Analysis

  • max time kernel
    99s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-04-2024 16:05

General

  • Target

    03025185db7ff2b3f7faeeb2f600274a8c87011ae7c2771f11df5be956a228e0.exe

  • Size

    1.8MB

  • MD5

    6dca2e803f570d076689d40d1de040c1

  • SHA1

    0db4712005184022c7b9b61a9d58caffaf7b784b

  • SHA256

    03025185db7ff2b3f7faeeb2f600274a8c87011ae7c2771f11df5be956a228e0

  • SHA512

    24669394b81cb57f40c28dfe72aef2983725341bba0433ad5a721bb7379ea1b3d361d4ba3ac05be96bce098d90efd56145df07d50bf6d9bf2add2274f0fa7cfb

  • SSDEEP

    49152:LhNBaJExGIvaPQGFL2wHLs79l1TEGP11yC5+aWemYdLMMLhMM:LhfGExhaPQeeX1YGIVTY/LhJ

Malware Config

Extracted

Family

amadey

Version

4.17

C2

http://193.233.132.167

Attributes
  • install_dir

    4d0ab15804

  • install_file

    chrosha.exe

  • strings_key

    1a9519d7b465e1f4880fa09a6162d768

  • url_paths

    /enigma/index.php

rc4.plain

Extracted

Family

redline

Botnet

@CLOUDYTTEAM

C2

185.172.128.33:8970

Extracted

Family

stealc

C2

http://52.143.157.84

Attributes
  • url_path

    /c73eed764cc59dcb.php

Extracted

Family

lumma

C2

https://affordcharmcropwo.shop/api

https://cleartotalfisherwo.shop/api

https://worryfillvolcawoi.shop/api

https://enthusiasimtitleow.shop/api

https://dismissalcylinderhostw.shop/api

https://diskretainvigorousiw.shop/api

https://communicationgenerwo.shop/api

https://pillowbrocccolipe.shop/api

https://productivelookewr.shop/api

https://tolerateilusidjukl.shop/api

https://shatterbreathepsw.shop/api

https://shortsvelventysjo.shop/api

https://incredibleextedwj.shop/api

https://alcojoldwograpciw.shop/api

https://liabilitynighstjsko.shop/api

https://demonstationfukewko.shop/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect ZGRat V1 4 IoCs
  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 12 IoCs
  • Lumma Stealer

    An infostealer written in C++ first seen in August 2022.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • UAC bypass 3 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 2 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Modifies Windows Firewall 2 TTPs 3 IoCs
  • Stops running service(s) 3 TTPs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 17 IoCs
  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 3 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • Drops file in Windows directory 1 IoCs
  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 9 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 37 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\03025185db7ff2b3f7faeeb2f600274a8c87011ae7c2771f11df5be956a228e0.exe
    "C:\Users\Admin\AppData\Local\Temp\03025185db7ff2b3f7faeeb2f600274a8c87011ae7c2771f11df5be956a228e0.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    PID:740
  • C:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exe
    C:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exe
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Executes dropped EXE
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3736
    • C:\Users\Admin\AppData\Local\Temp\1000147001\swiiiii.exe
      "C:\Users\Admin\AppData\Local\Temp\1000147001\swiiiii.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1620
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        3⤵
          PID:2536
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1620 -s 868
          3⤵
          • Program crash
          PID:3980
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll, Main
        2⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:4332
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll, Main
          3⤵
          • Blocklisted process makes network request
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:800
          • C:\Windows\system32\netsh.exe
            netsh wlan show profiles
            4⤵
              PID:1268
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\084619521222_Desktop.zip' -CompressionLevel Optimal
              4⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:5028
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main
          2⤵
          • Blocklisted process makes network request
          • Loads dropped DLL
          PID:4444
        • C:\Users\Admin\AppData\Local\Temp\1000148001\alexxxxxxxx.exe
          "C:\Users\Admin\AppData\Local\Temp\1000148001\alexxxxxxxx.exe"
          2⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:4988
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            3⤵
            • Checks computer location settings
            • Suspicious use of WriteProcessMemory
            PID:3660
            • C:\Users\Admin\AppData\Roaming\configurationValue\keks.exe
              "C:\Users\Admin\AppData\Roaming\configurationValue\keks.exe"
              4⤵
              • Executes dropped EXE
              • Modifies system certificate store
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3576
            • C:\Users\Admin\AppData\Roaming\configurationValue\trf.exe
              "C:\Users\Admin\AppData\Roaming\configurationValue\trf.exe"
              4⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3400
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "RegAsm.exe"
              4⤵
                PID:5612
                • C:\Windows\SysWOW64\choice.exe
                  choice /C Y /N /D Y /T 3
                  5⤵
                    PID:5824
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 4988 -s 360
                3⤵
                • Program crash
                PID:2748
            • C:\Users\Admin\AppData\Local\Temp\1000149001\gold.exe
              "C:\Users\Admin\AppData\Local\Temp\1000149001\gold.exe"
              2⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:4816
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                3⤵
                  PID:4428
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                  3⤵
                    PID:3548
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 4816 -s 364
                    3⤵
                    • Program crash
                    PID:3996
                • C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe
                  "C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe"
                  2⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Suspicious use of WriteProcessMemory
                  PID:1016
                  • C:\Windows\SysWOW64\schtasks.exe
                    "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN NewB.exe /TR "C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe" /F
                    3⤵
                    • Creates scheduled task(s)
                    PID:908
                  • C:\Users\Admin\AppData\Local\Temp\1000223001\ISetup8.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000223001\ISetup8.exe"
                    3⤵
                    • Checks computer location settings
                    • Executes dropped EXE
                    PID:4448
                    • C:\Users\Admin\AppData\Local\Temp\u3fk.0.exe
                      "C:\Users\Admin\AppData\Local\Temp\u3fk.0.exe"
                      4⤵
                      • Executes dropped EXE
                      PID:4300
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 4300 -s 1016
                        5⤵
                        • Program crash
                        PID:4164
                    • C:\Users\Admin\AppData\Local\Temp\u3fk.2\run.exe
                      "C:\Users\Admin\AppData\Local\Temp\u3fk.2\run.exe"
                      4⤵
                        PID:5716
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\SysWOW64\cmd.exe
                          5⤵
                            PID:3404
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                              C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                              6⤵
                                PID:5840
                        • C:\Users\Admin\AppData\Local\Temp\1000224001\toolspub1.exe
                          "C:\Users\Admin\AppData\Local\Temp\1000224001\toolspub1.exe"
                          3⤵
                          • Executes dropped EXE
                          • Checks SCSI registry key(s)
                          PID:4552
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 4552 -s 356
                            4⤵
                            • Program crash
                            PID:4164
                        • C:\Users\Admin\AppData\Local\Temp\1000225001\4767d2e713f2021e8fe856e3ea638b58.exe
                          "C:\Users\Admin\AppData\Local\Temp\1000225001\4767d2e713f2021e8fe856e3ea638b58.exe"
                          3⤵
                          • Executes dropped EXE
                          PID:3620
                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            powershell -nologo -noprofile
                            4⤵
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3288
                          • C:\Users\Admin\AppData\Local\Temp\1000225001\4767d2e713f2021e8fe856e3ea638b58.exe
                            "C:\Users\Admin\AppData\Local\Temp\1000225001\4767d2e713f2021e8fe856e3ea638b58.exe"
                            4⤵
                              PID:5332
                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                powershell -nologo -noprofile
                                5⤵
                                  PID:5872
                                • C:\Windows\system32\cmd.exe
                                  C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
                                  5⤵
                                    PID:5792
                                    • C:\Windows\system32\netsh.exe
                                      netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                                      6⤵
                                      • Modifies Windows Firewall
                                      PID:5348
                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    powershell -nologo -noprofile
                                    5⤵
                                      PID:5212
                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      powershell -nologo -noprofile
                                      5⤵
                                        PID:5176
                                      • C:\Windows\rss\csrss.exe
                                        C:\Windows\rss\csrss.exe
                                        5⤵
                                          PID:5944
                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            powershell -nologo -noprofile
                                            6⤵
                                              PID:3668
                                            • C:\Windows\SYSTEM32\schtasks.exe
                                              schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                                              6⤵
                                              • Creates scheduled task(s)
                                              PID:5396
                                            • C:\Windows\SYSTEM32\schtasks.exe
                                              schtasks /delete /tn ScheduledUpdate /f
                                              6⤵
                                                PID:5564
                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                powershell -nologo -noprofile
                                                6⤵
                                                  PID:3204
                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  powershell -nologo -noprofile
                                                  6⤵
                                                    PID:1208
                                                  • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                                                    C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
                                                    6⤵
                                                      PID:4712
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 3620 -s 936
                                                  4⤵
                                                  • Program crash
                                                  PID:5420
                                            • C:\Users\Admin\AppData\Local\Temp\1000152001\jok.exe
                                              "C:\Users\Admin\AppData\Local\Temp\1000152001\jok.exe"
                                              2⤵
                                              • Executes dropped EXE
                                              • Suspicious behavior: EnumeratesProcesses
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:5016
                                            • C:\Users\Admin\AppData\Local\Temp\1000153001\swiiii.exe
                                              "C:\Users\Admin\AppData\Local\Temp\1000153001\swiiii.exe"
                                              2⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetThreadContext
                                              PID:3032
                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                3⤵
                                                  PID:3732
                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                  3⤵
                                                  • Checks processor information in registry
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  PID:4552
                                              • C:\Users\Admin\AppData\Local\Temp\1000181001\file300un.exe
                                                "C:\Users\Admin\AppData\Local\Temp\1000181001\file300un.exe"
                                                2⤵
                                                • UAC bypass
                                                • Windows security bypass
                                                • Checks computer location settings
                                                • Executes dropped EXE
                                                • Windows security modification
                                                • Checks whether UAC is enabled
                                                • Suspicious use of SetThreadContext
                                                • Suspicious use of AdjustPrivilegeToken
                                                • System policy modification
                                                PID:4072
                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\1000181001\file300un.exe" -Force
                                                  3⤵
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:624
                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe
                                                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"
                                                  3⤵
                                                    PID:3860
                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                                                    3⤵
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:3816
                                                    • C:\Users\Admin\Pictures\MjC3Ls3cFBX5dT6FLyA0D5HH.exe
                                                      "C:\Users\Admin\Pictures\MjC3Ls3cFBX5dT6FLyA0D5HH.exe"
                                                      4⤵
                                                      • Executes dropped EXE
                                                      PID:1520
                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        powershell -nologo -noprofile
                                                        5⤵
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:3368
                                                      • C:\Users\Admin\Pictures\MjC3Ls3cFBX5dT6FLyA0D5HH.exe
                                                        "C:\Users\Admin\Pictures\MjC3Ls3cFBX5dT6FLyA0D5HH.exe"
                                                        5⤵
                                                          PID:3032
                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            powershell -nologo -noprofile
                                                            6⤵
                                                              PID:5524
                                                            • C:\Windows\system32\cmd.exe
                                                              C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
                                                              6⤵
                                                                PID:3288
                                                                • C:\Windows\system32\netsh.exe
                                                                  netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                                                                  7⤵
                                                                  • Modifies Windows Firewall
                                                                  PID:6012
                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                powershell -nologo -noprofile
                                                                6⤵
                                                                  PID:3080
                                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                  powershell -nologo -noprofile
                                                                  6⤵
                                                                    PID:5104
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 1520 -s 800
                                                                  5⤵
                                                                  • Program crash
                                                                  PID:5152
                                                              • C:\Users\Admin\Pictures\KOJjgsKnBGcarEFpfajKambQ.exe
                                                                "C:\Users\Admin\Pictures\KOJjgsKnBGcarEFpfajKambQ.exe"
                                                                4⤵
                                                                • Executes dropped EXE
                                                                PID:4992
                                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                  powershell -nologo -noprofile
                                                                  5⤵
                                                                    PID:752
                                                                  • C:\Users\Admin\Pictures\KOJjgsKnBGcarEFpfajKambQ.exe
                                                                    "C:\Users\Admin\Pictures\KOJjgsKnBGcarEFpfajKambQ.exe"
                                                                    5⤵
                                                                      PID:6096
                                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                        powershell -nologo -noprofile
                                                                        6⤵
                                                                          PID:5428
                                                                        • C:\Windows\system32\cmd.exe
                                                                          C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
                                                                          6⤵
                                                                            PID:1964
                                                                            • C:\Windows\system32\netsh.exe
                                                                              netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                                                                              7⤵
                                                                              • Modifies Windows Firewall
                                                                              PID:5896
                                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                            powershell -nologo -noprofile
                                                                            6⤵
                                                                              PID:3668
                                                                              • C:\Windows\System32\Conhost.exe
                                                                                \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                7⤵
                                                                                  PID:3368
                                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                powershell -nologo -noprofile
                                                                                6⤵
                                                                                  PID:5940
                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 6096 -s 892
                                                                                  6⤵
                                                                                  • Program crash
                                                                                  PID:3356
                                                                            • C:\Users\Admin\Pictures\pzbDlMTbZAB0Zds84duJ6QpA.exe
                                                                              "C:\Users\Admin\Pictures\pzbDlMTbZAB0Zds84duJ6QpA.exe"
                                                                              4⤵
                                                                                PID:6072
                                                                                • C:\Users\Admin\AppData\Local\Temp\u4oo.0.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\u4oo.0.exe"
                                                                                  5⤵
                                                                                    PID:5232
                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 5232 -s 1016
                                                                                      6⤵
                                                                                      • Program crash
                                                                                      PID:5568
                                                                                  • C:\Users\Admin\AppData\Local\Temp\u4oo.2\run.exe
                                                                                    "C:\Users\Admin\AppData\Local\Temp\u4oo.2\run.exe"
                                                                                    5⤵
                                                                                      PID:5664
                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                        C:\Windows\SysWOW64\cmd.exe
                                                                                        6⤵
                                                                                          PID:5212
                                                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                                                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                                                                                    3⤵
                                                                                      PID:1740
                                                                                  • C:\Users\Admin\AppData\Local\Temp\1000208001\install.exe
                                                                                    "C:\Users\Admin\AppData\Local\Temp\1000208001\install.exe"
                                                                                    2⤵
                                                                                      PID:5288
                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                        C:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\GameServerClient\installg.bat" "
                                                                                        3⤵
                                                                                          PID:5348
                                                                                          • C:\Windows\SysWOW64\sc.exe
                                                                                            Sc delete GameServerClient
                                                                                            4⤵
                                                                                            • Launches sc.exe
                                                                                            PID:4136
                                                                                          • C:\Program Files (x86)\GameServerClient\GameService.exe
                                                                                            GameService remove GameServerClient confirm
                                                                                            4⤵
                                                                                              PID:3904
                                                                                            • C:\Program Files (x86)\GameServerClient\GameService.exe
                                                                                              GameService install GameServerClient "C:\Program Files (x86)\GameServerClient\GameServerClient.exe"
                                                                                              4⤵
                                                                                                PID:4556
                                                                                              • C:\Program Files (x86)\GameServerClient\GameService.exe
                                                                                                GameService start GameServerClient
                                                                                                4⤵
                                                                                                  PID:3288
                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                C:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\GameServerClient\installc.bat" "
                                                                                                3⤵
                                                                                                  PID:3080
                                                                                                  • C:\Windows\SysWOW64\sc.exe
                                                                                                    Sc delete GameServerClientC
                                                                                                    4⤵
                                                                                                    • Launches sc.exe
                                                                                                    PID:6080
                                                                                                  • C:\Program Files (x86)\GameServerClient\GameService.exe
                                                                                                    GameService remove GameServerClientC confirm
                                                                                                    4⤵
                                                                                                      PID:5940
                                                                                                    • C:\Program Files (x86)\GameServerClient\GameService.exe
                                                                                                      GameService install GameServerClientC "C:\Program Files (x86)\GameServerClient\GameServerClientC.exe"
                                                                                                      4⤵
                                                                                                        PID:1044
                                                                                                      • C:\Program Files (x86)\GameServerClient\GameService.exe
                                                                                                        GameService start GameServerClientC
                                                                                                        4⤵
                                                                                                          PID:3224
                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7ZSfx000.cmd" "
                                                                                                        3⤵
                                                                                                          PID:1192
                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1620 -ip 1620
                                                                                                      1⤵
                                                                                                        PID:2464
                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4988 -ip 4988
                                                                                                        1⤵
                                                                                                          PID:1480
                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4816 -ip 4816
                                                                                                          1⤵
                                                                                                            PID:4972
                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4552 -ip 4552
                                                                                                            1⤵
                                                                                                              PID:3668
                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4300 -ip 4300
                                                                                                              1⤵
                                                                                                                PID:3668
                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe
                                                                                                                C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe
                                                                                                                1⤵
                                                                                                                • Executes dropped EXE
                                                                                                                PID:2780
                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3620 -ip 3620
                                                                                                                1⤵
                                                                                                                  PID:5360
                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1520 -ip 1520
                                                                                                                  1⤵
                                                                                                                    PID:2672
                                                                                                                  • C:\Program Files (x86)\GameServerClient\GameService.exe
                                                                                                                    "C:\Program Files (x86)\GameServerClient\GameService.exe"
                                                                                                                    1⤵
                                                                                                                      PID:5836
                                                                                                                      • C:\Program Files (x86)\GameServerClient\GameServerClient.exe
                                                                                                                        "C:\Program Files (x86)\GameServerClient\GameServerClient.exe"
                                                                                                                        2⤵
                                                                                                                          PID:2628
                                                                                                                          • C:\Windows\Temp\761347.exe
                                                                                                                            "C:\Windows\Temp\761347.exe" --list-devices
                                                                                                                            3⤵
                                                                                                                              PID:2780
                                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 6096 -ip 6096
                                                                                                                          1⤵
                                                                                                                            PID:5028
                                                                                                                          • C:\Program Files (x86)\GameServerClient\GameService.exe
                                                                                                                            "C:\Program Files (x86)\GameServerClient\GameService.exe"
                                                                                                                            1⤵
                                                                                                                              PID:5508
                                                                                                                              • C:\Program Files (x86)\GameServerClient\GameServerClientC.exe
                                                                                                                                "C:\Program Files (x86)\GameServerClient\GameServerClientC.exe"
                                                                                                                                2⤵
                                                                                                                                  PID:6020
                                                                                                                                  • C:\Windows\Temp\263715.exe
                                                                                                                                    "C:\Windows\Temp\263715.exe" --coin BTC -m ADDRESSES -t 0 --range 27764869860000000:27764869880000000 -o xxx0.txt -i C:\Windows\Temp\curjob.bin
                                                                                                                                    3⤵
                                                                                                                                      PID:6008
                                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 5232 -ip 5232
                                                                                                                                  1⤵
                                                                                                                                    PID:3992
                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe
                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe
                                                                                                                                    1⤵
                                                                                                                                      PID:5416

                                                                                                                                    Network

                                                                                                                                    MITRE ATT&CK Enterprise v15

                                                                                                                                    Replay Monitor

                                                                                                                                    Loading Replay Monitor...

                                                                                                                                    Downloads

                                                                                                                                    • C:\ProgramData\mozglue.dll

                                                                                                                                      Filesize

                                                                                                                                      593KB

                                                                                                                                      MD5

                                                                                                                                      c8fd9be83bc728cc04beffafc2907fe9

                                                                                                                                      SHA1

                                                                                                                                      95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                                                                                                      SHA256

                                                                                                                                      ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                                                                                                      SHA512

                                                                                                                                      fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                                                      Filesize

                                                                                                                                      3KB

                                                                                                                                      MD5

                                                                                                                                      fe3aab3ae544a134b68e881b82b70169

                                                                                                                                      SHA1

                                                                                                                                      926e9b4e527ae1bd9b3b25726e1f59d5a34d36a6

                                                                                                                                      SHA256

                                                                                                                                      bda499e3f69d8fe0227e734bbb935dc5bf0050d37adf03bc41356dfcb5bcca0b

                                                                                                                                      SHA512

                                                                                                                                      3fbd3499d98280b6c79c67b0ee183b27692dbc31acf103b4f8ca4dcdf392afff2b3aad500037f4288581ed37e85f45c3bbb5dcde11cddf3ef0609f44b2ecb280

                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                                                                      Filesize

                                                                                                                                      2KB

                                                                                                                                      MD5

                                                                                                                                      3d086a433708053f9bf9523e1d87a4e8

                                                                                                                                      SHA1

                                                                                                                                      b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28

                                                                                                                                      SHA256

                                                                                                                                      6f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69

                                                                                                                                      SHA512

                                                                                                                                      931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd

                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                                                                                      Filesize

                                                                                                                                      19KB

                                                                                                                                      MD5

                                                                                                                                      b74a5f26f9550a92dfbaca6ac0343d3d

                                                                                                                                      SHA1

                                                                                                                                      dac471c6d505badc8d61517211c6615a049abefd

                                                                                                                                      SHA256

                                                                                                                                      0d7d523c1157f131648d282fe0df1c4bc4a5d72b2eee0cede70c306f4c1d7bb1

                                                                                                                                      SHA512

                                                                                                                                      c4ba3465827bce565b6b8a8c5b174f9f8b16984b537c1ff00801684950a695f1b9c601252de438f5faa4f5055a39a185f880c6da8ed3ad583d80e65c23041452

                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                                                                                      Filesize

                                                                                                                                      19KB

                                                                                                                                      MD5

                                                                                                                                      beec0c7b024f433338187bb1791f156e

                                                                                                                                      SHA1

                                                                                                                                      4319759323cc051b0f8b8c059f0ecf79418d7842

                                                                                                                                      SHA256

                                                                                                                                      b8a98919426802693a769d668be633b591703d15b9885ca52ae2b85d2560287f

                                                                                                                                      SHA512

                                                                                                                                      f1e2ab609fe7b9059942c697a2d0be5e141197ad2505a9365e12165b9b2a10df3b5c118730d6f4d2ad8271b529ce1efc8984e283f00e285e3af860123a5bceeb

                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                      Filesize

                                                                                                                                      1KB

                                                                                                                                      MD5

                                                                                                                                      7f5130f8643f9c281b6384704d27b900

                                                                                                                                      SHA1

                                                                                                                                      c384737918a1e492e8742800a251d31de1842de2

                                                                                                                                      SHA256

                                                                                                                                      e5a21b6e080bd51ab39ae0aa91aa0573951a52aafd2f021263141d0755e1cf8f

                                                                                                                                      SHA512

                                                                                                                                      ff471d00db8f4ec88cd0d52894e4f1a91ad32473cb173b7a5d431def9717cbe106c2ae431869651a3a9fc1801f9997a9d35d22a85cdb605ed98731e6dc129161

                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\1000147001\swiiiii.exe

                                                                                                                                      Filesize

                                                                                                                                      321KB

                                                                                                                                      MD5

                                                                                                                                      1c7d0f34bb1d85b5d2c01367cc8f62ef

                                                                                                                                      SHA1

                                                                                                                                      33aedadb5361f1646cffd68791d72ba5f1424114

                                                                                                                                      SHA256

                                                                                                                                      e9e09c5e5d03d21fca820bd9b0a0ea7b86ab9e85cdc9996f8f1dc822b0cc801c

                                                                                                                                      SHA512

                                                                                                                                      53bf85d2b004f69bbbf7b6dc78e5f021aba71b6f814101c55d3bf76e6d058a973bc58270b6b621b2100c6e02d382f568d1e96024464e8ea81e6db8ccd948679d

                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\1000148001\alexxxxxxxx.exe

                                                                                                                                      Filesize

                                                                                                                                      2.7MB

                                                                                                                                      MD5

                                                                                                                                      31841361be1f3dc6c2ce7756b490bf0f

                                                                                                                                      SHA1

                                                                                                                                      ff2506641a401ac999f5870769f50b7326f7e4eb

                                                                                                                                      SHA256

                                                                                                                                      222393a4ab4b2ae83ca861faee6df02ac274b2f2ca0bed8db1783dd61f2f37ee

                                                                                                                                      SHA512

                                                                                                                                      53d66fa19e8db360042dadc55caaa9a1ca30a9d825e23ed2a58f32834691eb2aaaa27a4471e3fc4d13e201accc43160436ed0e9939df1cc227a62a09a2ae0019

                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\1000149001\gold.exe

                                                                                                                                      Filesize

                                                                                                                                      460KB

                                                                                                                                      MD5

                                                                                                                                      b22521fb370921bb5d69bf8deecce59e

                                                                                                                                      SHA1

                                                                                                                                      3d4486b206e8aaac14a3cf201c5ac152a2a7d4ea

                                                                                                                                      SHA256

                                                                                                                                      b30d10e292f89f4d288839974f71f6b703d6d9a9ae698ea172a2b64364e77158

                                                                                                                                      SHA512

                                                                                                                                      1f7d64ba5266314ed18f577f0984706c21f4f48e8cdb069130e4435c2bcdf219f8dd27e4d3bf3a373f4db4c01e30efe8d7f4d87f4d8cbbbeaf9c7043f685994c

                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe

                                                                                                                                      Filesize

                                                                                                                                      418KB

                                                                                                                                      MD5

                                                                                                                                      0099a99f5ffb3c3ae78af0084136fab3

                                                                                                                                      SHA1

                                                                                                                                      0205a065728a9ec1133e8a372b1e3864df776e8c

                                                                                                                                      SHA256

                                                                                                                                      919ae827ff59fcbe3dbaea9e62855a4d27690818189f696cfb5916a88c823226

                                                                                                                                      SHA512

                                                                                                                                      5ac4f3265c7dd7d172284fb28c94f8fc6428c27853e70989f4ec4208f9897be91720e8eee1906d8e843ab05798f3279a12492a32e8a118f5621ac5e1be2031b6

                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\1000152001\jok.exe

                                                                                                                                      Filesize

                                                                                                                                      304KB

                                                                                                                                      MD5

                                                                                                                                      8510bcf5bc264c70180abe78298e4d5b

                                                                                                                                      SHA1

                                                                                                                                      2c3a2a85d129b0d750ed146d1d4e4d6274623e28

                                                                                                                                      SHA256

                                                                                                                                      096220045877e456edfea1adcd5bf1efd332665ef073c6d1e9474c84ca5433f6

                                                                                                                                      SHA512

                                                                                                                                      5ff0a47f9e14e22fc76d41910b2986605376605913173d8ad83d29d85eb79b679459e2723a6ad17bc3c3b8c9b359e2be7348ee1c21fa2e8ceb7cc9220515258d

                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\1000153001\swiiii.exe

                                                                                                                                      Filesize

                                                                                                                                      158KB

                                                                                                                                      MD5

                                                                                                                                      586f7fecacd49adab650fae36e2db994

                                                                                                                                      SHA1

                                                                                                                                      35d9fb512a8161ce867812633f0a43b042f9a5e6

                                                                                                                                      SHA256

                                                                                                                                      cf88d499c83da613ad5ccd8805822901bdc3a12eb9b15804aeff8c53dc05fc4e

                                                                                                                                      SHA512

                                                                                                                                      a44a2c99d18509681505cf70a251baf2558030a8648d9c621acc72fafcb2f744e3ef664dfd0229baf7c78fb72e69f5d644c755ded4060dcafa7f711d70e94772

                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\1000181001\file300un.exe

                                                                                                                                      Filesize

                                                                                                                                      768KB

                                                                                                                                      MD5

                                                                                                                                      96b291b8b678331caaa8910e6c5b5676

                                                                                                                                      SHA1

                                                                                                                                      d5411828c36192751915493d99404dd84b7cd188

                                                                                                                                      SHA256

                                                                                                                                      27b3a4cb988e416a260c7287b59fc72cd4d7cb4b94f25daa01daab2ea192da2b

                                                                                                                                      SHA512

                                                                                                                                      21d4fbc3060a202f873a3d23f5956409070f5acb64d423070e97b1f909897619e6cf3be90b1574552494a7ce1ac12d4139e3626cd737ab1fffdde321cd30924e

                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\1000208001\install.exe

                                                                                                                                      Filesize

                                                                                                                                      2.4MB

                                                                                                                                      MD5

                                                                                                                                      55f780ea4dc5a5401b80915d69a55481

                                                                                                                                      SHA1

                                                                                                                                      5ebdde7f87637493de0a5e7a4ffcd59839672c4e

                                                                                                                                      SHA256

                                                                                                                                      c3014a898f63fab694a759d56bb0b3c979484eedd32708e1467e566b4f3dfa70

                                                                                                                                      SHA512

                                                                                                                                      680ca9d6f5aa4d53e7083858bfd4d3fc71f567993968edc83ddf262e15b2ed06f07c5a4c47e65f4874074213adf3cd978b8eaa658563694caf013fb126948697

                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\1000223001\ISetup8.exe

                                                                                                                                      Filesize

                                                                                                                                      407KB

                                                                                                                                      MD5

                                                                                                                                      b82a9fba1917da3b2fe0d2b1eb5d810c

                                                                                                                                      SHA1

                                                                                                                                      d5eb2ffb02586987369ab69f419f6e3517a4a998

                                                                                                                                      SHA256

                                                                                                                                      75fb2b9b7e61009e71a3a280c81187cc6e7af9821137ce2e942a987b9aa14784

                                                                                                                                      SHA512

                                                                                                                                      e3bbaf074595ebeda6f902973a7556a7a1c9c90375f8a29a099dd54e5ad90535d45b2f14fe14016619c072e6d9e2c7efc9097dcb8aef6fc2dcf4ae01fa7cdf4b

                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\1000224001\toolspub1.exe

                                                                                                                                      Filesize

                                                                                                                                      265KB

                                                                                                                                      MD5

                                                                                                                                      d2d61371e2c16ed85a6cdca7931a9976

                                                                                                                                      SHA1

                                                                                                                                      4fa89990a7c2d0abc223056440b949a36754eb2d

                                                                                                                                      SHA256

                                                                                                                                      eca62d3dfad6ae0eef6f384360749315a305139c6db17435754a44c2b30333ce

                                                                                                                                      SHA512

                                                                                                                                      646839a1081de540ca9dc56dae22eec209a9f4bce709016983be6173c2a86eed8a9e76a58e0aeea8b86b2fb604ff98da3ffd4f3afe6465018adaee098f781d49

                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\1000225001\4767d2e713f2021e8fe856e3ea638b58.exe

                                                                                                                                      Filesize

                                                                                                                                      4.1MB

                                                                                                                                      MD5

                                                                                                                                      52350cf7f8d03c016db75f5e31f3f587

                                                                                                                                      SHA1

                                                                                                                                      24367055bd2cd51ab7727f01f0b053f483388563

                                                                                                                                      SHA256

                                                                                                                                      d5399893dcbdd8c313a6455d5edd68ad7dd242119423cb632c83818dea29e277

                                                                                                                                      SHA512

                                                                                                                                      4b1e67e7d4bb40f65b26122df1a683ffa86a4cd815fef8e0d919b4a2d8fb2af8be31bee5cd434c7d65621f9ca6fee15411b63cb7ce9a68509a63d18310e29ef6

                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exe

                                                                                                                                      Filesize

                                                                                                                                      1.8MB

                                                                                                                                      MD5

                                                                                                                                      6dca2e803f570d076689d40d1de040c1

                                                                                                                                      SHA1

                                                                                                                                      0db4712005184022c7b9b61a9d58caffaf7b784b

                                                                                                                                      SHA256

                                                                                                                                      03025185db7ff2b3f7faeeb2f600274a8c87011ae7c2771f11df5be956a228e0

                                                                                                                                      SHA512

                                                                                                                                      24669394b81cb57f40c28dfe72aef2983725341bba0433ad5a721bb7379ea1b3d361d4ba3ac05be96bce098d90efd56145df07d50bf6d9bf2add2274f0fa7cfb

                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Tmp7CDC.tmp

                                                                                                                                      Filesize

                                                                                                                                      2KB

                                                                                                                                      MD5

                                                                                                                                      1420d30f964eac2c85b2ccfe968eebce

                                                                                                                                      SHA1

                                                                                                                                      bdf9a6876578a3e38079c4f8cf5d6c79687ad750

                                                                                                                                      SHA256

                                                                                                                                      f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9

                                                                                                                                      SHA512

                                                                                                                                      6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8

                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_cn0imkks.x5w.ps1

                                                                                                                                      Filesize

                                                                                                                                      60B

                                                                                                                                      MD5

                                                                                                                                      d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                      SHA1

                                                                                                                                      6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                      SHA256

                                                                                                                                      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                      SHA512

                                                                                                                                      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\u3fk.0.exe

                                                                                                                                      Filesize

                                                                                                                                      264KB

                                                                                                                                      MD5

                                                                                                                                      4d4fdab28f0c4656ba04783316751b06

                                                                                                                                      SHA1

                                                                                                                                      b3d4036203dad1cb05976c5c28f9d1af1ad50361

                                                                                                                                      SHA256

                                                                                                                                      c1586e82cf889acfbe3d9ff17d9f76d49c513ef62ba79f15c613fb87881d71d5

                                                                                                                                      SHA512

                                                                                                                                      4a36fcd18bf86deedf5e3759d0d996972031625ac62892e50097df321a71215ab8d1d2b03b51886fe0cc4eeb9f70c86a7b1961f3b422f8e416d27e0aac40f1c9

                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\u3fk.1.zip

                                                                                                                                      Filesize

                                                                                                                                      3.7MB

                                                                                                                                      MD5

                                                                                                                                      78d3ca6355c93c72b494bb6a498bf639

                                                                                                                                      SHA1

                                                                                                                                      2fa4e5df74bfe75c207c881a1b0d3bc1c62c8b0e

                                                                                                                                      SHA256

                                                                                                                                      a1dd547a63b256aa6a16871ed03f8b025226f7617e67b8817a08444df077b001

                                                                                                                                      SHA512

                                                                                                                                      1b2df7bee2514aee7efd3579f5dd33c76b40606d07dba69a34c45747662fad61174db4931bca02b058830107959205e889fee74f8ccc9f6e03f9fd111761f4ea

                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\u3fk.2\bunch.dat

                                                                                                                                      Filesize

                                                                                                                                      1.3MB

                                                                                                                                      MD5

                                                                                                                                      1e8237d3028ab52821d69099e0954f97

                                                                                                                                      SHA1

                                                                                                                                      30a6ae353adda0c471c6ed5b7a2458b07185abf2

                                                                                                                                      SHA256

                                                                                                                                      9387488f9d338e211be2cb45109bf590a5070180bc0d4a703f70d3cb3c4e1742

                                                                                                                                      SHA512

                                                                                                                                      a6406d7c18694ee014d59df581f1f76e980b68e3361ae680dc979606a423eba48d35e37f143154dd97fe5f066baf0ea51a2e9f8bc822d593e1cba70ead6559f3

                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\u3fk.2\relay.dll

                                                                                                                                      Filesize

                                                                                                                                      1.5MB

                                                                                                                                      MD5

                                                                                                                                      10d51becd0bbce0fab147ff9658c565e

                                                                                                                                      SHA1

                                                                                                                                      4689a18112ff876d3c066bc8c14a08fd6b7b7a4a

                                                                                                                                      SHA256

                                                                                                                                      7b2db9c88f60ed6dd24b1dec321a304564780fdb191a96ec35c051856128f1ed

                                                                                                                                      SHA512

                                                                                                                                      29faf493bb28f7842c905adc5312f31741effb09f841059b53d73b22aea2c4d41d73db10bbf37703d6aeb936ffacbc756a3cc85ba3c0b6a6863ef4d27fefcd29

                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\u3fk.2\run.exe

                                                                                                                                      Filesize

                                                                                                                                      2.4MB

                                                                                                                                      MD5

                                                                                                                                      9fb4770ced09aae3b437c1c6eb6d7334

                                                                                                                                      SHA1

                                                                                                                                      fe54b31b0db8665aa5b22bed147e8295afc88a03

                                                                                                                                      SHA256

                                                                                                                                      a05b592a971fe5011554013bcfe9a4aaf9cfc633bdd1fe3a8197f213d557b8d3

                                                                                                                                      SHA512

                                                                                                                                      140fee6daf23fe8b7e441b3b4de83554af804f00ecedc421907a385ac79a63164bd9f28b4be061c2ea2262755d85e14d3a8e7dc910547837b664d78d93667256

                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\u3fk.2\whale.dbf

                                                                                                                                      Filesize

                                                                                                                                      85KB

                                                                                                                                      MD5

                                                                                                                                      a723bf46048e0bfb15b8d77d7a648c3e

                                                                                                                                      SHA1

                                                                                                                                      8952d3c34e9341e4425571e10f22b782695bb915

                                                                                                                                      SHA256

                                                                                                                                      b440170853bdb43b66497f701aee2901080326975140b095a1669cb9dee13422

                                                                                                                                      SHA512

                                                                                                                                      ca8ea2f7f3c7af21b5673a0a3f2611b6580a7ed02efa2cfd8b343eb644ff09682bde43b25ef7aab68530d5ce31dcbd252c382dd336ecb610d4c4ebde78347273

                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\u4oo.2\UIxMarketPlugin.dll

                                                                                                                                      Filesize

                                                                                                                                      1.6MB

                                                                                                                                      MD5

                                                                                                                                      d1ba9412e78bfc98074c5d724a1a87d6

                                                                                                                                      SHA1

                                                                                                                                      0572f98d78fb0b366b5a086c2a74cc68b771d368

                                                                                                                                      SHA256

                                                                                                                                      cbcea8f28d8916219d1e8b0a8ca2db17e338eb812431bc4ad0cb36c06fd67f15

                                                                                                                                      SHA512

                                                                                                                                      8765de36d3824b12c0a4478c31b985878d4811bd0e5b6fba4ea07f8c76340bd66a2da3490d4871b95d9a12f96efc25507dfd87f431de211664dbe9a9c914af6f

                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-4084619521-2220719027-1909462854-1000\76b53b3ec448f7ccdda2063b15d2bfc3_338e918a-08d3-477c-81e2-0f9a71d72db8

                                                                                                                                      Filesize

                                                                                                                                      2KB

                                                                                                                                      MD5

                                                                                                                                      738595215453f9d3532fa2aab0a49ddf

                                                                                                                                      SHA1

                                                                                                                                      1cf620b40c158f8416b4d3f936822eb3f8923ae0

                                                                                                                                      SHA256

                                                                                                                                      40ce779af1fb97dd774217d669720a7a2e733001c2ee5014c5e850d9a56bb553

                                                                                                                                      SHA512

                                                                                                                                      8b1ca2b12b0c17ad577b64ebf6ebc75577f3dd4e7c89a5d27f6a08ae7cf20d59dbcc90447ec60e861c0c88d48ed89f05d88389ecb7ca2a5a4e848177ab301f80

                                                                                                                                    • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll

                                                                                                                                      Filesize

                                                                                                                                      109KB

                                                                                                                                      MD5

                                                                                                                                      154c3f1334dd435f562672f2664fea6b

                                                                                                                                      SHA1

                                                                                                                                      51dd25e2ba98b8546de163b8f26e2972a90c2c79

                                                                                                                                      SHA256

                                                                                                                                      5f431129f97f3d56929f1e5584819e091bd6c854d7e18503074737fc6d79e33f

                                                                                                                                      SHA512

                                                                                                                                      1bca69bbcdb7ecd418769e9d4befc458f9f8e3cee81feb7316bb61e189e2904f4431e4cc7d291e179a5dec441b959d428d8e433f579036f763bbad6460222841

                                                                                                                                    • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll

                                                                                                                                      Filesize

                                                                                                                                      1.2MB

                                                                                                                                      MD5

                                                                                                                                      f35b671fda2603ec30ace10946f11a90

                                                                                                                                      SHA1

                                                                                                                                      059ad6b06559d4db581b1879e709f32f80850872

                                                                                                                                      SHA256

                                                                                                                                      83e3df5bec15d5333935bea8b719a6d677e2fb3dc1cf9e18e7b82fd0438285c7

                                                                                                                                      SHA512

                                                                                                                                      b5fa27d08c64727cef7fdda5e68054a4359cd697df50d70d1d90da583195959a139066a6214531bbc5f20cd4f9bc1ca3e4244396547381291a6a1d2df9cf8705

                                                                                                                                    • C:\Users\Admin\AppData\Roaming\configurationValue\keks.exe

                                                                                                                                      Filesize

                                                                                                                                      304KB

                                                                                                                                      MD5

                                                                                                                                      0c582da789c91878ab2f1b12d7461496

                                                                                                                                      SHA1

                                                                                                                                      238bd2408f484dd13113889792d6e46d6b41c5ba

                                                                                                                                      SHA256

                                                                                                                                      a6ab532816fbb0c9664c708746db35287aaa85cbb417bef2eafcd9f5eaf7cf67

                                                                                                                                      SHA512

                                                                                                                                      a1b7c5c13462a7704ea2aea5025d1cb16ddd622fe1e2de3bbe08337c271a4dc8b9be2eae58a4896a7df3ad44823675384dbc60bdc737c54b173909be7a0a086a

                                                                                                                                    • C:\Users\Admin\AppData\Roaming\configurationValue\trf.exe

                                                                                                                                      Filesize

                                                                                                                                      750KB

                                                                                                                                      MD5

                                                                                                                                      20ae0bb07ba77cb3748aa63b6eb51afb

                                                                                                                                      SHA1

                                                                                                                                      87c468dc8f3d90a63833d36e4c900fa88d505c6d

                                                                                                                                      SHA256

                                                                                                                                      daf6ae706fc78595f0d386817a0f8a3a7eb4ec8613219382b1cbaa7089418e7d

                                                                                                                                      SHA512

                                                                                                                                      db315e00ce2b2d5a05cb69541ee45aade4332e424c4955a79d2b7261ab7bd739f02dc688224f031a7a030c92fa915d029538e236dbd3c28b8d07d1265a52e5b2

                                                                                                                                    • C:\Users\Admin\Desktop\Microsoft Edge.lnk

                                                                                                                                      Filesize

                                                                                                                                      2KB

                                                                                                                                      MD5

                                                                                                                                      e75d9fd25fcbf24bb9ceee28118c8f20

                                                                                                                                      SHA1

                                                                                                                                      4a2e563fbaa11f9163e7947645f0ff184a059469

                                                                                                                                      SHA256

                                                                                                                                      dacb9948adb316e2f1691d5247fc0b18899d6dd8204cb3a48d83d712a4d1e0b6

                                                                                                                                      SHA512

                                                                                                                                      e5ae736c428db50c5e8cff9b55a73b37754bcd887f09e09c2aacd3c24cfab4f2543822028a39b229c7130f92a63e82ace4bf40c98fa1c86fbc4e7ce54e105a13

                                                                                                                                    • C:\Users\Admin\Desktop\Microsoft Edge.lnk

                                                                                                                                      Filesize

                                                                                                                                      2KB

                                                                                                                                      MD5

                                                                                                                                      00dda58c068f292032fbd6be20f3421f

                                                                                                                                      SHA1

                                                                                                                                      568eb06419f4fc67a6e3d333e834f54d4477ed0f

                                                                                                                                      SHA256

                                                                                                                                      283c2afb4e7e4eda97563501b60331bfde8061024b3abdd51448ad9a82fa6ff4

                                                                                                                                      SHA512

                                                                                                                                      cb3080413b064c17756cefe240caa4312d9c07550a89cf7ba146e79411b76fbde2e92117fb2b6ac82453c137ad879b118feac269f6422c65817e71fb0e25da43

                                                                                                                                    • C:\Users\Admin\Pictures\MjC3Ls3cFBX5dT6FLyA0D5HH.exe

                                                                                                                                      Filesize

                                                                                                                                      4.1MB

                                                                                                                                      MD5

                                                                                                                                      9d9a93a6f9e21b61bf9252005523c0f4

                                                                                                                                      SHA1

                                                                                                                                      74291f35a68d342c62aef9754fb7048986f96a0e

                                                                                                                                      SHA256

                                                                                                                                      4c5f8e2835fafb62643afb08232a462b3f060787af9650ab0fa831a15460f838

                                                                                                                                      SHA512

                                                                                                                                      00d19de9699025ec3341ff7921b320bbb22d2f861e81a290e2a4b4334136499c3ebe0d535442b94d9f05f486e7d394b315bbdc4749aae30fe8559efe280aadf4

                                                                                                                                    • C:\Users\Admin\Pictures\pzbDlMTbZAB0Zds84duJ6QpA.exe

                                                                                                                                      Filesize

                                                                                                                                      407KB

                                                                                                                                      MD5

                                                                                                                                      14098ff4315f5d2fa48d294044f56723

                                                                                                                                      SHA1

                                                                                                                                      e57500af037cef93917b31808d139ae2a2d15357

                                                                                                                                      SHA256

                                                                                                                                      0da645e22d4346b60004fe98ff5db921cc6ed51a64da653ca7c205a557adaf64

                                                                                                                                      SHA512

                                                                                                                                      d072a75f5b492f84521eec2e7ee9f09637c6174aaeca6b058a016ea4644c27a7ee166894a7feaffb2ad499a7d809a0c04a998c47d0ff1ebc2f997ea2de3094ee

                                                                                                                                    • C:\Users\Admin\Pictures\yN3ehvWBWzeEsqTd3mHd88sT.exe

                                                                                                                                      Filesize

                                                                                                                                      7KB

                                                                                                                                      MD5

                                                                                                                                      5b423612b36cde7f2745455c5dd82577

                                                                                                                                      SHA1

                                                                                                                                      0187c7c80743b44e9e0c193e993294e3b969cc3d

                                                                                                                                      SHA256

                                                                                                                                      e0840d2ea74a00dcc545d770b91d9d889e5a82c7bedf1b989e0a89db04685b09

                                                                                                                                      SHA512

                                                                                                                                      c26a1e7e96dbd178d961c630abd8e564ef69532f386fb198eb20119a88ecab2fe885d71ac0c90687c18910ce00c445f352a5e8fbf5328f3403964f7c7802414c

                                                                                                                                    • C:\Users\Public\Desktop\Google Chrome.lnk

                                                                                                                                      Filesize

                                                                                                                                      2KB

                                                                                                                                      MD5

                                                                                                                                      f5f7eaf36eaf49c04a6acda81c5a698d

                                                                                                                                      SHA1

                                                                                                                                      fdf66e542f5619b972aa05c0519b0b44f9af0fb9

                                                                                                                                      SHA256

                                                                                                                                      781e78cd6f664a585d187a4010d45d30213872207133f0bf87a2d201f45cffd3

                                                                                                                                      SHA512

                                                                                                                                      8f0a3c70fcdc6194bc50a151dd8a61e7c0386e69ec45fe74fbf2c983249f8ca869bcb93dd2c79e99f58ccdd428d608131cb0fe5701a24f1ff755fcaf7b8d653b

                                                                                                                                    • C:\Users\Public\Desktop\Google Chrome.lnk

                                                                                                                                      Filesize

                                                                                                                                      2KB

                                                                                                                                      MD5

                                                                                                                                      85deec65e16c4202676771c20a0c6822

                                                                                                                                      SHA1

                                                                                                                                      e393d00707d69e39098f4eb054561566f068eebc

                                                                                                                                      SHA256

                                                                                                                                      e166e39510a22a0bae4cff6bd42ba41508db86ab2fd7cbb57d62162b7fd9de04

                                                                                                                                      SHA512

                                                                                                                                      356557c99494b4fa7faf0591fa6d7286e26573044f124d3522e6d0421f452b4210fda2d6ee8b2df64c3592c91104ef2ddaa864283b7b6ba9b7eed44cf06de313

                                                                                                                                    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                                                                                      Filesize

                                                                                                                                      19KB

                                                                                                                                      MD5

                                                                                                                                      e22ba25e90b5ee936d47089ccc22d88c

                                                                                                                                      SHA1

                                                                                                                                      8f711525d915307a12efa3b27b977acf44acb584

                                                                                                                                      SHA256

                                                                                                                                      5b85c2bbd90c089fdb1e4b0813b51f31b6a5b7b2131a85549067ed7b6617abc4

                                                                                                                                      SHA512

                                                                                                                                      c37a71a795edc383c1bba5a5d0b7cd6d8f03fca2ec10065f6acce303a81bb1c07b8c91dfffd6312ed8609816bb4b929a355bbd13d191c59eb8fd65c1e78ac6c0

                                                                                                                                    • memory/740-7-0x0000000004E00000-0x0000000004E01000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      4KB

                                                                                                                                    • memory/740-4-0x0000000004E20000-0x0000000004E21000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      4KB

                                                                                                                                    • memory/740-0-0x0000000000CC0000-0x0000000001172000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      4.7MB

                                                                                                                                    • memory/740-5-0x0000000004E40000-0x0000000004E41000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      4KB

                                                                                                                                    • memory/740-8-0x0000000004DF0000-0x0000000004DF1000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      4KB

                                                                                                                                    • memory/740-6-0x0000000004DE0000-0x0000000004DE1000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      4KB

                                                                                                                                    • memory/740-2-0x0000000000CC0000-0x0000000001172000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      4.7MB

                                                                                                                                    • memory/740-15-0x0000000000CC0000-0x0000000001172000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      4.7MB

                                                                                                                                    • memory/740-10-0x0000000004E60000-0x0000000004E61000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      4KB

                                                                                                                                    • memory/740-9-0x0000000004E70000-0x0000000004E71000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      4KB

                                                                                                                                    • memory/740-3-0x0000000004E10000-0x0000000004E11000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      4KB

                                                                                                                                    • memory/740-1-0x0000000077C54000-0x0000000077C56000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      8KB

                                                                                                                                    • memory/1520-679-0x0000000000400000-0x0000000004416000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      64.1MB

                                                                                                                                    • memory/1620-59-0x0000000073860000-0x0000000074010000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      7.7MB

                                                                                                                                    • memory/1620-56-0x0000000002B70000-0x0000000004B70000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      32.0MB

                                                                                                                                    • memory/1620-49-0x0000000073860000-0x0000000074010000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      7.7MB

                                                                                                                                    • memory/1620-48-0x0000000000570000-0x00000000005C2000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      328KB

                                                                                                                                    • memory/2536-58-0x0000000000400000-0x000000000044C000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      304KB

                                                                                                                                    • memory/2536-55-0x0000000000400000-0x000000000044C000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      304KB

                                                                                                                                    • memory/2536-52-0x0000000000400000-0x000000000044C000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      304KB

                                                                                                                                    • memory/2536-57-0x00000000014A0000-0x00000000014A1000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      4KB

                                                                                                                                    • memory/3032-812-0x0000000000400000-0x0000000004416000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      64.1MB

                                                                                                                                    • memory/3032-1067-0x0000000000400000-0x0000000004416000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      64.1MB

                                                                                                                                    • memory/3032-718-0x0000000000400000-0x0000000004416000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      64.1MB

                                                                                                                                    • memory/3400-157-0x00007FFC11530000-0x00007FFC11FF1000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      10.8MB

                                                                                                                                    • memory/3400-158-0x0000000000440000-0x0000000000500000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      768KB

                                                                                                                                    • memory/3400-230-0x0000000002590000-0x00000000025A0000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      64KB

                                                                                                                                    • memory/3400-228-0x000000001C020000-0x000000001C05C000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      240KB

                                                                                                                                    • memory/3400-227-0x000000001B3A0000-0x000000001B3B2000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      72KB

                                                                                                                                    • memory/3400-226-0x000000001D850000-0x000000001D95A000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      1.0MB

                                                                                                                                    • memory/3400-225-0x0000000002590000-0x00000000025A0000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      64KB

                                                                                                                                    • memory/3404-1073-0x00007FFC31630000-0x00007FFC31825000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      2.0MB

                                                                                                                                    • memory/3548-201-0x0000000000400000-0x000000000044E000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      312KB

                                                                                                                                    • memory/3548-204-0x0000000000400000-0x000000000044E000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      312KB

                                                                                                                                    • memory/3548-205-0x0000000000400000-0x000000000044E000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      312KB

                                                                                                                                    • memory/3576-155-0x0000000005760000-0x0000000005770000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      64KB

                                                                                                                                    • memory/3576-176-0x00000000069C0000-0x00000000069DE000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      120KB

                                                                                                                                    • memory/3576-183-0x0000000006EA0000-0x0000000006EEC000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      304KB

                                                                                                                                    • memory/3576-222-0x0000000006FE0000-0x0000000007046000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      408KB

                                                                                                                                    • memory/3576-182-0x0000000006D30000-0x0000000006D6C000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      240KB

                                                                                                                                    • memory/3576-181-0x0000000006CD0000-0x0000000006CE2000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      72KB

                                                                                                                                    • memory/3576-180-0x0000000006D90000-0x0000000006E9A000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      1.0MB

                                                                                                                                    • memory/3576-179-0x0000000007240000-0x0000000007858000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      6.1MB

                                                                                                                                    • memory/3576-149-0x0000000073500000-0x0000000073CB0000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      7.7MB

                                                                                                                                    • memory/3576-151-0x0000000000C70000-0x0000000000CC2000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      328KB

                                                                                                                                    • memory/3576-152-0x0000000005A70000-0x0000000006014000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      5.6MB

                                                                                                                                    • memory/3576-175-0x0000000006220000-0x0000000006296000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      472KB

                                                                                                                                    • memory/3576-156-0x0000000005730000-0x000000000573A000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      40KB

                                                                                                                                    • memory/3576-153-0x0000000005580000-0x0000000005612000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      584KB

                                                                                                                                    • memory/3620-541-0x0000000000400000-0x0000000004416000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      64.1MB

                                                                                                                                    • memory/3620-578-0x0000000000400000-0x0000000004416000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      64.1MB

                                                                                                                                    • memory/3660-127-0x0000000073500000-0x0000000073CB0000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      7.7MB

                                                                                                                                    • memory/3660-229-0x0000000073500000-0x0000000073CB0000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      7.7MB

                                                                                                                                    • memory/3660-130-0x0000000004FD0000-0x0000000004FE0000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      64KB

                                                                                                                                    • memory/3660-125-0x0000000000400000-0x0000000000592000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      1.6MB

                                                                                                                                    • memory/3736-545-0x0000000000A90000-0x0000000000F42000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      4.7MB

                                                                                                                                    • memory/3736-18-0x0000000000A90000-0x0000000000F42000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      4.7MB

                                                                                                                                    • memory/3736-26-0x0000000005450000-0x0000000005451000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      4KB

                                                                                                                                    • memory/3736-27-0x0000000005480000-0x0000000005481000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      4KB

                                                                                                                                    • memory/3736-811-0x0000000000A90000-0x0000000000F42000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      4.7MB

                                                                                                                                    • memory/3736-413-0x0000000000A90000-0x0000000000F42000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      4.7MB

                                                                                                                                    • memory/3736-24-0x00000000053F0000-0x00000000053F1000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      4KB

                                                                                                                                    • memory/3736-108-0x0000000000A90000-0x0000000000F42000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      4.7MB

                                                                                                                                    • memory/3736-96-0x0000000000A90000-0x0000000000F42000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      4.7MB

                                                                                                                                    • memory/3736-25-0x0000000005400000-0x0000000005401000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      4KB

                                                                                                                                    • memory/3736-28-0x0000000005470000-0x0000000005471000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      4KB

                                                                                                                                    • memory/3736-23-0x0000000005460000-0x0000000005461000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      4KB

                                                                                                                                    • memory/3736-19-0x0000000000A90000-0x0000000000F42000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      4.7MB

                                                                                                                                    • memory/3736-60-0x0000000000A90000-0x0000000000F42000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      4.7MB

                                                                                                                                    • memory/3736-236-0x0000000000A90000-0x0000000000F42000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      4.7MB

                                                                                                                                    • memory/3736-200-0x0000000000A90000-0x0000000000F42000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      4.7MB

                                                                                                                                    • memory/3736-21-0x0000000005430000-0x0000000005431000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      4KB

                                                                                                                                    • memory/3736-22-0x0000000005410000-0x0000000005411000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      4KB

                                                                                                                                    • memory/3736-73-0x0000000000A90000-0x0000000000F42000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      4.7MB

                                                                                                                                    • memory/3736-20-0x0000000005420000-0x0000000005421000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      4KB

                                                                                                                                    • memory/3736-717-0x0000000000A90000-0x0000000000F42000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      4.7MB

                                                                                                                                    • memory/3736-1066-0x0000000000A90000-0x0000000000F42000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      4.7MB

                                                                                                                                    • memory/3816-444-0x0000000000400000-0x0000000000408000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      32KB

                                                                                                                                    • memory/4300-415-0x0000000000400000-0x0000000004032000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      60.2MB

                                                                                                                                    • memory/4448-939-0x0000000000400000-0x0000000004056000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      60.3MB

                                                                                                                                    • memory/4448-443-0x0000000000400000-0x0000000004056000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      60.3MB

                                                                                                                                    • memory/4552-579-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      972KB

                                                                                                                                    • memory/4552-409-0x0000000000400000-0x000000000063B000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      2.2MB

                                                                                                                                    • memory/4552-405-0x0000000000400000-0x000000000063B000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      2.2MB

                                                                                                                                    • memory/4552-345-0x0000000000400000-0x0000000004033000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      60.2MB

                                                                                                                                    • memory/4816-202-0x0000000000B40000-0x0000000000BB4000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      464KB

                                                                                                                                    • memory/4988-126-0x0000000000280000-0x0000000000538000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      2.7MB

                                                                                                                                    • memory/4992-672-0x0000000000400000-0x0000000004416000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      64.1MB

                                                                                                                                    • memory/5028-88-0x0000022875640000-0x0000022875652000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      72KB

                                                                                                                                    • memory/5028-74-0x0000022875010000-0x0000022875032000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      136KB

                                                                                                                                    • memory/5028-95-0x00007FFC11480000-0x00007FFC11F41000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      10.8MB

                                                                                                                                    • memory/5028-89-0x0000022875620000-0x000002287562A000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      40KB

                                                                                                                                    • memory/5028-84-0x00007FFC11480000-0x00007FFC11F41000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      10.8MB

                                                                                                                                    • memory/5028-87-0x0000022875060000-0x0000022875070000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      64KB

                                                                                                                                    • memory/5028-85-0x0000022875060000-0x0000022875070000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      64KB

                                                                                                                                    • memory/5028-86-0x0000022875060000-0x0000022875070000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      64KB

                                                                                                                                    • memory/5332-1060-0x0000000000400000-0x0000000004416000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      64.1MB

                                                                                                                                    • memory/5332-719-0x0000000000400000-0x0000000004416000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      64.1MB

                                                                                                                                    • memory/5332-933-0x0000000000400000-0x0000000004416000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      64.1MB

                                                                                                                                    • memory/5716-928-0x00007FFC31630000-0x00007FFC31825000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      2.0MB

                                                                                                                                    • memory/5716-1029-0x000000006B890000-0x000000006BA0B000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      1.5MB

                                                                                                                                    • memory/5716-918-0x000000006B890000-0x000000006BA0B000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      1.5MB

                                                                                                                                    • memory/6072-1031-0x0000000000400000-0x0000000004056000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      60.3MB

                                                                                                                                    • memory/6096-1028-0x0000000000400000-0x0000000004416000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      64.1MB

                                                                                                                                    • memory/6096-778-0x0000000000400000-0x0000000004416000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      64.1MB