Analysis

  • max time kernel
    161s
  • max time network
    164s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-11-2024 09:24

General

  • Target

    https://mega.nz/file/iN9RXLaA#-p17M5OrKTA9uh2TWvKrD9IhOKXBK-AQl4spSERybEA

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Modifies WinLogon for persistence 2 TTPs 6 IoCs
  • Process spawned unexpected child process 18 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Checks computer location settings 2 TTPs 26 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 26 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 12 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 17 IoCs
  • Drops file in Program Files directory 5 IoCs
  • Drops file in Windows directory 4 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 38 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 18 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 49 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://mega.nz/file/iN9RXLaA#-p17M5OrKTA9uh2TWvKrD9IhOKXBK-AQl4spSERybEA
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4380
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fff094ccc40,0x7fff094ccc4c,0x7fff094ccc58
      2⤵
        PID:4516
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1976,i,15473175931751201571,7105633002917873146,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1972 /prefetch:2
        2⤵
          PID:4320
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2124,i,15473175931751201571,7105633002917873146,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2152 /prefetch:3
          2⤵
            PID:2536
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2224,i,15473175931751201571,7105633002917873146,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2240 /prefetch:8
            2⤵
              PID:1504
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3116,i,15473175931751201571,7105633002917873146,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3136 /prefetch:1
              2⤵
                PID:444
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3132,i,15473175931751201571,7105633002917873146,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3164 /prefetch:1
                2⤵
                  PID:2348
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=4536,i,15473175931751201571,7105633002917873146,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4608 /prefetch:8
                  2⤵
                    PID:3920
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4904,i,15473175931751201571,7105633002917873146,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4936 /prefetch:8
                    2⤵
                      PID:2972
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5044,i,15473175931751201571,7105633002917873146,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5024 /prefetch:8
                      2⤵
                        PID:2100
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=964,i,15473175931751201571,7105633002917873146,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5072 /prefetch:1
                        2⤵
                          PID:3256
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=3320,i,15473175931751201571,7105633002917873146,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5684 /prefetch:1
                          2⤵
                            PID:2012
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5868,i,15473175931751201571,7105633002917873146,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5880 /prefetch:8
                            2⤵
                              PID:3164
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5940,i,15473175931751201571,7105633002917873146,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5972 /prefetch:8
                              2⤵
                                PID:2408
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5856,i,15473175931751201571,7105633002917873146,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6084 /prefetch:1
                                2⤵
                                  PID:4864
                              • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                1⤵
                                  PID:3724
                                • C:\Windows\system32\AUDIODG.EXE
                                  C:\Windows\system32\AUDIODG.EXE 0x154 0x494
                                  1⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3252
                                • C:\Windows\system32\svchost.exe
                                  C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                  1⤵
                                    PID:3896
                                  • C:\Windows\system32\OpenWith.exe
                                    C:\Windows\system32\OpenWith.exe -Embedding
                                    1⤵
                                    • Modifies registry class
                                    • Suspicious use of SetWindowsHookEx
                                    PID:2964
                                  • C:\Windows\System32\rundll32.exe
                                    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                    1⤵
                                      PID:2416
                                    • C:\Windows\System32\svchost.exe
                                      C:\Windows\System32\svchost.exe -k UnistackSvcGroup
                                      1⤵
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:1644
                                    • C:\Program Files\7-Zip\7zG.exe
                                      "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\" -an -ai#7zMap14694:84:7zEvent8621
                                      1⤵
                                      • Suspicious use of AdjustPrivilegeToken
                                      • Suspicious use of FindShellTrayWindow
                                      PID:2384
                                    • C:\Windows\system32\NOTEPAD.EXE
                                      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\ИНСТРУКЦИЯ.txt
                                      1⤵
                                        PID:2272
                                      • C:\Users\Admin\Desktop\NIXWARE\loader.exe
                                        "C:\Users\Admin\Desktop\NIXWARE\loader.exe"
                                        1⤵
                                        • Checks computer location settings
                                        • Executes dropped EXE
                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                        • System Location Discovery: System Language Discovery
                                        • Modifies registry class
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of SetWindowsHookEx
                                        PID:1408
                                        • C:\Windows\SysWOW64\WScript.exe
                                          "C:\Windows\System32\WScript.exe" "C:\bridgeHypercomComponentHost\u95boq3b7HFvqr.vbe"
                                          2⤵
                                          • Checks computer location settings
                                          • System Location Discovery: System Language Discovery
                                          PID:4044
                                          • C:\Windows\SysWOW64\cmd.exe
                                            C:\Windows\system32\cmd.exe /c ""C:\bridgeHypercomComponentHost\AAJff1lG8RICXs2A4EYTaC5p7dZ23zLFBkqYwYWng.bat" "
                                            3⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:3724
                                            • C:\bridgeHypercomComponentHost\mscontainerWindll.exe
                                              "C:\bridgeHypercomComponentHost/mscontainerWindll.exe"
                                              4⤵
                                              • Modifies WinLogon for persistence
                                              • Checks computer location settings
                                              • Executes dropped EXE
                                              • Adds Run key to start application
                                              • Drops file in Program Files directory
                                              • Drops file in Windows directory
                                              • Modifies registry class
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:4300
                                              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\m5ry2uj0\m5ry2uj0.cmdline"
                                                5⤵
                                                • Drops file in System32 directory
                                                PID:1428
                                                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                  C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1C77.tmp" "c:\Windows\System32\CSCE72A92DF64484CDD88D1D021D7BD6C0.TMP"
                                                  6⤵
                                                    PID:2824
                                                • C:\Windows\System32\cmd.exe
                                                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\qE7VszSitn.bat"
                                                  5⤵
                                                    PID:2740
                                                    • C:\Windows\system32\chcp.com
                                                      chcp 65001
                                                      6⤵
                                                        PID:4908
                                                      • C:\Windows\system32\w32tm.exe
                                                        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                        6⤵
                                                          PID:2400
                                                        • C:\bridgeHypercomComponentHost\mscontainerWindll.exe
                                                          "C:\bridgeHypercomComponentHost\mscontainerWindll.exe"
                                                          6⤵
                                                          • Executes dropped EXE
                                                          PID:2240
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "explorere" /sc MINUTE /mo 11 /tr "'C:\Users\Admin\Templates\explorer.exe'" /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:380
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Users\Admin\Templates\explorer.exe'" /rl HIGHEST /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:424
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "explorere" /sc MINUTE /mo 11 /tr "'C:\Users\Admin\Templates\explorer.exe'" /rl HIGHEST /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:4216
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 8 /tr "'C:\Program Files\dotnet\host\fxr\RuntimeBroker.exe'" /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:4772
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files\dotnet\host\fxr\RuntimeBroker.exe'" /rl HIGHEST /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:312
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 6 /tr "'C:\Program Files\dotnet\host\fxr\RuntimeBroker.exe'" /rl HIGHEST /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:4956
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 8 /tr "'C:\Windows\ImmersiveControlPanel\pris\RuntimeBroker.exe'" /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:4588
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\ImmersiveControlPanel\pris\RuntimeBroker.exe'" /rl HIGHEST /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:3084
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 7 /tr "'C:\Windows\ImmersiveControlPanel\pris\RuntimeBroker.exe'" /rl HIGHEST /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:2364
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 9 /tr "'C:\Windows\Help\en-US\WmiPrvSE.exe'" /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:4960
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Windows\Help\en-US\WmiPrvSE.exe'" /rl HIGHEST /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:2004
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 12 /tr "'C:\Windows\Help\en-US\WmiPrvSE.exe'" /rl HIGHEST /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:1596
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Photo Viewer\fr-FR\winlogon.exe'" /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:4752
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Program Files\Windows Photo Viewer\fr-FR\winlogon.exe'" /rl HIGHEST /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:1504
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 12 /tr "'C:\Program Files\Windows Photo Viewer\fr-FR\winlogon.exe'" /rl HIGHEST /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:3676
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "mscontainerWindllm" /sc MINUTE /mo 11 /tr "'C:\bridgeHypercomComponentHost\mscontainerWindll.exe'" /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:4188
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "mscontainerWindll" /sc ONLOGON /tr "'C:\bridgeHypercomComponentHost\mscontainerWindll.exe'" /rl HIGHEST /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:4788
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "mscontainerWindllm" /sc MINUTE /mo 14 /tr "'C:\bridgeHypercomComponentHost\mscontainerWindll.exe'" /rl HIGHEST /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:4864
                                              • C:\Windows\system32\OpenWith.exe
                                                C:\Windows\system32\OpenWith.exe -Embedding
                                                1⤵
                                                • Modifies registry class
                                                • Suspicious use of SetWindowsHookEx
                                                PID:4072
                                                • C:\Windows\system32\NOTEPAD.EXE
                                                  "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\CFG\RAGE 3.cfg
                                                  2⤵
                                                    PID:1056
                                                • C:\Users\Admin\Desktop\NIXWARE\loader.exe
                                                  "C:\Users\Admin\Desktop\NIXWARE\loader.exe"
                                                  1⤵
                                                  • Checks computer location settings
                                                  • Executes dropped EXE
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  • System Location Discovery: System Language Discovery
                                                  • Modifies registry class
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:3236
                                                  • C:\Windows\SysWOW64\WScript.exe
                                                    "C:\Windows\System32\WScript.exe" "C:\bridgeHypercomComponentHost\u95boq3b7HFvqr.vbe"
                                                    2⤵
                                                    • Checks computer location settings
                                                    • System Location Discovery: System Language Discovery
                                                    PID:3492
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      C:\Windows\system32\cmd.exe /c ""C:\bridgeHypercomComponentHost\AAJff1lG8RICXs2A4EYTaC5p7dZ23zLFBkqYwYWng.bat" "
                                                      3⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:4624
                                                      • C:\bridgeHypercomComponentHost\mscontainerWindll.exe
                                                        "C:\bridgeHypercomComponentHost/mscontainerWindll.exe"
                                                        4⤵
                                                        • Executes dropped EXE
                                                        PID:3116
                                                • C:\Users\Admin\Desktop\NIXWARE\loader.exe
                                                  "C:\Users\Admin\Desktop\NIXWARE\loader.exe"
                                                  1⤵
                                                  • Checks computer location settings
                                                  • Executes dropped EXE
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  • System Location Discovery: System Language Discovery
                                                  • Modifies registry class
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:3744
                                                  • C:\Windows\SysWOW64\WScript.exe
                                                    "C:\Windows\System32\WScript.exe" "C:\bridgeHypercomComponentHost\u95boq3b7HFvqr.vbe"
                                                    2⤵
                                                    • Checks computer location settings
                                                    • System Location Discovery: System Language Discovery
                                                    PID:1188
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      C:\Windows\system32\cmd.exe /c ""C:\bridgeHypercomComponentHost\AAJff1lG8RICXs2A4EYTaC5p7dZ23zLFBkqYwYWng.bat" "
                                                      3⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:4700
                                                      • C:\bridgeHypercomComponentHost\mscontainerWindll.exe
                                                        "C:\bridgeHypercomComponentHost/mscontainerWindll.exe"
                                                        4⤵
                                                        • Executes dropped EXE
                                                        PID:4068
                                                • C:\Users\Admin\Desktop\NIXWARE\loader.exe
                                                  "C:\Users\Admin\Desktop\NIXWARE\loader.exe"
                                                  1⤵
                                                  • Checks computer location settings
                                                  • Executes dropped EXE
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  • System Location Discovery: System Language Discovery
                                                  • Modifies registry class
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:2364
                                                  • C:\Windows\SysWOW64\WScript.exe
                                                    "C:\Windows\System32\WScript.exe" "C:\bridgeHypercomComponentHost\u95boq3b7HFvqr.vbe"
                                                    2⤵
                                                    • Checks computer location settings
                                                    • System Location Discovery: System Language Discovery
                                                    PID:2540
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      C:\Windows\system32\cmd.exe /c ""C:\bridgeHypercomComponentHost\AAJff1lG8RICXs2A4EYTaC5p7dZ23zLFBkqYwYWng.bat" "
                                                      3⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:5064
                                                      • C:\bridgeHypercomComponentHost\mscontainerWindll.exe
                                                        "C:\bridgeHypercomComponentHost/mscontainerWindll.exe"
                                                        4⤵
                                                        • Executes dropped EXE
                                                        PID:3556
                                                • C:\Users\Admin\Desktop\NIXWARE\loader.exe
                                                  "C:\Users\Admin\Desktop\NIXWARE\loader.exe"
                                                  1⤵
                                                  • Checks computer location settings
                                                  • Executes dropped EXE
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  • System Location Discovery: System Language Discovery
                                                  • Modifies registry class
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:1088
                                                  • C:\Windows\SysWOW64\WScript.exe
                                                    "C:\Windows\System32\WScript.exe" "C:\bridgeHypercomComponentHost\u95boq3b7HFvqr.vbe"
                                                    2⤵
                                                    • Checks computer location settings
                                                    • System Location Discovery: System Language Discovery
                                                    PID:1988
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      C:\Windows\system32\cmd.exe /c ""C:\bridgeHypercomComponentHost\AAJff1lG8RICXs2A4EYTaC5p7dZ23zLFBkqYwYWng.bat" "
                                                      3⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:2284
                                                      • C:\bridgeHypercomComponentHost\mscontainerWindll.exe
                                                        "C:\bridgeHypercomComponentHost/mscontainerWindll.exe"
                                                        4⤵
                                                        • Executes dropped EXE
                                                        PID:5044
                                                • C:\Users\Admin\Desktop\NIXWARE\loader.exe
                                                  "C:\Users\Admin\Desktop\NIXWARE\loader.exe"
                                                  1⤵
                                                  • Checks computer location settings
                                                  • Executes dropped EXE
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  • System Location Discovery: System Language Discovery
                                                  • Modifies registry class
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:3420
                                                  • C:\Windows\SysWOW64\WScript.exe
                                                    "C:\Windows\System32\WScript.exe" "C:\bridgeHypercomComponentHost\u95boq3b7HFvqr.vbe"
                                                    2⤵
                                                    • Checks computer location settings
                                                    • System Location Discovery: System Language Discovery
                                                    PID:2200
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      C:\Windows\system32\cmd.exe /c ""C:\bridgeHypercomComponentHost\AAJff1lG8RICXs2A4EYTaC5p7dZ23zLFBkqYwYWng.bat" "
                                                      3⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:4312
                                                      • C:\bridgeHypercomComponentHost\mscontainerWindll.exe
                                                        "C:\bridgeHypercomComponentHost/mscontainerWindll.exe"
                                                        4⤵
                                                        • Executes dropped EXE
                                                        PID:4024
                                                • C:\Users\Admin\Desktop\NIXWARE\loader.exe
                                                  "C:\Users\Admin\Desktop\NIXWARE\loader.exe"
                                                  1⤵
                                                  • Checks computer location settings
                                                  • Executes dropped EXE
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  • System Location Discovery: System Language Discovery
                                                  • Modifies registry class
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:5072
                                                  • C:\Windows\SysWOW64\WScript.exe
                                                    "C:\Windows\System32\WScript.exe" "C:\bridgeHypercomComponentHost\u95boq3b7HFvqr.vbe"
                                                    2⤵
                                                    • Checks computer location settings
                                                    • System Location Discovery: System Language Discovery
                                                    PID:436
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      C:\Windows\system32\cmd.exe /c ""C:\bridgeHypercomComponentHost\AAJff1lG8RICXs2A4EYTaC5p7dZ23zLFBkqYwYWng.bat" "
                                                      3⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:4084
                                                      • C:\bridgeHypercomComponentHost\mscontainerWindll.exe
                                                        "C:\bridgeHypercomComponentHost/mscontainerWindll.exe"
                                                        4⤵
                                                        • Executes dropped EXE
                                                        PID:1528
                                                • C:\Users\Admin\Desktop\NIXWARE\loader.exe
                                                  "C:\Users\Admin\Desktop\NIXWARE\loader.exe"
                                                  1⤵
                                                  • Checks computer location settings
                                                  • Executes dropped EXE
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  • System Location Discovery: System Language Discovery
                                                  • Modifies registry class
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:3256
                                                  • C:\Windows\SysWOW64\WScript.exe
                                                    "C:\Windows\System32\WScript.exe" "C:\bridgeHypercomComponentHost\u95boq3b7HFvqr.vbe"
                                                    2⤵
                                                    • Checks computer location settings
                                                    • System Location Discovery: System Language Discovery
                                                    PID:3276
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      C:\Windows\system32\cmd.exe /c ""C:\bridgeHypercomComponentHost\AAJff1lG8RICXs2A4EYTaC5p7dZ23zLFBkqYwYWng.bat" "
                                                      3⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:2196
                                                      • C:\bridgeHypercomComponentHost\mscontainerWindll.exe
                                                        "C:\bridgeHypercomComponentHost/mscontainerWindll.exe"
                                                        4⤵
                                                        • Executes dropped EXE
                                                        PID:3256
                                                • C:\Users\Admin\Desktop\NIXWARE\loader.exe
                                                  "C:\Users\Admin\Desktop\NIXWARE\loader.exe"
                                                  1⤵
                                                  • Checks computer location settings
                                                  • Executes dropped EXE
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  • System Location Discovery: System Language Discovery
                                                  • Modifies registry class
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:4680
                                                  • C:\Windows\SysWOW64\WScript.exe
                                                    "C:\Windows\System32\WScript.exe" "C:\bridgeHypercomComponentHost\u95boq3b7HFvqr.vbe"
                                                    2⤵
                                                    • Checks computer location settings
                                                    • System Location Discovery: System Language Discovery
                                                    PID:1256
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      C:\Windows\system32\cmd.exe /c ""C:\bridgeHypercomComponentHost\AAJff1lG8RICXs2A4EYTaC5p7dZ23zLFBkqYwYWng.bat" "
                                                      3⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:2384
                                                      • C:\bridgeHypercomComponentHost\mscontainerWindll.exe
                                                        "C:\bridgeHypercomComponentHost/mscontainerWindll.exe"
                                                        4⤵
                                                        • Executes dropped EXE
                                                        PID:1336
                                                • C:\Users\Admin\Desktop\NIXWARE\loader.exe
                                                  "C:\Users\Admin\Desktop\NIXWARE\loader.exe"
                                                  1⤵
                                                  • Checks computer location settings
                                                  • Executes dropped EXE
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  • System Location Discovery: System Language Discovery
                                                  • Modifies registry class
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:4196
                                                  • C:\Windows\SysWOW64\WScript.exe
                                                    "C:\Windows\System32\WScript.exe" "C:\bridgeHypercomComponentHost\u95boq3b7HFvqr.vbe"
                                                    2⤵
                                                    • Checks computer location settings
                                                    • System Location Discovery: System Language Discovery
                                                    PID:1168
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      C:\Windows\system32\cmd.exe /c ""C:\bridgeHypercomComponentHost\AAJff1lG8RICXs2A4EYTaC5p7dZ23zLFBkqYwYWng.bat" "
                                                      3⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:4732
                                                      • C:\bridgeHypercomComponentHost\mscontainerWindll.exe
                                                        "C:\bridgeHypercomComponentHost/mscontainerWindll.exe"
                                                        4⤵
                                                        • Executes dropped EXE
                                                        PID:3116
                                                • C:\Windows\system32\taskmgr.exe
                                                  "C:\Windows\system32\taskmgr.exe" /4
                                                  1⤵
                                                  • Checks SCSI registry key(s)
                                                  • Modifies registry class
                                                  • Suspicious use of FindShellTrayWindow
                                                  • Suspicious use of SendNotifyMessage
                                                  PID:3352
                                                • C:\Users\Admin\Desktop\NIXWARE\loader.exe
                                                  "C:\Users\Admin\Desktop\NIXWARE\loader.exe"
                                                  1⤵
                                                  • Checks computer location settings
                                                  • Executes dropped EXE
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  • System Location Discovery: System Language Discovery
                                                  • Modifies registry class
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:4864
                                                  • C:\Windows\SysWOW64\WScript.exe
                                                    "C:\Windows\System32\WScript.exe" "C:\bridgeHypercomComponentHost\u95boq3b7HFvqr.vbe"
                                                    2⤵
                                                    • Checks computer location settings
                                                    • System Location Discovery: System Language Discovery
                                                    PID:2744
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      C:\Windows\system32\cmd.exe /c ""C:\bridgeHypercomComponentHost\AAJff1lG8RICXs2A4EYTaC5p7dZ23zLFBkqYwYWng.bat" "
                                                      3⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:4764
                                                      • C:\bridgeHypercomComponentHost\mscontainerWindll.exe
                                                        "C:\bridgeHypercomComponentHost/mscontainerWindll.exe"
                                                        4⤵
                                                        • Executes dropped EXE
                                                        PID:4620
                                                • C:\Users\Admin\Desktop\NIXWARE\loader.exe
                                                  "C:\Users\Admin\Desktop\NIXWARE\loader.exe"
                                                  1⤵
                                                  • Checks computer location settings
                                                  • Executes dropped EXE
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  • System Location Discovery: System Language Discovery
                                                  • Modifies registry class
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:1476
                                                  • C:\Windows\SysWOW64\WScript.exe
                                                    "C:\Windows\System32\WScript.exe" "C:\bridgeHypercomComponentHost\u95boq3b7HFvqr.vbe"
                                                    2⤵
                                                    • Checks computer location settings
                                                    • System Location Discovery: System Language Discovery
                                                    PID:3772
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      C:\Windows\system32\cmd.exe /c ""C:\bridgeHypercomComponentHost\AAJff1lG8RICXs2A4EYTaC5p7dZ23zLFBkqYwYWng.bat" "
                                                      3⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:1832
                                                      • C:\bridgeHypercomComponentHost\mscontainerWindll.exe
                                                        "C:\bridgeHypercomComponentHost/mscontainerWindll.exe"
                                                        4⤵
                                                        • Executes dropped EXE
                                                        PID:3920
                                                • C:\Users\Admin\Desktop\NIXWARE\loader.exe
                                                  "C:\Users\Admin\Desktop\NIXWARE\loader.exe"
                                                  1⤵
                                                  • Checks computer location settings
                                                  • Executes dropped EXE
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  • System Location Discovery: System Language Discovery
                                                  • Modifies registry class
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:1532
                                                  • C:\Windows\SysWOW64\WScript.exe
                                                    "C:\Windows\System32\WScript.exe" "C:\bridgeHypercomComponentHost\u95boq3b7HFvqr.vbe"
                                                    2⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:2656

                                                Network

                                                MITRE ATT&CK Enterprise v15

                                                Replay Monitor

                                                Loading Replay Monitor...

                                                Downloads

                                                • C:\Users\Admin\AppData\Local\Comms\UnistoreDB\store.jfm

                                                  Filesize

                                                  16KB

                                                  MD5

                                                  f73a1acbe9d4c62317a4f366c1824f36

                                                  SHA1

                                                  fd9e1cd456c92bb2f7cb2e838ad233209f07c217

                                                  SHA256

                                                  f0849a224717bce179c9e293327754ced9ecc080f779e6e5c699009754ea0bd8

                                                  SHA512

                                                  35e215b533b440579fb836cce2c97aeacb18959cca29ade90c3809d6a4b635898723509526352fbc5a7d0459e072cf23f32b834d51502e553f02c0cfcf811f6d

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                                  Filesize

                                                  649B

                                                  MD5

                                                  5025d5a6819b298b518040d48069cc2f

                                                  SHA1

                                                  f746119a77fb261ebc0d360231c68087d8592be8

                                                  SHA256

                                                  a04091d2fdedb2c11586aa1b0152d3aa0412d1c654214866bf7877d53ac6d126

                                                  SHA512

                                                  51934a656686a18be7eaad798f6c1c16d09fd82a4a7e73c755b7b542d2a697caa4c52a282bb01b546a95e1f3d55143c400f58e124c54628a6c7ad81d7b34f147

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                  Filesize

                                                  120B

                                                  MD5

                                                  efe7c247f4f6e34783ff94d7aa0fc0a3

                                                  SHA1

                                                  352311e0084a58b5c02e8248eb286d98f2ef5900

                                                  SHA256

                                                  224d90e57da299305d1a4489e2afe699f6867ed925409145ad41abeddbba923c

                                                  SHA512

                                                  9030cb6b06007600e5a78f30f9d2e7da3a87aa3571868f30fff6f8af02dd727dc276c5bc93e9c0a92a6e5c243c75b1a89c9101f525a222bf8cc7cccaa1e24a76

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                  Filesize

                                                  576B

                                                  MD5

                                                  39634694edeef1e38b0527d50a1a0a7d

                                                  SHA1

                                                  13efce50646f96b902d18e012354ba8bc40dcefe

                                                  SHA256

                                                  2e511585a1b27d0e24b9938fc239ae543f28012fe6e4b46ad7b40871736048ed

                                                  SHA512

                                                  dd3b7c07fcd4af21d4e75a931be9c97643341f1d2cbaff189fa47b03fbee718f425dfc842a37bc72ed200da1a1800e5a7853efd4d4b02a71dba7231563357520

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\DawnCache\data_1

                                                  Filesize

                                                  264KB

                                                  MD5

                                                  74529e249d853574ec71680942494ad2

                                                  SHA1

                                                  e7ab3bf6e66b10e8bda436ab62fba03efd92dcf0

                                                  SHA256

                                                  0c5b495fef55aa0cd245e414cd9000c661d4eae44efed4930eb67f864a5dc96d

                                                  SHA512

                                                  afa7842a751ea05c9c2d94b238cb464ed2f1a6b558d1ea564f200cdfc9397caf7fafad136bb8eca8b30681644ff7d75e11278f5de9efe4b6e925b9da082b6752

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\File System\000\p\Paths\MANIFEST-000001

                                                  Filesize

                                                  41B

                                                  MD5

                                                  5af87dfd673ba2115e2fcf5cfdb727ab

                                                  SHA1

                                                  d5b5bbf396dc291274584ef71f444f420b6056f1

                                                  SHA256

                                                  f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                                  SHA512

                                                  de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_mega.nz_0.indexeddb.leveldb\CURRENT

                                                  Filesize

                                                  16B

                                                  MD5

                                                  46295cac801e5d4857d09837238a6394

                                                  SHA1

                                                  44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                  SHA256

                                                  0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                  SHA512

                                                  8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies

                                                  Filesize

                                                  20KB

                                                  MD5

                                                  99a2b0abea7bee55efe0198f67efdf2a

                                                  SHA1

                                                  dcf92e709a3d8b7d234f3cfebf6a0a8219cd297c

                                                  SHA256

                                                  8ba9a97d157ee740282887c9ad9f5f9fb50845c3a86bc65444d4bc005627a5ee

                                                  SHA512

                                                  5b7234b2a25802eeab2df6163b5abf4a5ce70e6abb50f698df29d3fea68d58f9360fa8378491a1b81730ee195d6b0a56fbdba05bf1ce05ce041ac2c441ce6e9a

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  944fbc06e5f8787f66103ad82490754e

                                                  SHA1

                                                  6823b399e34f80bbce15d6e6a107c6767094589e

                                                  SHA256

                                                  db3531fd5ef5899eb415de28d9eb43d8ebb9bedf852ccdf19314d9c31b529766

                                                  SHA512

                                                  9da54f271934548be31f156aea15f371df8a81eb7ad5ff0f05b128bc1cbf7b7ee738573d82e72357ea951d64f55b338c796841ddd9222dfb1661097cc7877cd9

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                  Filesize

                                                  4KB

                                                  MD5

                                                  20f39b255a8880fd5f51e59425ab1637

                                                  SHA1

                                                  14ceafb1e37950ee04d8bd9aad9b1bbeff5ce0f1

                                                  SHA256

                                                  2ccbdc1f93d9d0f62a9c7a727c5d0cb5966d4e0760d69028b8a393a7b1357923

                                                  SHA512

                                                  b9c5bc4b59bd569f0fa7ffb9c982d852cb4eac79330179c7ef5b37fd74f51ee22aa32921f72c2676698e5c4b481f3687f6f3ddb96d265ee1665cbe0a5eeb4c7b

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                  Filesize

                                                  2B

                                                  MD5

                                                  d751713988987e9331980363e24189ce

                                                  SHA1

                                                  97d170e1550eee4afc0af065b78cda302a97674c

                                                  SHA256

                                                  4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                  SHA512

                                                  b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                  Filesize

                                                  691B

                                                  MD5

                                                  de5e8ece0fde454a81e9d845bde1f9e9

                                                  SHA1

                                                  68f9050e5bdb1fac7a35612121828a2a7c6f74bf

                                                  SHA256

                                                  c9e3aa6c20dff6968a98193dfd451c7eb2224357be67bb1b962fcfcc78238e04

                                                  SHA512

                                                  81c7200fa2909c124defed6394b7711bb79d4f17005e1972a6fec60ff9c80d266d0ed266536b0cef4b2bc5e187443001026ba729acd048e7e9b3b6862f5ab5b4

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                  Filesize

                                                  523B

                                                  MD5

                                                  c109c5999b5ba873223f02f1f483ff94

                                                  SHA1

                                                  327d7b22679015fb01509a5c8818576b2f64ef12

                                                  SHA256

                                                  d584fe3e02d3c7c4c1c15a17adc8dfd1db1b0c8cad23c4f81f4b27ce1c15fd97

                                                  SHA512

                                                  ef2f6178fed06bc157a48aa21bff5583f872e5fd311e2cd48c932d3872d718f4af7c5f70317047f8468e4a330870cde98eca304a59c2ec9b38f78b5ca471201e

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                  Filesize

                                                  523B

                                                  MD5

                                                  58c04726eec73b637856b7c53d5c7cb3

                                                  SHA1

                                                  ef288e751d200342b0bae6bb7f98c2e2406acb98

                                                  SHA256

                                                  49f2c1da6a5eb9bd5384991b8e5fe6de2cec63c421d5ef4f6b4440700f37d0fc

                                                  SHA512

                                                  5f984ed1851c99823f6e889d5e860ae0bcb6f52af279d352550689479e7275f014bc1e25116dfe3543a9d40655da239d632c4b9a6140bad8c4ac4fa537993da3

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                  Filesize

                                                  9KB

                                                  MD5

                                                  688526e09621ef1ebcc2982621560328

                                                  SHA1

                                                  94114a01b101fcd0f9982334ab680816141bbd69

                                                  SHA256

                                                  14c0953263b0b841885238cd4ed43c927a9f2161275dac04262c17021c5ec3fc

                                                  SHA512

                                                  936c24db5b7f71f390ac2206e1c1f9d22762693729bc5ec0a33055c9afbf50f0baa993ff16aef2c0ad314fddf139a3706b6bc96d1d5140e60507a9ed5c8ce65d

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                  Filesize

                                                  9KB

                                                  MD5

                                                  e9e352f428e41ae0301d6a499a453c7a

                                                  SHA1

                                                  dce4f7f2ac96b40e9779d736b2f81f6d7a6598d1

                                                  SHA256

                                                  ef94bd06086827f3bc24b22c116763403279a3b11e6313925f630752e56c4130

                                                  SHA512

                                                  9f4feb7d61f23ee7f8e91f77b1f26ddaff7e9f82b52673f1bbdeda3889c851f91980bda28281f205fedeed0be398f6a233751ff0586a4c0c86163f319dc7006a

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                  Filesize

                                                  10KB

                                                  MD5

                                                  0dcb85e38c2ed16b9356f5c8c90cb0d7

                                                  SHA1

                                                  7ec1c6bf533d847ae7a8cd53658635062986e7dd

                                                  SHA256

                                                  c4067a9ec96eb9e0b72935f68f6f8ea297c7a94d8ac8a8fee41718fe66844669

                                                  SHA512

                                                  e7ba53b749613a5403073e328fef3469c1774aeecef679510f09e042fa84267dcbd092cedcdcd9d62a26dbd94ab63af5fe43d6c0725ed13870806de4f4d7d2b8

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                  Filesize

                                                  9KB

                                                  MD5

                                                  8c9a096698b9893c3dd1819ab630d021

                                                  SHA1

                                                  ff467c177a6072cd794a85d5302aaed9af84a39c

                                                  SHA256

                                                  d603f93c1839bbbf64e6320bdbc179e4cf7527511e1198a47d6945dc32e866e5

                                                  SHA512

                                                  e4395bda55ebcd0e770cf4b73b91a33d3dc38fee18024ce4c2cf633c5c956667c5fbf2f47bd5ea5375216dd164db95af91f701adcabfa81a1e108e3e97333d27

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                  Filesize

                                                  10KB

                                                  MD5

                                                  0b3bad62b1f704a822262af88591c50b

                                                  SHA1

                                                  86cd958b55e2ece146e9deb28c5cec7c0e82f70c

                                                  SHA256

                                                  c1ddfbb560463d8d242025617eb4fb835a5cb34643155d546767380a12701800

                                                  SHA512

                                                  9cc3df4d4397ae517b3dc279f491afcd148c1974573b4c28cd476d2f3c2203cecaf011e0c9380720fb8fa11396ae17c9dffb80f3e4ae28071b2e71dfe51102bc

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                  Filesize

                                                  9KB

                                                  MD5

                                                  18f3207e1dcb1f5472795cbf646da03f

                                                  SHA1

                                                  8fe56e1b46ece9215586ae56f988f3de5310b8a6

                                                  SHA256

                                                  ba487085e7ca6e810da57a821d3b2df997d7a59167f1ccc5e4f5a6c18032c40d

                                                  SHA512

                                                  969ab1b813daa94ed7a83edae7035ba4d39ddf5f6ccd3f80dc3dca151fb10ac2c8b08f3dca505f0b2a200e3f422b977928fa95a364694c3a7402000cc14126ef

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                                  Filesize

                                                  96B

                                                  MD5

                                                  f0693fcc90b1fa391248896b2d38e973

                                                  SHA1

                                                  d3361eaeebecb1543dc8f09871d95da61e0bedf3

                                                  SHA256

                                                  bd88b476d89256391ebdf59eb075e3f796e26f0a3a23239e7ce66765bb0ab06b

                                                  SHA512

                                                  a84cb9abb79b718ca8cb08c0c94858ebc3a01d25ead731bc2f5ded34e5a012759dd3f7528d77daf4c62a4211f8b43e4f7d95c5067be99a595fa5809983ccd08e

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web Data

                                                  Filesize

                                                  114KB

                                                  MD5

                                                  9a637405c600a38f7fa85ec5627c5338

                                                  SHA1

                                                  5fbbf93049f473caab414dc5f3b84acf5d6d60f0

                                                  SHA256

                                                  13f66e0b9e0b796724eee785c71d037bdc55bb0972fb22fa6bdb79035ef75379

                                                  SHA512

                                                  03ba3f95e9f4c262286ac43768e559f2e89f6180c982b49dd696733f51c022da4f71eecb51b0f106d96d2599a50fce26f774d6dddcea0a2c35bbd35620e1b727

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                  Filesize

                                                  116KB

                                                  MD5

                                                  bcad59b3c7d5c2cd596f256f2a7919ea

                                                  SHA1

                                                  1d0099cfb0f141c0c3f18e0a9aaf08240b55f234

                                                  SHA256

                                                  639139f8e44afce7f40985ebb86e03b51691dee194c6e7c73d49250848f461e0

                                                  SHA512

                                                  c80ddee7d25d96dac6d92c513bdac0098f39ea52bb30235c8bed3a1a5cfb464805dddaf6a66d4aa11ffc73f7d8b2618134efe20d5b67a71b97df606c098285f7

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                  Filesize

                                                  116KB

                                                  MD5

                                                  e016d220c8b0d0427c0f11a3d1e024d0

                                                  SHA1

                                                  0a25a72fbc6d6367583e8f4612c3a253e3fdd6a3

                                                  SHA256

                                                  6ad43bc124a16cb1df79dd928eebb3135488c7df3e683e46bbacde50b78c5d52

                                                  SHA512

                                                  5638c5417bf04e8637635f00ff89ef8577bafc27a5969849367373d0f340f383e4a4beb963eb0c403f9719ebe11a0d2ce28b5749bb26b680d581cfd6e9cc296d

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                  Filesize

                                                  116KB

                                                  MD5

                                                  ca3e276ec265d437a6112aae8bfac70f

                                                  SHA1

                                                  309658dd9448729b18e74c05dddf939113a99add

                                                  SHA256

                                                  a4cca994d6bbe512bf126640385b68fdc166e31c5a86fc8e5793feae50c1254f

                                                  SHA512

                                                  ba08bc0c2a2323c490f46907030a298dbde65a00ada6cb3ae1027dfc11901c7034c510921aba29ded06cc0ee3e6c3e77100169549904ad36ebaa93b98a1632e6

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                  Filesize

                                                  116KB

                                                  MD5

                                                  265991081b98c03068b5bec27a6de086

                                                  SHA1

                                                  d2adec25479bafc9752527fa1877ac97c70a90c3

                                                  SHA256

                                                  e035703b370ee543c22ce6bec35abfdf53ba50466856bfd003a11faa5876f1e0

                                                  SHA512

                                                  d8dc319d83b671d969453d6b0c89fbc59da20b6daee793cf35159f3071cf799434cb86f3eb66f87fa64f545520af4746f96967d29245246fc08eb267c22c2407

                                                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\mscontainerWindll.exe.log

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  af6acd95d59de87c04642509c30e81c1

                                                  SHA1

                                                  f9549ae93fdb0a5861a79a08f60aa81c4b32377b

                                                  SHA256

                                                  7521ee2d065a78efcab55a194fbd78492f84b70595f139263875f4ea92b194d6

                                                  SHA512

                                                  93ab99bcf588fde553de3240e0d2b0cbd4e4bc5ef5e99d53f45a267d7ff30103a80b5a7aa1c52d6eff1e070af0ec82d2c0b8aafb7099742aa16810edc1815c3a

                                                • C:\Users\Admin\AppData\Local\Temp\RES1C77.tmp

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  0d9a352c461d13a0193d935bce3cf759

                                                  SHA1

                                                  a02448f65c8798920dd04fb4c3b45c08f7c177a0

                                                  SHA256

                                                  9d5c4c524d7d3d812989e361c864fe4db4bc8a6f6fe553110166d8b71c3e0784

                                                  SHA512

                                                  429327689c15c2b40001405f2957daa30a316d720e0077c65b7e231742487ed3e22c925efdf4a4febe560977f49f770e62f984f128016ae2d1e9c598e2cf21d2

                                                • C:\Users\Admin\AppData\Local\Temp\qE7VszSitn.bat

                                                  Filesize

                                                  228B

                                                  MD5

                                                  771a47dea45411f02205d7df4ab202fd

                                                  SHA1

                                                  b77beb2416ea123f61c98f86b7325eed1158dd8e

                                                  SHA256

                                                  e673a8381c9970dc04f03bad6bfc725d33ee38af33bf6f1f24504042ef695068

                                                  SHA512

                                                  4cfb63f5754ea5ea1a8f9dda3ac30325722e0999ef118f09f5974c1977ced37cdcad4378dea2aa0b2c0253fdab80521212f7d2b737fa8e1e328d5f0b031aaa94

                                                • C:\Users\Admin\Desktop\CFG\RAGE 3.cfg

                                                  Filesize

                                                  6KB

                                                  MD5

                                                  a2fccb87bdcb14e855b1b51ef9e81f5b

                                                  SHA1

                                                  b9536805e6c8255ff34d540c748e09b57a8d5193

                                                  SHA256

                                                  262acb6a1133e5f229c1e59ef83e17fece5aae4353c967c031c0ddc95d5257bd

                                                  SHA512

                                                  76e78e9085e980c01f7f2abe9aae5571dd5c716023b77fc63bf8364d7f603292024d3091924e33d807b0330500207dcab71d9328e44a8eb83ed183992cfde15e

                                                • C:\Users\Admin\Desktop\NIXWARE\loader.exe

                                                  Filesize

                                                  3.2MB

                                                  MD5

                                                  8faa9e2bbcb1f98cb3971b94f9feda41

                                                  SHA1

                                                  ab03732cdbc58c752057f2dd3c39e164e222476f

                                                  SHA256

                                                  026825e9ca81fe52b1833a5e2c838336bc645778da89ff5c266c65c9d750a490

                                                  SHA512

                                                  5a660bddaf58c15503861663d018e3444c40fc9a62cc2953a60e41c78561014db4911d4f1da80f70a492d6ff912765d93e08c3c39fce921580b034dfcc47d358

                                                • C:\Users\Admin\Desktop\ИНСТРУКЦИЯ.txt

                                                  Filesize

                                                  153B

                                                  MD5

                                                  e5bf3c592fa0a8639cc9d6c3afcfe101

                                                  SHA1

                                                  4edd2164926a8726069f360a91a33725c34da48c

                                                  SHA256

                                                  bd8b97d57eb446afcdb4d046b44417daaa4380d052da59d036528b6ea9293d9d

                                                  SHA512

                                                  ca3a1fcd7b11741dd29b1244b5103f3ef7e182b312e9e237e158c87bb0e5720e19044f22e98385a8e6feb0b33ccd689cccf55756b1588151de48f28b97c761bd

                                                • C:\Users\Admin\Downloads\NIXWARE PASTA.rar

                                                  Filesize

                                                  2.7MB

                                                  MD5

                                                  2b2957e283af18531e63cab123079d3e

                                                  SHA1

                                                  a9f5c70f85becca9b7ca60ff6389ca3d023f858c

                                                  SHA256

                                                  bb107d0ce375bd8c74e1c57a4ee0e67ce80a3e8de84944048bde248d81f7ee51

                                                  SHA512

                                                  16c36326eb62ae3acb2e731de1b84844ff574a41b88d04ef8d185eb05bccc9f8dd67a5343960d41ca8e85f984e35fb9da3d6c5a1a26bec35d748fc45fca79dd2

                                                • C:\bridgeHypercomComponentHost\AAJff1lG8RICXs2A4EYTaC5p7dZ23zLFBkqYwYWng.bat

                                                  Filesize

                                                  108B

                                                  MD5

                                                  836fc705ac99bb9e9c32457cd334e13e

                                                  SHA1

                                                  ebbb2cfd6a3260e482447d1c7871391ea8c75551

                                                  SHA256

                                                  e0446f377405745b3712c210adeda645441bc9f6b987756b53aa05ed167fbf9c

                                                  SHA512

                                                  ae2915671fee13ce19947eed0733d3de5b462ca8ef55b422259814004cc51df54a1ea58a6659a36a886103e84191f93fee5d7a134a50439a81c856645f88cc90

                                                • C:\bridgeHypercomComponentHost\mscontainerWindll.exe

                                                  Filesize

                                                  1.9MB

                                                  MD5

                                                  5a7bf976e09d1835a65809093075a1bc

                                                  SHA1

                                                  d2de32c02c3d6e79f185b6b5f91e95144ae5a033

                                                  SHA256

                                                  20ea6e36a40896c99a0549118ac01b9508dd72b484050c9b2ce4fb5ac805a950

                                                  SHA512

                                                  60c6f582e29415186d2fef58a469a6bd87e84daf084d8705f09605f331d015abb1a825d06343a797532561915e754015692e745de21c55ed6e52cb5ba47129c6

                                                • C:\bridgeHypercomComponentHost\u95boq3b7HFvqr.vbe

                                                  Filesize

                                                  246B

                                                  MD5

                                                  a672021e4678a1cee46a924baa63411c

                                                  SHA1

                                                  c4c27bf73768a3cc97d070e3d560e4f45affe9b4

                                                  SHA256

                                                  65a576bed74898f83fd527be9a715aaac80609066d01e8b16a691c5287bd15b5

                                                  SHA512

                                                  ea08511f0859767abdbc080e7dcbad20bced260cfb2b58ba51cc8d48d544fb36256f56887c25763f25d799fa225674d487d6f5826f835fb8462c0c6441c64b67

                                                • C:\windows\system32\kpkopw.exe

                                                  Filesize

                                                  4KB

                                                  MD5

                                                  1d7607f017127785541d8927ae59c8e1

                                                  SHA1

                                                  a51a5ec64e4f696c64abbffd837cf65b849de84c

                                                  SHA256

                                                  db832702e50b8cab3ab357eed4af43eb6e73188a7c76e1385681a949be6a1d07

                                                  SHA512

                                                  16178241094435dfc2d29c6d67c0223713a2cc8478e8d1dbabcb1e7e9f16fb3c2f2c22e97d4b8f674d9d4ef52ed92ef3c623326b0dcd2faff515bb8d474df7f7

                                                • \??\c:\Users\Admin\AppData\Local\Temp\m5ry2uj0\m5ry2uj0.0.cs

                                                  Filesize

                                                  369B

                                                  MD5

                                                  4adb1a4f672f37b652ad372203dccf9d

                                                  SHA1

                                                  8fdc4716c03d924e4797fa63cde6d38dac5967cd

                                                  SHA256

                                                  a420c5df3ddd020aac2db38d861c83ea826efda6dc2baa0379e2a0a3b811dfbd

                                                  SHA512

                                                  f9a0958ba1b34002121e5a6a813fac6f0407ba9ebe1748c6abfa8098b3f95b53579e2782458fd159d81faab39bbc8f6d155dcafebc26e4a38156d83a8445ecd8

                                                • \??\c:\Users\Admin\AppData\Local\Temp\m5ry2uj0\m5ry2uj0.cmdline

                                                  Filesize

                                                  235B

                                                  MD5

                                                  95f9fc2b9259211589815a5d2825940c

                                                  SHA1

                                                  1a33ba5f061e7ec8d5cb85d5c2f92e3c85025fc1

                                                  SHA256

                                                  6964cb22fad6487cc8d37e1c358f630f3275e784f30160ad952560a44a91cea7

                                                  SHA512

                                                  be1bd2e2cc08aabb44f0d6a00c17d06fee375b0ef0767e905d65aab6548086b14777805f307b58b6c44b0570e6e201db35538eecfa0b95582135380e983d93cc

                                                • \??\c:\Windows\System32\CSCE72A92DF64484CDD88D1D021D7BD6C0.TMP

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  7bbfaf1199741b237d2493615c95c6d7

                                                  SHA1

                                                  86d466217c4dc1e0808f83ceda8f4b4df948b5dc

                                                  SHA256

                                                  e20e4619dbc932a216fd93f86fe0af2e915f4c2ba6177fc3581da59885094476

                                                  SHA512

                                                  2eda9bf71dc4a4583b7b8e9a6aab0f91d98cca68ee4309df1a4d26541917678da09a15d712397ae4b95fe95b65c8aa6eeab94d7620a5546b3df6c00306ef4a5c

                                                • memory/1088-611-0x00000000001F0000-0x00000000005E6000-memory.dmp

                                                  Filesize

                                                  4.0MB

                                                • memory/1408-544-0x00000000001F0000-0x00000000005E6000-memory.dmp

                                                  Filesize

                                                  4.0MB

                                                • memory/1408-533-0x00000000001F0000-0x00000000005E6000-memory.dmp

                                                  Filesize

                                                  4.0MB

                                                • memory/1476-692-0x00000000001F0000-0x00000000005E6000-memory.dmp

                                                  Filesize

                                                  4.0MB

                                                • memory/1532-697-0x00000000001F0000-0x00000000005E6000-memory.dmp

                                                  Filesize

                                                  4.0MB

                                                • memory/1644-209-0x00000214E7AD0000-0x00000214E7AD1000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/1644-225-0x00000214E7720000-0x00000214E7721000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/1644-212-0x00000214E7B00000-0x00000214E7B01000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/1644-211-0x00000214E7B00000-0x00000214E7B01000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/1644-213-0x00000214E7B00000-0x00000214E7B01000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/1644-214-0x00000214E7B00000-0x00000214E7B01000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/1644-215-0x00000214E7B00000-0x00000214E7B01000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/1644-216-0x00000214E7B00000-0x00000214E7B01000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/1644-222-0x00000214E7B00000-0x00000214E7B01000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/1644-223-0x00000214E7B00000-0x00000214E7B01000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/1644-224-0x00000214E7B00000-0x00000214E7B01000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/1644-210-0x00000214E7B00000-0x00000214E7B01000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/1644-193-0x00000214DF540000-0x00000214DF550000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/1644-226-0x00000214E7710000-0x00000214E7711000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/1644-228-0x00000214E7720000-0x00000214E7721000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/1644-234-0x00000214E7650000-0x00000214E7651000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/1644-231-0x00000214E7710000-0x00000214E7711000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/1644-249-0x00000214E7860000-0x00000214E7861000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/1644-250-0x00000214E7970000-0x00000214E7971000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/1644-248-0x00000214E7860000-0x00000214E7861000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/1644-246-0x00000214E7850000-0x00000214E7851000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/1644-177-0x00000214DF440000-0x00000214DF450000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/2364-607-0x00000000001F0000-0x00000000005E6000-memory.dmp

                                                  Filesize

                                                  4.0MB

                                                • memory/2364-604-0x00000000001F0000-0x00000000005E6000-memory.dmp

                                                  Filesize

                                                  4.0MB

                                                • memory/3236-600-0x00000000001F0000-0x00000000005E6000-memory.dmp

                                                  Filesize

                                                  4.0MB

                                                • memory/3256-619-0x00000000001F0000-0x00000000005E6000-memory.dmp

                                                  Filesize

                                                  4.0MB

                                                • memory/3256-623-0x00000000001F0000-0x00000000005E6000-memory.dmp

                                                  Filesize

                                                  4.0MB

                                                • memory/3352-635-0x000001D1D7400000-0x000001D1D7401000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/3420-614-0x00000000001F0000-0x00000000005E6000-memory.dmp

                                                  Filesize

                                                  4.0MB

                                                • memory/3744-602-0x00000000001F0000-0x00000000005E6000-memory.dmp

                                                  Filesize

                                                  4.0MB

                                                • memory/4196-626-0x00000000001F0000-0x00000000005E6000-memory.dmp

                                                  Filesize

                                                  4.0MB

                                                • memory/4196-631-0x00000000001F0000-0x00000000005E6000-memory.dmp

                                                  Filesize

                                                  4.0MB

                                                • memory/4300-558-0x0000000002840000-0x000000000284E000-memory.dmp

                                                  Filesize

                                                  56KB

                                                • memory/4300-560-0x000000001B440000-0x000000001B44C000-memory.dmp

                                                  Filesize

                                                  48KB

                                                • memory/4300-556-0x000000001B6A0000-0x000000001B6B8000-memory.dmp

                                                  Filesize

                                                  96KB

                                                • memory/4300-554-0x000000001B6F0000-0x000000001B740000-memory.dmp

                                                  Filesize

                                                  320KB

                                                • memory/4300-553-0x000000001B680000-0x000000001B69C000-memory.dmp

                                                  Filesize

                                                  112KB

                                                • memory/4300-551-0x00000000027F0000-0x00000000027FE000-memory.dmp

                                                  Filesize

                                                  56KB

                                                • memory/4300-549-0x0000000000530000-0x0000000000716000-memory.dmp

                                                  Filesize

                                                  1.9MB

                                                • memory/4680-628-0x00000000001F0000-0x00000000005E6000-memory.dmp

                                                  Filesize

                                                  4.0MB

                                                • memory/4864-689-0x00000000001F0000-0x00000000005E6000-memory.dmp

                                                  Filesize

                                                  4.0MB

                                                • memory/5072-621-0x00000000001F0000-0x00000000005E6000-memory.dmp

                                                  Filesize

                                                  4.0MB

                                                • memory/5072-617-0x00000000001F0000-0x00000000005E6000-memory.dmp

                                                  Filesize

                                                  4.0MB