Resubmissions

27-09-2024 11:31

240927-nmra8asgnd 10

27-09-2024 11:30

240927-nl85mszgmr 10

27-09-2024 11:19

240927-ne7y1asejg 10

27-09-2024 11:11

240927-nagk9azckj 10

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    27-09-2024 11:31

General

  • Target

    4bc8ab389044aabd25719e924300530feddae8efa8a485cbfd67de8f347132f2.exe

  • Size

    1.8MB

  • MD5

    73acb4cc181aca9525ab9f599500b9ca

  • SHA1

    46a29f8b0e10003f85a8eae8a46473d0344650df

  • SHA256

    4bc8ab389044aabd25719e924300530feddae8efa8a485cbfd67de8f347132f2

  • SHA512

    f84e777e3591e00a8c7ac53ad47554d100aec16f19e143dd69447cd2d3872975c5c673f2ab1a8c66a164d0dec73d8876a7d9064386eb90c0474e55c2187ce5c0

  • SSDEEP

    49152:yndcjiRsr7EcYYIpTdp08efz7c2QL7nqIGg0HlpI4:eZR66TdWfXc2aTDYI

Malware Config

Extracted

Family

amadey

Version

4.41

Botnet

fed3aa

C2

http://185.215.113.16

Attributes
  • install_dir

    44111dbc49

  • install_file

    axplong.exe

  • strings_key

    8d0ad6945b1a30a186ec2d30be6db0b5

  • url_paths

    /Jo89Ku7d/index.php

rc4.plain

Extracted

Family

redline

Botnet

LiveTraffic

C2

95.179.250.45:26212

Extracted

Family

lumma

C2

https://reinforcenh.shop/api

https://stogeneratmns.shop/api

https://fragnantbui.shop/api

https://drawzhotdog.shop/api

https://vozmeatillu.shop/api

https://offensivedzvju.shop/api

https://ghostreedmnu.shop/api

https://gutterydhowi.shop/api

https://lootebarrkeyn.shop/api

Extracted

Family

redline

Botnet

@LOGSCLOUDYT_BOT

C2

65.21.18.51:45580

Extracted

Family

stealc

Botnet

default2

C2

http://185.215.113.17

Attributes
  • url_path

    /2fb6c2cc8dce150a.php

Extracted

Family

stealc

Botnet

default

C2

http://91.202.233.158

Attributes
  • url_path

    /e96ea2db21fa9a1b.php

Extracted

Family

redline

Botnet

TG CLOUD @RLREBORN Admin @FATHEROFCARDERS

C2

89.105.223.196:29862

Extracted

Family

redline

Botnet

newbundle2

C2

185.215.113.67:15206

Extracted

Family

xworm

Version

5.0

C2

188.190.10.161:4444

Mutex

TSXTkO0pNBdN2KNw

Attributes
  • install_file

    USB.exe

aes.plain

Extracted

Family

stealc

Botnet

save

C2

http://185.215.113.37

Attributes
  • url_path

    /e2b1563c6670f193.php

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect Xworm Payload 1 IoCs
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 7 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 22 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 35 IoCs
  • Identifies Wine through registry keys 2 TTPs 11 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 6 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 7 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Drops file in Windows directory 8 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 39 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4bc8ab389044aabd25719e924300530feddae8efa8a485cbfd67de8f347132f2.exe
    "C:\Users\Admin\AppData\Local\Temp\4bc8ab389044aabd25719e924300530feddae8efa8a485cbfd67de8f347132f2.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2440
    • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
      "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4208
      • C:\Users\Admin\AppData\Local\Temp\1000002001\gold.exe
        "C:\Users\Admin\AppData\Local\Temp\1000002001\gold.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:5060
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          4⤵
            PID:2552
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            4⤵
            • System Location Discovery: System Language Discovery
            • Modifies system certificate store
            PID:4224
        • C:\Users\Admin\AppData\Local\Temp\1000004001\12dsvc.exe
          "C:\Users\Admin\AppData\Local\Temp\1000004001\12dsvc.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2116
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            4⤵
              PID:4172
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
              4⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:3272
              • C:\Users\Admin\AppData\Roaming\p1SagEjXDm.exe
                "C:\Users\Admin\AppData\Roaming\p1SagEjXDm.exe"
                5⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:3596
              • C:\Users\Admin\AppData\Roaming\Q2SPkteWHK.exe
                "C:\Users\Admin\AppData\Roaming\Q2SPkteWHK.exe"
                5⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:3580
          • C:\Users\Admin\AppData\Local\Temp\1000005001\Nework.exe
            "C:\Users\Admin\AppData\Local\Temp\1000005001\Nework.exe"
            3⤵
            • Executes dropped EXE
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:3024
            • C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe
              "C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe"
              4⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2756
              • C:\Users\Admin\AppData\Local\Temp\1000065001\stories.exe
                "C:\Users\Admin\AppData\Local\Temp\1000065001\stories.exe"
                5⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:3332
                • C:\Users\Admin\AppData\Local\Temp\is-KN2I9.tmp\stories.tmp
                  "C:\Users\Admin\AppData\Local\Temp\is-KN2I9.tmp\stories.tmp" /SL5="$60108,3777639,56832,C:\Users\Admin\AppData\Local\Temp\1000065001\stories.exe"
                  6⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of WriteProcessMemory
                  PID:2992
                  • C:\Users\Admin\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe
                    "C:\Users\Admin\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe" -i
                    7⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    PID:548
          • C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe
            "C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe"
            3⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Checks processor information in registry
            • Suspicious behavior: EnumeratesProcesses
            PID:2380
          • C:\Users\Admin\AppData\Local\Temp\1000191001\needmoney.exe
            "C:\Users\Admin\AppData\Local\Temp\1000191001\needmoney.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            PID:1872
            • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
              C:\Users\Admin\AppData\Local\Temp\svchost015.exe
              4⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:2148
          • C:\Users\Admin\AppData\Local\Temp\1000254001\penis.exe
            "C:\Users\Admin\AppData\Local\Temp\1000254001\penis.exe"
            3⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4316
          • C:\Users\Admin\AppData\Local\Temp\1000290001\crypted.exe
            "C:\Users\Admin\AppData\Local\Temp\1000290001\crypted.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            PID:2660
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
              4⤵
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2416
          • C:\Users\Admin\AppData\Local\Temp\1000314001\LummaC222222.exe
            "C:\Users\Admin\AppData\Local\Temp\1000314001\LummaC222222.exe"
            3⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2876
          • C:\Users\Admin\AppData\Local\Temp\1000322001\newbundle2.exe
            "C:\Users\Admin\AppData\Local\Temp\1000322001\newbundle2.exe"
            3⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2832
            • C:\Users\Admin\AppData\Local\Temp\NetSup_Buil2d.exe
              "C:\Users\Admin\AppData\Local\Temp\NetSup_Buil2d.exe"
              4⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:5464
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\file1.bat" "
                5⤵
                • System Location Discovery: System Language Discovery
                PID:5500
                • C:\Windows\SysWOW64\rundll32.exe
                  rundll32 file1.dll,x
                  6⤵
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  PID:5540
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 5540 -s 520
                    7⤵
                    • Program crash
                    PID:4860
          • C:\Users\Admin\AppData\Local\Temp\1000342001\rstxdhuj.exe
            "C:\Users\Admin\AppData\Local\Temp\1000342001\rstxdhuj.exe"
            3⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • System Location Discovery: System Language Discovery
            PID:1916
          • C:\Users\Admin\AppData\Local\Temp\1000349001\cccc2.exe
            "C:\Users\Admin\AppData\Local\Temp\1000349001\cccc2.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            PID:1936
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
              4⤵
                PID:412
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                4⤵
                • System Location Discovery: System Language Discovery
                PID:1520
            • C:\Users\Admin\AppData\Local\Temp\1000354001\3f31cf3915.exe
              "C:\Users\Admin\AppData\Local\Temp\1000354001\3f31cf3915.exe"
              3⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:3812
            • C:\Users\Admin\AppData\Local\Temp\1000355001\1d4fbe54bc.exe
              "C:\Users\Admin\AppData\Local\Temp\1000355001\1d4fbe54bc.exe"
              3⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:3524
              • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
                4⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Adds Run key to start application
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:928
                • C:\Users\Admin\AppData\Local\Temp\1000023001\dc050681f1.exe
                  "C:\Users\Admin\AppData\Local\Temp\1000023001\dc050681f1.exe"
                  5⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  PID:1136
                • C:\Users\Admin\1000026002\09414a3f73.exe
                  "C:\Users\Admin\1000026002\09414a3f73.exe"
                  5⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • System Location Discovery: System Language Discovery
                  PID:2760
                • C:\Users\Admin\AppData\Local\Temp\1000028001\e461853836.exe
                  "C:\Users\Admin\AppData\Local\Temp\1000028001\e461853836.exe"
                  5⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: GetForegroundWindowSpam
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  PID:1412
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
                    6⤵
                    • Drops file in Windows directory
                    • Enumerates system info in registry
                    • Modifies data under HKEY_USERS
                    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SendNotifyMessage
                    PID:3476
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd66b8cc40,0x7ffd66b8cc4c,0x7ffd66b8cc58
                      7⤵
                        PID:2568
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=3200,i,13362065341432982655,3240791826971425331,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3196 /prefetch:2
                        7⤵
                          PID:1900
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1828,i,13362065341432982655,3240791826971425331,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3428 /prefetch:3
                          7⤵
                            PID:4960
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=1884,i,13362065341432982655,3240791826971425331,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3568 /prefetch:8
                            7⤵
                              PID:3760
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=2656,i,13362065341432982655,3240791826971425331,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3708 /prefetch:1
                              7⤵
                                PID:2784
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=2664,i,13362065341432982655,3240791826971425331,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3788 /prefetch:1
                                7⤵
                                  PID:1072
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4088,i,13362065341432982655,3240791826971425331,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4328 /prefetch:8
                                  7⤵
                                    PID:4796
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4544,i,13362065341432982655,3240791826971425331,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4548 /prefetch:8
                                    7⤵
                                      PID:5520
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4828,i,13362065341432982655,3240791826971425331,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4556 /prefetch:1
                                      7⤵
                                        PID:5532
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=3944,i,13362065341432982655,3240791826971425331,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3772 /prefetch:1
                                        7⤵
                                          PID:5900
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=4884,i,13362065341432982655,3240791826971425331,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4948 /prefetch:8
                                          7⤵
                                            PID:5840
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4900,i,13362065341432982655,3240791826971425331,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5032 /prefetch:8
                                            7⤵
                                            • Modifies registry class
                                            PID:1120
                                  • C:\Users\Admin\AppData\Local\Temp\1000356001\neon.exe
                                    "C:\Users\Admin\AppData\Local\Temp\1000356001\neon.exe"
                                    3⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetThreadContext
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:2328
                                    • C:\Windows\SYSTEM32\cmd.exe
                                      "cmd" /c ping 127.0.0.1 -n 10 > nul && REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "neon" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\neon.exe"
                                      4⤵
                                      • System Network Configuration Discovery: Internet Connection Discovery
                                      PID:924
                                      • C:\Windows\system32\PING.EXE
                                        ping 127.0.0.1 -n 10
                                        5⤵
                                        • System Network Configuration Discovery: Internet Connection Discovery
                                        • Runs ping.exe
                                        PID:5248
                                      • C:\Windows\system32\reg.exe
                                        REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "neon" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\neon.exe"
                                        5⤵
                                        • Adds Run key to start application
                                        PID:5872
                                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
                                      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"
                                      4⤵
                                        PID:5288
                                      • C:\Users\Admin\AppData\Local\Temp\neon.exe
                                        "C:\Users\Admin\AppData\Local\Temp\neon.exe"
                                        4⤵
                                        • Executes dropped EXE
                                        • System Location Discovery: System Language Discovery
                                        PID:5752
                                        • C:\Users\Admin\AppData\Local\Temp\neon.exe
                                          "C:\Users\Admin\AppData\Local\Temp\neon.exe"
                                          5⤵
                                          • Executes dropped EXE
                                          • System Location Discovery: System Language Discovery
                                          PID:4028
                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                                  1⤵
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious behavior: AddClipboardFormatListener
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  • Suspicious use of SetWindowsHookEx
                                  PID:3820
                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe'
                                    2⤵
                                    • Command and Scripting Interpreter: PowerShell
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:1064
                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'InstallUtil.exe'
                                    2⤵
                                    • Command and Scripting Interpreter: PowerShell
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:776
                                • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                  "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                  1⤵
                                    PID:3676
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                    1⤵
                                      PID:5580
                                    • C:\Windows\System32\oobe\UserOOBEBroker.exe
                                      C:\Windows\System32\oobe\UserOOBEBroker.exe -Embedding
                                      1⤵
                                      • Drops file in Windows directory
                                      PID:5972
                                    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe
                                      C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding
                                      1⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:6008
                                    • C:\Windows\system32\svchost.exe
                                      C:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc
                                      1⤵
                                        PID:8
                                      • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                        C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                        1⤵
                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                        • Checks BIOS information in registry
                                        • Executes dropped EXE
                                        • Identifies Wine through registry keys
                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                        PID:5376
                                      • C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe
                                        C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe
                                        1⤵
                                        • Executes dropped EXE
                                        PID:948
                                      • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                        C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                        1⤵
                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                        • Checks BIOS information in registry
                                        • Executes dropped EXE
                                        • Identifies Wine through registry keys
                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                        PID:1676
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 352 -p 5540 -ip 5540
                                        1⤵
                                          PID:648
                                        • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                          C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                          1⤵
                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                          • Checks BIOS information in registry
                                          • Executes dropped EXE
                                          • Identifies Wine through registry keys
                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                          PID:5104
                                        • C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe
                                          C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe
                                          1⤵
                                          • Executes dropped EXE
                                          PID:5128
                                        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                          C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                          1⤵
                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                          • Checks BIOS information in registry
                                          • Executes dropped EXE
                                          • Identifies Wine through registry keys
                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                          PID:1996

                                        Network

                                        MITRE ATT&CK Enterprise v15

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\ProgramData\mozglue.dll

                                          Filesize

                                          593KB

                                          MD5

                                          c8fd9be83bc728cc04beffafc2907fe9

                                          SHA1

                                          95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                          SHA256

                                          ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                          SHA512

                                          fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                        • C:\ProgramData\nss3.dll

                                          Filesize

                                          2.0MB

                                          MD5

                                          1cc453cdf74f31e4d913ff9c10acdde2

                                          SHA1

                                          6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                          SHA256

                                          ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                          SHA512

                                          dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                        • C:\Users\Admin\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe

                                          Filesize

                                          3.1MB

                                          MD5

                                          64aae911240760abac72df65ba0e5716

                                          SHA1

                                          17ba9eb66d8e2f17a33f2cad0635296699280a4f

                                          SHA256

                                          fa489e32634a897ca51c5ec9048e470a1e2e87fb192756f0b0d0728599a0c3b3

                                          SHA512

                                          465d920bfa4a410e1f666829ea440164fd584fca338ec25ba9d4bf0f4d95fa573f79dbc7408b446b5890783f0527956375044a2bddd50806bac5925a48672c1a

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                          Filesize

                                          649B

                                          MD5

                                          0107d0fb107bc66f089e775a68b0a753

                                          SHA1

                                          5791ec8eea2f2d4cd587050830bd6380f43c715d

                                          SHA256

                                          fd96127148baa6857fee00a0a47042d4072520315f28b52184be1f801c71b320

                                          SHA512

                                          f25fb9035098e81a30255640bf9eafa637def0335a41fd36a4bffbc4213a3d94846836eb1a8574f5b9db33671b03a58be24d39a840925ba2331a8c5b86aa6471

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                          Filesize

                                          288B

                                          MD5

                                          5bebd4001273a1b092f9ec9aab4d1bf2

                                          SHA1

                                          df77830bf0e9a91b589b629116951249227f21d0

                                          SHA256

                                          e45598f068471bb71b3641dc9142fb39c41e53297b9503ca6f6c76cf34856347

                                          SHA512

                                          afb8dea1843e4226f8273279e69ce04b8084ec63471d69dda1f0dabf0643a574c7172630577a630f1a6a0f4fccd6bf3e5c36c25a4aeb49a0db225ef7a50c17a4

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                          Filesize

                                          576B

                                          MD5

                                          acb8b120e4a90e22fa41defa1c68a214

                                          SHA1

                                          a3588587136e3189c5547f0e44e1dfd1fc296ef5

                                          SHA256

                                          e3847af41cd7654fa112f73aec3155ebd3c1c8aa996003e0e0cce7add76bcfa3

                                          SHA512

                                          8c71f4d001099e63c14e44da46eac57f66add1380e3a6a379d12065b53bfbc6715fc89d787632ceed17baea656205091e8b76e1461d15398b53c42f3f097a791

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                          Filesize

                                          4KB

                                          MD5

                                          ee1ff604d3ce209e480f2ee8118e13be

                                          SHA1

                                          fb8bce1e13eeaf652f456425f52d99cfe65e0c1d

                                          SHA256

                                          8a277f32a3c314e273b0461e1b93c8381396ea46402e0f747ba2d67e9987c89a

                                          SHA512

                                          93bab6d08a0cd716833b969b2a3fd52a01710e97f7eb45c104a8a937630b948a3d4b2d1bb68ef65b17a03cb55d827839d5d8de70b0b5f3ab36d3ee7bbf4c475c

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                          Filesize

                                          2B

                                          MD5

                                          d751713988987e9331980363e24189ce

                                          SHA1

                                          97d170e1550eee4afc0af065b78cda302a97674c

                                          SHA256

                                          4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                          SHA512

                                          b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                          Filesize

                                          680B

                                          MD5

                                          3ebbb20864fc9424c6fdb828a2270660

                                          SHA1

                                          5427130cf89c1eecb534292aa489775936639ad5

                                          SHA256

                                          39ae91a18237ad7dd1a5dc58a5dfeb16dbb586141da29f96399e690638bbf708

                                          SHA512

                                          fec807859f603291d58b709a2396d8cf6395ed19aee9d50d28deb9aaeafc8d763b6766c908ce212a0e055f8623a6a220fdb57d0322fd0dd6f3aba49a71578c39

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                          Filesize

                                          680B

                                          MD5

                                          fd5548efe345e14eb1c966b3d6d75cba

                                          SHA1

                                          c591f9aa32ac5586f10114ad230e8c020d99d01f

                                          SHA256

                                          f8c58c93f5b25427aba1b9134f07bf1d899bfe8ec7f1db27aa15c33131563163

                                          SHA512

                                          e49c4bcd115f616e3fa6673796c8612baeb5eeee803e381273ce6b6a4935c77b74bad0882144e3a49f6125a128d00a982d4f2130ec4c1730c5adb6cafdc7579c

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                          Filesize

                                          684B

                                          MD5

                                          4fd3acc1f1f70fa1450ec1eec3dc8c6a

                                          SHA1

                                          f6494206ac2643510a5d437440424654c54e3b68

                                          SHA256

                                          90f124957b2a7fdd35c8b59df0fe84f15aeb506378292cfcc4a87b207ce0e07e

                                          SHA512

                                          07ddb2cb121a175d119e3281c1e2ca9ff01a94451ef193fd9fc940dc0feb6b321a98f60d34e2bfb69e6543e032109dc2fe17b97c76315ee2271827bb85911f2b

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                          Filesize

                                          520B

                                          MD5

                                          3d22e6e30256a8b7f553a71f1a58bda4

                                          SHA1

                                          46ae77e91cc478fa410063eeda3e2bb15fc30acb

                                          SHA256

                                          fe70ad0b4a3b7cfd985ea894fea6d3eeece71d11a4bead247173afcbd079789c

                                          SHA512

                                          76adc9842d319256a77ecb21dbeb8805aa4944492095b5a5950b1229853923492d7345f5fcf29baf901da472f340aee3cd3bc6bb5bf47d19b885cf4ff2e3e2c0

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                          Filesize

                                          9KB

                                          MD5

                                          225fcfea549ed2781702721773d0b198

                                          SHA1

                                          07df003eaf1b238fc272d06298835dd9eedcb0ba

                                          SHA256

                                          0d8eda5bf7a9999046cb3aed49eeafe7b578494c7a2c1ddf1a8639d76d3287e6

                                          SHA512

                                          9a5227526350c3f758b0987d993e1b42535e859e405ce9a8b1bb18703bdcc90b8e0c350e91f3e0f7298ada153643fdde22a33605a9bf71c30a600edde561acb5

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                          Filesize

                                          9KB

                                          MD5

                                          2658cda9abaf27eaa80ea58f57118ecf

                                          SHA1

                                          5d03173c20b48f08976a184531d97635bd1569b6

                                          SHA256

                                          a9f753a8fbe350cf0bb80aaac03a473d79d4e0986ceb403467b6811f93952a55

                                          SHA512

                                          73da976d3cbb7f0c927cb7bced5208dc126edbaac4e9e1e79b5b53db7b62a8840980d6b7cb376bf37f8d910dc0622e6d14e333249d409528e37e6986679951bb

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                          Filesize

                                          10KB

                                          MD5

                                          3cbd5aba01f0f11676bdd147ec49159f

                                          SHA1

                                          abcb3ccae35aadf94a79489c09dbfab028702fd6

                                          SHA256

                                          399abca12e4068d68a9607e8558c81c4ccdc87244c271ecb760b1015514ce86c

                                          SHA512

                                          e776b1248a55aabafb0122f21afff544c144cc175e73ccc77db25ba31ecbde58a92f092d4e47de42b1bcc0b0804c908376e92cbd5c08276e71eb338332da7886

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                          Filesize

                                          10KB

                                          MD5

                                          d70c2bd65d0f462b26df87d825a4afa6

                                          SHA1

                                          cedfabe867cdf210c1aa283d65409fb553ebe16d

                                          SHA256

                                          3758f9367f78bcf495c4e0dcdc6fa03adc54708822befd349be55a81352844e5

                                          SHA512

                                          caf1a1ca30cc5b1312dd1494653d06ba90a2f3d7edcb25c0c428447e98adbae34b4d97a96747287c94b9fe784c25f4807565798028411398af3855b3ac2cef22

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                          Filesize

                                          10KB

                                          MD5

                                          bf06b000f7e217b8e4543004a2062019

                                          SHA1

                                          d5056cfd767bc5cceebd9abc65e55fc5e7c66769

                                          SHA256

                                          1e58f489a59390f150e7ac28270a921da80b45bfeced3436eafd4ad07b1d3ffe

                                          SHA512

                                          d948e87ac0e1b6a1b798805262a7c77c51b60670a3537583425f0c91f7dcb96628db933d1ee05801f2714e7ab6e2c011f036aeccd475de1b767668233b556235

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                          Filesize

                                          10KB

                                          MD5

                                          e101430cb7c32870a8c757306c38a95b

                                          SHA1

                                          86ea85ec67b9dc8d9e32ca38a6a979ee03248c82

                                          SHA256

                                          1279fb82e25938bb15ccc85ff4e96d685dda39101636579fcee5044ee7ab82b9

                                          SHA512

                                          fee8aa5db71f5db7e9dfa97f9a39ea8fbed01bd750be83ae5a19acfe2656639badaa5223b44254819153264803575d9496db2b17f2fce9e3014c5944f8640ca3

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                          Filesize

                                          10KB

                                          MD5

                                          468892abf32b127ede8cf272188fe4d5

                                          SHA1

                                          d60d0e158da01c018b7af46cd2bf0f48681a686d

                                          SHA256

                                          7338ac99252663d1ae7132726ab1643a7309b2ec7d5b823f07f460a0cb975cb0

                                          SHA512

                                          92db241afd826e9e5373c825b0f29ee00efb173cf506ab5bdb2614862949c192d32b57223f1da6e304d75d7a472ccc295e70ef1e98e5449a70f30a027b8bf16c

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                          Filesize

                                          13KB

                                          MD5

                                          33b4ab5707aa74903250b1386716c0cd

                                          SHA1

                                          978a5a8b7cf66fb4d30be2af88bab017042f0b67

                                          SHA256

                                          af9ce55e71466a1e95b3599cc2efc499112517c36062aae649153c73fd99c1d1

                                          SHA512

                                          24636913ce037116b16f5c235fdc5c215f9b596d15bbcc189cd8bba1d0bd38ff1c1f132158a362607ed404c159cd6965cccad65e92a12522f5896f6a011ea6c3

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                          Filesize

                                          212KB

                                          MD5

                                          15acc4b66b264291f7c5687255f3776c

                                          SHA1

                                          d9f63cc9a1988c4bc8af83c7e1e5fa12ed7f49db

                                          SHA256

                                          12c2fc97fc1c14584d498bc467bd794bd14b38f9ea4778c9c24bb2bb46d59afd

                                          SHA512

                                          b9a5a1eea104f5cd8a86ca88e4f64cccdb87696058c2d774dea20604122cc928ae7e4466d3ba6b7ec5a6cca25b43c2e9df0a91b8d064aa7fb346db584bb558fa

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                          Filesize

                                          212KB

                                          MD5

                                          b9ed12ca3aaa0309af981fef0b156925

                                          SHA1

                                          412c5b6ad4aca3cc2fc33570ed6a7af13460190f

                                          SHA256

                                          137fc184202331f9b3e17308889b692ca60655e3974280990a8d54c33030d67b

                                          SHA512

                                          cb5e3023f54d5fdbdc4c4bf30ee73486d6e85b63842cf036a46894fa43af27f38b7f44d5dd3727cd79998d5ecb9e136e6b15425bd39d11f916cd9df3836a5159

                                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                          Filesize

                                          2KB

                                          MD5

                                          ac4917a885cf6050b1a483e4bc4d2ea5

                                          SHA1

                                          b1c0a9f27bd21c6bbb8e9be70db8777b4a2a640f

                                          SHA256

                                          e39062a62c3c7617feeeff95ea8a0be51104a0d36f46e44eea22556fda74d8d9

                                          SHA512

                                          092c67a3ecae1d187cad72a8ea1ea37cb78a0cf79c2cd7fb88953e5990669a2e871267015762fd46d274badb88ac0c1d73b00f1df7394d89bed48a3a45c2ba3d

                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                          Filesize

                                          18KB

                                          MD5

                                          b9478b6f34e95520fe2b86e2357919e0

                                          SHA1

                                          3f944087a6cbf1bc3b71328fae90798dd4b85763

                                          SHA256

                                          69f713adc6baabc88ab22ffcede583ddc81d8b5ebbc6b056fcc97c1e0644aa6d

                                          SHA512

                                          e9db6532bf6b1cf089ebac594e292e78ccca28e7e78f8072cdc42d94d0952530a80f8b337e2bb73b6f4855baf5248c089cda9994c407820854475bdb735fdd1f

                                        • C:\Users\Admin\AppData\Local\Temp\1000002001\gold.exe

                                          Filesize

                                          312KB

                                          MD5

                                          389881b424cf4d7ec66de13f01c7232a

                                          SHA1

                                          d3bc5a793c1b8910e1ecc762b69b3866e4c5ba78

                                          SHA256

                                          9d1211b3869ca43840b7da1677b257ad37521aab47719c6fcfe343121760b746

                                          SHA512

                                          2b9517d5d9d972e8754a08863a29e3d3e3cfde58e20d433c85546c2298aad50ac8b069cafd5abb3c86e24263d662c6e1ea23c0745a2668dfd215ddbdfbd1ab96

                                        • C:\Users\Admin\AppData\Local\Temp\1000004001\12dsvc.exe

                                          Filesize

                                          882KB

                                          MD5

                                          84263ab03b0a0f2b51cc11b93ec49c9f

                                          SHA1

                                          e6457eb0e0131bec70a2fd4d4a943314f0bd28d4

                                          SHA256

                                          7d6e4e01c452dd502361640ee095e2bee35e3f55fd11edc9e94c3580d2c132b5

                                          SHA512

                                          db35a02345b5166077e300524675c523a8b4082fa62fc151c0797141348cae5e173eeaec5ad1e95556e048ea6ed34a78b90b1184420557c53cd91f351417ebb2

                                        • C:\Users\Admin\AppData\Local\Temp\1000005001\Nework.exe

                                          Filesize

                                          416KB

                                          MD5

                                          f5d7b79ee6b6da6b50e536030bcc3b59

                                          SHA1

                                          751b555a8eede96d55395290f60adc43b28ba5e2

                                          SHA256

                                          2f1aff28961ba0ce85ea0e35b8936bc387f84f459a4a1d63d964ce79e34b8459

                                          SHA512

                                          532b17cd2a6ac5172b1ddba1e63edd51ab53a4527204415241e3a78e8ffeb9728071bde5ae1eefabefd2627f00963f8a5458668cd7b8df041c8683252ff56b46

                                        • C:\Users\Admin\AppData\Local\Temp\1000028001\e461853836.exe

                                          Filesize

                                          1.1MB

                                          MD5

                                          55ad212ef14e1d3a99251ba84d4c3497

                                          SHA1

                                          5f7127f6f859cae4b9d19f700196cb207a6ddd87

                                          SHA256

                                          c4ef6abb3459faf2b1c99b9ebdb68e27bda102f71df30c1e773bf737cc2d9f33

                                          SHA512

                                          8199e1b9e83ea7f028c6f851b886d3cac829c533489c5e3292bc74b94df2900c7e4168dadec1f4ac0e12bff8a08679433586f79b719a240bb94cb816df5b5c76

                                        • C:\Users\Admin\AppData\Local\Temp\1000065001\stories.exe

                                          Filesize

                                          3.9MB

                                          MD5

                                          28235267b2a3dd75e1e773ada90e0dac

                                          SHA1

                                          166000e3901999dfc8709cb8628014acb7992256

                                          SHA256

                                          9c265bab6183255bc0e0700ec74fbd30cbbf7b6a4f3196ef4a82a517b2d41ce5

                                          SHA512

                                          1f4a35448e9498cd30585bacbbdde37f4f43e596c9356f224bd4aa10083ae4aa48933ccbd555f228732284a713f7afa2bc356ecc6e9c783bd24cfda4d077da64

                                        • C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe

                                          Filesize

                                          187KB

                                          MD5

                                          7a02aa17200aeac25a375f290a4b4c95

                                          SHA1

                                          7cc94ca64268a9a9451fb6b682be42374afc22fd

                                          SHA256

                                          836799fd760eba25e15a55c75c50b977945c557065a708317e00f2c8f965339e

                                          SHA512

                                          f6ebfe7e087aa354722cea3fddd99b1883a862fb92bb5a5a86782ea846a1bff022ab7db4397930bcabaa05cb3d817de3a89331d41a565bc1da737f2c5e3720b6

                                        • C:\Users\Admin\AppData\Local\Temp\1000191001\needmoney.exe

                                          Filesize

                                          4.1MB

                                          MD5

                                          7fa5c660d124162c405984d14042506f

                                          SHA1

                                          69f0dff06ff1911b97a2a0aa4ca9046b722c6b2f

                                          SHA256

                                          fd3edfaff77dd969e3e0d086495e4c742d00e111df9f935ed61dfba8392584b2

                                          SHA512

                                          d50848adbfe75f509414acc97096dad191ae4cef54752bdddcb227ffc0f59bfd2770561e7b3c2a14f4a1423215f05847206ad5c242c7fd5b0655edf513b22f6c

                                        • C:\Users\Admin\AppData\Local\Temp\1000254001\penis.exe

                                          Filesize

                                          409KB

                                          MD5

                                          a21700718c70ec5e787ad373cb72a757

                                          SHA1

                                          027554ab5ff3245e7617f3b83d6548bf7919f92e

                                          SHA256

                                          87e639ecc7704cb5e29f1ebb1d8ade3ae863aaa2505a37b28f2d45121da500c6

                                          SHA512

                                          ea292a5442d9fe536e650a2bc5142dd3aef79c66930243897e0e87c57915f0a54e45e03e58daffb473f85fe10b963d4670050bff5ab3f91121d21d463e25659b

                                        • C:\Users\Admin\AppData\Local\Temp\1000290001\crypted.exe

                                          Filesize

                                          314KB

                                          MD5

                                          ff5afed0a8b802d74af1c1422c720446

                                          SHA1

                                          7135acfa641a873cb0c4c37afc49266bfeec91d8

                                          SHA256

                                          17ac37b4946539fa7fa68b12bd80946d340497a7971802b5848830ad99ea1e10

                                          SHA512

                                          11724d26e11b3146e0fc947c06c59c004c015de0afea24ec28a4eb8145fcd51e9b70007e17621c83f406d9aeb7cd96601245671d41c3fcc88a27c33bd7cf55ac

                                        • C:\Users\Admin\AppData\Local\Temp\1000314001\LummaC222222.exe

                                          Filesize

                                          352KB

                                          MD5

                                          2f1d09f64218fffe7243a8b44345b27e

                                          SHA1

                                          72553e1b3a759c17f54e7b568f39b3f8f1b1cdbe

                                          SHA256

                                          4a553c39728410eb0ebd5e530fc47ef1bdf4b11848a69889e8301974fc26cde2

                                          SHA512

                                          5871e2925ca8375f3c3ce368c05eb67796e1fbec80649d3cc9c39b57ee33f46476d38d3ea8335e2f5518c79f27411a568209f9f6ef38a56650c7436bbaa3f909

                                        • C:\Users\Admin\AppData\Local\Temp\1000322001\newbundle2.exe

                                          Filesize

                                          304KB

                                          MD5

                                          58e8b2eb19704c5a59350d4ff92e5ab6

                                          SHA1

                                          171fc96dda05e7d275ec42840746258217d9caf0

                                          SHA256

                                          07d4b7768e13d79ac5f05f81167b29bb6fbf97828a289d8d11eec38939846834

                                          SHA512

                                          e7655762c5f2d10ec246d11f82d437a2717ad05be847b5e0fd055e3241caaca85430f424055b343e3a44c90d76a0ba07a6913c2208f374f59b61f8aa4477889f

                                        • C:\Users\Admin\AppData\Local\Temp\1000342001\rstxdhuj.exe

                                          Filesize

                                          963KB

                                          MD5

                                          1ef39c8bc5799aa381fe093a1f2d532a

                                          SHA1

                                          57eabb02a7c43c9682988227dd470734cc75edb2

                                          SHA256

                                          0cced5b50789fca3ad4b2c151b798363d712da04c377bd704dcef4898e66b2b4

                                          SHA512

                                          13a9c267c4ceb2bd176f1339faa035ffeb08936deeeb4e38252ea43cfe487ea1c1876e4cc2a965548e767af02805a1da62885e6538da056be0c6fae33b637682

                                        • C:\Users\Admin\AppData\Local\Temp\1000349001\cccc2.exe

                                          Filesize

                                          359KB

                                          MD5

                                          6b470f7251aa9c14d7daea8f6446e217

                                          SHA1

                                          a256c54d4dd7e0a7a1582d8fdfef5807bc3c4af4

                                          SHA256

                                          8b9097b795d42c49c3b2c560714226361671a3f1d711faa9aeaee20e22e7095f

                                          SHA512

                                          fdc553c9d2ff19343dd99b0b34c875752df4fa0cbd494096aeb51d859bd102448f1a5043a53a808045ae52077f180546a134b1aa69db4dc04aff2610fadeaca4

                                        • C:\Users\Admin\AppData\Local\Temp\1000354001\3f31cf3915.exe

                                          Filesize

                                          1.8MB

                                          MD5

                                          fb6e05d5c008f119efcdeefe60d6e924

                                          SHA1

                                          76fca4e5da3cff2eee99634b2f442850000ce47f

                                          SHA256

                                          b01a2006b9ca98754e6c54ea5940b99dba53720fd9f0b83a4024a7061723f90d

                                          SHA512

                                          dfbf12f37b792017329c03fbaec55d4a2cd3c4735defe551d25b91468ed20a2413efcd5c762b2ea68b64028ae895e547141140589500f7156468652696bb342a

                                        • C:\Users\Admin\AppData\Local\Temp\1000355001\1d4fbe54bc.exe

                                          Filesize

                                          1.8MB

                                          MD5

                                          712d279ab30924feb8050a1aeae79f66

                                          SHA1

                                          efeb59fe2bdd1122fbc1abdbbf4da237fc9d9622

                                          SHA256

                                          87f7fedd903ebbb8621dc7d357add628a5b58bf3a47e32b2d45da49ad54684aa

                                          SHA512

                                          e0470d2e8f0050796c6044fb15a24b2dd64af1e03f0ae748d7a1cd8901ba9635e39275fb4cff88f717659f2125e1fffdf308f39bc71ed8c0a9ac21773fd2241d

                                        • C:\Users\Admin\AppData\Local\Temp\1000356001\neon.exe

                                          Filesize

                                          3.5MB

                                          MD5

                                          b3fd0e1003b1cd38402b6d32829f6135

                                          SHA1

                                          c9cedd6322fb83457f56b64b4624b07e2786f702

                                          SHA256

                                          e4a36be98f730d706d2ca97a5d687329a1cc7d4848daf698b7e21b6b9b577f31

                                          SHA512

                                          04692e0f80a75f78b533677cefe3db6607108abf19963d88e231925cfa13f1ec054811aebe53c82d238e732a999cd8d176107d50cf2ea5694d4177cbfd3b30f1

                                        • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe

                                          Filesize

                                          1.8MB

                                          MD5

                                          73acb4cc181aca9525ab9f599500b9ca

                                          SHA1

                                          46a29f8b0e10003f85a8eae8a46473d0344650df

                                          SHA256

                                          4bc8ab389044aabd25719e924300530feddae8efa8a485cbfd67de8f347132f2

                                          SHA512

                                          f84e777e3591e00a8c7ac53ad47554d100aec16f19e143dd69447cd2d3872975c5c673f2ab1a8c66a164d0dec73d8876a7d9064386eb90c0474e55c2187ce5c0

                                        • C:\Users\Admin\AppData\Local\Temp\NetSup_Buil2d.exe

                                          Filesize

                                          2.6MB

                                          MD5

                                          48d3871fe96d9589ea77e2be0adfa4c5

                                          SHA1

                                          9c4ac1f16f9d6ef6ed4fe15a9a34a8666bc5a34b

                                          SHA256

                                          1744714e3873dedbd522830d98b9ce8a38c378338ef081b58d6199ec190e5528

                                          SHA512

                                          9a6809453490ad9818491658472c10a879ce543c7cdb3c62f60ea04031cd1f11562ce5f509bdc78894e3ac4c05728b9261904385ff00f28a5d887c9b223d70ce

                                        • C:\Users\Admin\AppData\Local\Temp\TmpCE4C.tmp

                                          Filesize

                                          2KB

                                          MD5

                                          1420d30f964eac2c85b2ccfe968eebce

                                          SHA1

                                          bdf9a6876578a3e38079c4f8cf5d6c79687ad750

                                          SHA256

                                          f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9

                                          SHA512

                                          6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8

                                        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ewckelr3.san.ps1

                                          Filesize

                                          60B

                                          MD5

                                          d17fe0a3f47be24a6453e9ef58c94641

                                          SHA1

                                          6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                          SHA256

                                          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                          SHA512

                                          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                        • C:\Users\Admin\AppData\Local\Temp\is-0I2T9.tmp\_isetup\_iscrypt.dll

                                          Filesize

                                          2KB

                                          MD5

                                          a69559718ab506675e907fe49deb71e9

                                          SHA1

                                          bc8f404ffdb1960b50c12ff9413c893b56f2e36f

                                          SHA256

                                          2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

                                          SHA512

                                          e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

                                        • C:\Users\Admin\AppData\Local\Temp\is-0I2T9.tmp\_isetup\_isdecmp.dll

                                          Filesize

                                          13KB

                                          MD5

                                          a813d18268affd4763dde940246dc7e5

                                          SHA1

                                          c7366e1fd925c17cc6068001bd38eaef5b42852f

                                          SHA256

                                          e19781aabe466dd8779cb9c8fa41bbb73375447066bb34e876cf388a6ed63c64

                                          SHA512

                                          b310ed4cd2e94381c00a6a370fcb7cc867ebe425d705b69caaaaffdafbab91f72d357966916053e72e68ecf712f2af7585500c58bb53ec3e1d539179fcb45fb4

                                        • C:\Users\Admin\AppData\Local\Temp\is-KN2I9.tmp\stories.tmp

                                          Filesize

                                          692KB

                                          MD5

                                          02bf852d3e218f0bebd47cd9fb88f71c

                                          SHA1

                                          8462e25c948c18846056b6107773f5706c03bdd9

                                          SHA256

                                          849c2ae0fa48cf208f44452ec7b0c0d1ba4092432163cac491ba0281d63e7e69

                                          SHA512

                                          266d7e444145bbd3530bf6f2371955c96b07d9c9a3f5647624f63b983145b1828923f7bff70af3aa0046fba8bb9cf67ae207f5ca04c30740b4c138549aaceea6

                                        • C:\Users\Admin\AppData\Local\Temp\neon.exe

                                          Filesize

                                          76KB

                                          MD5

                                          0e362e7005823d0bec3719b902ed6d62

                                          SHA1

                                          590d860b909804349e0cdc2f1662b37bd62f7463

                                          SHA256

                                          2d0dc6216f613ac7551a7e70a798c22aee8eb9819428b1357e2b8c73bef905ad

                                          SHA512

                                          518991b68496b3f8545e418cf9b345e0791e09cc20d177b8aa47e0aba447aa55383c64f5bdaca39f2b061a5d08c16f2ad484af8a9f238ca23ab081618fba3ad3

                                        • C:\Users\Admin\AppData\Local\Temp\svchost015.exe

                                          Filesize

                                          2.9MB

                                          MD5

                                          b826dd92d78ea2526e465a34324ebeea

                                          SHA1

                                          bf8a0093acfd2eb93c102e1a5745fb080575372e

                                          SHA256

                                          7824b50acdd144764dac7445a4067b35cf0fef619e451045ab6c1f54f5653a5b

                                          SHA512

                                          1ac4b731b9b31cabf3b1c43aee37206aee5326c8e786abe2ab38e031633b778f97f2d6545cf745c3066f3bd47b7aaf2ded2f9955475428100eaf271dd9aeef17

                                        • C:\Users\Admin\AppData\Local\Temp\tmp68A8.tmp.dat

                                          Filesize

                                          114KB

                                          MD5

                                          7db6cef80eafac6e18a510ab209edfe2

                                          SHA1

                                          3ee98c48386788861bf1d99043e6836df4763308

                                          SHA256

                                          4db72158cdd9735367a53c79b929d7e93d2778c970e883faa1b37f741ae01bed

                                          SHA512

                                          78e958b8a7b712349471879d6449f6e9c165511942f71093259cd139f6709f08498bb664562552ba2aa3e218bc3f396f43f26360ca646f1999573772a5b63c2d

                                        • C:\Users\Admin\AppData\Local\Temp\tmp68FC.tmp.dat

                                          Filesize

                                          5.0MB

                                          MD5

                                          3334a482f7268e33522e6ff471b72588

                                          SHA1

                                          f448a4226641d39aa179786e664f318bbfb78e10

                                          SHA256

                                          bfe468f6627db30eb3cc0ddcd48ed57f8ce2c64ce38f799117c4394503016210

                                          SHA512

                                          a61f757df7c6b627153bea2ac6a5eddd4ba10bb35f3f57a97b3c877bfb9e48e98099f53736a8c1105f79d421fbba0e0dc7b585463de97b11bca8cab62d4191f3

                                        • C:\Users\Admin\AppData\Local\Temp\tmp691C.tmp.dat

                                          Filesize

                                          112KB

                                          MD5

                                          87210e9e528a4ddb09c6b671937c79c6

                                          SHA1

                                          3c75314714619f5b55e25769e0985d497f0062f2

                                          SHA256

                                          eeb23424586eb7bc62b51b19f1719c6571b71b167f4d63f25984b7f5c5436db1

                                          SHA512

                                          f8cb8098dc8d478854cddddeac3396bc7b602c4d0449491ecacea7b9106672f36b55b377c724dc6881bee407c6b6c5c3352495ed4b852dd578aa3643a43e37c0

                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-661032028-162657920-1226909816-1000\76b53b3ec448f7ccdda2063b15d2bfc3_397a1569-0be2-47f2-b50f-ef09823a05f8

                                          Filesize

                                          2KB

                                          MD5

                                          75ad04dce14ebf4fed86b491777ce6f2

                                          SHA1

                                          bf1e260b0b0c66398921d8209373e99cde2eae91

                                          SHA256

                                          3a3c5c4dc739b1b7698fb0af0ad96f6aaeeff93305aaf7278ab3d7050e153392

                                          SHA512

                                          79ab36d4b78def6a4483f2b4b806b2fbe3429f964c317bc3d8e2c89fc7e782e67440e57427fbbf97c4a9c742901e978fedaf73c54395f0c110d1109bc39e5ed6

                                        • C:\Users\Admin\AppData\Roaming\Q2SPkteWHK.exe

                                          Filesize

                                          304KB

                                          MD5

                                          4e60f3fd76d9eab244f9dc00f7765b0b

                                          SHA1

                                          1a154d6e837e7105c551793131cde89f157c4330

                                          SHA256

                                          d6945846cc23c01b9c9ad2b97d35b5a14c01f1a4cc2ec651a596f06777ba4fec

                                          SHA512

                                          44727e25781f448579ac35aab94aff550ed9fe5ac58d95bd394569c62892dc78216ac687baa43cef66187ebe629f5dd9cd63ea274222d11dbef3440ec4d7f77a

                                        • C:\Users\Admin\AppData\Roaming\p1SagEjXDm.exe

                                          Filesize

                                          356KB

                                          MD5

                                          a3ef9920a91b891837705e46bb26de17

                                          SHA1

                                          9cfbcd0f46ec86fb57d3d6d74a064f9098adf117

                                          SHA256

                                          171cef885f6c285e995ce3ec5960c5ea4e4ed049cec362745058fee39e4136cc

                                          SHA512

                                          c65e91091b95c3aba0af7df4ed6543d26bcb5b54d6fab82f9d2ac1ba156f475f98124a1a0e8851d69be23b1dc945c76c075cd32515203273260802e1224dbd6e

                                        • C:\Users\Admin\Desktop\Microsoft Edge.lnk

                                          Filesize

                                          2KB

                                          MD5

                                          609751755cb117a58527f3aac011f23e

                                          SHA1

                                          8dd2355cc745fd211ff6fa4d9a41526a98dc3095

                                          SHA256

                                          c67cece5b6c3e35d57d91bd7d22c749c3aba0078964c237e734ac50b34453d22

                                          SHA512

                                          3125254980504edb06b9bc515f5dcb6fa34876ab4007eefa0d794776859ccde52ffdba8a12542872a0605d55790122142c445c89d02650ba9a0dbd9eb2485b78

                                        • C:\Users\Public\Desktop\Google Chrome.lnk

                                          Filesize

                                          2KB

                                          MD5

                                          3f48117780d6190feb7383cea1399ae3

                                          SHA1

                                          a3ba0fa5df3b7ec81bc31678f90af81f45421de9

                                          SHA256

                                          82e3e688774a4dc914ee9af67a8ce4924553769b221dca16ed06d78b4cf3c84c

                                          SHA512

                                          df5d6bc4502bf168d5e0fad49942a4e5854c61633a736eb1467ddb4183388e5c151dacd6f6981ace33b5ce207372595c97fde50f8b14349d07348388b23f8bbe

                                        • memory/548-1266-0x0000000000400000-0x0000000000720000-memory.dmp

                                          Filesize

                                          3.1MB

                                        • memory/548-667-0x0000000000400000-0x0000000000720000-memory.dmp

                                          Filesize

                                          3.1MB

                                        • memory/548-302-0x0000000000400000-0x0000000000720000-memory.dmp

                                          Filesize

                                          3.1MB

                                        • memory/548-305-0x0000000000400000-0x0000000000720000-memory.dmp

                                          Filesize

                                          3.1MB

                                        • memory/548-517-0x0000000000400000-0x0000000000720000-memory.dmp

                                          Filesize

                                          3.1MB

                                        • memory/776-619-0x00000000075E0000-0x00000000075F1000-memory.dmp

                                          Filesize

                                          68KB

                                        • memory/776-620-0x0000000007620000-0x0000000007635000-memory.dmp

                                          Filesize

                                          84KB

                                        • memory/776-599-0x0000000005AC0000-0x0000000005E17000-memory.dmp

                                          Filesize

                                          3.3MB

                                        • memory/776-618-0x00000000072D0000-0x0000000007374000-memory.dmp

                                          Filesize

                                          656KB

                                        • memory/776-609-0x000000006CBF0000-0x000000006CC3C000-memory.dmp

                                          Filesize

                                          304KB

                                        • memory/928-590-0x00000000002E0000-0x000000000078D000-memory.dmp

                                          Filesize

                                          4.7MB

                                        • memory/928-698-0x00000000002E0000-0x000000000078D000-memory.dmp

                                          Filesize

                                          4.7MB

                                        • memory/928-686-0x00000000002E0000-0x000000000078D000-memory.dmp

                                          Filesize

                                          4.7MB

                                        • memory/1064-530-0x0000000004EC0000-0x0000000004EE2000-memory.dmp

                                          Filesize

                                          136KB

                                        • memory/1064-574-0x00000000070C0000-0x00000000070DA000-memory.dmp

                                          Filesize

                                          104KB

                                        • memory/1064-595-0x0000000007400000-0x0000000007408000-memory.dmp

                                          Filesize

                                          32KB

                                        • memory/1064-594-0x0000000007420000-0x000000000743A000-memory.dmp

                                          Filesize

                                          104KB

                                        • memory/1064-593-0x0000000007310000-0x0000000007325000-memory.dmp

                                          Filesize

                                          84KB

                                        • memory/1064-592-0x0000000007300000-0x000000000730E000-memory.dmp

                                          Filesize

                                          56KB

                                        • memory/1064-577-0x00000000072D0000-0x00000000072E1000-memory.dmp

                                          Filesize

                                          68KB

                                        • memory/1064-576-0x0000000007360000-0x00000000073F6000-memory.dmp

                                          Filesize

                                          600KB

                                        • memory/1064-575-0x0000000007130000-0x000000000713A000-memory.dmp

                                          Filesize

                                          40KB

                                        • memory/1064-573-0x0000000007700000-0x0000000007D7A000-memory.dmp

                                          Filesize

                                          6.5MB

                                        • memory/1064-563-0x0000000006D80000-0x0000000006E24000-memory.dmp

                                          Filesize

                                          656KB

                                        • memory/1064-562-0x0000000006D50000-0x0000000006D6E000-memory.dmp

                                          Filesize

                                          120KB

                                        • memory/1064-553-0x000000006CBF0000-0x000000006CC3C000-memory.dmp

                                          Filesize

                                          304KB

                                        • memory/1064-552-0x0000000006D10000-0x0000000006D44000-memory.dmp

                                          Filesize

                                          208KB

                                        • memory/1064-541-0x0000000005D60000-0x0000000005D7E000-memory.dmp

                                          Filesize

                                          120KB

                                        • memory/1064-540-0x00000000058E0000-0x0000000005C37000-memory.dmp

                                          Filesize

                                          3.3MB

                                        • memory/1064-533-0x0000000004F60000-0x0000000004FC6000-memory.dmp

                                          Filesize

                                          408KB

                                        • memory/1064-522-0x0000000002510000-0x0000000002546000-memory.dmp

                                          Filesize

                                          216KB

                                        • memory/1064-523-0x0000000005010000-0x000000000563A000-memory.dmp

                                          Filesize

                                          6.2MB

                                        • memory/1136-663-0x00000000005C0000-0x0000000000C65000-memory.dmp

                                          Filesize

                                          6.6MB

                                        • memory/1136-657-0x00000000005C0000-0x0000000000C65000-memory.dmp

                                          Filesize

                                          6.6MB

                                        • memory/1520-529-0x0000000000400000-0x0000000000462000-memory.dmp

                                          Filesize

                                          392KB

                                        • memory/1520-525-0x0000000000400000-0x0000000000462000-memory.dmp

                                          Filesize

                                          392KB

                                        • memory/1520-527-0x0000000000400000-0x0000000000462000-memory.dmp

                                          Filesize

                                          392KB

                                        • memory/1676-854-0x00000000002E0000-0x000000000078D000-memory.dmp

                                          Filesize

                                          4.7MB

                                        • memory/1676-850-0x00000000002E0000-0x000000000078D000-memory.dmp

                                          Filesize

                                          4.7MB

                                        • memory/1872-352-0x0000000000400000-0x000000000081B000-memory.dmp

                                          Filesize

                                          4.1MB

                                        • memory/1936-495-0x0000000000960000-0x00000000009C0000-memory.dmp

                                          Filesize

                                          384KB

                                        • memory/1996-1348-0x00000000002E0000-0x000000000078D000-memory.dmp

                                          Filesize

                                          4.7MB

                                        • memory/1996-1350-0x00000000002E0000-0x000000000078D000-memory.dmp

                                          Filesize

                                          4.7MB

                                        • memory/2116-91-0x00000000001B0000-0x0000000000292000-memory.dmp

                                          Filesize

                                          904KB

                                        • memory/2148-353-0x0000000000400000-0x0000000000643000-memory.dmp

                                          Filesize

                                          2.3MB

                                        • memory/2148-348-0x0000000000400000-0x0000000000643000-memory.dmp

                                          Filesize

                                          2.3MB

                                        • memory/2148-496-0x0000000000400000-0x0000000000643000-memory.dmp

                                          Filesize

                                          2.3MB

                                        • memory/2148-351-0x0000000000400000-0x0000000000643000-memory.dmp

                                          Filesize

                                          2.3MB

                                        • memory/2328-758-0x0000000001C60000-0x0000000001CFE000-memory.dmp

                                          Filesize

                                          632KB

                                        • memory/2328-756-0x0000000001BB0000-0x0000000001C5E000-memory.dmp

                                          Filesize

                                          696KB

                                        • memory/2328-753-0x0000000001600000-0x00000000016BD000-memory.dmp

                                          Filesize

                                          756KB

                                        • memory/2328-752-0x0000000000F50000-0x0000000000FB7000-memory.dmp

                                          Filesize

                                          412KB

                                        • memory/2328-806-0x00000000261D0000-0x00000000261EA000-memory.dmp

                                          Filesize

                                          104KB

                                        • memory/2328-755-0x0000000001B10000-0x0000000001BA1000-memory.dmp

                                          Filesize

                                          580KB

                                        • memory/2328-761-0x0000000002410000-0x000000000246D000-memory.dmp

                                          Filesize

                                          372KB

                                        • memory/2328-760-0x0000000002360000-0x000000000240A000-memory.dmp

                                          Filesize

                                          680KB

                                        • memory/2328-759-0x00000000021C0000-0x00000000022E0000-memory.dmp

                                          Filesize

                                          1.1MB

                                        • memory/2328-766-0x0000000003540000-0x0000000003556000-memory.dmp

                                          Filesize

                                          88KB

                                        • memory/2328-768-0x0000000003560000-0x0000000003586000-memory.dmp

                                          Filesize

                                          152KB

                                        • memory/2328-769-0x0000000003590000-0x00000000035B9000-memory.dmp

                                          Filesize

                                          164KB

                                        • memory/2328-767-0x0000000003620000-0x00000000036DD000-memory.dmp

                                          Filesize

                                          756KB

                                        • memory/2328-762-0x0000000002320000-0x0000000002338000-memory.dmp

                                          Filesize

                                          96KB

                                        • memory/2328-763-0x0000000000AA0000-0x0000000000AAA000-memory.dmp

                                          Filesize

                                          40KB

                                        • memory/2328-757-0x0000000001D10000-0x0000000001DB3000-memory.dmp

                                          Filesize

                                          652KB

                                        • memory/2328-754-0x00000000016C0000-0x0000000001A34000-memory.dmp

                                          Filesize

                                          3.5MB

                                        • memory/2328-765-0x0000000003390000-0x000000000353C000-memory.dmp

                                          Filesize

                                          1.7MB

                                        • memory/2328-640-0x0000000000AB0000-0x0000000000E2C000-memory.dmp

                                          Filesize

                                          3.5MB

                                        • memory/2328-649-0x0000000024200000-0x000000002429E000-memory.dmp

                                          Filesize

                                          632KB

                                        • memory/2328-807-0x00000000261F0000-0x00000000261F6000-memory.dmp

                                          Filesize

                                          24KB

                                        • memory/2380-180-0x00000000003C0000-0x0000000000603000-memory.dmp

                                          Filesize

                                          2.3MB

                                        • memory/2380-201-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                          Filesize

                                          972KB

                                        • memory/2380-474-0x00000000003C0000-0x0000000000603000-memory.dmp

                                          Filesize

                                          2.3MB

                                        • memory/2416-355-0x0000000000400000-0x0000000000452000-memory.dmp

                                          Filesize

                                          328KB

                                        • memory/2440-2-0x0000000000981000-0x00000000009AF000-memory.dmp

                                          Filesize

                                          184KB

                                        • memory/2440-0-0x0000000000980000-0x0000000000E4B000-memory.dmp

                                          Filesize

                                          4.8MB

                                        • memory/2440-16-0x0000000000980000-0x0000000000E4B000-memory.dmp

                                          Filesize

                                          4.8MB

                                        • memory/2440-1-0x0000000077676000-0x0000000077678000-memory.dmp

                                          Filesize

                                          8KB

                                        • memory/2440-3-0x0000000000980000-0x0000000000E4B000-memory.dmp

                                          Filesize

                                          4.8MB

                                        • memory/2440-4-0x0000000000980000-0x0000000000E4B000-memory.dmp

                                          Filesize

                                          4.8MB

                                        • memory/2660-342-0x0000000000220000-0x0000000000274000-memory.dmp

                                          Filesize

                                          336KB

                                        • memory/2760-685-0x0000000000E10000-0x00000000014B5000-memory.dmp

                                          Filesize

                                          6.6MB

                                        • memory/2760-682-0x0000000000E10000-0x00000000014B5000-memory.dmp

                                          Filesize

                                          6.6MB

                                        • memory/2832-414-0x00000000006B0000-0x0000000000702000-memory.dmp

                                          Filesize

                                          328KB

                                        • memory/2992-500-0x0000000000400000-0x00000000004BD000-memory.dmp

                                          Filesize

                                          756KB

                                        • memory/3272-113-0x0000000000400000-0x00000000004DE000-memory.dmp

                                          Filesize

                                          888KB

                                        • memory/3272-112-0x0000000000400000-0x00000000004DE000-memory.dmp

                                          Filesize

                                          888KB

                                        • memory/3272-111-0x0000000000400000-0x00000000004DE000-memory.dmp

                                          Filesize

                                          888KB

                                        • memory/3272-141-0x0000000000400000-0x00000000004DE000-memory.dmp

                                          Filesize

                                          888KB

                                        • memory/3272-108-0x0000000000400000-0x00000000004DE000-memory.dmp

                                          Filesize

                                          888KB

                                        • memory/3332-245-0x0000000000400000-0x0000000000414000-memory.dmp

                                          Filesize

                                          80KB

                                        • memory/3332-499-0x0000000000400000-0x0000000000414000-memory.dmp

                                          Filesize

                                          80KB

                                        • memory/3524-591-0x0000000000CD0000-0x000000000117D000-memory.dmp

                                          Filesize

                                          4.7MB

                                        • memory/3524-571-0x0000000000CD0000-0x000000000117D000-memory.dmp

                                          Filesize

                                          4.7MB

                                        • memory/3580-450-0x0000000008240000-0x0000000008290000-memory.dmp

                                          Filesize

                                          320KB

                                        • memory/3580-318-0x0000000006410000-0x0000000006476000-memory.dmp

                                          Filesize

                                          408KB

                                        • memory/3580-413-0x0000000008300000-0x00000000084C2000-memory.dmp

                                          Filesize

                                          1.8MB

                                        • memory/3580-145-0x00000000000F0000-0x0000000000142000-memory.dmp

                                          Filesize

                                          328KB

                                        • memory/3580-415-0x0000000008A00000-0x0000000008F2C000-memory.dmp

                                          Filesize

                                          5.2MB

                                        • memory/3812-518-0x0000000000AB0000-0x0000000001155000-memory.dmp

                                          Filesize

                                          6.6MB

                                        • memory/3812-543-0x0000000000AB0000-0x0000000001155000-memory.dmp

                                          Filesize

                                          6.6MB

                                        • memory/3820-476-0x0000000004BE0000-0x0000000004C7C000-memory.dmp

                                          Filesize

                                          624KB

                                        • memory/3820-797-0x0000000007E60000-0x00000000081B0000-memory.dmp

                                          Filesize

                                          3.3MB

                                        • memory/3820-804-0x0000000007600000-0x0000000007720000-memory.dmp

                                          Filesize

                                          1.1MB

                                        • memory/3820-805-0x00000000078A0000-0x0000000007BF7000-memory.dmp

                                          Filesize

                                          3.3MB

                                        • memory/3820-475-0x00000000003D0000-0x00000000003FE000-memory.dmp

                                          Filesize

                                          184KB

                                        • memory/3820-751-0x0000000006900000-0x000000000690E000-memory.dmp

                                          Filesize

                                          56KB

                                        • memory/4208-498-0x0000000000420000-0x00000000008EB000-memory.dmp

                                          Filesize

                                          4.8MB

                                        • memory/4208-658-0x0000000000420000-0x00000000008EB000-memory.dmp

                                          Filesize

                                          4.8MB

                                        • memory/4208-17-0x0000000000420000-0x00000000008EB000-memory.dmp

                                          Filesize

                                          4.8MB

                                        • memory/4208-270-0x0000000000420000-0x00000000008EB000-memory.dmp

                                          Filesize

                                          4.8MB

                                        • memory/4208-19-0x0000000000421000-0x000000000044F000-memory.dmp

                                          Filesize

                                          184KB

                                        • memory/4208-20-0x0000000000420000-0x00000000008EB000-memory.dmp

                                          Filesize

                                          4.8MB

                                        • memory/4208-21-0x0000000000420000-0x00000000008EB000-memory.dmp

                                          Filesize

                                          4.8MB

                                        • memory/4208-182-0x0000000000420000-0x00000000008EB000-memory.dmp

                                          Filesize

                                          4.8MB

                                        • memory/4208-181-0x0000000000420000-0x00000000008EB000-memory.dmp

                                          Filesize

                                          4.8MB

                                        • memory/4224-65-0x00000000063C0000-0x00000000063DE000-memory.dmp

                                          Filesize

                                          120KB

                                        • memory/4224-47-0x0000000005610000-0x0000000005BB6000-memory.dmp

                                          Filesize

                                          5.6MB

                                        • memory/4224-44-0x0000000000400000-0x0000000000452000-memory.dmp

                                          Filesize

                                          328KB

                                        • memory/4224-48-0x0000000004FB0000-0x0000000005042000-memory.dmp

                                          Filesize

                                          584KB

                                        • memory/4224-49-0x0000000004F90000-0x0000000004F9A000-memory.dmp

                                          Filesize

                                          40KB

                                        • memory/4224-64-0x0000000005D40000-0x0000000005DB6000-memory.dmp

                                          Filesize

                                          472KB

                                        • memory/4224-76-0x0000000006D50000-0x0000000007368000-memory.dmp

                                          Filesize

                                          6.1MB

                                        • memory/4224-86-0x0000000008510000-0x000000000861A000-memory.dmp

                                          Filesize

                                          1.0MB

                                        • memory/4224-89-0x00000000067A0000-0x00000000067EC000-memory.dmp

                                          Filesize

                                          304KB

                                        • memory/4224-87-0x0000000006C80000-0x0000000006C92000-memory.dmp

                                          Filesize

                                          72KB

                                        • memory/4224-88-0x0000000006CE0000-0x0000000006D1C000-memory.dmp

                                          Filesize

                                          240KB

                                        • memory/4316-314-0x0000000000BC0000-0x0000000000C2C000-memory.dmp

                                          Filesize

                                          432KB

                                        • memory/5060-40-0x000000007303E000-0x000000007303F000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/5060-41-0x00000000005A0000-0x00000000005F4000-memory.dmp

                                          Filesize

                                          336KB

                                        • memory/5104-1347-0x0000000000420000-0x00000000008EB000-memory.dmp

                                          Filesize

                                          4.8MB

                                        • memory/5376-808-0x0000000000420000-0x00000000008EB000-memory.dmp

                                          Filesize

                                          4.8MB

                                        • memory/5376-852-0x0000000000420000-0x00000000008EB000-memory.dmp

                                          Filesize

                                          4.8MB

                                        • memory/5752-1119-0x00000000003D0000-0x00000000003EA000-memory.dmp

                                          Filesize

                                          104KB