Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

12/03/2025, 21:32

250312-1dmynatxey 10

11/03/2025, 16:10

250311-tmgdxaxnx4 10

06/03/2025, 02:30

250306-cze8yav1az 10

Analysis

  • max time kernel
    237s
  • max time network
    266s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250217-en
  • resource tags

    arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    12/03/2025, 21:32

General

  • Target

    bluestealer.rar

  • Size

    5.6MB

  • MD5

    a90f4f14fd13ca22cfeb32127493bb3c

  • SHA1

    680a9f3b7d74575cdd91f461e9e2b47c10e5c79c

  • SHA256

    ee66a185008549b9ca0c687a78aa6a69e4770dd12cab9dc63d5346c1f570904b

  • SHA512

    69fee2468fdb90e4dfebe18dd90f040be372a8d7c35f049d1f594c4f6ec37a7bb9fb8f2c847114e315b214e823d3921d4260b3770628903a875a8b9fbb270a66

  • SSDEEP

    98304:xIb3rOEojkouUyLJ/IIDwOMTwKoD+ORWkt78cZfHKDDFaWI5Sz3ptM9b3Pd4g6wx:izaEJvD0WD+OP8QfqmSz3pt2zV4g6SmC

Malware Config

Extracted

Family

redline

Botnet

@Baobabss

C2

185.230.143.48:14462

Extracted

Family

redline

Botnet

@tupa187

C2

185.230.143.48:14462

Extracted

Family

formbook

Version

4.1

Campaign

o4ms

Decoy

fishingboatpub.com

trebor72.com

qualitycleanaustralia.com

amphilykenyx.com

jayte90.net

alveegrace.com

le-fleursoleil.com

volumoffer.com

businessbookwriters.com

alpin-art.com

firsttastetogo.com

catofc.com

ref-290.com

sbo2008.com

fortlauderdaleelevators.com

shanghaiyalian.com

majestybags.com

afcerd.com

myceliated.com

ls0a.com

Extracted

Family

asyncrat

Version

4.0.0.0

Botnet

Default

C2

2.56.59.227:8081

2.56.59.227:8082

2.56.59.227:8083

Mutex

Mutex_21687213

Attributes
  • delay

    5

  • install

    false

  • install_file

    example.exe

  • install_folder

    %AppData%

aes.plain

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.boydsteamships.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    co*tNjEBt4

Extracted

Family

xloader

Version

2.5

Campaign

mjyv

Decoy

wenyuexuan.com

tropicaldepression.info

healthylifefit.com

reemletenleafy.com

jmrrve.com

mabduh.com

esomvw.com

selfcaresereneneness.com

murdabudz.com

meinemail.online

brandqrcodes.com

live-in-pflege.com

nickrecovery.com

ziototoristorante.com

chatcure.com

corlora.com

localagentlab.com

yogo7.net

krveop.com

heianswer.xyz

Extracted

Family

redline

Botnet

@l_Like_a_Sir_l

C2

185.230.143.48:14462

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

iphy.strangled.net:1604

gpmaw.duckdns.org:3040

gpmaw.duckdns.org:2020

gpmaw.duckdns.org:4040

hpdndbnb.duckdns.org:3040

hpdndbnb.duckdns.org:2020

hpdndbnb.duckdns.org:4040

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain
aes.plain

Extracted

Family

redline

Botnet

@chucoed

C2

185.230.143.48:14462

Extracted

Family

revengerat

Botnet

NyanCatRevenge

C2

hpdndbnb.duckdns.org:2404

Mutex

90a49aa7c27647e

Extracted

Family

azorult

C2

https://guifenergy.co.ke/bin/32/index.php

Extracted

Family

xloader

Version

2.5

Campaign

qs23

Decoy

alimentosafc.com

noveltyporpak.xyz

fleteszoom.com

crabcompanions.com

metumuskfinance.com

perfectwatch.store

thweddingstory.com

ameliasongsforever.com

enowrecords.com

mywebcrown.com

silianceconseil.com

moodoven.com

generalwholesalestore.com

laguiza.com

gionakpil.com

nftfreemarket.com

astrainconsultora.com

favoritepedia.com

mycprguru.com

estateadmin.services

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Agenttesla family
  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • Azorult family
  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 4 IoCs
  • Redline family
  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

  • Revengerat family
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 4 IoCs
  • Sectoprat family
  • Snake Keylogger

    Keylogger and Infostealer first seen in November 2020.

  • Snake Keylogger payload 4 IoCs
  • Snakekeylogger family
  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader family
  • AgentTesla payload 1 IoCs
  • Async RAT payload 1 IoCs
  • Formbook payload 1 IoCs
  • Xloader payload 4 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Modifies Windows Firewall 2 TTPs 2 IoCs
  • Drops startup file 1 IoCs
  • Executes dropped EXE 50 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates connected drives 3 TTPs 2 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 33 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Program crash 6 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 25 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 7 IoCs
  • Modifies registry class 64 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 6 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious behavior: MapViewOfSection 18 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3216
    • C:\Program Files\7-Zip\7zFM.exe
      "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\bluestealer.rar"
      2⤵
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:3864
    • C:\Users\Admin\Desktop\cd3b81fbf93281530341f8c8cd66cfdeb7b2f1ec04f6fbe68ddcc35d28200a1c.exe
      "C:\Users\Admin\Desktop\cd3b81fbf93281530341f8c8cd66cfdeb7b2f1ec04f6fbe68ddcc35d28200a1c.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1480
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4676
    • C:\Users\Admin\Desktop\.exe
      "C:\Users\Admin\Desktop\.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1896
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1528
    • C:\Users\Admin\Desktop\rape (2).exe
      "C:\Users\Admin\Desktop\rape (2).exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2444
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:708
    • C:\Users\Admin\Desktop\ (1).exe
      "C:\Users\Admin\Desktop\ (1).exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1124
      • C:\Users\Admin\Desktop\ (1).exe
        "C:\Users\Admin\Desktop\ (1).exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:5480
    • C:\Users\Admin\Desktop\ (2).exe
      "C:\Users\Admin\Desktop\ (2).exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:5428
      • C:\Users\Admin\Desktop\ (2).exe
        "C:\Users\Admin\Desktop\ (2).exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:6816
        • C:\Users\Admin\AppData\Local\Temp\FB_E735.tmp.exe
          "C:\Users\Admin\AppData\Local\Temp\FB_E735.tmp.exe"
          4⤵
          • Drops startup file
          • Executes dropped EXE
          • Adds Run key to start application
          PID:7068
        • C:\Users\Admin\AppData\Local\Temp\FB_E830.tmp.exe
          "C:\Users\Admin\AppData\Local\Temp\FB_E830.tmp.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:7120
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 7120 -s 1920
            5⤵
            • Program crash
            PID:6092
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c schtasks /create /sc minute /mo 1 /tn "Nano" /tr "'C:\Users\Admin\AppData\Roaming\sergf\sergf.exe'" /f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:6916
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /sc minute /mo 1 /tn "Nano" /tr "'C:\Users\Admin\AppData\Roaming\sergf\sergf.exe'" /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:4680
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\Desktop\ (2).exe" "C:\Users\Admin\AppData\Roaming\sergf\sergf.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:6924
    • C:\Users\Admin\Desktop\rape (6).exe
      "C:\Users\Admin\Desktop\rape (6).exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:4108
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:5908
    • C:\Users\Admin\Desktop\rape (13).exe
      "C:\Users\Admin\Desktop\rape (13).exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:5316
      • C:\Users\Admin\Desktop\rape (13).exe
        "C:\Users\Admin\Desktop\rape (13).exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2472
    • C:\Users\Admin\Desktop\rape (5).exe
      "C:\Users\Admin\Desktop\rape (5).exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:776
      • C:\Users\Admin\Desktop\rape (5).exe
        "C:\Users\Admin\Desktop\rape (5).exe"
        3⤵
        • Executes dropped EXE
        • Checks processor information in registry
        PID:2700
      • C:\Users\Admin\Desktop\AsyncClient no setting.exe
        "C:\Users\Admin\Desktop\AsyncClient no setting.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        PID:800
        • C:\Users\Admin\Desktop\AsyncClient no setting.exe
          "C:\Users\Admin\Desktop\AsyncClient no setting.exe"
          4⤵
          • Executes dropped EXE
          PID:4528
    • C:\Users\Admin\Desktop\ (6).exe
      "C:\Users\Admin\Desktop\ (6).exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:904
      • C:\Users\Admin\Desktop\ (6).exe
        "C:\Users\Admin\Desktop\ (6).exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1552
        • C:\Windows\explorer.exe
          "C:\Windows\explorer.exe"
          4⤵
          • Boot or Logon Autostart Execution: Active Setup
          • Enumerates connected drives
          • Checks SCSI registry key(s)
          • Modifies registry class
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:2760
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"
          4⤵
          • Suspicious use of SetThreadContext
          • Suspicious use of AdjustPrivilegeToken
          PID:5512
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:5576
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c schtasks /create /sc minute /mo 1 /tn "Nano" /tr "'C:\Users\Admin\AppData\Roaming\Winrar\Winrar.exe'" /f
            5⤵
            • System Location Discovery: System Language Discovery
            PID:6088
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /create /sc minute /mo 1 /tn "Nano" /tr "'C:\Users\Admin\AppData\Roaming\Winrar\Winrar.exe'" /f
              6⤵
              • System Location Discovery: System Language Discovery
              • Scheduled Task/Job: Scheduled Task
              PID:6236
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c copy "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" "C:\Users\Admin\AppData\Roaming\Winrar\Winrar.exe"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:1360
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c schtasks /create /sc minute /mo 1 /tn "Nano" /tr "'C:\Users\Admin\AppData\Roaming\Winrar\Winrar.exe'" /f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:5392
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /sc minute /mo 1 /tn "Nano" /tr "'C:\Users\Admin\AppData\Roaming\Winrar\Winrar.exe'" /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:5576
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\Desktop\ (6).exe" "C:\Users\Admin\AppData\Roaming\Winrar\Winrar.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:6028
    • C:\Users\Admin\Desktop\rape (12).exe
      "C:\Users\Admin\Desktop\rape (12).exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      PID:3908
      • C:\Users\Admin\Desktop\rape (12).exe
        "C:\Users\Admin\Desktop\rape (12).exe"
        3⤵
        • Executes dropped EXE
        PID:2088
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3908 -s 1468
        3⤵
        • Program crash
        PID:400
    • C:\Users\Admin\Desktop\rape (11).exe
      "C:\Users\Admin\Desktop\rape (11).exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2108
      • C:\Users\Admin\AppData\Local\Temp\AfraidDns_Async.exe
        "C:\Users\Admin\AppData\Local\Temp\AfraidDns_Async.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2300
      • C:\Windows\SysWOW64\cmd.exe
        "cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Local\Temp\win10\win10.exe'" /f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:5036
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Local\Temp\win10\win10.exe'" /f
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:4908
      • C:\Windows\SysWOW64\cmd.exe
        "cmd.exe" /C copy "C:\Users\Admin\Desktop\rape (11).exe" "C:\Users\Admin\AppData\Local\Temp\win10\win10.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1684
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\SysWOW64\msiexec.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      PID:1564
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\Desktop\ (1).exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:5668
    • C:\Users\Admin\Desktop\rape (11).exe
      "C:\Users\Admin\Desktop\rape (11).exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2564
      • C:\Users\Admin\AppData\Local\Temp\AfraidDns_Async.exe
        "C:\Users\Admin\AppData\Local\Temp\AfraidDns_Async.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:1276
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2564 -s 1080
        3⤵
        • Program crash
        PID:4864
    • C:\Users\Admin\Desktop\ (5).exe
      "C:\Users\Admin\Desktop\ (5).exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2268
      • C:\Users\Admin\Desktop\ (5).exe
        "C:\Users\Admin\Desktop\ (5).exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:4000
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4000 -s 404
          4⤵
          • Program crash
          PID:6940
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c schtasks /create /sc minute /mo 1 /tn "Nano" /tr "'C:\Users\Admin\AppData\Roaming\Filemanager\Filemanager.exe'" /f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:6892
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /sc minute /mo 1 /tn "Nano" /tr "'C:\Users\Admin\AppData\Roaming\Filemanager\Filemanager.exe'" /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:3352
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\Desktop\ (5).exe" "C:\Users\Admin\AppData\Roaming\Filemanager\Filemanager.exe"
        3⤵
          PID:7112
      • C:\Users\Admin\Desktop\rape (8).exe
        "C:\Users\Admin\Desktop\rape (8).exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:5984
        • C:\Users\Admin\Desktop\rape (8).exe
          "C:\Users\Admin\Desktop\rape (8).exe"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:5652
      • C:\Users\Admin\Desktop\ (4).exe
        "C:\Users\Admin\Desktop\ (4).exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2576
        • C:\Users\Admin\Desktop\ (4).exe
          "C:\Users\Admin\Desktop\ (4).exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:5324
      • C:\Users\Admin\Desktop\ (3).exe
        "C:\Users\Admin\Desktop\ (3).exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:844
        • C:\Users\Admin\Desktop\ (3).exe
          "C:\Users\Admin\Desktop\ (3).exe"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5068
      • C:\Users\Admin\Desktop\rape (7).exe
        "C:\Users\Admin\Desktop\rape (7).exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:5768
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:1556
          • C:\Windows\SysWOW64\netsh.exe
            netsh firewall add allowedprogram "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe" "AppLaunch.exe" ENABLE
            4⤵
            • Modifies Windows Firewall
            • Event Triggered Execution: Netsh Helper DLL
            • System Location Discovery: System Language Discovery
            PID:4864
          • C:\Windows\SysWOW64\netsh.exe
            netsh firewall add allowedprogram "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe" "AppLaunch.exe" ENABLE
            4⤵
            • Modifies Windows Firewall
            • Event Triggered Execution: Netsh Helper DLL
            • System Location Discovery: System Language Discovery
            PID:3140
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionExtension exe,vbs,bat,hta,lnk,dll,ps1;exit
            4⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:5036
        • C:\Users\Admin\AppData\Local\Temp\nitropdf.enterprise.pro.x64.13.xx-patch.exe
          "C:\Users\Admin\AppData\Local\Temp\nitropdf.enterprise.pro.x64.13.xx-patch.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in Program Files directory
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious use of SetWindowsHookEx
          PID:1472
      • C:\Users\Admin\Desktop\rape (17).exe
        "C:\Users\Admin\Desktop\rape (17).exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1740
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:2660
      • C:\Users\Admin\Desktop\rape (18).exe
        "C:\Users\Admin\Desktop\rape (18).exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:3620
        • C:\Users\Admin\Desktop\rape (18).exe
          "C:\Users\Admin\Desktop\rape (18).exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: MapViewOfSection
          PID:7084
      • C:\Windows\SysWOW64\mstsc.exe
        "C:\Windows\SysWOW64\mstsc.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        PID:4556
        • C:\Windows\SysWOW64\cmd.exe
          /c del "C:\Users\Admin\Desktop\ (4).exe"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:2836
      • C:\Users\Admin\Desktop\rape (7).exe
        "C:\Users\Admin\Desktop\rape (7).exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        PID:1684
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:796
        • C:\Users\Admin\AppData\Local\Temp\nitropdf.enterprise.pro.x64.13.xx-patch.exe
          "C:\Users\Admin\AppData\Local\Temp\nitropdf.enterprise.pro.x64.13.xx-patch.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          PID:6248
      • C:\Users\Admin\Desktop\rape (7).exe
        "C:\Users\Admin\Desktop\rape (7).exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        PID:6128
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:308
        • C:\Users\Admin\AppData\Local\Temp\nitropdf.enterprise.pro.x64.13.xx-patch.exe
          "C:\Users\Admin\AppData\Local\Temp\nitropdf.enterprise.pro.x64.13.xx-patch.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          PID:5588
      • C:\Users\Admin\Desktop\ (4).exe
        "C:\Users\Admin\Desktop\ (4).exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        PID:4864
        • C:\Users\Admin\Desktop\ (4).exe
          "C:\Users\Admin\Desktop\ (4).exe"
          3⤵
          • Executes dropped EXE
          PID:6684
      • C:\Users\Admin\Desktop\rape (5).exe
        "C:\Users\Admin\Desktop\rape (5).exe"
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:4340
        • C:\Users\Admin\Desktop\rape (5).exe
          "C:\Users\Admin\Desktop\rape (5).exe"
          3⤵
            PID:2028
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4340 -s 1444
            3⤵
            • Program crash
            PID:2076
        • C:\Users\Admin\Desktop\ (3).exe
          "C:\Users\Admin\Desktop\ (3).exe"
          2⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          PID:296
          • C:\Users\Admin\Desktop\ (3).exe
            "C:\Users\Admin\Desktop\ (3).exe"
            3⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2484
        • C:\Users\Admin\Desktop\rape (5).exe
          "C:\Users\Admin\Desktop\rape (5).exe"
          2⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2368
          • C:\Users\Admin\Desktop\rape (5).exe
            "C:\Users\Admin\Desktop\rape (5).exe"
            3⤵
              PID:3044
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2368 -s 1444
              3⤵
              • Program crash
              PID:3900
          • C:\Users\Admin\Desktop\ (4).exe
            "C:\Users\Admin\Desktop\ (4).exe"
            2⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            PID:6256
            • C:\Users\Admin\Desktop\ (4).exe
              "C:\Users\Admin\Desktop\ (4).exe"
              3⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              PID:6696
          • C:\Windows\system32\taskmgr.exe
            "C:\Windows\system32\taskmgr.exe" /0
            2⤵
            • Checks SCSI registry key(s)
            • Modifies registry class
            • Suspicious use of FindShellTrayWindow
            PID:6544
          • C:\Windows\SysWOW64\raserver.exe
            "C:\Windows\SysWOW64\raserver.exe"
            2⤵
              PID:1036
              • C:\Windows\SysWOW64\cmd.exe
                /c del "C:\Users\Admin\Desktop\rape (18).exe"
                3⤵
                • System Location Discovery: System Language Discovery
                PID:2108
          • C:\Windows\system32\OpenWith.exe
            C:\Windows\system32\OpenWith.exe -Embedding
            1⤵
            • Suspicious use of SetWindowsHookEx
            PID:3992
          • C:\Windows\system32\OpenWith.exe
            C:\Windows\system32\OpenWith.exe -Embedding
            1⤵
            • Modifies registry class
            • Suspicious use of SetWindowsHookEx
            PID:1992
          • C:\Windows\system32\OpenWith.exe
            C:\Windows\system32\OpenWith.exe -Embedding
            1⤵
            • Suspicious use of SetWindowsHookEx
            PID:3536
          • C:\Program Files\WindowsApps\Microsoft.WindowsTerminal_1.6.10571.0_x64__8wekyb3d8bbwe\wt.exe
            "C:\Users\Admin\AppData\Local\Microsoft\WindowsApps\Microsoft.WindowsTerminal_8wekyb3d8bbwe\wt.exe" -d "C:\Users\Admin\Desktop\."
            1⤵
            • Suspicious use of WriteProcessMemory
            PID:2024
            • C:\Program Files\WindowsApps\Microsoft.WindowsTerminal_1.6.10571.0_x64__8wekyb3d8bbwe\WindowsTerminal.exe
              wt.exe -d "C:\Users\Admin\Desktop\."
              2⤵
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:2308
              • C:\Windows\system32\wsl.exe
                C:\Windows\system32\wsl.exe --list
                3⤵
                  PID:1488
                • C:\Program Files\WindowsApps\Microsoft.WindowsTerminal_1.6.10571.0_x64__8wekyb3d8bbwe\OpenConsole.exe
                  "C:\Program Files\WindowsApps\Microsoft.WindowsTerminal_1.6.10571.0_x64__8wekyb3d8bbwe\OpenConsole.exe" --headless --win32input --resizeQuirk --width 120 --height 27 --signal 0xa1c --server 0xa18
                  3⤵
                    PID:4256
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    powershell.exe
                    3⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3164
                  • C:\Program Files\WindowsApps\Microsoft.WindowsTerminal_1.6.10571.0_x64__8wekyb3d8bbwe\OpenConsole.exe
                    "C:\Program Files\WindowsApps\Microsoft.WindowsTerminal_1.6.10571.0_x64__8wekyb3d8bbwe\OpenConsole.exe" --headless --win32input --resizeQuirk --width 120 --height 27 --signal 0xb68 --server 0xb5c
                    3⤵
                      PID:5148
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      powershell.exe
                      3⤵
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:4876
                    • C:\Program Files\WindowsApps\Microsoft.WindowsTerminal_1.6.10571.0_x64__8wekyb3d8bbwe\OpenConsole.exe
                      "C:\Program Files\WindowsApps\Microsoft.WindowsTerminal_1.6.10571.0_x64__8wekyb3d8bbwe\OpenConsole.exe" --headless --win32input --resizeQuirk --width 120 --height 27 --signal 0xc2c --server 0xc24
                      3⤵
                        PID:4304
                      • C:\Windows\system32\cmd.exe
                        cmd.exe
                        3⤵
                          PID:5856
                    • C:\Windows\system32\OpenWith.exe
                      C:\Windows\system32\OpenWith.exe -Embedding
                      1⤵
                      • Modifies registry class
                      • Suspicious use of SetWindowsHookEx
                      PID:4136
                    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                      1⤵
                      • Modifies registry class
                      • Suspicious use of SetWindowsHookEx
                      PID:664
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 400 -p 2564 -ip 2564
                      1⤵
                        PID:1888
                      • C:\Windows\system32\BackgroundTransferHost.exe
                        "BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.13
                        1⤵
                        • Modifies registry class
                        PID:804
                      • C:\Windows\system32\vssvc.exe
                        C:\Windows\system32\vssvc.exe
                        1⤵
                          PID:2408
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 7120 -ip 7120
                          1⤵
                            PID:4864
                          • C:\Users\Admin\AppData\Roaming\sergf\sergf.exe
                            C:\Users\Admin\AppData\Roaming\sergf\sergf.exe
                            1⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            PID:3756
                            • C:\Users\Admin\AppData\Roaming\sergf\sergf.exe
                              "C:\Users\Admin\AppData\Roaming\sergf\sergf.exe"
                              2⤵
                                PID:6664
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\System32\cmd.exe" /c schtasks /create /sc minute /mo 1 /tn "Nano" /tr "'C:\Users\Admin\AppData\Roaming\sergf\sergf.exe'" /f
                                2⤵
                                  PID:6668
                                  • C:\Windows\SysWOW64\schtasks.exe
                                    schtasks /create /sc minute /mo 1 /tn "Nano" /tr "'C:\Users\Admin\AppData\Roaming\sergf\sergf.exe'" /f
                                    3⤵
                                    • Scheduled Task/Job: Scheduled Task
                                    PID:5636
                                • C:\Windows\SysWOW64\cmd.exe
                                  "C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Roaming\sergf\sergf.exe" "C:\Users\Admin\AppData\Roaming\sergf\sergf.exe"
                                  2⤵
                                    PID:5840
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3908 -ip 3908
                                  1⤵
                                    PID:1888
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4000 -ip 4000
                                    1⤵
                                      PID:6944
                                    • C:\Windows\System32\rundll32.exe
                                      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                      1⤵
                                        PID:6252
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4340 -ip 4340
                                        1⤵
                                          PID:6184
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2368 -ip 2368
                                          1⤵
                                            PID:6632

                                          Network

                                          MITRE ATT&CK Enterprise v15

                                          Replay Monitor

                                          Loading Replay Monitor...

                                          Downloads

                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

                                            Filesize

                                            62KB

                                            MD5

                                            e566632d8956997225be604d026c9b39

                                            SHA1

                                            94a9aade75fffc63ed71404b630eca41d3ce130e

                                            SHA256

                                            b7f66a3543488b08d8533f290eb5f2df7289531934e6db9c346714cfbf609cf0

                                            SHA512

                                            f244eb419eef0617cd585002e52c26120e57fcbadc37762c100712c55ff3c29b0f3991c2ffa8eefc4080d2a8dbfa01b188250ea440d631efed358e702cc3fecd

                                          • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\BackgroundTransferApi\eef1ef81-7215-4306-a3e0-0392571f6590.down_data

                                            Filesize

                                            555KB

                                            MD5

                                            5683c0028832cae4ef93ca39c8ac5029

                                            SHA1

                                            248755e4e1db552e0b6f8651b04ca6d1b31a86fb

                                            SHA256

                                            855abd360d8a8d6974eba92b70cbd09ce519bc8773439993f9ab37cb6847309e

                                            SHA512

                                            aba434bd29be191c823b02ea9b639beb10647bbe7759bbffdaa790dfb1ec2c58d74c525ef11aacda209e4effe322d1d3a07b115446c8914b07a3bce4d8a0e2c3

                                          • C:\Users\Admin\AppData\Local\Temp\AfraidDns_Async.exe

                                            Filesize

                                            47KB

                                            MD5

                                            c1dcd0d286ad0121901f2c269c86d16b

                                            SHA1

                                            10acacc80588f73f5197adc0ea7cf1eadb49c793

                                            SHA256

                                            16d86733b11a9fd3ec2a732c2ca18c04c427d9fb9ddf1bdc14fe4109644854f9

                                            SHA512

                                            919dc181df55584c744d98344ae340ad2a844aed278570dc2729f430234e3ce7539bc9807a522c7b73d8e26c05cdf5a45851ba88688e7840b03e7ffb7c278618

                                          • C:\Users\Admin\AppData\Local\Temp\FB_E735.tmp.exe

                                            Filesize

                                            69KB

                                            MD5

                                            0052d6c22b3c528c011b2e093155f8e0

                                            SHA1

                                            e176827903acb3f96b4114b036a0cda8646331d9

                                            SHA256

                                            eef635d1c6f58320072d6b4b762bee15d559978f2d150726a0fef3f83627871f

                                            SHA512

                                            b6f1f20b43b2af9633d16532be2d05a1ece10d99a83481913b254a5301e0c7934a8035fc0ba752a5c863aea1828665ad99e69c8ccdaa086544f228beb72db50a

                                          • C:\Users\Admin\AppData\Local\Temp\FB_E830.tmp.exe

                                            Filesize

                                            126KB

                                            MD5

                                            6871e4e3ce2b458881aa007560ef80b5

                                            SHA1

                                            e2a3fb4dc3d184693aed6b3c2f2f3065fdb0ff4e

                                            SHA256

                                            39e83410a9e1b504499680e98c3a4c5b7f272bf74e72528c8796f97ef6868c6e

                                            SHA512

                                            8bf95a29c79123bfd88f3ebbf1abd5095ce0bafac9cf9f97b619f4a1ab3e6df2574b9d24e9157b9da0d64240fa63818467ae31a0f2e139e411330a718371c7ef

                                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_cjpdwijy.hq4.ps1

                                            Filesize

                                            60B

                                            MD5

                                            d17fe0a3f47be24a6453e9ef58c94641

                                            SHA1

                                            6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                            SHA256

                                            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                            SHA512

                                            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                          • C:\Users\Admin\AppData\Local\Temp\dup2patcher.dll

                                            Filesize

                                            234KB

                                            MD5

                                            6f8b0021a206e48a50986333b87a5245

                                            SHA1

                                            b650435b6e1a0cc59e2c232f83a9796770f85f96

                                            SHA256

                                            326ca48a87c1e82e1fcaf95acd5b8c09d92f712591ba88928f48e093c485c40a

                                            SHA512

                                            b7f066786f20934148d718689fbcdf830a0a04ebf46092c48b6ec06ef5a989518cb23659a7ecbcef5b689a58546f2ac688a861887611cd3ee62b8ade62b4cc27

                                          • C:\Users\Admin\AppData\Local\Temp\nitropdf.enterprise.pro.x64.13.xx-patch.exe

                                            Filesize

                                            240KB

                                            MD5

                                            646260e1f316dd6e518d4c7a9ac6b589

                                            SHA1

                                            33eb1212fd842078b5b65d8720672582d8acb7ca

                                            SHA256

                                            8b0a871839c2e9714684cdb00cd18484780e29ee762f004d300c1fe65bb08628

                                            SHA512

                                            fc8e21267cc9141c86d490557de28e1afaebfb8d1519aca377160543b1dd825cd116d7b5bcb2e3b21a15b32f7f45505cf3c47ae6b29e4dd39c137ebaa694acad

                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\PowerShell\PSReadLine\ConsoleHost_history.txt

                                            Filesize

                                            22B

                                            MD5

                                            bf47811e88069dd8be6a856b0b25cbc9

                                            SHA1

                                            dd5d8ccb039c004cc12e43371dc177cc49d5ea3b

                                            SHA256

                                            de708ed0b51e59a12bb14bbb376daa4a390667605125d3642ac151e2605ea7e6

                                            SHA512

                                            0c475dfc4be11103e09759cd450568022953f2c984514efdd7cbd541862fa2669f3d4e4be70e67614fde398896e9e8581e27d4d2077c38b98745d074b688b757

                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\f01b4d95cf55d32a.automaticDestinations-ms

                                            Filesize

                                            7KB

                                            MD5

                                            a2e0eed4b8ef85807b0e2d0aae2a191b

                                            SHA1

                                            3b60dbaa3dee3abb1722179ecbf7917ea06faace

                                            SHA256

                                            00f202fd5b8cfa1ed51b1cca03a1995e3a8248611b660902ecc60698ad78a3ee

                                            SHA512

                                            f28c6eb23ae39c8bffc40c753111cbed45ebe2a7492900a4dc06b30c78a8205aa50deea3a2d9bc2f04c6a7d91578f27df621edc8c1e6f9d0bd8943d014449737

                                          • C:\Users\Admin\AppData\Roaming\Winrar\Winrar.exe

                                            Filesize

                                            45KB

                                            MD5

                                            70d838a7dc5b359c3f938a71fad77db0

                                            SHA1

                                            66b83eb16481c334719eed406bc58a3c2b910923

                                            SHA256

                                            e4dbdbf7888ea96f3f8aa5c4c7f2bcf6e57d724dd8194fe5f35b673c6ef724ea

                                            SHA512

                                            9c9a945db5b5e7ff8105bfe74578e6f00b5f707f7c3d8f1f1fb41553a6d0eab29cef026e77877a1ad6435fa7bc369141921442e1485f2b0894c6bbcbd7791034

                                          • C:\Users\Admin\Desktop\ (1).bin

                                            Filesize

                                            436KB

                                            MD5

                                            9284392fd96b31b3de8d8f664de3f0e4

                                            SHA1

                                            9b2e8d834a7e50ec7e674433d019dbd19996036c

                                            SHA256

                                            4f8799e5441c553ebbda342b6b06356a70dc432e5ac0434f4158146520b57ab7

                                            SHA512

                                            61efcc329ba8f50c32de43ba0bfc66e6591158c12fcb095dfa3652e54fc799255a49e44c62f2022b807d51b432050f85d94a172dc0e186af40a21e3848c7c922

                                          • C:\Users\Admin\Desktop\ (2).bin

                                            Filesize

                                            659KB

                                            MD5

                                            183ebe37f8f5b5b3e324577327363c3f

                                            SHA1

                                            8ae40a52e750efa0f8c7014583770f9ff2343291

                                            SHA256

                                            5f278f8bdee6e51c769320f10506c28a4e84a56ee3ff44f63eec9a189236b1cb

                                            SHA512

                                            0b2600468a1977e14f592ca5ddda8ec5c0ab8bcab15a3cce9107360e3fdc95b00f55f424ba42ab9ba6624586e5e9f27d00270adf12e5f651ef5c46030b186034

                                          • C:\Users\Admin\Desktop\ (3).bin

                                            Filesize

                                            296KB

                                            MD5

                                            31a70c300f7286f3621ae7836616190c

                                            SHA1

                                            094b64bbd18840512fc9e044d79bb32cf4dc9ca3

                                            SHA256

                                            56b7b7798a01e1bad522a375b7b096efeba0e118885b353b525b44471cdec90e

                                            SHA512

                                            37c420cb69669ed5aad32131fc78a8e6f3cdd90d156151fe6c928c407fb13654d37b99cdfd0a78ab9c396e917168ac8f8d977a1c054cd9903a442e3aa5614be3

                                          • C:\Users\Admin\Desktop\ (4).bin

                                            Filesize

                                            402KB

                                            MD5

                                            f4d5ddad31a703040adf721a9f9378c1

                                            SHA1

                                            21475642eb3561ba5d34a1a7f02899bb1ca61432

                                            SHA256

                                            57fb4959548b3597ea3689167e496cdbb83d07afa9f0f3acb6a56987cd50099d

                                            SHA512

                                            d595b167f88f3e5fe2329e2423914dd32a79a38dda9197d6d87517cf1cdd2322cac9ac42f1e02e934e310d9e5a3a431217983888bb293f617ca88528a075a776

                                          • C:\Users\Admin\Desktop\ (5).bin

                                            Filesize

                                            471KB

                                            MD5

                                            ab1a54b9bc677256e1757897de53211e

                                            SHA1

                                            d8dff0fc44fb65c2ec1f4d43fb69f979b78c8c29

                                            SHA256

                                            cbee3a2ab943816de40704ed266962b9d84d1a9b58a4a79f0200eb2a7258197f

                                            SHA512

                                            d434d9ba2ccef628e4e8288557e22578ddfe7128daf3b626e480cbae887ef81278f9a6b9824b7e67b392a982f116e84f6b73f36fa976f23cc6869f4643854615

                                          • C:\Users\Admin\Desktop\ (6).bin

                                            Filesize

                                            384KB

                                            MD5

                                            6430da0933f212d3dbc26aa283131e3f

                                            SHA1

                                            19ca70847c2a47c17674bcfa7507ddd973ab7574

                                            SHA256

                                            d0ac203d92810c4e13aa360f1accb3053f4179c73a47ba7fdb0566c5b6788b28

                                            SHA512

                                            f3e06bc6177a22189b9f0c3738e2e0235d7d34e7807c824028923ba262ac254a8460ab934a94264193ed3f60cdedadf3bbf68770c7b26ee7bff9f38eb69d3adf

                                          • C:\Users\Admin\Desktop\.exe

                                            Filesize

                                            393KB

                                            MD5

                                            b00ce88a2b91a871790fd474b9a1d21a

                                            SHA1

                                            080cb85002442c677a54e17fc26883d24ecf9551

                                            SHA256

                                            e45511dfa75cd8f4c3735710d850f5dc0f30f0af6ea034ba48ddf81a27df6b48

                                            SHA512

                                            b6876af01963d4b8fbc80e6067a62086a6f48c6242ac4d778b185b4f6e6b7a750172fcdd4c949f20a27ef57f9c3ea0d1d79bc98220faa3a2074db5b2a806ea74

                                          • C:\Users\Admin\Desktop\AsyncClient no setting.exe

                                            Filesize

                                            280KB

                                            MD5

                                            211fe2f27eb6bb501821766ffe46f8c6

                                            SHA1

                                            cdb9c540719567b7ef64677f1fe030de377cb534

                                            SHA256

                                            6497a1878d2676ba6e4184692baceb2147f09a0cf6ce117ff09c8d759a64d3df

                                            SHA512

                                            fcf4c0284577d770f29520910c6e3d6121a35a9d68748708e8e9556d5ec811813525df7820e7b632122289de4e095f8a989a999f662526bf00c853f3057c9089

                                          • C:\Users\Admin\Desktop\cd3b81fbf93281530341f8c8cd66cfdeb7b2f1ec04f6fbe68ddcc35d28200a1c.exe

                                            Filesize

                                            397KB

                                            MD5

                                            03a32b8f44708e43ba5655d735eaebc0

                                            SHA1

                                            1d5aa010a79241fb75eab2cab75acd4a449338b5

                                            SHA256

                                            cd3b81fbf93281530341f8c8cd66cfdeb7b2f1ec04f6fbe68ddcc35d28200a1c

                                            SHA512

                                            9a93097bd0a5a57103c3099c6c0738c56c38cfb6fabb9036326d06c1761cf03dd78802f357380949c3f0d507ca0f8f13e0a0b5158d7148b3db077c80065036df

                                          • C:\Users\Admin\Desktop\rape (1).bin

                                            Filesize

                                            429KB

                                            MD5

                                            3aa19b791cd0ec8d9bc25a631bbad827

                                            SHA1

                                            d807bc8785423b59ce08fa1a89205eb95f0e57fc

                                            SHA256

                                            3a9efda763f017e1ca8237aa27f8659b081f62f42e11aa36b6e122f65caca48a

                                            SHA512

                                            a9a4a3e8603d28c7df254507f668052c722b742e937fefd5c9c687e48e502f147f22deacfad8510d09faac59a928a536061c5a1865247fcc6bebb9abdcffc489

                                          • C:\Users\Admin\Desktop\rape (11).bin

                                            Filesize

                                            363KB

                                            MD5

                                            ddbbbb0895f1997339c1c388f853f65d

                                            SHA1

                                            d79b5cab17509a0aaeef232947a3992a20a706be

                                            SHA256

                                            66b157a3d414b913b1a436edc71e8fc733c1f5457302fe9ca950a8b16d86b9e6

                                            SHA512

                                            a3912b39b1efe5e56b970ba4e2a64bc76a36c1edfc1774ac3dc987e9f89fa6468ff26db69e58854a1b11e58bcaa64789a223fadc9f599649cb5cc08db936307a

                                          • C:\Users\Admin\Desktop\rape (12).bin

                                            Filesize

                                            376KB

                                            MD5

                                            5022069109525eccc6b1f9aea5310c30

                                            SHA1

                                            07427c696897bbe46a384aed624c4fd0b55d155c

                                            SHA256

                                            977e5ce44a0ca0b374857f1f9ba476376ab41b7edf1117a3f5b805a69244f6f1

                                            SHA512

                                            d2c6b6175bf776d61efdeaf522ff5b73da883d84dfa10804d4bab2e0c8e83b82af839a0328e4ef1493dddf323edc2c496df55f13e99912b27a6b61d4cd363600

                                          • C:\Users\Admin\Desktop\rape (13).bin

                                            Filesize

                                            296KB

                                            MD5

                                            d88fc1f23009d945ef6096b14a2b52ff

                                            SHA1

                                            c1a7e896034692aa6ae337d9034aa09baedac9d8

                                            SHA256

                                            099355d506f15966ba946cd6f58a72f6c02c73232349cf7f2d6af5641eed0ceb

                                            SHA512

                                            359d8d15130582112dcff3a5ec596f23d9ce5cfec60b011d1d5623919e5f9581f49ae1b9fc47a177d16002baa8b8dbced2413740664ffaa0fcf61bfbc9a321ea

                                          • C:\Users\Admin\Desktop\rape (14).bin

                                            Filesize

                                            397KB

                                            MD5

                                            399d700b5b33aaa71dfd3663d3f726ca

                                            SHA1

                                            e19122ffc9ac23b15cda09c01d949e938e533f9e

                                            SHA256

                                            a4865b2ed7dce154e50357674e8f15052a532609af0026dc4c8ea69b8a2f77c6

                                            SHA512

                                            58e337a1fec459c6124a45e6eb9298fe0743987dd279f5f0c350e78c2b189d635c661a2e7696456262f0da4a61a0e3755e436278ad337905dd888e15fee81108

                                          • C:\Users\Admin\Desktop\rape (17).bin

                                            Filesize

                                            392KB

                                            MD5

                                            de8048ac576f6245d0d1e4c46d99ecc9

                                            SHA1

                                            3dc6a9821a623e226d14c6b677341539d3330a1a

                                            SHA256

                                            ec80b9834589c1d7c085ed91c380dba9dc8617e246cbbcfcb7b66657134ca28b

                                            SHA512

                                            8c9f49232362338c4a0ec4a931c8fa7b52fdb29cc16099ce3acf1a0f2384ee8d8a16bf385475ce19ced56b6a98a426519d85a12880aea78f78478755f8ce26b8

                                          • C:\Users\Admin\Desktop\rape (18).bin

                                            Filesize

                                            481KB

                                            MD5

                                            d57a65324f585b76a5109a9e24e15e36

                                            SHA1

                                            fe71977f7e6525a556a50a1492a553923543bf62

                                            SHA256

                                            f421edcb46a128618f15ada2053d311ea25e065d80d8da89bdc211bba054c07e

                                            SHA512

                                            6055b7841fbd60a4db9e5bc6750550702543259308a0a048a60ad924b647d0528c76dad91cb931b926a8057fe7eedd4e5e9b63f4f2107b552d7090e9ee0ec123

                                          • C:\Users\Admin\Desktop\rape (2).bin

                                            Filesize

                                            1.6MB

                                            MD5

                                            7ea2249f22066a4dafa98d3a054d8dfb

                                            SHA1

                                            fc7582154e909a4ffae91f7e672be8c084a999d1

                                            SHA256

                                            3b49b6c1cc92bed7fb10ec3399c1f03449c5ab983a7d03f22bd83392b7a2dc86

                                            SHA512

                                            351abe96e14a2872a6e3e087c645b0547fdd61e2e64092ab76e29412f22196151deb27d3f79a53182ae235601e5e8757a13d38beedbd22c8cdbfab4c3846aba7

                                          • C:\Users\Admin\Desktop\rape (5).bin

                                            Filesize

                                            376KB

                                            MD5

                                            9ceb9d87e88e9183841d70781b4dbf2f

                                            SHA1

                                            1d6c5ec438aa3d6e79487a1ec0340c34128d2c85

                                            SHA256

                                            6ec9f82a79152492b6a50a55dee43665e5205d607206573ce3729f824a05db36

                                            SHA512

                                            5abea7da457d239799555b8263c7f7b945ba1b327f88fecc2bee8faea7731634fd99f7e99d1b08b38a406e297de638306e45079ec78d7e970be01ee37124bc16

                                          • C:\Users\Admin\Desktop\rape (6).bin

                                            Filesize

                                            401KB

                                            MD5

                                            4e0d7de9ab90eae3d73e82c516746b1d

                                            SHA1

                                            319c1b1ebcb538f0b74b56e5087b2cf960b33ce9

                                            SHA256

                                            8d469fed80fcd597d17e15df98cd15a4646abb69cd7f81795af94c2c46ed2a33

                                            SHA512

                                            2d9abc62b8033ef874d09d274efd1e1546c5a51790d990a5c8dffed70d0cca0c6f76868b745322e1638e1b79970e42c277327052f6024275b864cae3eae65936

                                          • C:\Users\Admin\Desktop\rape (7).bin

                                            Filesize

                                            324KB

                                            MD5

                                            638264dabfa294ec7b31dfb89a85edbc

                                            SHA1

                                            2029e54083f1900349c89cc49a72f914c0db943f

                                            SHA256

                                            23d6f9a120790d441377488f28c15f7ffc4df84c3fb5d05ce42f0bae5d75731e

                                            SHA512

                                            2bc06a4789bcdecc338a53410ffdbf4c4f7914884db9a2ab05940296824aaae5c94a33cce61f82c32d83164efbec9c53ffc4a2ba76e27f6c417d78a9a15e3d0f

                                          • C:\Users\Admin\Desktop\rape (8).bin

                                            Filesize

                                            482KB

                                            MD5

                                            d5c6afc24d4fff226ae1190fde23e514

                                            SHA1

                                            e342136d49082c798e5da37f27a0bad894e3e4ce

                                            SHA256

                                            51bd8c50dd5a58aa312bbcd0db0a1c297b929b8addb04cca5552a0ed1a79b209

                                            SHA512

                                            4cfa0f5bacd1521792bc3278bd0b25871da1b86afc7e7a243b89cd2a7ccd7119ab013422c1cccad06790e2d5b3885180047684d5a3504d6a1f86ad42aba0a575

                                          • memory/776-113-0x0000000000460000-0x00000000004C4000-memory.dmp

                                            Filesize

                                            400KB

                                          • memory/800-307-0x0000000000AA0000-0x0000000000AEC000-memory.dmp

                                            Filesize

                                            304KB

                                          • memory/844-141-0x0000000000830000-0x0000000000880000-memory.dmp

                                            Filesize

                                            320KB

                                          • memory/904-115-0x00000000004D0000-0x0000000000536000-memory.dmp

                                            Filesize

                                            408KB

                                          • memory/1036-359-0x0000000000E90000-0x0000000000EB1000-memory.dmp

                                            Filesize

                                            132KB

                                          • memory/1036-360-0x0000000000E90000-0x0000000000EB1000-memory.dmp

                                            Filesize

                                            132KB

                                          • memory/1124-105-0x00000000004F0000-0x0000000000562000-memory.dmp

                                            Filesize

                                            456KB

                                          • memory/1472-169-0x000000006FC30000-0x000000006FC83000-memory.dmp

                                            Filesize

                                            332KB

                                          • memory/1480-44-0x0000000005330000-0x00000000053C2000-memory.dmp

                                            Filesize

                                            584KB

                                          • memory/1480-45-0x0000000005290000-0x00000000052F6000-memory.dmp

                                            Filesize

                                            408KB

                                          • memory/1480-42-0x0000000000A50000-0x0000000000AB8000-memory.dmp

                                            Filesize

                                            416KB

                                          • memory/1480-46-0x00000000057B0000-0x00000000057BA000-memory.dmp

                                            Filesize

                                            40KB

                                          • memory/1480-43-0x0000000005840000-0x0000000005DE6000-memory.dmp

                                            Filesize

                                            5.6MB

                                          • memory/1528-57-0x0000000000800000-0x0000000000822000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/1552-128-0x0000000000400000-0x0000000000414000-memory.dmp

                                            Filesize

                                            80KB

                                          • memory/1556-156-0x0000000000400000-0x000000000040C000-memory.dmp

                                            Filesize

                                            48KB

                                          • memory/1564-139-0x00000000000A0000-0x00000000000C8000-memory.dmp

                                            Filesize

                                            160KB

                                          • memory/1564-136-0x00000000000A0000-0x00000000000C8000-memory.dmp

                                            Filesize

                                            160KB

                                          • memory/1564-137-0x00000000000A0000-0x00000000000C8000-memory.dmp

                                            Filesize

                                            160KB

                                          • memory/1740-151-0x0000000000B70000-0x0000000000BD8000-memory.dmp

                                            Filesize

                                            416KB

                                          • memory/1896-56-0x0000000000200000-0x0000000000268000-memory.dmp

                                            Filesize

                                            416KB

                                          • memory/2108-119-0x00000000009B0000-0x0000000000A10000-memory.dmp

                                            Filesize

                                            384KB

                                          • memory/2268-125-0x0000000000090000-0x000000000010C000-memory.dmp

                                            Filesize

                                            496KB

                                          • memory/2300-178-0x00000000003F0000-0x0000000000402000-memory.dmp

                                            Filesize

                                            72KB

                                          • memory/2472-187-0x0000000005840000-0x0000000005858000-memory.dmp

                                            Filesize

                                            96KB

                                          • memory/2472-144-0x00000000058A0000-0x000000000593C000-memory.dmp

                                            Filesize

                                            624KB

                                          • memory/2472-142-0x0000000000400000-0x000000000043C000-memory.dmp

                                            Filesize

                                            240KB

                                          • memory/2576-134-0x0000000000BC0000-0x0000000000C0E000-memory.dmp

                                            Filesize

                                            312KB

                                          • memory/2660-188-0x0000000000400000-0x0000000000422000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/2700-293-0x0000000000430000-0x000000000043C000-memory.dmp

                                            Filesize

                                            48KB

                                          • memory/2760-252-0x00000000093B0000-0x0000000009479000-memory.dmp

                                            Filesize

                                            804KB

                                          • memory/2760-327-0x00000000093B0000-0x0000000009479000-memory.dmp

                                            Filesize

                                            804KB

                                          • memory/2760-337-0x000000000B160000-0x000000000B2EA000-memory.dmp

                                            Filesize

                                            1.5MB

                                          • memory/3164-68-0x000001FA7F990000-0x000001FA7F9B2000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/3164-72-0x000001FA7F9C0000-0x000001FA7FA06000-memory.dmp

                                            Filesize

                                            280KB

                                          • memory/3216-214-0x00000000148A0000-0x0000000014985000-memory.dmp

                                            Filesize

                                            916KB

                                          • memory/3216-287-0x00000000148A0000-0x0000000014985000-memory.dmp

                                            Filesize

                                            916KB

                                          • memory/3216-358-0x00000000148A0000-0x0000000014985000-memory.dmp

                                            Filesize

                                            916KB

                                          • memory/3216-326-0x00000000164F0000-0x000000001658B000-memory.dmp

                                            Filesize

                                            620KB

                                          • memory/3620-157-0x00000000006D0000-0x000000000074E000-memory.dmp

                                            Filesize

                                            504KB

                                          • memory/3756-286-0x00000000008D0000-0x000000000097A000-memory.dmp

                                            Filesize

                                            680KB

                                          • memory/3908-117-0x0000000000A10000-0x0000000000A74000-memory.dmp

                                            Filesize

                                            400KB

                                          • memory/4000-322-0x00000000005C0000-0x00000000005E0000-memory.dmp

                                            Filesize

                                            128KB

                                          • memory/4000-320-0x00000000005C0000-0x00000000005E0000-memory.dmp

                                            Filesize

                                            128KB

                                          • memory/4000-324-0x00000000005C0000-0x00000000005E0000-memory.dmp

                                            Filesize

                                            128KB

                                          • memory/4000-319-0x0000000000400000-0x0000000000420000-memory.dmp

                                            Filesize

                                            128KB

                                          • memory/4108-109-0x0000000000270000-0x00000000002DA000-memory.dmp

                                            Filesize

                                            424KB

                                          • memory/4528-318-0x0000000000400000-0x0000000000412000-memory.dmp

                                            Filesize

                                            72KB

                                          • memory/4556-189-0x0000000000BD0000-0x0000000000D1E000-memory.dmp

                                            Filesize

                                            1.3MB

                                          • memory/4556-234-0x0000000000800000-0x0000000000829000-memory.dmp

                                            Filesize

                                            164KB

                                          • memory/4556-190-0x0000000000BD0000-0x0000000000D1E000-memory.dmp

                                            Filesize

                                            1.3MB

                                          • memory/4676-51-0x0000000004B20000-0x0000000004C2A000-memory.dmp

                                            Filesize

                                            1.0MB

                                          • memory/4676-53-0x0000000004AC0000-0x0000000004B0C000-memory.dmp

                                            Filesize

                                            304KB

                                          • memory/4676-52-0x0000000004A50000-0x0000000004A8C000-memory.dmp

                                            Filesize

                                            240KB

                                          • memory/4676-48-0x0000000000160000-0x0000000000182000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/4676-49-0x0000000004F50000-0x0000000005568000-memory.dmp

                                            Filesize

                                            6.1MB

                                          • memory/4676-50-0x00000000049F0000-0x0000000004A02000-memory.dmp

                                            Filesize

                                            72KB

                                          • memory/5036-216-0x0000000007360000-0x0000000007394000-memory.dmp

                                            Filesize

                                            208KB

                                          • memory/5036-209-0x0000000005550000-0x0000000005572000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/5036-232-0x00000000077C0000-0x0000000007856000-memory.dmp

                                            Filesize

                                            600KB

                                          • memory/5036-233-0x0000000007770000-0x0000000007781000-memory.dmp

                                            Filesize

                                            68KB

                                          • memory/5036-229-0x0000000007530000-0x000000000754A000-memory.dmp

                                            Filesize

                                            104KB

                                          • memory/5036-235-0x00000000077A0000-0x00000000077AE000-memory.dmp

                                            Filesize

                                            56KB

                                          • memory/5036-236-0x0000000007860000-0x0000000007875000-memory.dmp

                                            Filesize

                                            84KB

                                          • memory/5036-237-0x00000000078A0000-0x00000000078BA000-memory.dmp

                                            Filesize

                                            104KB

                                          • memory/5036-238-0x0000000007890000-0x0000000007898000-memory.dmp

                                            Filesize

                                            32KB

                                          • memory/5036-228-0x0000000007B70000-0x00000000081EA000-memory.dmp

                                            Filesize

                                            6.5MB

                                          • memory/5036-196-0x00000000029C0000-0x00000000029F6000-memory.dmp

                                            Filesize

                                            216KB

                                          • memory/5036-197-0x00000000055A0000-0x0000000005BCA000-memory.dmp

                                            Filesize

                                            6.2MB

                                          • memory/5036-227-0x00000000073D0000-0x0000000007474000-memory.dmp

                                            Filesize

                                            656KB

                                          • memory/5036-226-0x00000000073A0000-0x00000000073BE000-memory.dmp

                                            Filesize

                                            120KB

                                          • memory/5036-217-0x0000000070E80000-0x0000000070ECC000-memory.dmp

                                            Filesize

                                            304KB

                                          • memory/5036-231-0x00000000075B0000-0x00000000075BA000-memory.dmp

                                            Filesize

                                            40KB

                                          • memory/5036-210-0x0000000005CC0000-0x0000000005D26000-memory.dmp

                                            Filesize

                                            408KB

                                          • memory/5036-211-0x0000000005DA0000-0x00000000060F7000-memory.dmp

                                            Filesize

                                            3.3MB

                                          • memory/5036-215-0x0000000005C80000-0x0000000005C9E000-memory.dmp

                                            Filesize

                                            120KB

                                          • memory/5316-111-0x00000000004C0000-0x0000000000510000-memory.dmp

                                            Filesize

                                            320KB

                                          • memory/5324-147-0x0000000000400000-0x0000000000429000-memory.dmp

                                            Filesize

                                            164KB

                                          • memory/5324-184-0x0000000000400000-0x0000000000429000-memory.dmp

                                            Filesize

                                            164KB

                                          • memory/5428-107-0x0000000000B30000-0x0000000000BDA000-memory.dmp

                                            Filesize

                                            680KB

                                          • memory/5480-120-0x0000000000400000-0x000000000042E000-memory.dmp

                                            Filesize

                                            184KB

                                          • memory/5512-172-0x0000000000400000-0x0000000000466000-memory.dmp

                                            Filesize

                                            408KB

                                          • memory/5512-171-0x0000000000400000-0x0000000000466000-memory.dmp

                                            Filesize

                                            408KB

                                          • memory/5768-146-0x0000000000870000-0x00000000008C8000-memory.dmp

                                            Filesize

                                            352KB

                                          • memory/5908-152-0x0000000000400000-0x0000000000422000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/5984-130-0x0000000000C10000-0x0000000000C8E000-memory.dmp

                                            Filesize

                                            504KB

                                          • memory/6248-310-0x000000006FC30000-0x000000006FC83000-memory.dmp

                                            Filesize

                                            332KB

                                          • memory/6544-347-0x000001B6A60E0000-0x000001B6A60E1000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/6544-348-0x000001B6A60E0000-0x000001B6A60E1000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/6544-345-0x000001B6A60E0000-0x000001B6A60E1000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/6544-344-0x000001B6A60E0000-0x000001B6A60E1000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/6544-340-0x000001B6A60E0000-0x000001B6A60E1000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/6544-339-0x000001B6A60E0000-0x000001B6A60E1000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/6544-338-0x000001B6A60E0000-0x000001B6A60E1000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/6544-346-0x000001B6A60E0000-0x000001B6A60E1000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/6544-349-0x000001B6A60E0000-0x000001B6A60E1000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/6544-350-0x000001B6A60E0000-0x000001B6A60E1000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/6816-248-0x0000000000400000-0x0000000000436000-memory.dmp

                                            Filesize

                                            216KB

                                          • memory/6816-250-0x0000000000400000-0x0000000000436000-memory.dmp

                                            Filesize

                                            216KB

                                          • memory/7068-280-0x0000000001030000-0x0000000001038000-memory.dmp

                                            Filesize

                                            32KB

                                          • memory/7068-277-0x000000001BCE0000-0x000000001C1AE000-memory.dmp

                                            Filesize

                                            4.8MB

                                          • memory/7068-278-0x000000001B6D0000-0x000000001B76C000-memory.dmp

                                            Filesize

                                            624KB

                                          • memory/7068-279-0x000000001C360000-0x000000001C406000-memory.dmp

                                            Filesize

                                            664KB

                                          • memory/7084-356-0x0000000000400000-0x0000000000429000-memory.dmp

                                            Filesize

                                            164KB

                                          • memory/7120-274-0x0000000000980000-0x00000000009A6000-memory.dmp

                                            Filesize

                                            152KB