Analysis

  • max time kernel
    118s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-06-2024 22:27

General

  • Target

    ce616640a8e824fd9be928a2087178594d0b9e4b7b2ee6ff716ad241091cced1.exe

  • Size

    1.8MB

  • MD5

    b4004849731e065932cf29ef9e5865c5

  • SHA1

    4d5dec24f1f10bf1cbd0fcbde634069ddf824ac0

  • SHA256

    ce616640a8e824fd9be928a2087178594d0b9e4b7b2ee6ff716ad241091cced1

  • SHA512

    93aab4db32d74835cfced2a389eb8f28e8ffb5630710e10940a1502cd96ab2faaac7973c99ac497e281ae682d5bfa7496eda501eee7b86f8dc84aa6284dcc2b5

  • SSDEEP

    49152:fW+J+TgHAIvCcjlWT+W6hv5aQe8Q2Wt3vNrU:VJvHGcjvW6Palr

Malware Config

Extracted

Family

amadey

Version

4.21

Botnet

0e6740

C2

http://147.45.47.155

Attributes
  • install_dir

    9217037dc9

  • install_file

    explortu.exe

  • strings_key

    8e894a8a4a3d0da8924003a561cfb244

  • url_paths

    /ku4Nor9/index.php

rc4.plain

Extracted

Family

risepro

C2

77.91.77.66:58709

Extracted

Family

amadey

Version

8254624243

Botnet

e76b71

C2

http://77.91.77.81

Attributes
  • install_dir

    8254624243

  • install_file

    axplong.exe

  • strings_key

    90049e51fabf09df0d6748e0b271922e

  • url_paths

    /Kiru9gu/index.php

rc4.plain

Extracted

Family

redline

Botnet

LiveTraffic

C2

4.185.27.237:13528

Extracted

Family

redline

Botnet

newbild

C2

185.215.113.67:40960

Extracted

Family

redline

Botnet

@LOGSCLOUDYT_BOT

C2

185.172.128.33:8970

Extracted

Family

lumma

C2

https://parallelmercywksoffw.shop/api

https://liabiliytshareodlkv.shop/api

https://notoriousdcellkw.shop/api

https://conferencefreckewl.shop/api

https://flourhishdiscovrw.shop/api

https://landdumpycolorwskfw.shop/api

https://barebrilliancedkoso.shop/api

https://willingyhollowsk.shop/api

https://distincttangyflippan.shop/api

https://macabrecondfucews.shop/api

https://greentastellesqwm.shop/api

https://stickyyummyskiwffe.shop/api

https://sturdyregularrmsnhw.shop/api

https://lamentablegapingkwaq.shop/api

https://innerverdanytiresw.shop/api

https://standingcomperewhitwo.shop/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects Monster Stealer. 1 IoCs
  • Lumma Stealer

    An infostealer written in C++ first seen in August 2022.

  • Monster

    Monster is a Golang stealer that was discovered in 2024.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 14 IoCs

    Run Powershell and hide display window.

  • Creates new service(s) 2 TTPs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 20 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 7 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 29 IoCs
  • Identifies Wine through registry keys 2 TTPs 10 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 64 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Power Settings 1 TTPs 5 IoCs

    powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 3 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • Drops file in Windows directory 3 IoCs
  • Launches sc.exe 4 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Embeds OpenSSL 1 IoCs

    Embeds OpenSSL, may be used to circumvent TLS interception.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Kills process with taskkill 4 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 59 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ce616640a8e824fd9be928a2087178594d0b9e4b7b2ee6ff716ad241091cced1.exe
    "C:\Users\Admin\AppData\Local\Temp\ce616640a8e824fd9be928a2087178594d0b9e4b7b2ee6ff716ad241091cced1.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1616
    • C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
      "C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3944
      • C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
        "C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        PID:3588
      • C:\Users\Admin\1000015002\4b09605fe4.exe
        "C:\Users\Admin\1000015002\4b09605fe4.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks computer location settings
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:4340
        • C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe
          "C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious behavior: EnumeratesProcesses
          PID:3444
          • C:\Users\Admin\AppData\Local\Temp\1000007001\redline123123.exe
            "C:\Users\Admin\AppData\Local\Temp\1000007001\redline123123.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            PID:5748
          • C:\Users\Admin\AppData\Local\Temp\1000005001\judit.exe
            "C:\Users\Admin\AppData\Local\Temp\1000005001\judit.exe"
            5⤵
            • Executes dropped EXE
            PID:5780
            • C:\Users\Admin\AppData\Local\Temp\onefile_5780_133633097336400841\stub.exe
              "C:\Users\Admin\AppData\Local\Temp\1000005001\judit.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:5920
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c "ver"
                7⤵
                  PID:5332
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                  7⤵
                    PID:6304
                    • C:\Windows\System32\Wbem\WMIC.exe
                      wmic csproduct get uuid
                      8⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:6600
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c "tasklist"
                    7⤵
                      PID:6316
                      • C:\Windows\system32\tasklist.exe
                        tasklist
                        8⤵
                        • Enumerates processes with tasklist
                        PID:6724
                • C:\Users\Admin\AppData\Local\Temp\1000008001\upd.exe
                  "C:\Users\Admin\AppData\Local\Temp\1000008001\upd.exe"
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  PID:6044
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                    6⤵
                    • Checks computer location settings
                    PID:5800
                    • C:\Users\Admin\AppData\Roaming\configurationValue\One.exe
                      "C:\Users\Admin\AppData\Roaming\configurationValue\One.exe"
                      7⤵
                      • Executes dropped EXE
                      PID:6700
                    • C:\Users\Admin\AppData\Roaming\configurationValue\svhoost.exe
                      "C:\Users\Admin\AppData\Roaming\configurationValue\svhoost.exe"
                      7⤵
                      • Executes dropped EXE
                      • Modifies system certificate store
                      • Suspicious behavior: EnumeratesProcesses
                      PID:6712
                • C:\Users\Admin\AppData\Local\Temp\1000025001\setup222.exe
                  "C:\Users\Admin\AppData\Local\Temp\1000025001\setup222.exe"
                  5⤵
                  • Executes dropped EXE
                  PID:640
                  • C:\Users\Admin\AppData\Local\Temp\SetupWizard.exe
                    SetupWizard.exe
                    6⤵
                    • Executes dropped EXE
                    PID:528
                    • C:\Users\Admin\AppData\Local\Temp\SetupWizard-4fd935f8113c16d3\SetupWizard.exe
                      "C:\Users\Admin\AppData\Local\Temp\SetupWizard-4fd935f8113c16d3\SetupWizard.exe"
                      7⤵
                      • Executes dropped EXE
                      • Drops file in System32 directory
                      PID:6452
                      • C:\Windows\system32\winsvc.exe
                        "C:\Windows\system32\winsvc.exe" "C:\Users\Admin\AppData\Local\Temp\SetupWizard-4fd935f8113c16d3\SetupWizard.exe"
                        8⤵
                        • Executes dropped EXE
                        PID:5172
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          "powershell.exe" "-WindowStyle" "Hidden" "-Command" "&" "\"C:\Windows\system32\sc.exe\"" "create" "winsvc" "type=own" "start=auto" "error=ignore" "binPath=\"C:\Windows\system32\winsvc.exe\"" "DisplayName=\"Windows System Service\""
                          9⤵
                          • Command and Scripting Interpreter: PowerShell
                          PID:6960
                          • C:\Windows\system32\sc.exe
                            "C:\Windows\system32\sc.exe" create winsvc type=own start=auto error=ignore binPath=C:\Windows\system32\winsvc.exe "DisplayName=Windows System Service"
                            10⤵
                            • Launches sc.exe
                            PID:5984
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          "powershell.exe" "-WindowStyle" "Hidden" "-Command" "&" "\"C:\Windows\system32\sc.exe\"" "failure" "winsvc" "reset=0" "actions=restart/0/restart/0/restart/0"
                          9⤵
                          • Command and Scripting Interpreter: PowerShell
                          PID:4572
                          • C:\Windows\system32\sc.exe
                            "C:\Windows\system32\sc.exe" failure winsvc reset=0 actions=restart/0/restart/0/restart/0
                            10⤵
                            • Launches sc.exe
                            PID:5500
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          "powershell.exe" "-WindowStyle" "Hidden" "-Command" "&" "\"C:\Windows\system32\sc.exe\"" "description" "winsvc" "\"Windows System Service is the main system supervision service.\""
                          9⤵
                          • Command and Scripting Interpreter: PowerShell
                          PID:5260
                          • C:\Windows\system32\sc.exe
                            "C:\Windows\system32\sc.exe" description winsvc "Windows System Service is the main system supervision service."
                            10⤵
                            • Launches sc.exe
                            PID:1004
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          "powershell.exe" "-WindowStyle" "Hidden" "-Command" "&" "\"C:\Windows\system32\sc.exe\"" "start" "winsvc"
                          9⤵
                          • Command and Scripting Interpreter: PowerShell
                          PID:2644
                          • C:\Windows\system32\sc.exe
                            "C:\Windows\system32\sc.exe" start winsvc
                            10⤵
                            • Launches sc.exe
                            PID:3620
                • C:\Users\Admin\AppData\Local\Temp\1000035001\gold.exe
                  "C:\Users\Admin\AppData\Local\Temp\1000035001\gold.exe"
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  PID:5760
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                    6⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:1220
                • C:\Users\Admin\AppData\Local\Temp\1000047001\lummac2.exe
                  "C:\Users\Admin\AppData\Local\Temp\1000047001\lummac2.exe"
                  5⤵
                  • Executes dropped EXE
                  PID:5984
                • C:\Users\Admin\AppData\Local\Temp\1000063001\drivermanager.exe
                  "C:\Users\Admin\AppData\Local\Temp\1000063001\drivermanager.exe"
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  PID:5376
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                    6⤵
                      PID:6184
                  • C:\Users\Admin\AppData\Local\Temp\1000064001\NewLatest.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000064001\NewLatest.exe"
                    5⤵
                    • Checks computer location settings
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    PID:3732
                    • C:\Users\Admin\AppData\Local\Temp\b66a8ae076\Hkbsse.exe
                      "C:\Users\Admin\AppData\Local\Temp\b66a8ae076\Hkbsse.exe"
                      6⤵
                      • Executes dropped EXE
                      PID:6588
                  • C:\Users\Admin\AppData\Local\Temp\1000070001\monster.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000070001\monster.exe"
                    5⤵
                    • Executes dropped EXE
                    PID:3216
                    • C:\Users\Admin\AppData\Local\Temp\onefile_3216_133633097628545941\stub.exe
                      "C:\Users\Admin\AppData\Local\Temp\1000070001\monster.exe"
                      6⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      PID:6756
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /c "ver"
                        7⤵
                          PID:7160
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                          7⤵
                            PID:2384
                            • C:\Windows\System32\Wbem\WMIC.exe
                              wmic csproduct get uuid
                              8⤵
                                PID:2772
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /c "tasklist"
                              7⤵
                                PID:1604
                                • C:\Windows\system32\tasklist.exe
                                  tasklist
                                  8⤵
                                  • Enumerates processes with tasklist
                                  PID:6720
                          • C:\Users\Admin\AppData\Local\Temp\1000075001\legs.exe
                            "C:\Users\Admin\AppData\Local\Temp\1000075001\legs.exe"
                            5⤵
                            • Executes dropped EXE
                            • Suspicious use of SetThreadContext
                            PID:4816
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                              6⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:6624
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 4816 -s 240
                              6⤵
                              • Program crash
                              PID:5180
                      • C:\Users\Admin\AppData\Local\Temp\1000016001\4cfab1877c.exe
                        "C:\Users\Admin\AppData\Local\Temp\1000016001\4cfab1877c.exe"
                        3⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • Suspicious behavior: EnumeratesProcesses
                        PID:2172
                      • C:\Users\Admin\AppData\Local\Temp\1000017001\805fbad4dd.exe
                        "C:\Users\Admin\AppData\Local\Temp\1000017001\805fbad4dd.exe"
                        3⤵
                        • Checks computer location settings
                        • Executes dropped EXE
                        • Suspicious use of FindShellTrayWindow
                        • Suspicious use of SendNotifyMessage
                        • Suspicious use of WriteProcessMemory
                        PID:2384
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account
                          4⤵
                          • Enumerates system info in registry
                          • Modifies data under HKEY_USERS
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of FindShellTrayWindow
                          • Suspicious use of SendNotifyMessage
                          • Suspicious use of WriteProcessMemory
                          PID:4736
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffd3fc09758,0x7ffd3fc09768,0x7ffd3fc09778
                            5⤵
                              PID:4728
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1820 --field-trial-handle=1932,i,7072419801950164498,11893856913467899737,131072 /prefetch:2
                              5⤵
                                PID:4004
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2104 --field-trial-handle=1932,i,7072419801950164498,11893856913467899737,131072 /prefetch:8
                                5⤵
                                  PID:552
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2260 --field-trial-handle=1932,i,7072419801950164498,11893856913467899737,131072 /prefetch:8
                                  5⤵
                                    PID:4732
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2096 --field-trial-handle=1932,i,7072419801950164498,11893856913467899737,131072 /prefetch:1
                                    5⤵
                                      PID:4472
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3320 --field-trial-handle=1932,i,7072419801950164498,11893856913467899737,131072 /prefetch:1
                                      5⤵
                                        PID:464
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4640 --field-trial-handle=1932,i,7072419801950164498,11893856913467899737,131072 /prefetch:1
                                        5⤵
                                          PID:5496
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4992 --field-trial-handle=1932,i,7072419801950164498,11893856913467899737,131072 /prefetch:1
                                          5⤵
                                            PID:5596
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5176 --field-trial-handle=1932,i,7072419801950164498,11893856913467899737,131072 /prefetch:8
                                            5⤵
                                              PID:5992
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5184 --field-trial-handle=1932,i,7072419801950164498,11893856913467899737,131072 /prefetch:8
                                              5⤵
                                              • Modifies registry class
                                              PID:6032
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4888 --field-trial-handle=1932,i,7072419801950164498,11893856913467899737,131072 /prefetch:8
                                              5⤵
                                                PID:6028
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5584 --field-trial-handle=1932,i,7072419801950164498,11893856913467899737,131072 /prefetch:8
                                                5⤵
                                                  PID:2900
                                        • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                          "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                          1⤵
                                            PID:5288
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3700 --field-trial-handle=2280,i,4114443225282860369,4764091921472631035,262144 --variations-seed-version /prefetch:8
                                            1⤵
                                              PID:6008
                                            • C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe
                                              C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe
                                              1⤵
                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                              • Checks BIOS information in registry
                                              • Executes dropped EXE
                                              • Identifies Wine through registry keys
                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:5340
                                            • C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
                                              C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
                                              1⤵
                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                              • Checks BIOS information in registry
                                              • Executes dropped EXE
                                              • Identifies Wine through registry keys
                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:4204
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4816 -ip 4816
                                              1⤵
                                                PID:6732
                                              • C:\Users\Admin\AppData\Local\Temp\b66a8ae076\Hkbsse.exe
                                                C:\Users\Admin\AppData\Local\Temp\b66a8ae076\Hkbsse.exe
                                                1⤵
                                                • Executes dropped EXE
                                                PID:6200
                                              • C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe
                                                C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe
                                                1⤵
                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                • Checks BIOS information in registry
                                                • Executes dropped EXE
                                                • Identifies Wine through registry keys
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                PID:6800
                                              • C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
                                                C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
                                                1⤵
                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                • Checks BIOS information in registry
                                                • Executes dropped EXE
                                                • Identifies Wine through registry keys
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                PID:6876
                                              • C:\Windows\system32\winsvc.exe
                                                C:\Windows\system32\winsvc.exe
                                                1⤵
                                                  PID:3424
                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    "powershell.exe" "-WindowStyle" "Hidden" "-Command" "Add-MpPreference" "-ExclusionPath" "\"C:\Windows\system32\""
                                                    2⤵
                                                    • Command and Scripting Interpreter: PowerShell
                                                    PID:3432
                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    "powershell.exe" "-WindowStyle" "Hidden" "-Command" "Add-MpPreference" "-ExclusionPath" "\"C:\Windows\Temp\""
                                                    2⤵
                                                    • Command and Scripting Interpreter: PowerShell
                                                    PID:5356
                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    "powershell.exe" "-WindowStyle" "Hidden" "-Command" "&" "powercfg.exe" "-SETACTIVE" "8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c"
                                                    2⤵
                                                    • Command and Scripting Interpreter: PowerShell
                                                    PID:7120
                                                    • C:\Windows\system32\powercfg.exe
                                                      "C:\Windows\system32\powercfg.exe" -SETACTIVE 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c
                                                      3⤵
                                                      • Power Settings
                                                      PID:3060
                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    "powershell.exe" "-WindowStyle" "Hidden" "-Command" "&" "powercfg.exe" "-change" "standby-timeout-ac" "0"
                                                    2⤵
                                                    • Command and Scripting Interpreter: PowerShell
                                                    PID:6804
                                                    • C:\Windows\system32\powercfg.exe
                                                      "C:\Windows\system32\powercfg.exe" -change standby-timeout-ac 0
                                                      3⤵
                                                      • Power Settings
                                                      PID:5188
                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    "powershell.exe" "-WindowStyle" "Hidden" "-Command" "&" "powercfg.exe" "-change" "standby-timeout-dc" "0"
                                                    2⤵
                                                    • Command and Scripting Interpreter: PowerShell
                                                    PID:6312
                                                    • C:\Windows\system32\powercfg.exe
                                                      "C:\Windows\system32\powercfg.exe" -change standby-timeout-dc 0
                                                      3⤵
                                                      • Power Settings
                                                      PID:4832
                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    "powershell.exe" "-WindowStyle" "Hidden" "-Command" "&" "powercfg.exe" "-change" "hibernate-timeout-ac" "0"
                                                    2⤵
                                                    • Command and Scripting Interpreter: PowerShell
                                                    PID:4592
                                                    • C:\Windows\system32\powercfg.exe
                                                      "C:\Windows\system32\powercfg.exe" -change hibernate-timeout-ac 0
                                                      3⤵
                                                      • Power Settings
                                                      PID:1616
                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    "powershell.exe" "-WindowStyle" "Hidden" "-Command" "&" "powercfg.exe" "-change" "hibernate-timeout-dc" "0"
                                                    2⤵
                                                    • Command and Scripting Interpreter: PowerShell
                                                    PID:5328
                                                    • C:\Windows\system32\powercfg.exe
                                                      "C:\Windows\system32\powercfg.exe" -change hibernate-timeout-dc 0
                                                      3⤵
                                                      • Power Settings
                                                      PID:6408
                                                  • C:\Windows\system32\taskkill.exe
                                                    "taskkill.exe" "/F" "/IM" "winnet.exe"
                                                    2⤵
                                                    • Kills process with taskkill
                                                    PID:6316
                                                  • C:\Windows\system32\taskkill.exe
                                                    "taskkill.exe" "/F" "/IM" "winnet.exe"
                                                    2⤵
                                                    • Kills process with taskkill
                                                    PID:6160
                                                  • C:\Windows\system32\taskkill.exe
                                                    "taskkill.exe" "/F" "/IM" "wincfg.exe"
                                                    2⤵
                                                    • Kills process with taskkill
                                                    PID:5336
                                                  • C:\Windows\system32\taskkill.exe
                                                    "taskkill.exe" "/F" "/IM" "wincfg.exe"
                                                    2⤵
                                                    • Kills process with taskkill
                                                    PID:6340
                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    "powershell.exe" "-WindowStyle" "Hidden" "-Command" "Remove-NetFirewallRule" "-DisplayName" "\"Windows Network Manager\""
                                                    2⤵
                                                    • Command and Scripting Interpreter: PowerShell
                                                    PID:1168

                                                Network

                                                MITRE ATT&CK Enterprise v15

                                                Replay Monitor

                                                Loading Replay Monitor...

                                                Downloads

                                                • C:\Users\Admin\1000015002\4b09605fe4.exe

                                                  Filesize

                                                  1.8MB

                                                  MD5

                                                  2f96716f734495f84a577f80f1ac68cb

                                                  SHA1

                                                  a3b3765cef7edb467751caef8619ea2cd8a0c20c

                                                  SHA256

                                                  516128664fe152570ebbeb86ca173e1e669b4d2ce41590e592285c5c05a3689d

                                                  SHA512

                                                  13b1cb96cc3dc69e67a099765dfa5d87029c8c9e33f580dd6c667e6cf8f0f3d9e636fa4899f2043c3c6b63bea52c59250bbcbb38f9833a6ab12bfc4cb8a99d3a

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                  Filesize

                                                  336B

                                                  MD5

                                                  a8969f5853c4ae8808370ae880d9423e

                                                  SHA1

                                                  fc4e97b8db6af6bacbe82347d9f538e415b9a71c

                                                  SHA256

                                                  4d6d6b77cdbcd52a05e5d89e3af9e8e006927583e83206963c81fa2cacbebf35

                                                  SHA512

                                                  af6af09b07ab46f147fc45e553dc635b336b56f40edca1120ce200656b73772651ba1be4ea981ec79df5011264cb41d6fa3df79d89da65f426aaa36d05ea2905

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                  Filesize

                                                  371B

                                                  MD5

                                                  c6bada17a059256ba8c091c5811e0715

                                                  SHA1

                                                  d213409a9e7a6965da4e321d89fb3dffbed7bc6a

                                                  SHA256

                                                  c1abb7df5b68e5f3131ee1e1d22fcd41f915556aea77fbd91f470820d4c3df37

                                                  SHA512

                                                  9b2e242b191971f14e37c144c7282546991a61b8af1e166ab279f93ba8c39b898ed286c7867186f39f0567291bf600d3cfd7b41eea3b7184eb0e69a964f6b378

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                  Filesize

                                                  371B

                                                  MD5

                                                  1e0f6a38207cc4b7edf3796e78e5b2bc

                                                  SHA1

                                                  64cd5ef2a142ddb95ade730005513bd91ed340db

                                                  SHA256

                                                  c4e310eb903adf78dad30412e14a842b3a9bb4f785a11d308cf5f25a7f49a99b

                                                  SHA512

                                                  051574e0d5ff1f8d448e8b06ae7eaf476779f1c0cc6aacd868a1e23ceb7af13881ff08149a1ac454d0ed0ec57c6125c0d8f4ea9294d1407fe5d7ad2708997a55

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                  Filesize

                                                  371B

                                                  MD5

                                                  3e9816ef96d123760016963737296f1a

                                                  SHA1

                                                  b46c5632bc53080af15c27a1658617972b5414a4

                                                  SHA256

                                                  9ccd742ef4fa1c83686187c7bb14bd3997e319b32a363657e684eb3606b37f72

                                                  SHA512

                                                  05f647ab30b215f2166e02ea0119f28a11802357fc5f2199e1821180c3be1137735db3caddfb23e2a4a84ce0ed34c4db9e4bb2a4feac4e9e27fbac0551462aa7

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                  Filesize

                                                  371B

                                                  MD5

                                                  ef1a47f3a9bd8faaa48be30041ca6e09

                                                  SHA1

                                                  a1bc1a25a74a437d44f1bccb7c1e8876d2a6c444

                                                  SHA256

                                                  53f4a0f643ff8508434a12ae22b2593b8d99a819c92cd8c0ef24d33ec83a42a2

                                                  SHA512

                                                  438ac59f529999c079eb4ac0cc1b0451c43fb53b4865a832162f41e52a81744d51ff0bf497c234fe029af6da9f4c9d7d751195976a030c381f83b76b7152ae82

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                  Filesize

                                                  6KB

                                                  MD5

                                                  e09130d7d813ec9ead11e904c55c88ee

                                                  SHA1

                                                  f024c77a6d48519123a0b796ebbda209544218ac

                                                  SHA256

                                                  1f978724e7f87673fc06ca6eaf600b3d8daffa6288d4a49eaca468d7ef49a4b7

                                                  SHA512

                                                  8bba2dc3fe4c5677f0c62eb3872071fc81a401e51308137b0fce7ed9a0ae501978ae8ce6b8edc56af66051c3acfaea75de6d0aed49f63f86f20341a8d57211f6

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                  Filesize

                                                  6KB

                                                  MD5

                                                  b9ed7c527f192be1a82aadfeb34b00e4

                                                  SHA1

                                                  7a106f62d60331460251396e673190057e4e4fe5

                                                  SHA256

                                                  16c6e22e0fcc3a6bb82685d69b7f3fc3adc2356edaea830e4b726adaf75d0bc1

                                                  SHA512

                                                  29d5802645210a5dde5f0895a59ab56d8e54868d253383fd8a204b0a215cc90a31efa3eba51a6459c41b35538537701268052e7853ce23b0b3cc71f2de7c13e2

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                  Filesize

                                                  278KB

                                                  MD5

                                                  f555e024847568c9221289cea62f7369

                                                  SHA1

                                                  d1de1233960e2de72d2bcb53224fef5ffc56cc97

                                                  SHA256

                                                  bc4359ebb9494a83fe75a21b9b9af996fa02e963a3d877f39efc79da5e92abcd

                                                  SHA512

                                                  31c9698d5a324479ecc375f3d6c3a71e52b58aa79addd61565cb6e096a8e18c75bedc5b40e4c112980e5f5a80d89d48eb30b6e28b1c4f90ac20037eb15a1167d

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                                                  Filesize

                                                  2B

                                                  MD5

                                                  99914b932bd37a50b983c5e7c90ae93b

                                                  SHA1

                                                  bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                                  SHA256

                                                  44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                                  SHA512

                                                  27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                                                • C:\Users\Admin\AppData\Local\Temp\1000005001\judit.exe

                                                  Filesize

                                                  10.7MB

                                                  MD5

                                                  c09ff1273b09cb1f9c7698ed147bf22e

                                                  SHA1

                                                  5634aec5671c4fd565694aa12cd3bf11758675d2

                                                  SHA256

                                                  bf8ce6bb537881386facfe6c1f9003812b985cbc4b9e9addd39e102449868d92

                                                  SHA512

                                                  e8f19b432dc3be9a6138d6a2f79521599087466d1c55a49d73600c876508ab307a6e65694e0effb5b705fdecdd0e201f588c8d5c3767fe9ae0b8581c318cadac

                                                • C:\Users\Admin\AppData\Local\Temp\1000007001\redline123123.exe

                                                  Filesize

                                                  297KB

                                                  MD5

                                                  0efd5136528869a8ea1a37c5059d706e

                                                  SHA1

                                                  3593bec29dbfd333a5a3a4ad2485a94982bbf713

                                                  SHA256

                                                  7c21c1f3063ba963818542036a50f62ac7494ad422e7088897b55c61306ec74e

                                                  SHA512

                                                  4ac391812634107e4a4318c454a19e7c34abfc1f97acc9bcd0fac9a92c372e5ebfe809e5c433479142537762ed633564bc690b38fc268b169498d6a54249e3fe

                                                • C:\Users\Admin\AppData\Local\Temp\1000008001\upd.exe

                                                  Filesize

                                                  1.7MB

                                                  MD5

                                                  e8a7d0c6dedce0d4a403908a29273d43

                                                  SHA1

                                                  8289c35dabaee32f61c74de6a4e8308dc98eb075

                                                  SHA256

                                                  672f24842aeb72d7bd8d64e78aaba5f3a953409ce21cfe97d3a80e7ef67f232a

                                                  SHA512

                                                  c8bf2f42f7bcf6f6b752ba5165c57ee99d4b31d5ba48ce1c2651afdb8bc37a14f392253f3daa0e811116d11d4c9175dc55cfb1baac0c30a71a18e1df17e73770

                                                • C:\Users\Admin\AppData\Local\Temp\1000016001\4cfab1877c.exe

                                                  Filesize

                                                  2.3MB

                                                  MD5

                                                  7f65e0d68bc24a6e6e74aed966f873a8

                                                  SHA1

                                                  cc9339cdaaf241c3aff61673d88f8c1c890ddfb9

                                                  SHA256

                                                  9a85aec4398f5683ee98529c9281761877035f2ecf006ea5bd85ba924ea47894

                                                  SHA512

                                                  490b8e9464a2edeff5e11fc2078be63f74fbe0bb60362cc2bee1110ca47520c36060a72dd90584424c17e52d40795ac6dfd6e3fb17c9e69f88e518b9e622142f

                                                • C:\Users\Admin\AppData\Local\Temp\1000017001\805fbad4dd.exe

                                                  Filesize

                                                  1.1MB

                                                  MD5

                                                  698e6d7442b5d9317f8349cb97ef5de0

                                                  SHA1

                                                  497d04732311871c3e918c7df85594d072350f15

                                                  SHA256

                                                  88c0f3c73e97fefae3af2808defc17cc20154ec9573aad41e1198ed7ac6e0537

                                                  SHA512

                                                  afd1884e4b452527126291f304f584aa36ea8464e3746fb2e1b2d0dd7ee561e7e531b400b2ba51e6166054b3d14b9dc7abb2207f6d42498e8686956369abc25c

                                                • C:\Users\Admin\AppData\Local\Temp\1000025001\setup222.exe

                                                  Filesize

                                                  96KB

                                                  MD5

                                                  8677376c509f0c66d1f02c6b66d7ef90

                                                  SHA1

                                                  e057eddf9d2e319967e200a5801e4bbe6e45862a

                                                  SHA256

                                                  f7afac39d2754ac953bf129ee094c8b092e349cdf35f1ba23c2c76a0229f9e96

                                                  SHA512

                                                  e0c685e289c10a48b5fa251aa4414653c103dac69faf536b9ae9598e066aab5a03b03c09096c42a0f244aeaf80f2b9e4aa28d6b28da436587a3f52a9155473d0

                                                • C:\Users\Admin\AppData\Local\Temp\1000035001\gold.exe

                                                  Filesize

                                                  522KB

                                                  MD5

                                                  70a578f7f58456e475facd69469cf20a

                                                  SHA1

                                                  83e147e7ba01fa074b2f046b65978f838f7b1e8e

                                                  SHA256

                                                  5c8d556e39269b22e63ba9c941ff306bb043bc35125ba08787617577231b381a

                                                  SHA512

                                                  707ed48b45978d26faaf3544bf22912461503d6e4b1a077cbb7c3a8abd2f1eb3fec16b2786a79ae4db2dfec92f662ece1998bc142706d2b482599fb6191563c0

                                                • C:\Users\Admin\AppData\Local\Temp\1000047001\lummac2.exe

                                                  Filesize

                                                  310KB

                                                  MD5

                                                  6e3d83935c7a0810f75dfa9badc3f199

                                                  SHA1

                                                  9f7d7c0ea662bcdca9b0cda928dc339f06ef0730

                                                  SHA256

                                                  dc4f0a8e3d12c98eac09a42bd976579ccc1851056d9de447495e8be7519760ed

                                                  SHA512

                                                  9f6b22bc9d0306a69d3c5bab83c7603fa23925c12089f9608772602ab2c4c0908cda2a3d9592fc0fab4aaff209ef41d3e2a931511ce9dfd027691e8dce9ad9b9

                                                • C:\Users\Admin\AppData\Local\Temp\1000063001\drivermanager.exe

                                                  Filesize

                                                  3.6MB

                                                  MD5

                                                  c28a2d0a008788b49690b333d501e3f3

                                                  SHA1

                                                  6a25fdb8613db00b09d4d6e1ad302c20c7f7e2c4

                                                  SHA256

                                                  f61712dccccf8f19c6dbf0dfb7c7c0be9eb2f13d3381ee94e4cb6cb70ffb5f5a

                                                  SHA512

                                                  455923a63e60b6079d7e0af2bfae5f922b205d024def456ae95158ef1bfcdbc4f56e24b4421a2203f4618d0ea29e229e331c7ee0d7881ee8ebac83fa72f5d788

                                                • C:\Users\Admin\AppData\Local\Temp\1000064001\NewLatest.exe

                                                  Filesize

                                                  415KB

                                                  MD5

                                                  07101cac5b9477ba636cd8ca7b9932cb

                                                  SHA1

                                                  59ea7fd9ae6ded8c1b7240a4bf9399b4eb3849f1

                                                  SHA256

                                                  488385cd54d14790b03fa7c7dc997ebea3f7b2a8499e5927eb437a3791102a77

                                                  SHA512

                                                  02240ff51a74966bc31cfcc901105096eb871f588efaa9be1a829b4ee6f245bd9dca37be7e2946ba6315feea75c3dce5f490847250e62081445cd25b0f406887

                                                • C:\Users\Admin\AppData\Local\Temp\1000070001\monster.exe

                                                  Filesize

                                                  10.7MB

                                                  MD5

                                                  3f4f5c57433724a32b7498b6a2c91bf0

                                                  SHA1

                                                  04757ff666e1afa31679dd6bed4ed3af671332a3

                                                  SHA256

                                                  0608a7559f895fab33ae65bbfbdc5bebd21eea984f76e1b5571c80906824d665

                                                  SHA512

                                                  cf572ca616b4f4e6e472e33e8d6d90b85d5885fa64d8bca4507450d66d65057efa771f58c31ea13f394fd0e7b0ff2fcaa9d54c61f28b27b98a79c27bc964f935

                                                • C:\Users\Admin\AppData\Local\Temp\1000075001\legs.exe

                                                  Filesize

                                                  659KB

                                                  MD5

                                                  bbd06263062b2c536b5caacdd5f81b76

                                                  SHA1

                                                  c38352c1c08fb0fa5e67a079998ef30ebc962089

                                                  SHA256

                                                  1875275da8d576fd9962c5b2bd9fe0e4b4d188caad9549125c8a64ecaf9308c9

                                                  SHA512

                                                  7faa4e18cc9d7d82cb8efe8494668e05f75ddd5a8c9c9a058b2246a786a60d7761168862220b70820b02f38f196cfb5f106db36cdcfd5a5a3f9dfd01654eb9ad

                                                • C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe

                                                  Filesize

                                                  1.8MB

                                                  MD5

                                                  b4004849731e065932cf29ef9e5865c5

                                                  SHA1

                                                  4d5dec24f1f10bf1cbd0fcbde634069ddf824ac0

                                                  SHA256

                                                  ce616640a8e824fd9be928a2087178594d0b9e4b7b2ee6ff716ad241091cced1

                                                  SHA512

                                                  93aab4db32d74835cfced2a389eb8f28e8ffb5630710e10940a1502cd96ab2faaac7973c99ac497e281ae682d5bfa7496eda501eee7b86f8dc84aa6284dcc2b5

                                                • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\_sqlite3.pyd

                                                  Filesize

                                                  95KB

                                                  MD5

                                                  7f61eacbbba2ecf6bf4acf498fa52ce1

                                                  SHA1

                                                  3174913f971d031929c310b5e51872597d613606

                                                  SHA256

                                                  85de6d0b08b5cc1f2c3225c07338c76e1cab43b4de66619824f7b06cb2284c9e

                                                  SHA512

                                                  a5f6f830c7a5fadc3349b42db0f3da1fddb160d7e488ea175bf9be4732a18e277d2978720c0e294107526561a7011fadab992c555d93e77d4411528e7c4e695a

                                                • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\select.pyd

                                                  Filesize

                                                  28KB

                                                  MD5

                                                  adc412384b7e1254d11e62e451def8e9

                                                  SHA1

                                                  04e6dff4a65234406b9bc9d9f2dcfe8e30481829

                                                  SHA256

                                                  68b80009ab656ffe811d680585fac3d4f9c1b45f29d48c67ea2b3580ec4d86a1

                                                  SHA512

                                                  f250f1236882668b2686bd42e1c334c60da7abec3a208ebebdee84a74d7c4c6b1bc79eed7241bc7012e4ef70a6651a32aa00e32a83f402475b479633581e0b07

                                                • C:\Users\Admin\AppData\Local\Temp\SetupWizard.exe

                                                  Filesize

                                                  33.3MB

                                                  MD5

                                                  606a8fe7c08b1932e0f830da27ff0340

                                                  SHA1

                                                  8aa91c27818b8e66c5873b96391f8a765f5e3f1a

                                                  SHA256

                                                  d3c134e2fd27a85a3d270d39554629603562973d552e18dd6609069f77e50330

                                                  SHA512

                                                  48161a468280f2c14606a560f927f8dce5f49ea41418391ad88ca93f1b5c7773bed71ce6a7e9d108ab15071dfe028becd9ee4e2b404994b07cbd5809f44f031d

                                                • C:\Users\Admin\AppData\Local\Temp\Tmp3493.tmp

                                                  Filesize

                                                  2KB

                                                  MD5

                                                  1420d30f964eac2c85b2ccfe968eebce

                                                  SHA1

                                                  bdf9a6876578a3e38079c4f8cf5d6c79687ad750

                                                  SHA256

                                                  f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9

                                                  SHA512

                                                  6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8

                                                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_gu5c5gl0.kfj.ps1

                                                  Filesize

                                                  60B

                                                  MD5

                                                  d17fe0a3f47be24a6453e9ef58c94641

                                                  SHA1

                                                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                  SHA256

                                                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                  SHA512

                                                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                • C:\Users\Admin\AppData\Local\Temp\onefile_5780_133633097336400841\_bz2.pyd

                                                  Filesize

                                                  81KB

                                                  MD5

                                                  a4b636201605067b676cc43784ae5570

                                                  SHA1

                                                  e9f49d0fc75f25743d04ce23c496eb5f89e72a9a

                                                  SHA256

                                                  f178e29921c04fb68cc08b1e5d1181e5df8ce1de38a968778e27990f4a69973c

                                                  SHA512

                                                  02096bc36c7a9ecfa1712fe738b5ef8b78c6964e0e363136166657c153727b870a6a44c1e1ec9b81289d1aa0af9c85f1a37b95b667103edc2d3916280b6a9488

                                                • C:\Users\Admin\AppData\Local\Temp\onefile_5780_133633097336400841\_cffi_backend.pyd

                                                  Filesize

                                                  177KB

                                                  MD5

                                                  ebb660902937073ec9695ce08900b13d

                                                  SHA1

                                                  881537acead160e63fe6ba8f2316a2fbbb5cb311

                                                  SHA256

                                                  52e5a0c3ca9b0d4fc67243bd8492f5c305ff1653e8d956a2a3d9d36af0a3e4fd

                                                  SHA512

                                                  19d5000ef6e473d2f533603afe8d50891f81422c59ae03bead580412ec756723dc3379310e20cd0c39e9683ce7c5204791012e1b6b73996ea5cb59e8d371de24

                                                • C:\Users\Admin\AppData\Local\Temp\onefile_5780_133633097336400841\_ctypes.pyd

                                                  Filesize

                                                  119KB

                                                  MD5

                                                  87596db63925dbfe4d5f0f36394d7ab0

                                                  SHA1

                                                  ad1dd48bbc078fe0a2354c28cb33f92a7e64907e

                                                  SHA256

                                                  92d7954d9099762d81c1ae2836c11b6ba58c1883fde8eeefe387cc93f2f6afb4

                                                  SHA512

                                                  e6d63e6fe1c3bd79f1e39cb09b6f56589f0ee80fd4f4638002fe026752bfa65457982adbef13150fa2f36e68771262d9378971023e07a75d710026ed37e83d7b

                                                • C:\Users\Admin\AppData\Local\Temp\onefile_5780_133633097336400841\_lzma.pyd

                                                  Filesize

                                                  154KB

                                                  MD5

                                                  b5fbc034ad7c70a2ad1eb34d08b36cf8

                                                  SHA1

                                                  4efe3f21be36095673d949cceac928e11522b29c

                                                  SHA256

                                                  80a6ebe46f43ffa93bbdbfc83e67d6f44a44055de1439b06e4dd2983cb243df6

                                                  SHA512

                                                  e7185da748502b645030c96d3345d75814ba5fd95a997c2d1c923d981c44d5b90db64faf77ddbbdc805769af1bec37daf0ecee0930a248b67a1c2d92b59c250c

                                                • C:\Users\Admin\AppData\Local\Temp\onefile_5780_133633097336400841\_socket.pyd

                                                  Filesize

                                                  75KB

                                                  MD5

                                                  e137df498c120d6ac64ea1281bcab600

                                                  SHA1

                                                  b515e09868e9023d43991a05c113b2b662183cfe

                                                  SHA256

                                                  8046bf64e463d5aa38d13525891156131cf997c2e6cdf47527bc352f00f5c90a

                                                  SHA512

                                                  cc2772d282b81873aa7c5cba5939d232cceb6be0908b211edb18c25a17cbdb5072f102c0d6b7bc9b6b2f1f787b56ab1bc9be731bb9e98885c17e26a09c2beb90

                                                • C:\Users\Admin\AppData\Local\Temp\onefile_5780_133633097336400841\cryptography\hazmat\bindings\_rust.pyd

                                                  Filesize

                                                  6.9MB

                                                  MD5

                                                  b364cecdba4b73c71116781b1c38d40f

                                                  SHA1

                                                  59ef6f46bd3f2ec17e78df8ee426d4648836255a

                                                  SHA256

                                                  10d009a3c97bf908961a19b4aaddc298d32959acc64bedf9d2a7f24c0261605b

                                                  SHA512

                                                  999c2da8e046c9f4103385c7d7dbb3bfdac883b6292dca9d67b36830b593f55ac14d6091eb15a41416c0bd65ac3d4a4a2b84f50d13906d36ed5574b275773ce7

                                                • C:\Users\Admin\AppData\Local\Temp\onefile_5780_133633097336400841\libffi-7.dll

                                                  Filesize

                                                  32KB

                                                  MD5

                                                  eef7981412be8ea459064d3090f4b3aa

                                                  SHA1

                                                  c60da4830ce27afc234b3c3014c583f7f0a5a925

                                                  SHA256

                                                  f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081

                                                  SHA512

                                                  dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016

                                                • C:\Users\Admin\AppData\Local\Temp\onefile_5780_133633097336400841\python3.dll

                                                  Filesize

                                                  63KB

                                                  MD5

                                                  07bd9f1e651ad2409fd0b7d706be6071

                                                  SHA1

                                                  dfeb2221527474a681d6d8b16a5c378847c59d33

                                                  SHA256

                                                  5d78cd1365ea9ae4e95872576cfa4055342f1e80b06f3051cf91d564b6cd09f5

                                                  SHA512

                                                  def31d2df95cb7999ce1f55479b2ff7a3cb70e9fc4778fc50803f688448305454fbbf82b5a75032f182dff663a6d91d303ef72e3d2ca9f2a1b032956ec1a0e2a

                                                • C:\Users\Admin\AppData\Local\Temp\onefile_5780_133633097336400841\python310.dll

                                                  Filesize

                                                  4.3MB

                                                  MD5

                                                  c80b5cb43e5fe7948c3562c1fff1254e

                                                  SHA1

                                                  f73cb1fb9445c96ecd56b984a1822e502e71ab9d

                                                  SHA256

                                                  058925e4bbfcb460a3c00ec824b8390583baef0c780a7c7ff01d43d9eec45f20

                                                  SHA512

                                                  faa97a9d5d2a0bf78123f19f8657c24921b907268938c26f79e1df6d667f7bee564259a3a11022e8629996406cda9fa00434bb2b1de3e10b9bddc59708dbad81

                                                • C:\Users\Admin\AppData\Local\Temp\onefile_5780_133633097336400841\sqlite3.dll

                                                  Filesize

                                                  1.4MB

                                                  MD5

                                                  926dc90bd9faf4efe1700564aa2a1700

                                                  SHA1

                                                  763e5af4be07444395c2ab11550c70ee59284e6d

                                                  SHA256

                                                  50825ea8b431d86ec228d9fa6b643e2c70044c709f5d9471d779be63ff18bcd0

                                                  SHA512

                                                  a8703ff97243aa3bc877f71c0514b47677b48834a0f2fee54e203c0889a79ce37c648243dbfe2ee9e1573b3ca4d49c334e9bfe62541653125861a5398e2fe556

                                                • C:\Users\Admin\AppData\Local\Temp\onefile_5780_133633097336400841\stub.exe

                                                  Filesize

                                                  17.9MB

                                                  MD5

                                                  972d9d2422f1a71bed840709024302f8

                                                  SHA1

                                                  e52170710e3c413ae3cfa45fcdecf19db4aa382c

                                                  SHA256

                                                  1c666df4eafab03ecde809ffbc40dd60b8ac2fe7bdca5632c5c4002254e6e564

                                                  SHA512

                                                  3d84252756dcb4820b7794e9a92811d32631b9f3e9bd1a558fd040736b1472c0d00efb6ff7a13ae3bcd327f3bfac2b6ad94a5a3dfbc8ba54511a366c4f4727a6

                                                • C:\Users\Admin\AppData\Local\Temp\onefile_5780_133633097336400841\vcruntime140.dll

                                                  Filesize

                                                  96KB

                                                  MD5

                                                  f12681a472b9dd04a812e16096514974

                                                  SHA1

                                                  6fd102eb3e0b0e6eef08118d71f28702d1a9067c

                                                  SHA256

                                                  d66c3b47091ceb3f8d3cc165a43d285ae919211a0c0fcb74491ee574d8d464f8

                                                  SHA512

                                                  7d3accbf84de73fb0c5c0de812a9ed600d39cd7ed0f99527ca86a57ce63f48765a370e913e3a46ffc2ccd48ee07d823dafdd157710eef9e7cc1eb7505dc323a2

                                                • C:\Users\Admin\AppData\Local\Temp\tmp79DB.tmp

                                                  Filesize

                                                  46KB

                                                  MD5

                                                  02d2c46697e3714e49f46b680b9a6b83

                                                  SHA1

                                                  84f98b56d49f01e9b6b76a4e21accf64fd319140

                                                  SHA256

                                                  522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

                                                  SHA512

                                                  60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

                                                • C:\Users\Admin\AppData\Local\Temp\tmp7A9A.tmp

                                                  Filesize

                                                  92KB

                                                  MD5

                                                  4c2e2189b87f507edc2e72d7d55583a0

                                                  SHA1

                                                  1f06e340f76d41ea0d1e8560acd380a901b2a5bd

                                                  SHA256

                                                  99a5f8dea08b5cf512ed888b3e533cc77c08dc644078793dc870abd8828c1bca

                                                  SHA512

                                                  8b6b49e55afe8a697aaf71d975fab9e906143339827f75a57876a540d0d7b9e3cbbcdd8b5435d6198900a73895cc52d2082e66ee8cec342e72f2e427dde71600

                                                • C:\Users\Admin\AppData\Local\Temp\tmp7E30.tmp

                                                  Filesize

                                                  56KB

                                                  MD5

                                                  d444c807029c83b8a892ac0c4971f955

                                                  SHA1

                                                  fa58ce7588513519dc8fed939b26b05dc25e53b5

                                                  SHA256

                                                  8297a7698f19bb81539a18363db100c55e357fa73f773c2b883d2c4161f6a259

                                                  SHA512

                                                  b7958b843639d4223bef65cdc6c664d7d15b76ac4e0a8b1575201dd47a32899feff32389dcc047314f47944ebe7b774cd59e51d49202f49541bbd70ecbb31a2e

                                                • C:\Users\Admin\AppData\Local\Temp\tmp7F5C.tmp

                                                  Filesize

                                                  220KB

                                                  MD5

                                                  302e7bb88e0ca2e0a4b0fcb784f8e921

                                                  SHA1

                                                  79304b5359b5a5ffa222a48373d214ff7bdca8e9

                                                  SHA256

                                                  0583a074f22df06e2e66267c0cd1789e77849b6e7efaf9409baf814e95374f7b

                                                  SHA512

                                                  b15a5c71ba415d794690d49ba1585866a88e3d437c95c5e78f057a22108c6018441df3ee4a66b05133999fb42a043423317792f785ac2d42c8a73bee33c805b6

                                                • C:\Users\Admin\AppData\Roaming\configurationValue\One.exe

                                                  Filesize

                                                  408KB

                                                  MD5

                                                  816df4ac8c796b73a28159a0b17369b6

                                                  SHA1

                                                  db8bbb6f73fab9875de4aaa489c03665d2611558

                                                  SHA256

                                                  7843255bc50ddda8c651f51347313daf07e53a745d39cc61d708c6e7d79b3647

                                                  SHA512

                                                  7dd155346acf611ffaf6399408f6409146fd724d7d382c7e143e3921e3d109563c314a0367a378b0965e427470f36bf6d70e1586d695a266f34aebd789965285

                                                • C:\Users\Admin\AppData\Roaming\configurationValue\svhoost.exe

                                                  Filesize

                                                  304KB

                                                  MD5

                                                  15a7cae61788e4718d3c33abb7be6436

                                                  SHA1

                                                  62dac3a5d50c93c51f2ab4a5ebf78837dc7d3a9f

                                                  SHA256

                                                  bed71147aa297d95d2e2c67352fc06f7f631af3b7871ea148638ae66fc41e200

                                                  SHA512

                                                  5b3e3028523e95452be169bdfb966cd03ea5dbe34b7b98cf7482ca91b8317a0f4de224751d5a530ec23e72cbd6cc8e414d2d3726fefee9c30feab69dc348fa45

                                                • C:\Windows\System32\winsvc.exe

                                                  Filesize

                                                  42.4MB

                                                  MD5

                                                  bec827b061bebfc1c37c06e9c3d5f2f9

                                                  SHA1

                                                  23bd79bac29cbec7d275922e3534df73c302a0fc

                                                  SHA256

                                                  d4504abe508d8afefb56871eb830c390d5d746b29631766be7737a57a6ba2008

                                                  SHA512

                                                  f9bb555ce10bbcc4b111fd6cffb49bd21b9140ec53607f85d59a80d3211fd57838e2beac326acda3c0637762ca2de9bd157d9a75252c6d969cd59b8b8221f883

                                                • memory/1168-997-0x000002137BC10000-0x000002137BC2A000-memory.dmp

                                                  Filesize

                                                  104KB

                                                • memory/1168-996-0x000002137B6A0000-0x000002137B6AE000-memory.dmp

                                                  Filesize

                                                  56KB

                                                • memory/1220-410-0x0000000005600000-0x0000000005BA4000-memory.dmp

                                                  Filesize

                                                  5.6MB

                                                • memory/1220-424-0x0000000005050000-0x00000000050E2000-memory.dmp

                                                  Filesize

                                                  584KB

                                                • memory/1220-652-0x0000000007DE0000-0x0000000007E1C000-memory.dmp

                                                  Filesize

                                                  240KB

                                                • memory/1220-297-0x0000000000400000-0x0000000000450000-memory.dmp

                                                  Filesize

                                                  320KB

                                                • memory/1220-650-0x0000000007D80000-0x0000000007D92000-memory.dmp

                                                  Filesize

                                                  72KB

                                                • memory/1616-1-0x00000000775C4000-0x00000000775C6000-memory.dmp

                                                  Filesize

                                                  8KB

                                                • memory/1616-2-0x0000000000981000-0x00000000009AF000-memory.dmp

                                                  Filesize

                                                  184KB

                                                • memory/1616-4-0x0000000000980000-0x0000000000E24000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/1616-6-0x0000000000980000-0x0000000000E24000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/1616-16-0x0000000000980000-0x0000000000E24000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/1616-3-0x0000000000980000-0x0000000000E24000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/1616-0-0x0000000000980000-0x0000000000E24000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/2172-783-0x0000000000920000-0x0000000000EFA000-memory.dmp

                                                  Filesize

                                                  5.9MB

                                                • memory/2172-94-0x0000000000920000-0x0000000000EFA000-memory.dmp

                                                  Filesize

                                                  5.9MB

                                                • memory/2172-151-0x0000000000920000-0x0000000000EFA000-memory.dmp

                                                  Filesize

                                                  5.9MB

                                                • memory/2172-310-0x0000000000920000-0x0000000000EFA000-memory.dmp

                                                  Filesize

                                                  5.9MB

                                                • memory/3432-885-0x0000022F32860000-0x0000022F32866000-memory.dmp

                                                  Filesize

                                                  24KB

                                                • memory/3432-886-0x0000022F32870000-0x0000022F3287A000-memory.dmp

                                                  Filesize

                                                  40KB

                                                • memory/3432-877-0x0000022F325F0000-0x0000022F3260C000-memory.dmp

                                                  Filesize

                                                  112KB

                                                • memory/3432-878-0x0000022F32610000-0x0000022F326C5000-memory.dmp

                                                  Filesize

                                                  724KB

                                                • memory/3432-879-0x0000022F326D0000-0x0000022F326DA000-memory.dmp

                                                  Filesize

                                                  40KB

                                                • memory/3432-880-0x0000022F32840000-0x0000022F3285C000-memory.dmp

                                                  Filesize

                                                  112KB

                                                • memory/3432-882-0x0000022F32820000-0x0000022F3282A000-memory.dmp

                                                  Filesize

                                                  40KB

                                                • memory/3432-883-0x0000022F32880000-0x0000022F3289A000-memory.dmp

                                                  Filesize

                                                  104KB

                                                • memory/3432-884-0x0000022F32830000-0x0000022F32838000-memory.dmp

                                                  Filesize

                                                  32KB

                                                • memory/3444-126-0x00000000007F0000-0x0000000000CA2000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/3444-785-0x00000000007F0000-0x0000000000CA2000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/3444-294-0x00000000007F0000-0x0000000000CA2000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/3588-40-0x0000000000400000-0x00000000009EA000-memory.dmp

                                                  Filesize

                                                  5.9MB

                                                • memory/3588-79-0x0000000000400000-0x00000000009EA000-memory.dmp

                                                  Filesize

                                                  5.9MB

                                                • memory/3588-29-0x0000000000400000-0x00000000009EA000-memory.dmp

                                                  Filesize

                                                  5.9MB

                                                • memory/3588-55-0x0000000000400000-0x00000000009EA000-memory.dmp

                                                  Filesize

                                                  5.9MB

                                                • memory/3588-28-0x0000000000D00000-0x00000000011A4000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/3588-54-0x0000000000400000-0x00000000009EA000-memory.dmp

                                                  Filesize

                                                  5.9MB

                                                • memory/3588-26-0x0000000000400000-0x00000000009EA000-memory.dmp

                                                  Filesize

                                                  5.9MB

                                                • memory/3588-53-0x0000000000400000-0x00000000009EA000-memory.dmp

                                                  Filesize

                                                  5.9MB

                                                • memory/3588-56-0x0000000000400000-0x00000000009EA000-memory.dmp

                                                  Filesize

                                                  5.9MB

                                                • memory/3588-52-0x0000000000400000-0x00000000009EA000-memory.dmp

                                                  Filesize

                                                  5.9MB

                                                • memory/3588-27-0x0000000000400000-0x00000000009EA000-memory.dmp

                                                  Filesize

                                                  5.9MB

                                                • memory/3588-43-0x0000000000400000-0x00000000009EA000-memory.dmp

                                                  Filesize

                                                  5.9MB

                                                • memory/3588-41-0x0000000000400000-0x00000000009EA000-memory.dmp

                                                  Filesize

                                                  5.9MB

                                                • memory/3588-39-0x0000000000400000-0x00000000009EA000-memory.dmp

                                                  Filesize

                                                  5.9MB

                                                • memory/3588-38-0x0000000000400000-0x00000000009EA000-memory.dmp

                                                  Filesize

                                                  5.9MB

                                                • memory/3588-36-0x0000000000400000-0x00000000009EA000-memory.dmp

                                                  Filesize

                                                  5.9MB

                                                • memory/3588-35-0x0000000000400000-0x00000000009EA000-memory.dmp

                                                  Filesize

                                                  5.9MB

                                                • memory/3588-34-0x0000000000400000-0x00000000009EA000-memory.dmp

                                                  Filesize

                                                  5.9MB

                                                • memory/3588-31-0x0000000000400000-0x00000000009EA000-memory.dmp

                                                  Filesize

                                                  5.9MB

                                                • memory/3588-42-0x0000000000400000-0x00000000009EA000-memory.dmp

                                                  Filesize

                                                  5.9MB

                                                • memory/3588-60-0x0000000000400000-0x00000000009EA000-memory.dmp

                                                  Filesize

                                                  5.9MB

                                                • memory/3588-80-0x0000000000400000-0x00000000009EA000-memory.dmp

                                                  Filesize

                                                  5.9MB

                                                • memory/3588-81-0x0000000000400000-0x00000000009EA000-memory.dmp

                                                  Filesize

                                                  5.9MB

                                                • memory/3588-61-0x0000000000400000-0x00000000009EA000-memory.dmp

                                                  Filesize

                                                  5.9MB

                                                • memory/3588-62-0x0000000000400000-0x00000000009EA000-memory.dmp

                                                  Filesize

                                                  5.9MB

                                                • memory/3588-37-0x0000000000400000-0x00000000009EA000-memory.dmp

                                                  Filesize

                                                  5.9MB

                                                • memory/3588-33-0x0000000000400000-0x00000000009EA000-memory.dmp

                                                  Filesize

                                                  5.9MB

                                                • memory/3588-57-0x0000000000400000-0x00000000009EA000-memory.dmp

                                                  Filesize

                                                  5.9MB

                                                • memory/3588-58-0x0000000000400000-0x00000000009EA000-memory.dmp

                                                  Filesize

                                                  5.9MB

                                                • memory/3588-59-0x0000000000400000-0x00000000009EA000-memory.dmp

                                                  Filesize

                                                  5.9MB

                                                • memory/3588-30-0x0000000000400000-0x00000000009EA000-memory.dmp

                                                  Filesize

                                                  5.9MB

                                                • memory/3588-32-0x0000000000400000-0x00000000009EA000-memory.dmp

                                                  Filesize

                                                  5.9MB

                                                • memory/3944-19-0x0000000000D01000-0x0000000000D2F000-memory.dmp

                                                  Filesize

                                                  184KB

                                                • memory/3944-311-0x0000000000D00000-0x00000000011A4000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/3944-78-0x0000000000D00000-0x00000000011A4000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/3944-21-0x0000000000D00000-0x00000000011A4000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/3944-125-0x0000000000D00000-0x00000000011A4000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/3944-150-0x0000000000D00000-0x00000000011A4000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/3944-18-0x0000000000D00000-0x00000000011A4000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/3944-309-0x0000000000D00000-0x00000000011A4000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/3944-20-0x0000000000D00000-0x00000000011A4000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/4204-324-0x0000000000D00000-0x00000000011A4000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/4204-312-0x0000000000D00000-0x00000000011A4000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/4340-90-0x0000000000C40000-0x00000000010F2000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/4340-122-0x0000000000C40000-0x00000000010F2000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/5340-313-0x00000000007F0000-0x0000000000CA2000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/5340-338-0x00000000007F0000-0x0000000000CA2000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/5356-909-0x0000026D69490000-0x0000026D69545000-memory.dmp

                                                  Filesize

                                                  724KB

                                                • memory/5376-479-0x0000000004E70000-0x0000000004E8C000-memory.dmp

                                                  Filesize

                                                  112KB

                                                • memory/5376-411-0x0000000004F70000-0x000000000500C000-memory.dmp

                                                  Filesize

                                                  624KB

                                                • memory/5376-493-0x0000000004E70000-0x0000000004E85000-memory.dmp

                                                  Filesize

                                                  84KB

                                                • memory/5376-491-0x0000000004E70000-0x0000000004E85000-memory.dmp

                                                  Filesize

                                                  84KB

                                                • memory/5376-400-0x00000000002F0000-0x000000000068C000-memory.dmp

                                                  Filesize

                                                  3.6MB

                                                • memory/5376-489-0x0000000004E70000-0x0000000004E85000-memory.dmp

                                                  Filesize

                                                  84KB

                                                • memory/5376-471-0x00000000051B0000-0x000000000529C000-memory.dmp

                                                  Filesize

                                                  944KB

                                                • memory/5376-482-0x0000000004E70000-0x0000000004E85000-memory.dmp

                                                  Filesize

                                                  84KB

                                                • memory/5376-483-0x0000000004E70000-0x0000000004E85000-memory.dmp

                                                  Filesize

                                                  84KB

                                                • memory/5376-487-0x0000000004E70000-0x0000000004E85000-memory.dmp

                                                  Filesize

                                                  84KB

                                                • memory/5376-431-0x00000000050A0000-0x00000000051A6000-memory.dmp

                                                  Filesize

                                                  1.0MB

                                                • memory/5376-485-0x0000000004E70000-0x0000000004E85000-memory.dmp

                                                  Filesize

                                                  84KB

                                                • memory/5748-633-0x0000000006620000-0x0000000006C38000-memory.dmp

                                                  Filesize

                                                  6.1MB

                                                • memory/5748-398-0x0000000000A10000-0x0000000000A60000-memory.dmp

                                                  Filesize

                                                  320KB

                                                • memory/5748-658-0x00000000057A0000-0x00000000057EC000-memory.dmp

                                                  Filesize

                                                  304KB

                                                • memory/5748-647-0x0000000005830000-0x000000000593A000-memory.dmp

                                                  Filesize

                                                  1.0MB

                                                • memory/5760-298-0x00000000013B0000-0x00000000013B1000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/5800-295-0x0000000000400000-0x0000000000592000-memory.dmp

                                                  Filesize

                                                  1.6MB

                                                • memory/6044-296-0x0000000000BF0000-0x0000000000BF1000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/6044-279-0x0000000000BF0000-0x0000000000BF1000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/6624-698-0x0000000009900000-0x0000000009AC2000-memory.dmp

                                                  Filesize

                                                  1.8MB

                                                • memory/6624-700-0x000000000A000000-0x000000000A52C000-memory.dmp

                                                  Filesize

                                                  5.2MB

                                                • memory/6624-605-0x0000000000400000-0x0000000000470000-memory.dmp

                                                  Filesize

                                                  448KB

                                                • memory/6624-678-0x0000000008990000-0x00000000089F6000-memory.dmp

                                                  Filesize

                                                  408KB

                                                • memory/6700-542-0x0000000000860000-0x00000000008CC000-memory.dmp

                                                  Filesize

                                                  432KB

                                                • memory/6700-694-0x000000001DB50000-0x000000001DC5A000-memory.dmp

                                                  Filesize

                                                  1.0MB

                                                • memory/6700-697-0x000000001DA40000-0x000000001DA7C000-memory.dmp

                                                  Filesize

                                                  240KB

                                                • memory/6700-696-0x000000001C450000-0x000000001C462000-memory.dmp

                                                  Filesize

                                                  72KB

                                                • memory/6712-462-0x00000000005B0000-0x0000000000602000-memory.dmp

                                                  Filesize

                                                  328KB

                                                • memory/6712-695-0x0000000006B30000-0x0000000006B80000-memory.dmp

                                                  Filesize

                                                  320KB

                                                • memory/6712-660-0x0000000006450000-0x000000000646E000-memory.dmp

                                                  Filesize

                                                  120KB

                                                • memory/6712-646-0x0000000005370000-0x00000000053E6000-memory.dmp

                                                  Filesize

                                                  472KB

                                                • memory/6712-478-0x0000000004EE0000-0x0000000004EEA000-memory.dmp

                                                  Filesize

                                                  40KB

                                                • memory/6800-787-0x00000000007F0000-0x0000000000CA2000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/6800-790-0x00000000007F0000-0x0000000000CA2000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/6876-788-0x0000000000D00000-0x00000000011A4000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/6876-792-0x0000000000D00000-0x00000000011A4000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/6960-793-0x0000018ED4890000-0x0000018ED48B2000-memory.dmp

                                                  Filesize

                                                  136KB