Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-04-2024 19:55

General

  • Target

    ee348a4be35465c3b471b068df0e2db5101b0f014a4353806648b4f5892b9c8e.exe

  • Size

    1.8MB

  • MD5

    1fc3484a05a8d8e94070ef69880aecc0

  • SHA1

    5ef6ddcfa261b3cd94e5d8452566a3a1028ed585

  • SHA256

    ee348a4be35465c3b471b068df0e2db5101b0f014a4353806648b4f5892b9c8e

  • SHA512

    e36d070a39ac397096f39beaedea708a95113363b0e14eac2dfb635d72fda0e7accc6ce02e20d6593b4dd665835e02102da9164c1deda91879b9ddd510ae5dd3

  • SSDEEP

    49152:niEs3FYbJD8ytjfjV6iecICBnE1BqqFe2VZ:niv6gytjfjV6YNkUY

Malware Config

Extracted

Family

amadey

Version

4.17

C2

http://193.233.132.167

Attributes
  • install_dir

    4d0ab15804

  • install_file

    chrosha.exe

  • strings_key

    1a9519d7b465e1f4880fa09a6162d768

  • url_paths

    /enigma/index.php

rc4.plain

Extracted

Family

redline

Botnet

@CLOUDYTTEAM

C2

185.172.128.33:8970

Extracted

Family

redline

Botnet

Test1234

C2

185.215.113.67:26260

Extracted

Family

stealc

C2

http://52.143.157.84

Attributes
  • url_path

    /c73eed764cc59dcb.php

Extracted

Family

lumma

C2

https://affordcharmcropwo.shop/api

https://cleartotalfisherwo.shop/api

https://worryfillvolcawoi.shop/api

https://enthusiasimtitleow.shop/api

https://productivelookewr.shop/api

https://dismissalcylinderhostw.shop/api

https://tolerateilusidjukl.shop/api

https://diskretainvigorousiw.shop/api

https://communicationgenerwo.shop/api

https://shatterbreathepsw.shop/api

https://pillowbrocccolipe.shop/api

https://shortsvelventysjo.shop/api

https://incredibleextedwj.shop/api

https://alcojoldwograpciw.shop/api

https://liabilitynighstjsko.shop/api

https://demonstationfukewko.shop/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect ZGRat V1 6 IoCs
  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 9 IoCs
  • Lumma Stealer

    An infostealer written in C++ first seen in August 2022.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Stops running service(s) 3 TTPs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 6 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 34 IoCs
  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 7 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Drops file in System32 directory 6 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Program Files directory 10 IoCs
  • Drops file in Windows directory 5 IoCs
  • Launches sc.exe 3 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 5 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 23 IoCs
  • Suspicious use of FindShellTrayWindow 7 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ee348a4be35465c3b471b068df0e2db5101b0f014a4353806648b4f5892b9c8e.exe
    "C:\Users\Admin\AppData\Local\Temp\ee348a4be35465c3b471b068df0e2db5101b0f014a4353806648b4f5892b9c8e.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    PID:2756
  • C:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exe
    C:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exe
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Executes dropped EXE
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1644
    • C:\Users\Admin\AppData\Local\Temp\1000147001\swiiiii.exe
      "C:\Users\Admin\AppData\Local\Temp\1000147001\swiiiii.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1568
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        3⤵
          PID:5008
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1568 -s 868
          3⤵
          • Program crash
          PID:1452
      • C:\Users\Admin\AppData\Local\Temp\1000148001\alexxxxxxxx.exe
        "C:\Users\Admin\AppData\Local\Temp\1000148001\alexxxxxxxx.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:3080
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          3⤵
          • Checks computer location settings
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1304
          • C:\Users\Admin\AppData\Roaming\configurationValue\keks.exe
            "C:\Users\Admin\AppData\Roaming\configurationValue\keks.exe"
            4⤵
            • Executes dropped EXE
            • Modifies system certificate store
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1556
          • C:\Users\Admin\AppData\Roaming\configurationValue\trf.exe
            "C:\Users\Admin\AppData\Roaming\configurationValue\trf.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:624
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "RegAsm.exe"
            4⤵
              PID:1572
              • C:\Windows\SysWOW64\choice.exe
                choice /C Y /N /D Y /T 3
                5⤵
                  PID:4316
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3080 -s 332
              3⤵
              • Program crash
              PID:3548
          • C:\Users\Admin\AppData\Local\Temp\1000149001\gold.exe
            "C:\Users\Admin\AppData\Local\Temp\1000149001\gold.exe"
            2⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:1392
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
              3⤵
                PID:3660
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1392 -s 356
                3⤵
                • Program crash
                PID:1820
            • C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe
              "C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe"
              2⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:5012
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN NewB.exe /TR "C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe" /F
                3⤵
                • Creates scheduled task(s)
                PID:3640
              • C:\Users\Admin\AppData\Local\Temp\1000223001\ISetup8.exe
                "C:\Users\Admin\AppData\Local\Temp\1000223001\ISetup8.exe"
                3⤵
                • Checks computer location settings
                • Executes dropped EXE
                PID:1076
                • C:\Users\Admin\AppData\Local\Temp\utw.0.exe
                  "C:\Users\Admin\AppData\Local\Temp\utw.0.exe"
                  4⤵
                  • Executes dropped EXE
                  PID:1924
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 1924 -s 1016
                    5⤵
                    • Program crash
                    PID:4524
                • C:\Users\Admin\AppData\Local\Temp\utw.2\run.exe
                  "C:\Users\Admin\AppData\Local\Temp\utw.2\run.exe"
                  4⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of SetThreadContext
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious behavior: MapViewOfSection
                  • Suspicious use of SetWindowsHookEx
                  PID:4976
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\SysWOW64\cmd.exe
                    5⤵
                    • Suspicious use of SetThreadContext
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious behavior: MapViewOfSection
                    PID:1356
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                      6⤵
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of SetWindowsHookEx
                      PID:2608
                • C:\Users\Admin\AppData\Local\Temp\utw.3.exe
                  "C:\Users\Admin\AppData\Local\Temp\utw.3.exe"
                  4⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Checks SCSI registry key(s)
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  PID:1908
                  • C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe
                    "C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD1
                    5⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4236
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1076 -s 1152
                  4⤵
                  • Program crash
                  PID:2252
              • C:\Users\Admin\AppData\Local\Temp\1000225001\4767d2e713f2021e8fe856e3ea638b58.exe
                "C:\Users\Admin\AppData\Local\Temp\1000225001\4767d2e713f2021e8fe856e3ea638b58.exe"
                3⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:1244
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell -nologo -noprofile
                  4⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2492
                • C:\Users\Admin\AppData\Local\Temp\1000225001\4767d2e713f2021e8fe856e3ea638b58.exe
                  "C:\Users\Admin\AppData\Local\Temp\1000225001\4767d2e713f2021e8fe856e3ea638b58.exe"
                  4⤵
                  • Executes dropped EXE
                  • Adds Run key to start application
                  • Checks for VirtualBox DLLs, possible anti-VM trick
                  • Drops file in Windows directory
                  • Modifies data under HKEY_USERS
                  PID:3960
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    powershell -nologo -noprofile
                    5⤵
                    • Drops file in System32 directory
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4716
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
                    5⤵
                      PID:3472
                      • C:\Windows\system32\netsh.exe
                        netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                        6⤵
                        • Modifies Windows Firewall
                        PID:2252
                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      powershell -nologo -noprofile
                      5⤵
                      • Drops file in System32 directory
                      • Modifies data under HKEY_USERS
                      • Suspicious use of AdjustPrivilegeToken
                      PID:468
                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      powershell -nologo -noprofile
                      5⤵
                      • Drops file in System32 directory
                      • Modifies data under HKEY_USERS
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2640
                    • C:\Windows\rss\csrss.exe
                      C:\Windows\rss\csrss.exe
                      5⤵
                      • Executes dropped EXE
                      • Adds Run key to start application
                      • Manipulates WinMonFS driver.
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2044
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        powershell -nologo -noprofile
                        6⤵
                        • Modifies data under HKEY_USERS
                        PID:4076
                      • C:\Windows\SYSTEM32\schtasks.exe
                        schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                        6⤵
                        • Creates scheduled task(s)
                        PID:3060
                      • C:\Windows\SYSTEM32\schtasks.exe
                        schtasks /delete /tn ScheduledUpdate /f
                        6⤵
                          PID:3956
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          powershell -nologo -noprofile
                          6⤵
                          • Drops file in System32 directory
                          • Modifies data under HKEY_USERS
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4708
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          powershell -nologo -noprofile
                          6⤵
                          • Drops file in System32 directory
                          • Modifies data under HKEY_USERS
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4772
                        • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                          C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
                          6⤵
                          • Executes dropped EXE
                          PID:4468
                        • C:\Windows\SYSTEM32\schtasks.exe
                          schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                          6⤵
                          • Creates scheduled task(s)
                          PID:3816
                        • C:\Windows\windefender.exe
                          "C:\Windows\windefender.exe"
                          6⤵
                          • Executes dropped EXE
                          PID:4380
                          • C:\Windows\SysWOW64\cmd.exe
                            cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                            7⤵
                              PID:4200
                              • C:\Windows\SysWOW64\sc.exe
                                sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                                8⤵
                                • Launches sc.exe
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1288
                  • C:\Users\Admin\AppData\Local\Temp\1000152001\jok.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000152001\jok.exe"
                    2⤵
                    • Executes dropped EXE
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2544
                  • C:\Users\Admin\AppData\Local\Temp\1000153001\swiiii.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000153001\swiiii.exe"
                    2⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • Suspicious use of WriteProcessMemory
                    PID:3532
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                      3⤵
                        PID:208
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                        3⤵
                          PID:2840
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                          3⤵
                            PID:4532
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                            3⤵
                            • Loads dropped DLL
                            • Checks processor information in registry
                            • Suspicious behavior: EnumeratesProcesses
                            PID:3508
                        • C:\Users\Admin\AppData\Local\Temp\1000208001\install.exe
                          "C:\Users\Admin\AppData\Local\Temp\1000208001\install.exe"
                          2⤵
                          • Checks computer location settings
                          • Executes dropped EXE
                          • Drops file in Program Files directory
                          PID:2044
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\GameServerClient\installg.bat" "
                            3⤵
                              PID:1288
                              • C:\Windows\SysWOW64\sc.exe
                                Sc delete GameServerClient
                                4⤵
                                • Launches sc.exe
                                PID:1904
                              • C:\Program Files (x86)\GameServerClient\GameService.exe
                                GameService remove GameServerClient confirm
                                4⤵
                                • Executes dropped EXE
                                PID:2168
                              • C:\Program Files (x86)\GameServerClient\GameService.exe
                                GameService install GameServerClient "C:\Program Files (x86)\GameServerClient\GameServerClient.exe"
                                4⤵
                                • Executes dropped EXE
                                PID:1916
                              • C:\Program Files (x86)\GameServerClient\GameService.exe
                                GameService start GameServerClient
                                4⤵
                                • Executes dropped EXE
                                PID:756
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\GameServerClient\installc.bat" "
                              3⤵
                                PID:464
                                • C:\Windows\SysWOW64\sc.exe
                                  Sc delete GameServerClientC
                                  4⤵
                                  • Launches sc.exe
                                  PID:636
                                • C:\Program Files (x86)\GameServerClient\GameService.exe
                                  GameService remove GameServerClientC confirm
                                  4⤵
                                  • Executes dropped EXE
                                  PID:4760
                                • C:\Program Files (x86)\GameServerClient\GameService.exe
                                  GameService install GameServerClientC "C:\Program Files (x86)\GameServerClient\GameServerClientC.exe"
                                  4⤵
                                  • Executes dropped EXE
                                  PID:3552
                                • C:\Program Files (x86)\GameServerClient\GameService.exe
                                  GameService start GameServerClientC
                                  4⤵
                                  • Executes dropped EXE
                                  PID:4620
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7ZSfx000.cmd" "
                                3⤵
                                  PID:4460
                              • C:\Windows\SysWOW64\rundll32.exe
                                "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll, Main
                                2⤵
                                • Loads dropped DLL
                                PID:4548
                                • C:\Windows\system32\rundll32.exe
                                  "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll, Main
                                  3⤵
                                  • Blocklisted process makes network request
                                  • Loads dropped DLL
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:3080
                                  • C:\Windows\system32\netsh.exe
                                    netsh wlan show profiles
                                    4⤵
                                      PID:4760
                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\906287020291_Desktop.zip' -CompressionLevel Optimal
                                      4⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:1084
                                • C:\Windows\SysWOW64\rundll32.exe
                                  "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main
                                  2⤵
                                  • Blocklisted process makes network request
                                  • Loads dropped DLL
                                  PID:1432
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1568 -ip 1568
                                1⤵
                                  PID:3204
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3080 -ip 3080
                                  1⤵
                                    PID:4844
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1392 -ip 1392
                                    1⤵
                                      PID:2000
                                    • C:\Program Files (x86)\GameServerClient\GameService.exe
                                      "C:\Program Files (x86)\GameServerClient\GameService.exe"
                                      1⤵
                                      • Executes dropped EXE
                                      PID:4084
                                      • C:\Program Files (x86)\GameServerClient\GameServerClient.exe
                                        "C:\Program Files (x86)\GameServerClient\GameServerClient.exe"
                                        2⤵
                                        • Executes dropped EXE
                                        PID:1900
                                        • C:\Windows\Temp\594645.exe
                                          "C:\Windows\Temp\594645.exe" --list-devices
                                          3⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          PID:1568
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1076 -ip 1076
                                      1⤵
                                        PID:3272
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 1924 -ip 1924
                                        1⤵
                                          PID:2364
                                        • C:\Program Files (x86)\GameServerClient\GameService.exe
                                          "C:\Program Files (x86)\GameServerClient\GameService.exe"
                                          1⤵
                                          • Executes dropped EXE
                                          PID:1092
                                          • C:\Program Files (x86)\GameServerClient\GameServerClientC.exe
                                            "C:\Program Files (x86)\GameServerClient\GameServerClientC.exe"
                                            2⤵
                                            • Executes dropped EXE
                                            PID:2072
                                            • C:\Windows\Temp\186304.exe
                                              "C:\Windows\Temp\186304.exe" --coin BTC -m ADDRESSES -t 0 --range 3f7ca126800000000:3f7ca126a00000000 -o xxx0.txt -i C:\Windows\Temp\curjob.bin
                                              3⤵
                                              • Executes dropped EXE
                                              PID:3672
                                        • C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe
                                          C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe
                                          1⤵
                                          • Executes dropped EXE
                                          PID:1656
                                        • C:\Windows\windefender.exe
                                          C:\Windows\windefender.exe
                                          1⤵
                                          • Executes dropped EXE
                                          • Modifies data under HKEY_USERS
                                          PID:4920
                                        • C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe
                                          C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe
                                          1⤵
                                          • Executes dropped EXE
                                          PID:2792

                                        Network

                                        MITRE ATT&CK Enterprise v15

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\Program Files (x86)\GameServerClient\GameServerClient.exe

                                          Filesize

                                          2.5MB

                                          MD5

                                          bf4360d76b38ed71a8ec2391f1985a5f

                                          SHA1

                                          57d28dc8fd4ac052d0ae32ca22143e7b57733003

                                          SHA256

                                          4ebec636d15203378e15cc11967d00cbd17e040db1fca85cf3c10bbf7451adaf

                                          SHA512

                                          7b46bc87dc384d8227adf5b538861165fa9efa18e28f2de5c1a1bb1a3a9f6bef29b449706c4d8e637ae9805bb51c8548cb761facf82d1c273d3e3699ae727acd

                                        • C:\Program Files (x86)\GameServerClient\GameServerClientC.exe

                                          Filesize

                                          13.2MB

                                          MD5

                                          9c3cfd2a7e37af3ed81598469fcbe08a

                                          SHA1

                                          059bb3b9bb547feedc2bf07c89c9a604aaf04f3d

                                          SHA256

                                          6991a5928be7bfbb9a18f20bf00121371b4127f8295e5673303bfe044da8f715

                                          SHA512

                                          1b48d43d665cbe8588f984a588439d16aac12fc3a9c70cfbf223350221db0e60dedb1ad3b4b83d5b2e7352c3ee402884390647da3189af8e26c307eb5c679edf

                                        • C:\Program Files (x86)\GameServerClient\GameService.exe

                                          Filesize

                                          288KB

                                          MD5

                                          d9ec6f3a3b2ac7cd5eef07bd86e3efbc

                                          SHA1

                                          e1908caab6f938404af85a7df0f80f877a4d9ee6

                                          SHA256

                                          472232ca821b5c2ef562ab07f53638bc2cc82eae84cea13fbe674d6022b6481c

                                          SHA512

                                          1b6b8702dca3cb90fe64c4e48f2477045900c5e71dd96b84f673478bab1089febfa186bfc55aebd721ca73db1669145280ebb4e1862d3b9dc21f712cd76a07c4

                                        • C:\Program Files (x86)\GameServerClient\installc.bat

                                          Filesize

                                          244B

                                          MD5

                                          a3d3d85bc0b7945908dd1a5eaf6e6266

                                          SHA1

                                          8979e79895226f2d05f8af1e10b99e8496348131

                                          SHA256

                                          3aad1c9feb23c9383ee7e5c8cb966afd262142b2e0124b8e9cda010ea53f24c6

                                          SHA512

                                          9184b09bdc10fb3ec981624f286ab4228917f8b1f5cbec7ee875d468c38461395d970d860e3ff99cb184e8839ed6c3ca85a9eaffdd24f15c74b311623c48f618

                                        • C:\Program Files (x86)\GameServerClient\installg.bat

                                          Filesize

                                          238B

                                          MD5

                                          b6b57c523f3733580d973f0f79d5c609

                                          SHA1

                                          2cc30cfd66817274c84f71d46f60d9e578b7bf95

                                          SHA256

                                          d8d718641bdf39cca1a5db7bb52d3c66d400a97bef3cafdd81cd7e711a51c570

                                          SHA512

                                          d39440163592bc3b1cb7830f236a97d5819c10775e453637d5a04a981e9a336480c6b4701afdceba0d52dfe09413b7abe2ad58ff55b5057a26229f3ccdc3a7c7

                                        • C:\ProgramData\mozglue.dll

                                          Filesize

                                          593KB

                                          MD5

                                          c8fd9be83bc728cc04beffafc2907fe9

                                          SHA1

                                          95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                          SHA256

                                          ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                          SHA512

                                          fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                        • C:\ProgramData\nss3.dll

                                          Filesize

                                          2.0MB

                                          MD5

                                          1cc453cdf74f31e4d913ff9c10acdde2

                                          SHA1

                                          6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                          SHA256

                                          ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                          SHA512

                                          dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                        • C:\Users\Admin\AppData\Local\Temp\1000147001\swiiiii.exe

                                          Filesize

                                          321KB

                                          MD5

                                          1c7d0f34bb1d85b5d2c01367cc8f62ef

                                          SHA1

                                          33aedadb5361f1646cffd68791d72ba5f1424114

                                          SHA256

                                          e9e09c5e5d03d21fca820bd9b0a0ea7b86ab9e85cdc9996f8f1dc822b0cc801c

                                          SHA512

                                          53bf85d2b004f69bbbf7b6dc78e5f021aba71b6f814101c55d3bf76e6d058a973bc58270b6b621b2100c6e02d382f568d1e96024464e8ea81e6db8ccd948679d

                                        • C:\Users\Admin\AppData\Local\Temp\1000148001\alexxxxxxxx.exe

                                          Filesize

                                          2.7MB

                                          MD5

                                          31841361be1f3dc6c2ce7756b490bf0f

                                          SHA1

                                          ff2506641a401ac999f5870769f50b7326f7e4eb

                                          SHA256

                                          222393a4ab4b2ae83ca861faee6df02ac274b2f2ca0bed8db1783dd61f2f37ee

                                          SHA512

                                          53d66fa19e8db360042dadc55caaa9a1ca30a9d825e23ed2a58f32834691eb2aaaa27a4471e3fc4d13e201accc43160436ed0e9939df1cc227a62a09a2ae0019

                                        • C:\Users\Admin\AppData\Local\Temp\1000149001\gold.exe

                                          Filesize

                                          460KB

                                          MD5

                                          b22521fb370921bb5d69bf8deecce59e

                                          SHA1

                                          3d4486b206e8aaac14a3cf201c5ac152a2a7d4ea

                                          SHA256

                                          b30d10e292f89f4d288839974f71f6b703d6d9a9ae698ea172a2b64364e77158

                                          SHA512

                                          1f7d64ba5266314ed18f577f0984706c21f4f48e8cdb069130e4435c2bcdf219f8dd27e4d3bf3a373f4db4c01e30efe8d7f4d87f4d8cbbbeaf9c7043f685994c

                                        • C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe

                                          Filesize

                                          418KB

                                          MD5

                                          0099a99f5ffb3c3ae78af0084136fab3

                                          SHA1

                                          0205a065728a9ec1133e8a372b1e3864df776e8c

                                          SHA256

                                          919ae827ff59fcbe3dbaea9e62855a4d27690818189f696cfb5916a88c823226

                                          SHA512

                                          5ac4f3265c7dd7d172284fb28c94f8fc6428c27853e70989f4ec4208f9897be91720e8eee1906d8e843ab05798f3279a12492a32e8a118f5621ac5e1be2031b6

                                        • C:\Users\Admin\AppData\Local\Temp\1000152001\jok.exe

                                          Filesize

                                          304KB

                                          MD5

                                          8510bcf5bc264c70180abe78298e4d5b

                                          SHA1

                                          2c3a2a85d129b0d750ed146d1d4e4d6274623e28

                                          SHA256

                                          096220045877e456edfea1adcd5bf1efd332665ef073c6d1e9474c84ca5433f6

                                          SHA512

                                          5ff0a47f9e14e22fc76d41910b2986605376605913173d8ad83d29d85eb79b679459e2723a6ad17bc3c3b8c9b359e2be7348ee1c21fa2e8ceb7cc9220515258d

                                        • C:\Users\Admin\AppData\Local\Temp\1000153001\swiiii.exe

                                          Filesize

                                          158KB

                                          MD5

                                          586f7fecacd49adab650fae36e2db994

                                          SHA1

                                          35d9fb512a8161ce867812633f0a43b042f9a5e6

                                          SHA256

                                          cf88d499c83da613ad5ccd8805822901bdc3a12eb9b15804aeff8c53dc05fc4e

                                          SHA512

                                          a44a2c99d18509681505cf70a251baf2558030a8648d9c621acc72fafcb2f744e3ef664dfd0229baf7c78fb72e69f5d644c755ded4060dcafa7f711d70e94772

                                        • C:\Users\Admin\AppData\Local\Temp\1000208001\install.exe

                                          Filesize

                                          2.4MB

                                          MD5

                                          6184676075afacb9103ae8cbf542c1ed

                                          SHA1

                                          bc757642ad2fcfd6d1da79c0754323cdc823a937

                                          SHA256

                                          a0b0b39b69005a2d39a8b8271a3518aa0a55148b794d2b4995b3c87ed183b23b

                                          SHA512

                                          861ac361b585a069f2274b577b30f2a13baf72a60acd4f22da41885aee92c3975445150822f1072590d7b574ff54eb3abde6a6c4f800988ab9ff4344884f41fa

                                        • C:\Users\Admin\AppData\Local\Temp\1000223001\ISetup8.exe

                                          Filesize

                                          449KB

                                          MD5

                                          20a0a1688a5e7b415c5205993ab9ebd8

                                          SHA1

                                          bebd94aeb7c85496a7015d81cd4cc0aa12f2290e

                                          SHA256

                                          285ddca9d09a6bd8cc1e0159962d7f899ef47118575bd0ff2c0a4959f8c457eb

                                          SHA512

                                          2c45ce8eacf486b8006aa7d11656483fad200fec263426d4caee5a4ecdf8ff819248a0a1916821384b8cfe0a672ccb216a9578613561a29608f4256464e51713

                                        • C:\Users\Admin\AppData\Local\Temp\1000225001\4767d2e713f2021e8fe856e3ea638b58.exe

                                          Filesize

                                          4.2MB

                                          MD5

                                          38a965bd6e064c136b1b3c0af6857055

                                          SHA1

                                          0e8b21278d9fd2d6e9781ef97a49070656426851

                                          SHA256

                                          f5bb0eb9ec9b7c9cccd3bf05a66ed0b84859d1760e0dc6e17dc789232e688bd8

                                          SHA512

                                          ddceab32e526541cd11323e9962c486cdbf32ce1447f0fd6434a091fef6d7877b3d4522f8159ce3a2d505c65d4a8610a4fbc70cfacb44d880563072ed1d4ee88

                                        • C:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exe

                                          Filesize

                                          1.8MB

                                          MD5

                                          1fc3484a05a8d8e94070ef69880aecc0

                                          SHA1

                                          5ef6ddcfa261b3cd94e5d8452566a3a1028ed585

                                          SHA256

                                          ee348a4be35465c3b471b068df0e2db5101b0f014a4353806648b4f5892b9c8e

                                          SHA512

                                          e36d070a39ac397096f39beaedea708a95113363b0e14eac2dfb635d72fda0e7accc6ce02e20d6593b4dd665835e02102da9164c1deda91879b9ddd510ae5dd3

                                        • C:\Users\Admin\AppData\Local\Temp\Tmp9710.tmp

                                          Filesize

                                          2KB

                                          MD5

                                          1420d30f964eac2c85b2ccfe968eebce

                                          SHA1

                                          bdf9a6876578a3e38079c4f8cf5d6c79687ad750

                                          SHA256

                                          f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9

                                          SHA512

                                          6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8

                                        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ouufrxcy.ojl.ps1

                                          Filesize

                                          60B

                                          MD5

                                          d17fe0a3f47be24a6453e9ef58c94641

                                          SHA1

                                          6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                          SHA256

                                          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                          SHA512

                                          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                        • C:\Users\Admin\AppData\Local\Temp\iolo\dm\ioloDMLog.txt

                                          Filesize

                                          2KB

                                          MD5

                                          50a05b4426d99650b9d346a18d33778f

                                          SHA1

                                          c00dc90436554c9fc94d7d8c17f74251ec4c16bb

                                          SHA256

                                          cd551ed4be9cd1a35b72ce3d352e19bff645f68984a76d2b34384271ffa71545

                                          SHA512

                                          1458e0f815ae1c3137591309e5a40b3db21594265804ce4178853afc15da8c56d66da2ee238692d68dc9fd08250500f57683ec475ba07cddb0e65e7517d1e0c0

                                        • C:\Users\Admin\AppData\Local\Temp\iolo\dm\ioloDMLog.txt

                                          Filesize

                                          3KB

                                          MD5

                                          852636dd8dcdea86014970816d7d94fb

                                          SHA1

                                          2b16323ea905f251599c76c770fbfbaa853ccfd2

                                          SHA256

                                          0894324d8699abb58349d17ba194a8d072c22e3f61b35f5202a8f9e7dca1af90

                                          SHA512

                                          1c9051d9f7bd4224ab330926e1fbbee09bc87c28576c92c979efc2f649f5b533905c4924a71af1d3644598f45f5e26c4d466380644b6b51ca4f65a703ee5c48d

                                        • C:\Users\Admin\AppData\Local\Temp\tmp3787.tmp

                                          Filesize

                                          20KB

                                          MD5

                                          42c395b8db48b6ce3d34c301d1eba9d5

                                          SHA1

                                          b7cfa3de344814bec105391663c0df4a74310996

                                          SHA256

                                          5644546ecefc6786c7be5b1a89e935e640963ccd34b130f21baab9370cb9055d

                                          SHA512

                                          7b9214db96e9bec8745b4161a41c4c0520cdda9950f0cd3f12c7744227a25d639d07c0dd68b552cf1e032181c2e4f8297747f27bad6c7447b0f415a86bd82845

                                        • C:\Users\Admin\AppData\Local\Temp\tmp37B9.tmp

                                          Filesize

                                          20KB

                                          MD5

                                          49693267e0adbcd119f9f5e02adf3a80

                                          SHA1

                                          3ba3d7f89b8ad195ca82c92737e960e1f2b349df

                                          SHA256

                                          d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f

                                          SHA512

                                          b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2

                                        • C:\Users\Admin\AppData\Local\Temp\utw.0.exe

                                          Filesize

                                          305KB

                                          MD5

                                          c13b5f69beeab544ed5866c1408e4823

                                          SHA1

                                          d813820f26dc47050499187cc7139a2b5d325090

                                          SHA256

                                          2645bea90f70b70e06d552bb1237ff59f453a22a0b2677ed2e8e2ff39c2fa4c7

                                          SHA512

                                          22356b6c3c482ab0fb7f1bbaad99f7af19014b043916305f5885a7a1a01893d426f931bd1e7447544b8325458d7a6daa26c2371c2b863fbe6bb5d17ddfe67377

                                        • C:\Users\Admin\AppData\Local\Temp\utw.1.zip

                                          Filesize

                                          3.7MB

                                          MD5

                                          78d3ca6355c93c72b494bb6a498bf639

                                          SHA1

                                          2fa4e5df74bfe75c207c881a1b0d3bc1c62c8b0e

                                          SHA256

                                          a1dd547a63b256aa6a16871ed03f8b025226f7617e67b8817a08444df077b001

                                          SHA512

                                          1b2df7bee2514aee7efd3579f5dd33c76b40606d07dba69a34c45747662fad61174db4931bca02b058830107959205e889fee74f8ccc9f6e03f9fd111761f4ea

                                        • C:\Users\Admin\AppData\Local\Temp\utw.2\UIxMarketPlugin.dll

                                          Filesize

                                          1.6MB

                                          MD5

                                          d1ba9412e78bfc98074c5d724a1a87d6

                                          SHA1

                                          0572f98d78fb0b366b5a086c2a74cc68b771d368

                                          SHA256

                                          cbcea8f28d8916219d1e8b0a8ca2db17e338eb812431bc4ad0cb36c06fd67f15

                                          SHA512

                                          8765de36d3824b12c0a4478c31b985878d4811bd0e5b6fba4ea07f8c76340bd66a2da3490d4871b95d9a12f96efc25507dfd87f431de211664dbe9a9c914af6f

                                        • C:\Users\Admin\AppData\Local\Temp\utw.2\bunch.dat

                                          Filesize

                                          1.3MB

                                          MD5

                                          1e8237d3028ab52821d69099e0954f97

                                          SHA1

                                          30a6ae353adda0c471c6ed5b7a2458b07185abf2

                                          SHA256

                                          9387488f9d338e211be2cb45109bf590a5070180bc0d4a703f70d3cb3c4e1742

                                          SHA512

                                          a6406d7c18694ee014d59df581f1f76e980b68e3361ae680dc979606a423eba48d35e37f143154dd97fe5f066baf0ea51a2e9f8bc822d593e1cba70ead6559f3

                                        • C:\Users\Admin\AppData\Local\Temp\utw.2\relay.dll

                                          Filesize

                                          1.5MB

                                          MD5

                                          10d51becd0bbce0fab147ff9658c565e

                                          SHA1

                                          4689a18112ff876d3c066bc8c14a08fd6b7b7a4a

                                          SHA256

                                          7b2db9c88f60ed6dd24b1dec321a304564780fdb191a96ec35c051856128f1ed

                                          SHA512

                                          29faf493bb28f7842c905adc5312f31741effb09f841059b53d73b22aea2c4d41d73db10bbf37703d6aeb936ffacbc756a3cc85ba3c0b6a6863ef4d27fefcd29

                                        • C:\Users\Admin\AppData\Local\Temp\utw.2\run.exe

                                          Filesize

                                          2.4MB

                                          MD5

                                          9fb4770ced09aae3b437c1c6eb6d7334

                                          SHA1

                                          fe54b31b0db8665aa5b22bed147e8295afc88a03

                                          SHA256

                                          a05b592a971fe5011554013bcfe9a4aaf9cfc633bdd1fe3a8197f213d557b8d3

                                          SHA512

                                          140fee6daf23fe8b7e441b3b4de83554af804f00ecedc421907a385ac79a63164bd9f28b4be061c2ea2262755d85e14d3a8e7dc910547837b664d78d93667256

                                        • C:\Users\Admin\AppData\Local\Temp\utw.2\whale.dbf

                                          Filesize

                                          85KB

                                          MD5

                                          a723bf46048e0bfb15b8d77d7a648c3e

                                          SHA1

                                          8952d3c34e9341e4425571e10f22b782695bb915

                                          SHA256

                                          b440170853bdb43b66497f701aee2901080326975140b095a1669cb9dee13422

                                          SHA512

                                          ca8ea2f7f3c7af21b5673a0a3f2611b6580a7ed02efa2cfd8b343eb644ff09682bde43b25ef7aab68530d5ce31dcbd252c382dd336ecb610d4c4ebde78347273

                                        • C:\Users\Admin\AppData\Local\Temp\utw.3.exe

                                          Filesize

                                          4.6MB

                                          MD5

                                          397926927bca55be4a77839b1c44de6e

                                          SHA1

                                          e10f3434ef3021c399dbba047832f02b3c898dbd

                                          SHA256

                                          4f07e1095cc915b2d46eb149d1c3be14f3f4b4bd2742517265947fd23bdca5a7

                                          SHA512

                                          cf54136b977fc8af7e8746d78676d0d464362a8cfa2213e392487003b5034562ee802e6911760b98a847bddd36ad664f32d849af84d7e208d4648bd97a2fa954

                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3906287020-2915474608-1755617787-1000\76b53b3ec448f7ccdda2063b15d2bfc3_215f2dba-ef84-4dd1-b127-5f514a0c233b

                                          Filesize

                                          2KB

                                          MD5

                                          56a19f8a5482ceb48bd02615fbd3bb6e

                                          SHA1

                                          41cd69886c395b4a7f8edfc62ae852895e36c75e

                                          SHA256

                                          37b66eb4ad8d0fdbf1ccd703a4049faa4c7e832706f5a66281aa8e59d50f4c7b

                                          SHA512

                                          6d5815eebaaa0a29720f14db042bee7f0b55b70f71da0d0fd60a21d8b38195137fc56d4c4e15c12db3fd412af24d7fc112b3f545199ba6e48720e98800dfc875

                                        • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll

                                          Filesize

                                          109KB

                                          MD5

                                          154c3f1334dd435f562672f2664fea6b

                                          SHA1

                                          51dd25e2ba98b8546de163b8f26e2972a90c2c79

                                          SHA256

                                          5f431129f97f3d56929f1e5584819e091bd6c854d7e18503074737fc6d79e33f

                                          SHA512

                                          1bca69bbcdb7ecd418769e9d4befc458f9f8e3cee81feb7316bb61e189e2904f4431e4cc7d291e179a5dec441b959d428d8e433f579036f763bbad6460222841

                                        • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll

                                          Filesize

                                          1.2MB

                                          MD5

                                          f35b671fda2603ec30ace10946f11a90

                                          SHA1

                                          059ad6b06559d4db581b1879e709f32f80850872

                                          SHA256

                                          83e3df5bec15d5333935bea8b719a6d677e2fb3dc1cf9e18e7b82fd0438285c7

                                          SHA512

                                          b5fa27d08c64727cef7fdda5e68054a4359cd697df50d70d1d90da583195959a139066a6214531bbc5f20cd4f9bc1ca3e4244396547381291a6a1d2df9cf8705

                                        • C:\Users\Admin\AppData\Roaming\configurationValue\keks.exe

                                          Filesize

                                          304KB

                                          MD5

                                          0c582da789c91878ab2f1b12d7461496

                                          SHA1

                                          238bd2408f484dd13113889792d6e46d6b41c5ba

                                          SHA256

                                          a6ab532816fbb0c9664c708746db35287aaa85cbb417bef2eafcd9f5eaf7cf67

                                          SHA512

                                          a1b7c5c13462a7704ea2aea5025d1cb16ddd622fe1e2de3bbe08337c271a4dc8b9be2eae58a4896a7df3ad44823675384dbc60bdc737c54b173909be7a0a086a

                                        • C:\Users\Admin\AppData\Roaming\configurationValue\trf.exe

                                          Filesize

                                          750KB

                                          MD5

                                          20ae0bb07ba77cb3748aa63b6eb51afb

                                          SHA1

                                          87c468dc8f3d90a63833d36e4c900fa88d505c6d

                                          SHA256

                                          daf6ae706fc78595f0d386817a0f8a3a7eb4ec8613219382b1cbaa7089418e7d

                                          SHA512

                                          db315e00ce2b2d5a05cb69541ee45aade4332e424c4955a79d2b7261ab7bd739f02dc688224f031a7a030c92fa915d029538e236dbd3c28b8d07d1265a52e5b2

                                        • C:\Users\Admin\Desktop\Microsoft Edge.lnk

                                          Filesize

                                          2KB

                                          MD5

                                          17f7daf782738b3ae09406b9b72445d4

                                          SHA1

                                          1220fee4675d60de64b000d30f9a9deafc18d28c

                                          SHA256

                                          cbc0338e8d33243880a10b1be9176ca2521004d6264c8aafb956317ed3c83bc6

                                          SHA512

                                          bb21e68fa4bdc7e92058cd1b3b34f8b30c2177050978b537fb8e99f5d8055d3fe671388383f6cd2c730252ddfeb526ce01631de9a3a2494432da9e8a483f2c65

                                        • C:\Users\Admin\Desktop\Microsoft Edge.lnk

                                          Filesize

                                          2KB

                                          MD5

                                          9aeec98871cd6e4df29a71cd4e08740e

                                          SHA1

                                          db034ecd8ad727065b8180173ff3ff4c0343d607

                                          SHA256

                                          409e3f8a9e9cb339b6ab43989fd067e6cae1ba1f6479e14fa8be5912b49d914d

                                          SHA512

                                          8832d05049546a8227e4a08807e3b243a3eded6366959e77aede75e38b932a2af490a0b33dfd0c659d139bfc5b9aa9fb5d12c7b4e773ae5be306374f9694d315

                                        • C:\Users\Public\Desktop\Google Chrome.lnk

                                          Filesize

                                          2KB

                                          MD5

                                          24b78a2d82b708b851741bb37fc85a46

                                          SHA1

                                          58aaa9e4f7e4e4d1393991c1c9bde736a20a619f

                                          SHA256

                                          ed2d095ff3ddfe3846edc26b249d36825ea2dc489f6399de5dd78c5310e8470b

                                          SHA512

                                          0f92cb7495d538d439d1bec043ac16bd6c347f39505fec76ddf40ce1616881215c8151d0e873d080f40c0e05359f3e888a590fd48ce67042b859c91b5029220e

                                        • C:\Users\Public\Desktop\Google Chrome.lnk

                                          Filesize

                                          2KB

                                          MD5

                                          497562c072bbcba60f10168433ab7345

                                          SHA1

                                          92fe6469aaa9f4f25916467f86942813c07c713d

                                          SHA256

                                          164dc769576d976e05163201ea5647ae564233a6dcf69fc2cc1774845f9a9763

                                          SHA512

                                          1145f0d46c4445a515c917e9002d9148814ab8afd36041e4eeceb73cc12bda299c2b301ae508b08b949356944d6864ada0e35547aa1625ab31bef5f21dc52f85

                                        • C:\Windows\Temp\186304.exe

                                          Filesize

                                          13.1MB

                                          MD5

                                          bfe6b13011bbba05c28109cf6730f8a1

                                          SHA1

                                          28da37544341c3587c11c1f1f294505516434d40

                                          SHA256

                                          93fc509fc9fad8d0191ceb7fe43ae7be1ed176862eacf0f905120257b15ecbdd

                                          SHA512

                                          d717859dd8b04832588e9ada5f83a8e2953c6214364a189b1b731212a5d4cdd1ac441646339efc9484b38a49d518d70f09624028e0a12921d7f2778fd9982660

                                        • C:\Windows\Temp\594645.exe

                                          Filesize

                                          2.0MB

                                          MD5

                                          5c9e996ee95437c15b8d312932e72529

                                          SHA1

                                          eb174c76a8759f4b85765fa24d751846f4a2d2ef

                                          SHA256

                                          0eecdbfabaaef36f497e944a6ceb468d01824f3ae6457b4ae4b3ac8e95eebb55

                                          SHA512

                                          935102aad64da7eeb3e4b172488b3a0395298d480f885ecedc5d8325f0a9eabeea8ba1ece512753ac170a03016c80ba4990786ab608b4de0b11e6343fbf2192b

                                        • C:\Windows\Temp\cudart64_101.dll

                                          Filesize

                                          398KB

                                          MD5

                                          1d7955354884a9058e89bb8ea34415c9

                                          SHA1

                                          62c046984afd51877ecadad1eca209fda74c8cb1

                                          SHA256

                                          111f216aef35f45086888c3f0a30bb9ab48e2b333daeddafd3a76be037a22a6e

                                          SHA512

                                          7eb8739841c476cda3cf4c8220998bc8c435c04a89c4bbef27b8f3b904762dede224552b4204d35935562aa73f258c4e0ddb69d065f732cb06cc357796cdd1b2

                                        • memory/624-103-0x0000000000540000-0x0000000000600000-memory.dmp

                                          Filesize

                                          768KB

                                        • memory/624-222-0x000000001BE10000-0x000000001BE2E000-memory.dmp

                                          Filesize

                                          120KB

                                        • memory/624-217-0x000000001C9B0000-0x000000001CA26000-memory.dmp

                                          Filesize

                                          472KB

                                        • memory/1076-532-0x0000000000400000-0x0000000004060000-memory.dmp

                                          Filesize

                                          60.4MB

                                        • memory/1084-540-0x00000199F1C00000-0x00000199F1C12000-memory.dmp

                                          Filesize

                                          72KB

                                        • memory/1084-541-0x00000199F1B90000-0x00000199F1B9A000-memory.dmp

                                          Filesize

                                          40KB

                                        • memory/1084-514-0x00000199F1B30000-0x00000199F1B52000-memory.dmp

                                          Filesize

                                          136KB

                                        • memory/1244-696-0x0000000000400000-0x0000000004420000-memory.dmp

                                          Filesize

                                          64.1MB

                                        • memory/1304-77-0x0000000000400000-0x0000000000592000-memory.dmp

                                          Filesize

                                          1.6MB

                                        • memory/1356-590-0x00007FFEF8BF0000-0x00007FFEF8DE5000-memory.dmp

                                          Filesize

                                          2.0MB

                                        • memory/1356-685-0x000000006BFE0000-0x000000006C15B000-memory.dmp

                                          Filesize

                                          1.5MB

                                        • memory/1556-134-0x0000000006380000-0x00000000063F6000-memory.dmp

                                          Filesize

                                          472KB

                                        • memory/1556-138-0x0000000006CF0000-0x0000000006D0E000-memory.dmp

                                          Filesize

                                          120KB

                                        • memory/1556-146-0x0000000006F20000-0x0000000006F5C000-memory.dmp

                                          Filesize

                                          240KB

                                        • memory/1556-145-0x0000000006EC0000-0x0000000006ED2000-memory.dmp

                                          Filesize

                                          72KB

                                        • memory/1556-537-0x0000000008210000-0x00000000083D2000-memory.dmp

                                          Filesize

                                          1.8MB

                                        • memory/1556-143-0x0000000007430000-0x0000000007A48000-memory.dmp

                                          Filesize

                                          6.1MB

                                        • memory/1556-144-0x0000000006F80000-0x000000000708A000-memory.dmp

                                          Filesize

                                          1.0MB

                                        • memory/1556-538-0x0000000008B90000-0x00000000090BC000-memory.dmp

                                          Filesize

                                          5.2MB

                                        • memory/1556-100-0x0000000005B10000-0x00000000060B4000-memory.dmp

                                          Filesize

                                          5.6MB

                                        • memory/1556-99-0x0000000000D10000-0x0000000000D62000-memory.dmp

                                          Filesize

                                          328KB

                                        • memory/1556-360-0x00000000071D0000-0x0000000007236000-memory.dmp

                                          Filesize

                                          408KB

                                        • memory/1556-388-0x0000000007C50000-0x0000000007CA0000-memory.dmp

                                          Filesize

                                          320KB

                                        • memory/1556-147-0x0000000007090000-0x00000000070DC000-memory.dmp

                                          Filesize

                                          304KB

                                        • memory/1556-101-0x0000000005620000-0x00000000056B2000-memory.dmp

                                          Filesize

                                          584KB

                                        • memory/1556-104-0x00000000057E0000-0x00000000057EA000-memory.dmp

                                          Filesize

                                          40KB

                                        • memory/1568-58-0x0000000002FC0000-0x0000000004FC0000-memory.dmp

                                          Filesize

                                          32.0MB

                                        • memory/1568-60-0x0000000073600000-0x0000000073DB0000-memory.dmp

                                          Filesize

                                          7.7MB

                                        • memory/1568-51-0x0000000073600000-0x0000000073DB0000-memory.dmp

                                          Filesize

                                          7.7MB

                                        • memory/1568-50-0x0000000000B70000-0x0000000000BC2000-memory.dmp

                                          Filesize

                                          328KB

                                        • memory/1644-901-0x00000000001A0000-0x000000000063B000-memory.dmp

                                          Filesize

                                          4.6MB

                                        • memory/1644-25-0x0000000004BE0000-0x0000000004BE1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/1644-867-0x00000000001A0000-0x000000000063B000-memory.dmp

                                          Filesize

                                          4.6MB

                                        • memory/1644-563-0x00000000001A0000-0x000000000063B000-memory.dmp

                                          Filesize

                                          4.6MB

                                        • memory/1644-892-0x00000000001A0000-0x000000000063B000-memory.dmp

                                          Filesize

                                          4.6MB

                                        • memory/1644-589-0x00000000001A0000-0x000000000063B000-memory.dmp

                                          Filesize

                                          4.6MB

                                        • memory/1644-858-0x00000000001A0000-0x000000000063B000-memory.dmp

                                          Filesize

                                          4.6MB

                                        • memory/1644-888-0x00000000001A0000-0x000000000063B000-memory.dmp

                                          Filesize

                                          4.6MB

                                        • memory/1644-20-0x00000000001A0000-0x000000000063B000-memory.dmp

                                          Filesize

                                          4.6MB

                                        • memory/1644-850-0x00000000001A0000-0x000000000063B000-memory.dmp

                                          Filesize

                                          4.6MB

                                        • memory/1644-29-0x0000000004C70000-0x0000000004C71000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/1644-30-0x0000000004C60000-0x0000000004C61000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/1644-897-0x00000000001A0000-0x000000000063B000-memory.dmp

                                          Filesize

                                          4.6MB

                                        • memory/1644-22-0x0000000004C20000-0x0000000004C21000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/1644-645-0x00000000001A0000-0x000000000063B000-memory.dmp

                                          Filesize

                                          4.6MB

                                        • memory/1644-23-0x0000000004C10000-0x0000000004C11000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/1644-24-0x0000000004C50000-0x0000000004C51000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/1644-323-0x00000000001A0000-0x000000000063B000-memory.dmp

                                          Filesize

                                          4.6MB

                                        • memory/1644-26-0x0000000004C00000-0x0000000004C01000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/1644-27-0x0000000004BF0000-0x0000000004BF1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/1644-28-0x0000000004C40000-0x0000000004C41000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/1644-21-0x00000000001A0000-0x000000000063B000-memory.dmp

                                          Filesize

                                          4.6MB

                                        • memory/1644-726-0x00000000001A0000-0x000000000063B000-memory.dmp

                                          Filesize

                                          4.6MB

                                        • memory/1908-625-0x0000000000400000-0x00000000008AD000-memory.dmp

                                          Filesize

                                          4.7MB

                                        • memory/1908-598-0x0000000000400000-0x00000000008AD000-memory.dmp

                                          Filesize

                                          4.7MB

                                        • memory/1924-539-0x0000000000400000-0x000000000403D000-memory.dmp

                                          Filesize

                                          60.2MB

                                        • memory/2044-895-0x0000000000400000-0x0000000004420000-memory.dmp

                                          Filesize

                                          64.1MB

                                        • memory/2044-857-0x0000000000400000-0x0000000004420000-memory.dmp

                                          Filesize

                                          64.1MB

                                        • memory/2044-869-0x0000000000400000-0x0000000004420000-memory.dmp

                                          Filesize

                                          64.1MB

                                        • memory/2044-899-0x0000000000400000-0x0000000004420000-memory.dmp

                                          Filesize

                                          64.1MB

                                        • memory/2044-891-0x0000000000400000-0x0000000004420000-memory.dmp

                                          Filesize

                                          64.1MB

                                        • memory/2044-866-0x0000000000400000-0x0000000004420000-memory.dmp

                                          Filesize

                                          64.1MB

                                        • memory/2044-903-0x0000000000400000-0x0000000004420000-memory.dmp

                                          Filesize

                                          64.1MB

                                        • memory/2492-643-0x0000000002DD0000-0x0000000002E06000-memory.dmp

                                          Filesize

                                          216KB

                                        • memory/2492-644-0x00000000056D0000-0x0000000005CF8000-memory.dmp

                                          Filesize

                                          6.2MB

                                        • memory/2492-684-0x0000000007760000-0x000000000777A000-memory.dmp

                                          Filesize

                                          104KB

                                        • memory/2492-683-0x0000000007DB0000-0x000000000842A000-memory.dmp

                                          Filesize

                                          6.5MB

                                        • memory/2492-669-0x00000000075C0000-0x00000000075F2000-memory.dmp

                                          Filesize

                                          200KB

                                        • memory/2492-671-0x000000006B590000-0x000000006B8E4000-memory.dmp

                                          Filesize

                                          3.3MB

                                        • memory/2492-682-0x0000000007630000-0x00000000076D3000-memory.dmp

                                          Filesize

                                          652KB

                                        • memory/2492-681-0x00000000069E0000-0x00000000069FE000-memory.dmp

                                          Filesize

                                          120KB

                                        • memory/2492-670-0x0000000070850000-0x000000007089C000-memory.dmp

                                          Filesize

                                          304KB

                                        • memory/2492-687-0x00000000079E0000-0x0000000007A76000-memory.dmp

                                          Filesize

                                          600KB

                                        • memory/2492-688-0x0000000007950000-0x0000000007961000-memory.dmp

                                          Filesize

                                          68KB

                                        • memory/2492-664-0x00000000063E0000-0x00000000063FE000-memory.dmp

                                          Filesize

                                          120KB

                                        • memory/2492-689-0x0000000007980000-0x000000000798E000-memory.dmp

                                          Filesize

                                          56KB

                                        • memory/2492-690-0x0000000007990000-0x00000000079A4000-memory.dmp

                                          Filesize

                                          80KB

                                        • memory/2492-691-0x0000000007A80000-0x0000000007A9A000-memory.dmp

                                          Filesize

                                          104KB

                                        • memory/2492-692-0x00000000079C0000-0x00000000079C8000-memory.dmp

                                          Filesize

                                          32KB

                                        • memory/2492-660-0x0000000005FC0000-0x0000000006314000-memory.dmp

                                          Filesize

                                          3.3MB

                                        • memory/2492-657-0x0000000005E70000-0x0000000005ED6000-memory.dmp

                                          Filesize

                                          408KB

                                        • memory/2492-646-0x00000000055F0000-0x0000000005612000-memory.dmp

                                          Filesize

                                          136KB

                                        • memory/2492-686-0x00000000077D0000-0x00000000077DA000-memory.dmp

                                          Filesize

                                          40KB

                                        • memory/2544-218-0x0000000000280000-0x00000000002D2000-memory.dmp

                                          Filesize

                                          328KB

                                        • memory/2608-710-0x000000006D8D0000-0x000000006EB24000-memory.dmp

                                          Filesize

                                          18.3MB

                                        • memory/2756-11-0x0000000005460000-0x0000000005461000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/2756-12-0x0000000005450000-0x0000000005451000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/2756-1-0x00000000779F4000-0x00000000779F6000-memory.dmp

                                          Filesize

                                          8KB

                                        • memory/2756-4-0x0000000005420000-0x0000000005421000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/2756-9-0x0000000005430000-0x0000000005431000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/2756-7-0x00000000053E0000-0x00000000053E1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/2756-3-0x0000000005410000-0x0000000005411000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/2756-5-0x0000000005400000-0x0000000005401000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/2756-8-0x00000000053F0000-0x00000000053F1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/2756-6-0x0000000005440000-0x0000000005441000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/2756-0-0x0000000000F40000-0x00000000013DB000-memory.dmp

                                          Filesize

                                          4.6MB

                                        • memory/2756-2-0x0000000000F40000-0x00000000013DB000-memory.dmp

                                          Filesize

                                          4.6MB

                                        • memory/2756-17-0x0000000000F40000-0x00000000013DB000-memory.dmp

                                          Filesize

                                          4.6MB

                                        • memory/3508-307-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                          Filesize

                                          972KB

                                        • memory/3508-269-0x0000000000400000-0x000000000063B000-memory.dmp

                                          Filesize

                                          2.2MB

                                        • memory/3508-271-0x0000000000400000-0x000000000063B000-memory.dmp

                                          Filesize

                                          2.2MB

                                        • memory/3532-266-0x0000000000460000-0x000000000048E000-memory.dmp

                                          Filesize

                                          184KB

                                        • memory/3660-141-0x0000000000400000-0x000000000044E000-memory.dmp

                                          Filesize

                                          312KB

                                        • memory/3660-142-0x0000000000400000-0x000000000044E000-memory.dmp

                                          Filesize

                                          312KB

                                        • memory/3960-814-0x0000000000400000-0x0000000004420000-memory.dmp

                                          Filesize

                                          64.1MB

                                        • memory/4236-631-0x000001DCD1F20000-0x000001DCD1F44000-memory.dmp

                                          Filesize

                                          144KB

                                        • memory/4236-629-0x000001DCD0770000-0x000001DCD077C000-memory.dmp

                                          Filesize

                                          48KB

                                        • memory/4236-667-0x000001DCD7A10000-0x000001DCD7A60000-memory.dmp

                                          Filesize

                                          320KB

                                        • memory/4236-663-0x000001DCD81A0000-0x000001DCD86C8000-memory.dmp

                                          Filesize

                                          5.2MB

                                        • memory/4236-649-0x000001DCD71A0000-0x000001DCD71A8000-memory.dmp

                                          Filesize

                                          32KB

                                        • memory/4236-658-0x000001DCD66E0000-0x000001DCD6718000-memory.dmp

                                          Filesize

                                          224KB

                                        • memory/4236-661-0x000001DCD7C40000-0x000001DCD7C4A000-memory.dmp

                                          Filesize

                                          40KB

                                        • memory/4236-662-0x000001DCD7C50000-0x000001DCD7C72000-memory.dmp

                                          Filesize

                                          136KB

                                        • memory/4236-626-0x000001DCB2A30000-0x000001DCB6328000-memory.dmp

                                          Filesize

                                          57.0MB

                                        • memory/4236-668-0x000001DCD79C0000-0x000001DCD79CC000-memory.dmp

                                          Filesize

                                          48KB

                                        • memory/4236-659-0x000001DCD66B0000-0x000001DCD66BE000-memory.dmp

                                          Filesize

                                          56KB

                                        • memory/4236-641-0x000001DCD2790000-0x000001DCD2A90000-memory.dmp

                                          Filesize

                                          3.0MB

                                        • memory/4236-637-0x000001DCB6730000-0x000001DCB673A000-memory.dmp

                                          Filesize

                                          40KB

                                        • memory/4236-634-0x000001DCD2590000-0x000001DCD260A000-memory.dmp

                                          Filesize

                                          488KB

                                        • memory/4236-636-0x000001DCD2630000-0x000001DCD2692000-memory.dmp

                                          Filesize

                                          392KB

                                        • memory/4236-635-0x000001DCD2250000-0x000001DCD227A000-memory.dmp

                                          Filesize

                                          168KB

                                        • memory/4236-633-0x000001DCD24E0000-0x000001DCD2592000-memory.dmp

                                          Filesize

                                          712KB

                                        • memory/4236-632-0x000001DCB6720000-0x000001DCB672A000-memory.dmp

                                          Filesize

                                          40KB

                                        • memory/4236-630-0x000001DCB6760000-0x000001DCB6774000-memory.dmp

                                          Filesize

                                          80KB

                                        • memory/4236-627-0x000001DCD2290000-0x000001DCD23A0000-memory.dmp

                                          Filesize

                                          1.1MB

                                        • memory/4236-628-0x000001DCB6750000-0x000001DCB6760000-memory.dmp

                                          Filesize

                                          64KB

                                        • memory/4716-708-0x00000000068B0000-0x00000000068FC000-memory.dmp

                                          Filesize

                                          304KB

                                        • memory/4716-707-0x0000000005FC0000-0x0000000006314000-memory.dmp

                                          Filesize

                                          3.3MB

                                        • memory/4920-868-0x0000000000400000-0x00000000008DF000-memory.dmp

                                          Filesize

                                          4.9MB

                                        • memory/4920-894-0x0000000000400000-0x00000000008DF000-memory.dmp

                                          Filesize

                                          4.9MB

                                        • memory/4976-558-0x000000006BFE0000-0x000000006C15B000-memory.dmp

                                          Filesize

                                          1.5MB

                                        • memory/4976-481-0x00007FFEF8BF0000-0x00007FFEF8DE5000-memory.dmp

                                          Filesize

                                          2.0MB

                                        • memory/4976-477-0x000000006BFE0000-0x000000006C15B000-memory.dmp

                                          Filesize

                                          1.5MB

                                        • memory/5008-54-0x0000000000400000-0x000000000044C000-memory.dmp

                                          Filesize

                                          304KB

                                        • memory/5008-57-0x0000000000400000-0x000000000044C000-memory.dmp

                                          Filesize

                                          304KB

                                        • memory/5008-59-0x0000000000400000-0x000000000044C000-memory.dmp

                                          Filesize

                                          304KB