Resubmissions

13/01/2025, 04:25 UTC

250113-e1646awjay 10

12/01/2025, 18:11 UTC

250112-wssegavrfl 10

Analysis

  • max time kernel
    899s
  • max time network
    429s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/01/2025, 04:25 UTC

General

  • Target

    fda9c8dc11e87a2253800b7a579ef3e12c43e383a8294e081088ac63e697086c.exe

  • Size

    1.8MB

  • MD5

    8fbadab3fee07f074017c6b0a9804bdf

  • SHA1

    87a4b286a1d2d88c3d0e037bbabc485c9b62d7d8

  • SHA256

    fda9c8dc11e87a2253800b7a579ef3e12c43e383a8294e081088ac63e697086c

  • SHA512

    0333207cee1e97189b031cdcef05450510c2d1f77fe3e45afedec1a5f2ebf307a634320f99c8689696ad5f74c2fb7270e4061ed7e13cde195982d5cafdd3402a

  • SSDEEP

    12288:BUrjP8Xuc2UY0B8TIwDDMistJ6gicRzubSFJeOgTpBA7W2FeDSIGVH/KIDgDgUef:ujjSYIUDJ86giGTPQDbGV6eH81kT

Malware Config

Signatures

  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzonerat family
  • Warzone RAT payload 2 IoCs
  • Executes dropped EXE 35 IoCs
  • Adds Run key to start application 2 TTPs 18 IoCs
  • Suspicious use of SetThreadContext 33 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 44 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NTFS ADS 13 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 36 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fda9c8dc11e87a2253800b7a579ef3e12c43e383a8294e081088ac63e697086c.exe
    C:\Users\Admin\AppData\Local\Temp\fda9c8dc11e87a2253800b7a579ef3e12c43e383a8294e081088ac63e697086c.exe cmd /c %SIGILL% "SIGTERM|DELETE|SIGKILL"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4460
    • C:\Users\Admin\AppData\Local\Temp\fda9c8dc11e87a2253800b7a579ef3e12c43e383a8294e081088ac63e697086c.exe
      C:\Users\Admin\AppData\Local\Temp\fda9c8dc11e87a2253800b7a579ef3e12c43e383a8294e081088ac63e697086c.exe cmd /c %SIGILL% "SIGTERM|DELETE|SIGKILL"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:756
    • C:\Windows\SysWOW64\diskperf.exe
      "C:\Windows\SysWOW64\diskperf.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • NTFS ADS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4756
      • C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
        C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1160
        • C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
          C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:208
        • C:\Windows\SysWOW64\diskperf.exe
          "C:\Windows\SysWOW64\diskperf.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • NTFS ADS
          PID:2524
          • C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
            C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            PID:3896
            • C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
              C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              PID:3088
            • C:\Windows\SysWOW64\diskperf.exe
              "C:\Windows\SysWOW64\diskperf.exe"
              6⤵
              • System Location Discovery: System Language Discovery
              • NTFS ADS
              PID:2336
              • C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
                C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
                7⤵
                • Executes dropped EXE
                • Adds Run key to start application
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                PID:3832
                • C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
                  C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
                  8⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of SetWindowsHookEx
                  PID:4624
                • C:\Windows\SysWOW64\diskperf.exe
                  "C:\Windows\SysWOW64\diskperf.exe"
                  8⤵
                    PID:3448
                • C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
                  C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
                  7⤵
                  • Executes dropped EXE
                  • Adds Run key to start application
                  • Suspicious use of SetThreadContext
                  • System Location Discovery: System Language Discovery
                  PID:884
                  • C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
                    C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
                    8⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of SetWindowsHookEx
                    PID:5008
                  • C:\Windows\SysWOW64\diskperf.exe
                    "C:\Windows\SysWOW64\diskperf.exe"
                    8⤵
                      PID:1528
                  • C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
                    C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
                    7⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    PID:1252
          • C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
            C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
            3⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2880
            • C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
              C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
              4⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              PID:2228
            • C:\Windows\SysWOW64\diskperf.exe
              "C:\Windows\SysWOW64\diskperf.exe"
              4⤵
              • System Location Discovery: System Language Discovery
              • NTFS ADS
              PID:4964
              • C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
                C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
                5⤵
                • Executes dropped EXE
                • Adds Run key to start application
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                PID:544
                • C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
                  C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
                  6⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of SetWindowsHookEx
                  PID:2924
                • C:\Windows\SysWOW64\diskperf.exe
                  "C:\Windows\SysWOW64\diskperf.exe"
                  6⤵
                    PID:4392
                • C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
                  C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
                  5⤵
                  • Executes dropped EXE
                  • Adds Run key to start application
                  • Suspicious use of SetThreadContext
                  • System Location Discovery: System Language Discovery
                  PID:4972
                  • C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
                    C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
                    6⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of SetWindowsHookEx
                    PID:3612
                  • C:\Windows\SysWOW64\diskperf.exe
                    "C:\Windows\SysWOW64\diskperf.exe"
                    6⤵
                      PID:912
                  • C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
                    C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
                    5⤵
                    • Executes dropped EXE
                    • Adds Run key to start application
                    • Suspicious use of SetThreadContext
                    • System Location Discovery: System Language Discovery
                    PID:1892
                    • C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
                      C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
                      6⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of SetWindowsHookEx
                      PID:4896
                    • C:\Windows\SysWOW64\diskperf.exe
                      "C:\Windows\SysWOW64\diskperf.exe"
                      6⤵
                        PID:868
                • C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
                  C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
                  3⤵
                  • Executes dropped EXE
                  • Adds Run key to start application
                  • Suspicious use of SetThreadContext
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:4984
                  • C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
                    C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
                    4⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of SetWindowsHookEx
                    PID:1584
                  • C:\Windows\SysWOW64\diskperf.exe
                    "C:\Windows\SysWOW64\diskperf.exe"
                    4⤵
                      PID:4760
                  • C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
                    C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
                    3⤵
                    • Executes dropped EXE
                    • Adds Run key to start application
                    • Suspicious use of SetThreadContext
                    • System Location Discovery: System Language Discovery
                    PID:688
                    • C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
                      C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
                      4⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of SetWindowsHookEx
                      PID:392
                    • C:\Windows\SysWOW64\diskperf.exe
                      "C:\Windows\SysWOW64\diskperf.exe"
                      4⤵
                      • System Location Discovery: System Language Discovery
                      • NTFS ADS
                      PID:4128
                      • C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
                        C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
                        5⤵
                        • Executes dropped EXE
                        • Adds Run key to start application
                        • Suspicious use of SetThreadContext
                        • System Location Discovery: System Language Discovery
                        PID:1528
                        • C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
                          C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
                          6⤵
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of SetWindowsHookEx
                          PID:1388
                        • C:\Windows\SysWOW64\diskperf.exe
                          "C:\Windows\SysWOW64\diskperf.exe"
                          6⤵
                            PID:2384
                    • C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
                      C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
                      3⤵
                      • Executes dropped EXE
                      • Adds Run key to start application
                      • Suspicious use of SetThreadContext
                      • System Location Discovery: System Language Discovery
                      PID:64
                      • C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
                        C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
                        4⤵
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of SetWindowsHookEx
                        PID:4752
                      • C:\Windows\SysWOW64\diskperf.exe
                        "C:\Windows\SysWOW64\diskperf.exe"
                        4⤵
                          PID:1940
                      • C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
                        C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
                        3⤵
                        • Executes dropped EXE
                        • Adds Run key to start application
                        • Suspicious use of SetThreadContext
                        • System Location Discovery: System Language Discovery
                        PID:1392
                        • C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
                          C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
                          4⤵
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of SetWindowsHookEx
                          PID:4604
                        • C:\Windows\SysWOW64\diskperf.exe
                          "C:\Windows\SysWOW64\diskperf.exe"
                          4⤵
                          • System Location Discovery: System Language Discovery
                          • NTFS ADS
                          PID:1048
                          • C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
                            C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
                            5⤵
                            • Executes dropped EXE
                            • Adds Run key to start application
                            • Suspicious use of SetThreadContext
                            • System Location Discovery: System Language Discovery
                            PID:5088
                            • C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
                              C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
                              6⤵
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of SetWindowsHookEx
                              PID:4248
                            • C:\Windows\SysWOW64\diskperf.exe
                              "C:\Windows\SysWOW64\diskperf.exe"
                              6⤵
                                PID:3084
                        • C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
                          C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
                          3⤵
                          • Executes dropped EXE
                          • Adds Run key to start application
                          • Suspicious use of SetThreadContext
                          • System Location Discovery: System Language Discovery
                          PID:4856
                          • C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
                            C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
                            4⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            • Suspicious use of SetWindowsHookEx
                            PID:3992
                          • C:\Windows\SysWOW64\diskperf.exe
                            "C:\Windows\SysWOW64\diskperf.exe"
                            4⤵
                            • System Location Discovery: System Language Discovery
                            • NTFS ADS
                            PID:4888
                            • C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
                              C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
                              5⤵
                              • Executes dropped EXE
                              • Adds Run key to start application
                              • Suspicious use of SetThreadContext
                              • System Location Discovery: System Language Discovery
                              PID:2884
                              • C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
                                C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
                                6⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                • Suspicious use of SetWindowsHookEx
                                PID:4088
                              • C:\Windows\SysWOW64\diskperf.exe
                                "C:\Windows\SysWOW64\diskperf.exe"
                                6⤵
                                  PID:1352
                          • C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
                            C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
                            3⤵
                            • Executes dropped EXE
                            • Adds Run key to start application
                            • Suspicious use of SetThreadContext
                            • System Location Discovery: System Language Discovery
                            PID:1736
                            • C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
                              C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
                              4⤵
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of SetWindowsHookEx
                              PID:5080
                            • C:\Windows\SysWOW64\diskperf.exe
                              "C:\Windows\SysWOW64\diskperf.exe"
                              4⤵
                                PID:4448

                        Network

                        • flag-us
                          DNS
                          58.55.71.13.in-addr.arpa
                          Remote address:
                          8.8.8.8:53
                          Request
                          58.55.71.13.in-addr.arpa
                          IN PTR
                          Response
                        • flag-us
                          DNS
                          26.252.100.95.in-addr.arpa
                          Remote address:
                          8.8.8.8:53
                          Request
                          26.252.100.95.in-addr.arpa
                          IN PTR
                          Response
                          26.252.100.95.in-addr.arpa
                          IN PTR
                          a95-100-252-26deploystaticakamaitechnologiescom
                        • flag-us
                          DNS
                          138.32.126.40.in-addr.arpa
                          Remote address:
                          8.8.8.8:53
                          Request
                          138.32.126.40.in-addr.arpa
                          IN PTR
                          Response
                        • flag-us
                          DNS
                          95.221.229.192.in-addr.arpa
                          Remote address:
                          8.8.8.8:53
                          Request
                          95.221.229.192.in-addr.arpa
                          IN PTR
                          Response
                        • flag-us
                          DNS
                          196.249.167.52.in-addr.arpa
                          Remote address:
                          8.8.8.8:53
                          Request
                          196.249.167.52.in-addr.arpa
                          IN PTR
                          Response
                        • flag-us
                          DNS
                          104.219.191.52.in-addr.arpa
                          Remote address:
                          8.8.8.8:53
                          Request
                          104.219.191.52.in-addr.arpa
                          IN PTR
                          Response
                        • flag-us
                          DNS
                          197.87.175.4.in-addr.arpa
                          Remote address:
                          8.8.8.8:53
                          Request
                          197.87.175.4.in-addr.arpa
                          IN PTR
                          Response
                        • flag-us
                          DNS
                          15.164.165.52.in-addr.arpa
                          Remote address:
                          8.8.8.8:53
                          Request
                          15.164.165.52.in-addr.arpa
                          IN PTR
                          Response
                        • flag-us
                          DNS
                          172.210.232.199.in-addr.arpa
                          Remote address:
                          8.8.8.8:53
                          Request
                          172.210.232.199.in-addr.arpa
                          IN PTR
                          Response
                        • flag-us
                          DNS
                          27.252.100.95.in-addr.arpa
                          Remote address:
                          8.8.8.8:53
                          Request
                          27.252.100.95.in-addr.arpa
                          IN PTR
                          Response
                          27.252.100.95.in-addr.arpa
                          IN PTR
                          a95-100-252-27deploystaticakamaitechnologiescom
                        • flag-us
                          DNS
                          25.173.189.20.in-addr.arpa
                          Remote address:
                          8.8.8.8:53
                          Request
                          25.173.189.20.in-addr.arpa
                          IN PTR
                          Response
                        No results found
                        • 8.8.8.8:53
                          58.55.71.13.in-addr.arpa
                          dns
                          70 B
                          144 B
                          1
                          1

                          DNS Request

                          58.55.71.13.in-addr.arpa

                        • 8.8.8.8:53
                          26.252.100.95.in-addr.arpa
                          dns
                          72 B
                          137 B
                          1
                          1

                          DNS Request

                          26.252.100.95.in-addr.arpa

                        • 8.8.8.8:53
                          138.32.126.40.in-addr.arpa
                          dns
                          72 B
                          158 B
                          1
                          1

                          DNS Request

                          138.32.126.40.in-addr.arpa

                        • 8.8.8.8:53
                          95.221.229.192.in-addr.arpa
                          dns
                          73 B
                          144 B
                          1
                          1

                          DNS Request

                          95.221.229.192.in-addr.arpa

                        • 8.8.8.8:53
                          196.249.167.52.in-addr.arpa
                          dns
                          73 B
                          147 B
                          1
                          1

                          DNS Request

                          196.249.167.52.in-addr.arpa

                        • 8.8.8.8:53
                          104.219.191.52.in-addr.arpa
                          dns
                          73 B
                          147 B
                          1
                          1

                          DNS Request

                          104.219.191.52.in-addr.arpa

                        • 8.8.8.8:53
                          197.87.175.4.in-addr.arpa
                          dns
                          71 B
                          157 B
                          1
                          1

                          DNS Request

                          197.87.175.4.in-addr.arpa

                        • 8.8.8.8:53
                          15.164.165.52.in-addr.arpa
                          dns
                          72 B
                          146 B
                          1
                          1

                          DNS Request

                          15.164.165.52.in-addr.arpa

                        • 8.8.8.8:53
                          172.210.232.199.in-addr.arpa
                          dns
                          74 B
                          128 B
                          1
                          1

                          DNS Request

                          172.210.232.199.in-addr.arpa

                        • 8.8.8.8:53
                          27.252.100.95.in-addr.arpa
                          dns
                          72 B
                          137 B
                          1
                          1

                          DNS Request

                          27.252.100.95.in-addr.arpa

                        • 8.8.8.8:53
                          25.173.189.20.in-addr.arpa
                          dns
                          72 B
                          158 B
                          1
                          1

                          DNS Request

                          25.173.189.20.in-addr.arpa

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Chrome\SyncHost.exe

                          Filesize

                          1.8MB

                          MD5

                          3190046d06010327d5f1ea103a985bbe

                          SHA1

                          46323e6baa7a832b8d925e011a034395635cb2af

                          SHA256

                          8555703c101712b4f11a68a1344fdd4d83a50794579ca7fe09ea14155ebc9b08

                          SHA512

                          55846a7eef737cd02fc0925035a962724bf778d0a039a55e69c7541f650ff7f3ef00a45e1965f7d2587110b421cb19f100940347fe9bcaea98e7a433d839be5f

                        • C:\Users\Admin\AppData\Local\Temp\Disk.sys

                          Filesize

                          64KB

                          MD5

                          f037e9de6541f9ecce2a4600bbe7d2bc

                          SHA1

                          1e62d8bebff13f7084493c0368da2290bef7bc6c

                          SHA256

                          dbb0ff78995451c3ce2a3204b7854bc577efddb54a4e1b154e1ce56347e9b90a

                          SHA512

                          08e60802aac6ff8b6654a16995b32acb363db6166ae9ae8b4c3013baeba31c6f2c6be00667eef29d84360cb670aae5de040d508eb7eb3d8fe92dc3e3a1138a4b

                        • C:\Users\Admin\AppData\Local\Temp\Disk.sys

                          Filesize

                          1.8MB

                          MD5

                          8fbadab3fee07f074017c6b0a9804bdf

                          SHA1

                          87a4b286a1d2d88c3d0e037bbabc485c9b62d7d8

                          SHA256

                          fda9c8dc11e87a2253800b7a579ef3e12c43e383a8294e081088ac63e697086c

                          SHA512

                          0333207cee1e97189b031cdcef05450510c2d1f77fe3e45afedec1a5f2ebf307a634320f99c8689696ad5f74c2fb7270e4061ed7e13cde195982d5cafdd3402a

                        • memory/64-162-0x0000000000400000-0x0000000000514000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/64-176-0x0000000000400000-0x0000000000514000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/208-53-0x0000000000400000-0x000000000043E000-memory.dmp

                          Filesize

                          248KB

                        • memory/208-45-0x0000000000400000-0x000000000043E000-memory.dmp

                          Filesize

                          248KB

                        • memory/392-147-0x0000000000400000-0x000000000043E000-memory.dmp

                          Filesize

                          248KB

                        • memory/544-283-0x0000000000400000-0x0000000000514000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/544-257-0x0000000000400000-0x0000000000514000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/688-144-0x0000000000400000-0x0000000000514000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/688-131-0x0000000000400000-0x0000000000514000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/756-8-0x0000000000400000-0x000000000043E000-memory.dmp

                          Filesize

                          248KB

                        • memory/756-20-0x0000000000400000-0x000000000043E000-memory.dmp

                          Filesize

                          248KB

                        • memory/756-18-0x0000000000440000-0x0000000000509000-memory.dmp

                          Filesize

                          804KB

                        • memory/756-4-0x0000000000400000-0x000000000043E000-memory.dmp

                          Filesize

                          248KB

                        • memory/884-423-0x0000000000400000-0x0000000000514000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/884-433-0x0000000000400000-0x0000000000514000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1160-37-0x0000000000400000-0x0000000000514000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1160-36-0x0000000000400000-0x0000000000514000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1160-54-0x0000000000400000-0x0000000000514000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1252-497-0x0000000000400000-0x0000000000514000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1388-287-0x0000000000400000-0x000000000043E000-memory.dmp

                          Filesize

                          248KB

                        • memory/1392-210-0x0000000000400000-0x0000000000514000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1392-193-0x0000000000400000-0x0000000000514000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1528-285-0x0000000000400000-0x0000000000514000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1528-258-0x0000000000400000-0x0000000000514000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1584-116-0x0000000000400000-0x000000000043E000-memory.dmp

                          Filesize

                          248KB

                        • memory/1736-458-0x0000000000400000-0x0000000000514000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1736-448-0x0000000000400000-0x0000000000514000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1892-326-0x0000000000400000-0x0000000000514000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1892-334-0x0000000000400000-0x0000000000514000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/2228-84-0x0000000000400000-0x000000000043E000-memory.dmp

                          Filesize

                          248KB

                        • memory/2880-69-0x0000000000400000-0x0000000000514000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/2880-85-0x0000000000400000-0x0000000000514000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/2884-473-0x0000000000400000-0x0000000000514000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/2884-481-0x0000000000400000-0x0000000000514000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/2924-288-0x0000000000400000-0x000000000043E000-memory.dmp

                          Filesize

                          248KB

                        • memory/3088-241-0x0000000000400000-0x000000000043E000-memory.dmp

                          Filesize

                          248KB

                        • memory/3612-314-0x0000000000400000-0x000000000043E000-memory.dmp

                          Filesize

                          248KB

                        • memory/3832-358-0x0000000000400000-0x0000000000514000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/3832-350-0x0000000000400000-0x0000000000514000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/3832-349-0x0000000000400000-0x0000000000514000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/3896-225-0x0000000000400000-0x0000000000514000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/3896-237-0x0000000000400000-0x0000000000514000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/3992-386-0x0000000000400000-0x000000000043E000-memory.dmp

                          Filesize

                          248KB

                        • memory/4248-411-0x0000000000400000-0x000000000043E000-memory.dmp

                          Filesize

                          248KB

                        • memory/4460-0-0x0000000000400000-0x0000000000514000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/4460-1-0x0000000002540000-0x0000000002541000-memory.dmp

                          Filesize

                          4KB

                        • memory/4460-2-0x0000000000400000-0x0000000000514000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/4460-3-0x0000000002540000-0x0000000002541000-memory.dmp

                          Filesize

                          4KB

                        • memory/4460-16-0x0000000000400000-0x0000000000514000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/4604-206-0x0000000000400000-0x000000000043E000-memory.dmp

                          Filesize

                          248KB

                        • memory/4624-361-0x0000000000400000-0x000000000043E000-memory.dmp

                          Filesize

                          248KB

                        • memory/4752-178-0x0000000000400000-0x000000000043E000-memory.dmp

                          Filesize

                          248KB

                        • memory/4756-13-0x0000000000400000-0x0000000000412000-memory.dmp

                          Filesize

                          72KB

                        • memory/4756-12-0x0000000000400000-0x0000000000412000-memory.dmp

                          Filesize

                          72KB

                        • memory/4756-9-0x0000000000400000-0x0000000000412000-memory.dmp

                          Filesize

                          72KB

                        • memory/4856-373-0x0000000000400000-0x0000000000514000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/4856-382-0x0000000000400000-0x0000000000514000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/4896-337-0x0000000000400000-0x000000000043E000-memory.dmp

                          Filesize

                          248KB

                        • memory/4972-303-0x0000000000400000-0x0000000000514000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/4972-310-0x0000000000400000-0x0000000000514000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/4972-304-0x0000000000400000-0x0000000000514000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/4984-100-0x0000000000400000-0x0000000000514000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/4984-112-0x0000000000400000-0x0000000000514000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/5008-436-0x0000000000400000-0x000000000043E000-memory.dmp

                          Filesize

                          248KB

                        • memory/5080-461-0x0000000000400000-0x000000000043E000-memory.dmp

                          Filesize

                          248KB

                        • memory/5088-408-0x0000000000400000-0x0000000000514000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/5088-398-0x0000000000400000-0x0000000000514000-memory.dmp

                          Filesize

                          1.1MB

                        We care about your privacy.

                        This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.