000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/4372-8-0x0000000004BE0000-0x0000000004BE1000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/5188-631-0x00000000009C0000-0x0000000000E8B000-memory.dmp

                                                                                            Filesize

                                                                                            4.8MB

                                                                                          • memory/5524-270-0x0000000000D70000-0x000000000123C000-memory.dmp

                                                                                            Filesize

                                                                                            4.8MB

                                                                                          • memory/5524-309-0x00000000055D0000-0x00000000055D1000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/5524-239-0x0000000000D70000-0x000000000123C000-memory.dmp

                                                                                            Filesize

                                                                                            4.8MB

                                                                                          • memory/5524-319-0x0000000000D70000-0x000000000123C000-memory.dmp

                                                                                            Filesize

                                                                                            4.8MB

                                                                                          • memory/5524-254-0x0000000005570000-0x0000000005571000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/5524-256-0x0000000005550000-0x0000000005551000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/5524-255-0x00000000055B0000-0x00000000055B1000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/5524-268-0x0000000005590000-0x0000000005591000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/5524-267-0x0000000005560000-0x0000000005561000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/5524-308-0x00000000055E0000-0x00000000055E1000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/5524-248-0x0000000005580000-0x0000000005581000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/5784-290-0x000002A86BE80000-0x000002A86BEA2000-memory.dmp

                                                                                            Filesize

                                                                                            136KB

                                                                                          • memory/5784-298-0x00007FFFB6D70000-0x00007FFFB7832000-memory.dmp

                                                                                            Filesize

                                                                                            10.8MB

                                                                                          • memory/5784-305-0x000002A86BED0000-0x000002A86BEE0000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/5784-306-0x000002A86BED0000-0x000002A86BEE0000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/5784-368-0x00007FFFB6D70000-0x00007FFFB7832000-memory.dmp

                                                                                            Filesize

                                                                                            10.8MB

                                                                                          • memory/5784-310-0x000002A86BED0000-0x000002A86BEE0000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/5784-358-0x000002A86BEC0000-0x000002A86BECA000-memory.dmp

                                                                                            Filesize

                                                                                            40KB

                                                                                          • memory/5784-357-0x000002A86BF20000-0x000002A86BF32000-memory.dmp

                                                                                            Filesize

                                                                                            72KB

                                                                                          • memory/5948-524-0x0000000000400000-0x0000000000592000-memory.dmp

                                                                                            Filesize

                                                                                            1.6MB

                                                                                          • memory/6088-682-0x0000000000400000-0x00000000007C3000-memory.dmp

                                                                                            Filesize

                                                                                            3.8MB

                                                                                          • memory/6088-1073-0x0000000000400000-0x00000000007C3000-memory.dmp

                                                                                            Filesize

                                                                                            3.8MB