Resubmissions

13-02-2021 13:20

210213-v5rv7ejb7n 10

Analysis

  • max time kernel
    1800s
  • max time network
    1384s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    13-02-2021 13:20

General

  • Target

    Kepserverex_5_5_14_493_crack_by_CORE.exe

  • Size

    9.0MB

  • MD5

    10a7ec6eec9d29e7cf84477015651b65

  • SHA1

    c6b132ff8919f5da4959d68b5a9cf86919ccebee

  • SHA256

    a252756f1326333e8587740cfecad63d80ffd26dd49d6b9699d685fb5096b730

  • SHA512

    34c53db9f782e6899004673c3c531b58aacc2153554fd2ca06b47d80d21f8d536912f4ec7f7336738e24b034f5a567b32cf99015ee8c01259902b63a86722aaa

Malware Config

Extracted

Family

azorult

C2

http://kvaka.li/1210776429.php

Extracted

Family

smokeloader

Version

2020

C2

http://naritouzina.net/

http://nukaraguasleep.net/

http://notfortuaj.net/

http://natuturalistic.net/

http://zaniolofusa.net/

rc4.i32
rc4.i32

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • PlugX

    PlugX is a RAT (Remote Access Trojan) that has been around since 2008.

  • Pony,Fareit

    Pony is a Remote Access Trojan application that steals information.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Nirsoft 8 IoCs
  • Executes dropped EXE 37 IoCs
  • Suspicious Office macro 1 IoCs

    Office document equipped with 4.0 macros.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 14 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • themida 2 IoCs

    Detects Themida, Advanced Windows software protection system.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 5 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Writes to the Master Boot Record (MBR) 1 TTPs 4 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • Drops file in Program Files directory 51 IoCs
  • Drops file in Windows directory 10 IoCs
  • Program crash 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 1 IoCs
  • Modifies Control Panel 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Runs ping.exe 1 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 17 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Kepserverex_5_5_14_493_crack_by_CORE.exe
    "C:\Users\Admin\AppData\Local\Temp\Kepserverex_5_5_14_493_crack_by_CORE.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:944
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3300
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exe
        keygen-pr.exe -p83fsase3Ge
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:668
        • C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe
          "C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4004
          • C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe
            C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe -txt -scanlocal -file:potato.dat
            5⤵
            • Executes dropped EXE
            PID:2296
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exe
        keygen-step-1.exe
        3⤵
        • Executes dropped EXE
        PID:3084
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe
        keygen-step-3.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:732
        • C:\Windows\SysWOW64\cmd.exe
          cmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2760
          • C:\Windows\SysWOW64\PING.EXE
            ping 1.1.1.1 -n 1 -w 3000
            5⤵
            • Runs ping.exe
            PID:1352
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exe
        keygen-step-4.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:856
        • C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe
          "C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe"
          4⤵
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Writes to the Master Boot Record (MBR)
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Modifies system certificate store
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1188
          • C:\Windows\SysWOW64\msiexec.exe
            msiexec.exe /i "C:\Users\Admin\AppData\Local\Temp\gdiview.msi"
            5⤵
            • Enumerates connected drives
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            PID:3280
          • C:\Users\Admin\AppData\Local\Temp\6489A2274AE24900.exe
            C:\Users\Admin\AppData\Local\Temp\6489A2274AE24900.exe 0011 installp1
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Checks whether UAC is enabled
            • Writes to the Master Boot Record (MBR)
            • Suspicious use of SetThreadContext
            • Checks SCSI registry key(s)
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1700
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe"
              6⤵
              • Suspicious use of SetWindowsHookEx
              PID:4912
            • C:\Users\Admin\AppData\Roaming\1613225902607.exe
              "C:\Users\Admin\AppData\Roaming\1613225902607.exe" /sjson "C:\Users\Admin\AppData\Roaming\1613225902607.txt"
              6⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of SetWindowsHookEx
              PID:4240
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe"
              6⤵
              • Suspicious use of SetWindowsHookEx
              PID:4312
            • C:\Users\Admin\AppData\Roaming\1613225907079.exe
              "C:\Users\Admin\AppData\Roaming\1613225907079.exe" /sjson "C:\Users\Admin\AppData\Roaming\1613225907079.txt"
              6⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of SetWindowsHookEx
              PID:4324
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe"
              6⤵
              • Suspicious use of SetWindowsHookEx
              PID:4380
            • C:\Users\Admin\AppData\Roaming\1613225912796.exe
              "C:\Users\Admin\AppData\Roaming\1613225912796.exe" /sjson "C:\Users\Admin\AppData\Roaming\1613225912796.txt"
              6⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of SetWindowsHookEx
              PID:4392
            • C:\Users\Admin\AppData\Local\Temp\download\ThunderFW.exe
              C:\Users\Admin\AppData\Local\Temp\download\ThunderFW.exe ThunderFW "C:\Users\Admin\AppData\Local\Temp\download\MiniThunderPlatform.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:1224
            • C:\Users\Admin\AppData\Local\Temp\download\MiniThunderPlatform.exe
              "C:\Users\Admin\AppData\Local\Temp\download\MiniThunderPlatform.exe" -StartTP
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Writes to the Master Boot Record (MBR)
              • Suspicious use of SetWindowsHookEx
              PID:4308
            • C:\Users\Admin\AppData\Local\Temp\23E04C4F32EF2158.exe
              C:\Users\Admin\AppData\Local\Temp\23E04C4F32EF2158.exe /silent
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:4988
              • C:\Users\Admin\AppData\Local\Temp\is-RNS2I.tmp\23E04C4F32EF2158.tmp
                "C:\Users\Admin\AppData\Local\Temp\is-RNS2I.tmp\23E04C4F32EF2158.tmp" /SL5="$B00D4,815708,121344,C:\Users\Admin\AppData\Local\Temp\23E04C4F32EF2158.exe" /silent
                7⤵
                • Executes dropped EXE
                • Drops file in Program Files directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SetWindowsHookEx
                PID:5036
                • C:\Program Files (x86)\HappyNewYear\seed.sfx.exe
                  "C:\Program Files (x86)\HappyNewYear\seed.sfx.exe" -pX7mdks39WE0 -s1
                  8⤵
                  • Executes dropped EXE
                  • Drops file in Program Files directory
                  • Suspicious use of SetWindowsHookEx
                  PID:4620
                  • C:\Program Files (x86)\Seed Trade\Seed\seed.exe
                    "C:\Program Files (x86)\Seed Trade\Seed\seed.exe"
                    9⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Checks SCSI registry key(s)
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious behavior: MapViewOfSection
                    PID:768
                • C:\Windows\SysWOW64\cmd.exe
                  "cmd.exe" /c "start https://iplogger.org/14Zhe7"
                  8⤵
                  • Checks computer location settings
                  PID:2116
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\AppData\Local\Temp\6489A2274AE24900.exe"
              6⤵
                PID:4508
                • C:\Windows\SysWOW64\PING.EXE
                  ping 127.0.0.1 -n 3
                  7⤵
                  • Runs ping.exe
                  PID:4356
            • C:\Users\Admin\AppData\Local\Temp\6489A2274AE24900.exe
              C:\Users\Admin\AppData\Local\Temp\6489A2274AE24900.exe 200 installp1
              5⤵
              • Executes dropped EXE
              • Checks whether UAC is enabled
              • Writes to the Master Boot Record (MBR)
              • Checks SCSI registry key(s)
              • Suspicious use of SetWindowsHookEx
              PID:1092
              • C:\Windows\SysWOW64\cmd.exe
                cmd.exe /c taskkill /f /im chrome.exe
                6⤵
                  PID:4984
                  • C:\Windows\SysWOW64\taskkill.exe
                    taskkill /f /im chrome.exe
                    7⤵
                    • Kills process with taskkill
                    PID:5048
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\AppData\Local\Temp\6489A2274AE24900.exe"
                  6⤵
                    PID:1324
                    • C:\Windows\SysWOW64\PING.EXE
                      ping 127.0.0.1 -n 3
                      7⤵
                      • Runs ping.exe
                      PID:4284
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe"
                  5⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1628
                  • C:\Windows\SysWOW64\PING.EXE
                    ping 127.0.0.1 -n 3
                    6⤵
                    • Runs ping.exe
                    PID:4124
              • C:\Users\Admin\AppData\Local\Temp\RarSFX2\md2_2efs.exe
                "C:\Users\Admin\AppData\Local\Temp\RarSFX2\md2_2efs.exe"
                4⤵
                • Executes dropped EXE
                • Checks whether UAC is enabled
                PID:2292
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2292 -s 2944
                  5⤵
                  • Drops file in Windows directory
                  • Program crash
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4976
              • C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe
                "C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"
                4⤵
                • Executes dropped EXE
                PID:4740
                • C:\Users\Admin\AppData\Roaming\67F2.tmp.exe
                  "C:\Users\Admin\AppData\Roaming\67F2.tmp.exe"
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  PID:4180
                  • C:\Users\Admin\AppData\Roaming\67F2.tmp.exe
                    "C:\Users\Admin\AppData\Roaming\67F2.tmp.exe"
                    6⤵
                    • Executes dropped EXE
                    • Checks processor information in registry
                    • Suspicious behavior: EnumeratesProcesses
                    PID:5100
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"
                  5⤵
                    PID:4244
                    • C:\Windows\SysWOW64\PING.EXE
                      ping 127.0.0.1
                      6⤵
                      • Runs ping.exe
                      PID:4316
                • C:\Users\Admin\AppData\Local\Temp\RarSFX2\BTRSetp.exe
                  "C:\Users\Admin\AppData\Local\Temp\RarSFX2\BTRSetp.exe"
                  4⤵
                  • Executes dropped EXE
                  PID:2756
                  • C:\Users\Admin\AppData\Local\Temp\RarSFX1\installer.exe
                    "C:\Users\Admin\AppData\Local\Temp\RarSFX1\installer.exe"
                    5⤵
                    • Executes dropped EXE
                    PID:4364
                    • C:\ProgramData\8543617.93
                      "C:\ProgramData\8543617.93"
                      6⤵
                      • Executes dropped EXE
                      PID:4384
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 4384 -s 724
                        7⤵
                        • Program crash
                        • Suspicious behavior: EnumeratesProcesses
                        PID:4628
                    • C:\ProgramData\5503031.60
                      "C:\ProgramData\5503031.60"
                      6⤵
                      • Executes dropped EXE
                      • Adds Run key to start application
                      PID:4388
                      • C:\ProgramData\Windows Host\Windows Host.exe
                        "C:\ProgramData\Windows Host\Windows Host.exe"
                        7⤵
                        • Executes dropped EXE
                        PID:4796
                    • C:\ProgramData\6915393.76
                      "C:\ProgramData\6915393.76"
                      6⤵
                      • Executes dropped EXE
                      • Checks BIOS information in registry
                      • Checks whether UAC is enabled
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • Suspicious behavior: EnumeratesProcesses
                      PID:4568
                • C:\Users\Admin\AppData\Local\Temp\RarSFX2\gdrrr.exe
                  "C:\Users\Admin\AppData\Local\Temp\RarSFX2\gdrrr.exe"
                  4⤵
                  • Executes dropped EXE
                  • Adds Run key to start application
                  PID:4804
                  • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                    C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                    5⤵
                    • Executes dropped EXE
                    PID:4812
                  • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                    C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                    5⤵
                    • Executes dropped EXE
                    • Suspicious behavior: EnumeratesProcesses
                    PID:4088
                  • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                    C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                    5⤵
                    • Executes dropped EXE
                    PID:5660
                  • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                    C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                    5⤵
                    • Executes dropped EXE
                    PID:5756
          • C:\Windows\system32\msiexec.exe
            C:\Windows\system32\msiexec.exe /V
            1⤵
            • Enumerates connected drives
            • Drops file in Program Files directory
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2720
            • C:\Windows\syswow64\MsiExec.exe
              C:\Windows\syswow64\MsiExec.exe -Embedding DDB8CAD36971DD2CAF4BDD628A7C235D C
              2⤵
              • Loads dropped DLL
              PID:3696
            • C:\Windows\system32\srtasks.exe
              C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
              2⤵
                PID:4560
            • C:\Windows\system32\vssvc.exe
              C:\Windows\system32\vssvc.exe
              1⤵
                PID:1384
              • \??\c:\windows\system32\svchost.exe
                c:\windows\system32\svchost.exe -k netsvcs -s DsmSvc
                1⤵
                • Checks SCSI registry key(s)
                • Modifies data under HKEY_USERS
                PID:3584
              • C:\Program Files (x86)\gdiview\gdiview\GDIView.exe
                "C:\Program Files (x86)\gdiview\gdiview\GDIView.exe"
                1⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                PID:5012
              • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
                "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
                1⤵
                • Drops file in Windows directory
                • Modifies Control Panel
                • Modifies Internet Explorer settings
                • Modifies registry class
                • Suspicious use of SetWindowsHookEx
                PID:4640
              • C:\Windows\system32\browser_broker.exe
                C:\Windows\system32\browser_broker.exe -Embedding
                1⤵
                • Modifies Internet Explorer settings
                PID:4348
              • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                1⤵
                • Modifies registry class
                • Suspicious behavior: MapViewOfSection
                • Suspicious use of SetWindowsHookEx
                PID:1468
              • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                1⤵
                • Modifies Internet Explorer settings
                • Modifies registry class
                PID:788
              • C:\Windows\system32\compattelrunner.exe
                C:\Windows\system32\compattelrunner.exe -m:aeinv.dll -f:UpdateSoftwareInventoryW
                1⤵
                  PID:2372
                • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                  "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                  1⤵
                  • Modifies registry class
                  PID:4108
                • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                  "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                  1⤵
                  • Modifies registry class
                  PID:5184
                • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                  "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                  1⤵
                  • Modifies registry class
                  PID:5268
                • C:\Users\Admin\AppData\Roaming\tjjbeji
                  C:\Users\Admin\AppData\Roaming\tjjbeji
                  1⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious behavior: MapViewOfSection
                  PID:5364
                • C:\Users\Admin\AppData\Roaming\tjjbeji
                  C:\Users\Admin\AppData\Roaming\tjjbeji
                  1⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Checks SCSI registry key(s)
                  • Suspicious behavior: MapViewOfSection
                  PID:5680
                • C:\Users\Admin\AppData\Roaming\tjjbeji
                  C:\Users\Admin\AppData\Roaming\tjjbeji
                  1⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Checks SCSI registry key(s)
                  • Suspicious behavior: MapViewOfSection
                  PID:5784

                Network

                MITRE ATT&CK Matrix ATT&CK v6

                Persistence

                Registry Run Keys / Startup Folder

                1
                T1060

                Bootkit

                1
                T1067

                Defense Evasion

                Virtualization/Sandbox Evasion

                1
                T1497

                Modify Registry

                3
                T1112

                Install Root Certificate

                1
                T1130

                Credential Access

                Credentials in Files

                3
                T1081

                Discovery

                Query Registry

                7
                T1012

                Virtualization/Sandbox Evasion

                1
                T1497

                System Information Discovery

                7
                T1082

                Peripheral Device Discovery

                2
                T1120

                Remote System Discovery

                1
                T1018

                Collection

                Data from Local System

                3
                T1005

                Command and Control

                Web Service

                1
                T1102

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Program Files (x86)\gdiview\gdiview\GDIView.exe
                  MD5

                  292ce5c1baa3da54f5bfd847bdd92fa1

                  SHA1

                  4d98e3522790a9408e7e85d0e80c3b54a43318e1

                  SHA256

                  c49560f7a206b6b55d89c205a4631dfedd2b4a78ab81fea8706989a5627f95a1

                  SHA512

                  87df5d622d8f0685edf93f97b8213c893b203d1c6d064af238f0bdc0dc985c9968be6f0907aff4fb64a320b0886ef2bed2339694aca12f0bcd9502ce3d6f089d

                • C:\Program Files (x86)\gdiview\gdiview\GDIView.exe
                  MD5

                  292ce5c1baa3da54f5bfd847bdd92fa1

                  SHA1

                  4d98e3522790a9408e7e85d0e80c3b54a43318e1

                  SHA256

                  c49560f7a206b6b55d89c205a4631dfedd2b4a78ab81fea8706989a5627f95a1

                  SHA512

                  87df5d622d8f0685edf93f97b8213c893b203d1c6d064af238f0bdc0dc985c9968be6f0907aff4fb64a320b0886ef2bed2339694aca12f0bcd9502ce3d6f089d

                • C:\ProgramData\5503031.60
                  MD5

                  812106381d9d1e2b02a890710b56b47d

                  SHA1

                  e779d19559c8eb1a59be586a0309e559a0d175fa

                  SHA256

                  4dc2cda6da2e009dea089f085bb193c06e8fe6239788c7250e64b92c4130b25c

                  SHA512

                  cd4195284f26c76bcd67b2c08329c877325324dcf0137fe05224186f384180ed88ee9743cd0a984f8a7cefc93115d26accacc2b284a5090c4a9ec60f2d04e975

                • C:\ProgramData\5503031.60
                  MD5

                  812106381d9d1e2b02a890710b56b47d

                  SHA1

                  e779d19559c8eb1a59be586a0309e559a0d175fa

                  SHA256

                  4dc2cda6da2e009dea089f085bb193c06e8fe6239788c7250e64b92c4130b25c

                  SHA512

                  cd4195284f26c76bcd67b2c08329c877325324dcf0137fe05224186f384180ed88ee9743cd0a984f8a7cefc93115d26accacc2b284a5090c4a9ec60f2d04e975

                • C:\ProgramData\6915393.76
                  MD5

                  04341b1da2bc9a6ec918bfd61f554215

                  SHA1

                  ee3899dc00a588126c9166317b2fc41d9d73e124

                  SHA256

                  c3f0b90ba9005ccd671cd0247089f6f79351bbe2601ad7ca9f74b7ae627e55fd

                  SHA512

                  583f81fe33e5dc6e3694f37ffa55f862f622c4f45e685853824dfe71f4e10cff8e61998088a58aa4d917009ec903058e6907b39a291a1d9e1ff5919d7049df09

                • C:\ProgramData\8543617.93
                  MD5

                  7d42a88a867c6bfc2c0d58f902ccb27c

                  SHA1

                  2d2f6565734907ffa8874d89dd9b15cd487dd116

                  SHA256

                  e1a0ca77c2a0fb45c1b10eab9a9a3f9918be5ef8e4f6cb62c33c96e05fbb3a0a

                  SHA512

                  d018207a417d5e57e192b259cbe9c043824b801cd599e883da187a06364dceb0189f72f226474df5231c99ad37f78a6e2dfe8f684b9698ee63e99c4a4ae67a89

                • C:\ProgramData\8543617.93
                  MD5

                  7d42a88a867c6bfc2c0d58f902ccb27c

                  SHA1

                  2d2f6565734907ffa8874d89dd9b15cd487dd116

                  SHA256

                  e1a0ca77c2a0fb45c1b10eab9a9a3f9918be5ef8e4f6cb62c33c96e05fbb3a0a

                  SHA512

                  d018207a417d5e57e192b259cbe9c043824b801cd599e883da187a06364dceb0189f72f226474df5231c99ad37f78a6e2dfe8f684b9698ee63e99c4a4ae67a89

                • C:\ProgramData\Windows Host\Windows Host.exe
                  MD5

                  812106381d9d1e2b02a890710b56b47d

                  SHA1

                  e779d19559c8eb1a59be586a0309e559a0d175fa

                  SHA256

                  4dc2cda6da2e009dea089f085bb193c06e8fe6239788c7250e64b92c4130b25c

                  SHA512

                  cd4195284f26c76bcd67b2c08329c877325324dcf0137fe05224186f384180ed88ee9743cd0a984f8a7cefc93115d26accacc2b284a5090c4a9ec60f2d04e975

                • C:\ProgramData\Windows Host\Windows Host.exe
                  MD5

                  812106381d9d1e2b02a890710b56b47d

                  SHA1

                  e779d19559c8eb1a59be586a0309e559a0d175fa

                  SHA256

                  4dc2cda6da2e009dea089f085bb193c06e8fe6239788c7250e64b92c4130b25c

                  SHA512

                  cd4195284f26c76bcd67b2c08329c877325324dcf0137fe05224186f384180ed88ee9743cd0a984f8a7cefc93115d26accacc2b284a5090c4a9ec60f2d04e975

                • C:\Users\Admin\AppData\Local\Temp\6489A2274AE24900.exe
                  MD5

                  edeb50f0b803732a581ab558bf87d968

                  SHA1

                  35858ce564d4c8b080bae606bf67292f5b9b2201

                  SHA256

                  ee9743026ad49017735e58c3d9ee9198db87eb6a3ab77242aa9d15155a9504b6

                  SHA512

                  8c47a7964791452fc499046d60b08b99f7a986b3827cddeba88b20e91c0ff69475314f17662c33286f421d433fb507a9c673bcce75f0c5bb333ca6e58b219273

                • C:\Users\Admin\AppData\Local\Temp\6489A2274AE24900.exe
                  MD5

                  edeb50f0b803732a581ab558bf87d968

                  SHA1

                  35858ce564d4c8b080bae606bf67292f5b9b2201

                  SHA256

                  ee9743026ad49017735e58c3d9ee9198db87eb6a3ab77242aa9d15155a9504b6

                  SHA512

                  8c47a7964791452fc499046d60b08b99f7a986b3827cddeba88b20e91c0ff69475314f17662c33286f421d433fb507a9c673bcce75f0c5bb333ca6e58b219273

                • C:\Users\Admin\AppData\Local\Temp\6489A2274AE24900.exe
                  MD5

                  edeb50f0b803732a581ab558bf87d968

                  SHA1

                  35858ce564d4c8b080bae606bf67292f5b9b2201

                  SHA256

                  ee9743026ad49017735e58c3d9ee9198db87eb6a3ab77242aa9d15155a9504b6

                  SHA512

                  8c47a7964791452fc499046d60b08b99f7a986b3827cddeba88b20e91c0ff69475314f17662c33286f421d433fb507a9c673bcce75f0c5bb333ca6e58b219273

                • C:\Users\Admin\AppData\Local\Temp\MSIED63.tmp
                  MD5

                  84878b1a26f8544bda4e069320ad8e7d

                  SHA1

                  51c6ee244f5f2fa35b563bffb91e37da848a759c

                  SHA256

                  809aab5eace34dfbfb2b3d45462d42b34fcb95b415201d0d625414b56e437444

                  SHA512

                  4742b84826961f590e0a2d6cc85a60b59ca4d300c58be5d0c33eb2315cefaf5627ae5ed908233ad51e188ce53ca861cf5cf8c1aa2620dc2667f83f98e627b549

                • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exe
                  MD5

                  65b49b106ec0f6cf61e7dc04c0a7eb74

                  SHA1

                  a1f4784377c53151167965e0ff225f5085ebd43b

                  SHA256

                  862a8cf0e5561c848145a1a1f464acf77f92a3b15cc43722a7208701f60a2fcd

                  SHA512

                  e9030cd609f42fb616e5bac3a5203ae46bbae9ec95682432a367f8805cdaa3e30c18a732ceddb0545ac653d543348a6728866149d2822752c80948066bfdf3da

                • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exe
                  MD5

                  65b49b106ec0f6cf61e7dc04c0a7eb74

                  SHA1

                  a1f4784377c53151167965e0ff225f5085ebd43b

                  SHA256

                  862a8cf0e5561c848145a1a1f464acf77f92a3b15cc43722a7208701f60a2fcd

                  SHA512

                  e9030cd609f42fb616e5bac3a5203ae46bbae9ec95682432a367f8805cdaa3e30c18a732ceddb0545ac653d543348a6728866149d2822752c80948066bfdf3da

                • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exe
                  MD5

                  c615d0bfa727f494fee9ecb3f0acf563

                  SHA1

                  6c3509ae64abc299a7afa13552c4fe430071f087

                  SHA256

                  95d91febc45d03c1ee477c127bcbd332cd6fbce1e91105004af723594e6f0199

                  SHA512

                  d97256eb93d8e546f5fb5c61bebe61e7dfab316eb7685be83782bd36b28df3f80880e7b823197a4b6bae1af7b9460c4c81357dd44ed199ab93ccaee5acc10e51

                • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exe
                  MD5

                  c615d0bfa727f494fee9ecb3f0acf563

                  SHA1

                  6c3509ae64abc299a7afa13552c4fe430071f087

                  SHA256

                  95d91febc45d03c1ee477c127bcbd332cd6fbce1e91105004af723594e6f0199

                  SHA512

                  d97256eb93d8e546f5fb5c61bebe61e7dfab316eb7685be83782bd36b28df3f80880e7b823197a4b6bae1af7b9460c4c81357dd44ed199ab93ccaee5acc10e51

                • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe
                  MD5

                  62d2a07135884c5c8ff742c904fddf56

                  SHA1

                  46ce1f7fdf8b4cb2abe479efd5f352db9728a40b

                  SHA256

                  a12fee020eb54a0f012545074c689893113d130498d9ad411d5852c786770b81

                  SHA512

                  19c4dc3558308052bb13f71ca633ab05d55d57b68fc240fcc6d06e583fa61c5ccea87ef0f8196acc19b37d87deb42e5c204a2a05fce63f1accaf9e39c219f519

                • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe
                  MD5

                  62d2a07135884c5c8ff742c904fddf56

                  SHA1

                  46ce1f7fdf8b4cb2abe479efd5f352db9728a40b

                  SHA256

                  a12fee020eb54a0f012545074c689893113d130498d9ad411d5852c786770b81

                  SHA512

                  19c4dc3558308052bb13f71ca633ab05d55d57b68fc240fcc6d06e583fa61c5ccea87ef0f8196acc19b37d87deb42e5c204a2a05fce63f1accaf9e39c219f519

                • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exe
                  MD5

                  38f1d6ddf7e39767157acbb107e03250

                  SHA1

                  dcb0d5feacb80c1e4cbb71a30cff7edf10a185e8

                  SHA256

                  97ada84ef77a3b45abd2e14caf519e06bbbad5a6ed180aa6ee543e38e9bce796

                  SHA512

                  3ba909b5001a3b995ebe8f9dbd4ddb6506a5c66612cf43e94a50f72c543a9aa4828bbba224db807de10076c5e70fabf7cc31bf8e442a3f4cf26d95c7f7094c2d

                • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exe
                  MD5

                  38f1d6ddf7e39767157acbb107e03250

                  SHA1

                  dcb0d5feacb80c1e4cbb71a30cff7edf10a185e8

                  SHA256

                  97ada84ef77a3b45abd2e14caf519e06bbbad5a6ed180aa6ee543e38e9bce796

                  SHA512

                  3ba909b5001a3b995ebe8f9dbd4ddb6506a5c66612cf43e94a50f72c543a9aa4828bbba224db807de10076c5e70fabf7cc31bf8e442a3f4cf26d95c7f7094c2d

                • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat
                  MD5

                  f2632c204f883c59805093720dfe5a78

                  SHA1

                  c96e3aa03805a84fec3ea4208104a25a2a9d037e

                  SHA256

                  f9458a661ecd6c7e8fae669be72497288472a11ac3e823d3074e58f7fe98cd68

                  SHA512

                  5a19c4a777899889381be64f190e50a23cceee0abb78776b6d041e2384ba88e692972e40cefa34c03ca1b7d029475a0afbc5ce006ce833a1665e52008671bae2

                • C:\Users\Admin\AppData\Local\Temp\RarSFX1\JOzWR.dat
                  MD5

                  12476321a502e943933e60cfb4429970

                  SHA1

                  c71d293b84d03153a1bd13c560fca0f8857a95a7

                  SHA256

                  14a0fbd7eab461e49ee161ac3bd9ad8055086dbe56848dbaba9ec2034b3dea29

                  SHA512

                  f222de8febc705146394fd389e6cece95b077a0629e18eab91c49b139bf5b686435e28a6ada4a0dbb951fd24ec3db692e7a5584d57ffd0e851739e595f2bbfdc

                • C:\Users\Admin\AppData\Local\Temp\RarSFX1\installer.exe
                  MD5

                  874d5bd8807cebd41fd65ea12f4f9252

                  SHA1

                  d3833cf480b3d6bdd05be3e837cdebabfc6cdb5d

                  SHA256

                  2b1503e2375fcd64699867b513e8e51a6f15a1fbc461755249bff01adb658985

                  SHA512

                  b2e47db04d8bc92037e1d1492df161f1e66a75ef99e3c77b3ae6b9b74e270cb7b705f02b26ca9edf63a138244ca013fb4b7d41d4ade66404d1ec77433bbe1b48

                • C:\Users\Admin\AppData\Local\Temp\RarSFX1\installer.exe
                  MD5

                  874d5bd8807cebd41fd65ea12f4f9252

                  SHA1

                  d3833cf480b3d6bdd05be3e837cdebabfc6cdb5d

                  SHA256

                  2b1503e2375fcd64699867b513e8e51a6f15a1fbc461755249bff01adb658985

                  SHA512

                  b2e47db04d8bc92037e1d1492df161f1e66a75ef99e3c77b3ae6b9b74e270cb7b705f02b26ca9edf63a138244ca013fb4b7d41d4ade66404d1ec77433bbe1b48

                • C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe
                  MD5

                  51ef03c9257f2dd9b93bfdd74e96c017

                  SHA1

                  3baa7bee4b4b7d3ace13409d69dc7bcd0399ac34

                  SHA256

                  82a022b29bda763ef9f2ce01c82c82e199182d1d0243cca9811eccc1d993cecf

                  SHA512

                  2c97e5d08c9be89ca45153511e0976abfabf41e25d4187dcb7586ba125b6d8d763b99e79043ac1504203c26c7ab47a9246d9a0235b469f6c611703d4e2ae00e1

                • C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe
                  MD5

                  51ef03c9257f2dd9b93bfdd74e96c017

                  SHA1

                  3baa7bee4b4b7d3ace13409d69dc7bcd0399ac34

                  SHA256

                  82a022b29bda763ef9f2ce01c82c82e199182d1d0243cca9811eccc1d993cecf

                  SHA512

                  2c97e5d08c9be89ca45153511e0976abfabf41e25d4187dcb7586ba125b6d8d763b99e79043ac1504203c26c7ab47a9246d9a0235b469f6c611703d4e2ae00e1

                • C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe
                  MD5

                  51ef03c9257f2dd9b93bfdd74e96c017

                  SHA1

                  3baa7bee4b4b7d3ace13409d69dc7bcd0399ac34

                  SHA256

                  82a022b29bda763ef9f2ce01c82c82e199182d1d0243cca9811eccc1d993cecf

                  SHA512

                  2c97e5d08c9be89ca45153511e0976abfabf41e25d4187dcb7586ba125b6d8d763b99e79043ac1504203c26c7ab47a9246d9a0235b469f6c611703d4e2ae00e1

                • C:\Users\Admin\AppData\Local\Temp\RarSFX1\potato.dat
                  MD5

                  e6982420e4711e16f70a4b96d27932b4

                  SHA1

                  2e37dc1257ddac7a31ce3da59e4f0cb97c9dc291

                  SHA256

                  d8118c26935eb5dfc32213502547843e33c742a88d8bb11ae340d32f83a39dfd

                  SHA512

                  0bc50e97b3ca9692188859ffb00c45ac2747b5eee09e927f48dbcd897e4cd06b57ce2432633601202f255017c5da8bca85aa0b26af8e118b7cc13a9ff7a098c2

                • C:\Users\Admin\AppData\Local\Temp\RarSFX2\BTRSetp.exe
                  MD5

                  b2d8ce7b40730bc6615728b1b1795ce9

                  SHA1

                  5cf7a63f3ecc2184e7b2894c78538d89f7063fe1

                  SHA256

                  ee4b58514316c6fc928e60245384560a24723e690a3311e8c2dd9e8efd5de7ca

                  SHA512

                  cc79016627fb17a864ca3414f8bc598d52a9d17ec64ee1005b059a84597fe16493203879ff1c5a5ed46cf15a9e590098672a4b21a38852cace9bb02d8f1c531e

                • C:\Users\Admin\AppData\Local\Temp\RarSFX2\BTRSetp.exe
                  MD5

                  b2d8ce7b40730bc6615728b1b1795ce9

                  SHA1

                  5cf7a63f3ecc2184e7b2894c78538d89f7063fe1

                  SHA256

                  ee4b58514316c6fc928e60245384560a24723e690a3311e8c2dd9e8efd5de7ca

                  SHA512

                  cc79016627fb17a864ca3414f8bc598d52a9d17ec64ee1005b059a84597fe16493203879ff1c5a5ed46cf15a9e590098672a4b21a38852cace9bb02d8f1c531e

                • C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe
                  MD5

                  edeb50f0b803732a581ab558bf87d968

                  SHA1

                  35858ce564d4c8b080bae606bf67292f5b9b2201

                  SHA256

                  ee9743026ad49017735e58c3d9ee9198db87eb6a3ab77242aa9d15155a9504b6

                  SHA512

                  8c47a7964791452fc499046d60b08b99f7a986b3827cddeba88b20e91c0ff69475314f17662c33286f421d433fb507a9c673bcce75f0c5bb333ca6e58b219273

                • C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe
                  MD5

                  edeb50f0b803732a581ab558bf87d968

                  SHA1

                  35858ce564d4c8b080bae606bf67292f5b9b2201

                  SHA256

                  ee9743026ad49017735e58c3d9ee9198db87eb6a3ab77242aa9d15155a9504b6

                  SHA512

                  8c47a7964791452fc499046d60b08b99f7a986b3827cddeba88b20e91c0ff69475314f17662c33286f421d433fb507a9c673bcce75f0c5bb333ca6e58b219273

                • C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe
                  MD5

                  26baf1dd4e0c44975cf943b6d5269b07

                  SHA1

                  4648e9a79c7a4fd5be622128ddc5af68697f3121

                  SHA256

                  9117de15747527123f93284c821ea2e681b574639112532e66ad37a8246d98c9

                  SHA512

                  57adccbf3424849a19291e9e4ec018a4f3b1ca5fbdfedd16592fadae5c7664249eafcff85e916dd2342ab47b6440ac314af63360aaafba1a11c7356c0f27fcef

                • C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe
                  MD5

                  26baf1dd4e0c44975cf943b6d5269b07

                  SHA1

                  4648e9a79c7a4fd5be622128ddc5af68697f3121

                  SHA256

                  9117de15747527123f93284c821ea2e681b574639112532e66ad37a8246d98c9

                  SHA512

                  57adccbf3424849a19291e9e4ec018a4f3b1ca5fbdfedd16592fadae5c7664249eafcff85e916dd2342ab47b6440ac314af63360aaafba1a11c7356c0f27fcef

                • C:\Users\Admin\AppData\Local\Temp\RarSFX2\gdrrr.exe
                  MD5

                  6a714c56525073f78181129ce52175db

                  SHA1

                  eb7a9356e9cc40368e1774035c23b15b7c8d792b

                  SHA256

                  57c417f53d9032a2f256cee17c274df2d411858abb14789406671c1dca6017c4

                  SHA512

                  04a183bddeeaa6fe316596fad52a6e707549ca2e93b2b294c618b4381018bf5791582e2ac08e0f5e5cea86ac980a56208e54e1e310945614e00524d50a00c550

                • C:\Users\Admin\AppData\Local\Temp\RarSFX2\gdrrr.exe
                  MD5

                  6a714c56525073f78181129ce52175db

                  SHA1

                  eb7a9356e9cc40368e1774035c23b15b7c8d792b

                  SHA256

                  57c417f53d9032a2f256cee17c274df2d411858abb14789406671c1dca6017c4

                  SHA512

                  04a183bddeeaa6fe316596fad52a6e707549ca2e93b2b294c618b4381018bf5791582e2ac08e0f5e5cea86ac980a56208e54e1e310945614e00524d50a00c550

                • C:\Users\Admin\AppData\Local\Temp\RarSFX2\md2_2efs.exe
                  MD5

                  6f3b825f098993be0b5dbd0e42790b15

                  SHA1

                  cb6b13faf195f76f064c19d5b1a08b5d0633d3ea

                  SHA256

                  c6ee0d49bdb6580c6a972e1b087ba4973984843c94832082cb0454e17386ab2e

                  SHA512

                  bff72b5587ce20201e08919456726872aa253eceb7836884995f2807aaf1d6dc9ebd681c3aa6e34a56be18f1f3369bea4876df6836329dd43202103db7b7d34c

                • C:\Users\Admin\AppData\Local\Temp\RarSFX2\md2_2efs.exe
                  MD5

                  6f3b825f098993be0b5dbd0e42790b15

                  SHA1

                  cb6b13faf195f76f064c19d5b1a08b5d0633d3ea

                  SHA256

                  c6ee0d49bdb6580c6a972e1b087ba4973984843c94832082cb0454e17386ab2e

                  SHA512

                  bff72b5587ce20201e08919456726872aa253eceb7836884995f2807aaf1d6dc9ebd681c3aa6e34a56be18f1f3369bea4876df6836329dd43202103db7b7d34c

                • C:\Users\Admin\AppData\Local\Temp\download\ThunderFW.exe
                  MD5

                  f0372ff8a6148498b19e04203dbb9e69

                  SHA1

                  27fe4b5f8cb9464ab5ddc63e69c3c180b77dbde8

                  SHA256

                  298d334b630c77b70e66cf5e9c1924c7f0d498b02c2397e92e2d9efdff2e1bdf

                  SHA512

                  65d84817cdddb808b6e0ab964a4b41e96f7ce129e3cc8c253a31642efe73a9b7070638c22c659033e1479322aceea49d1afdceff54f8ed044b1513bffd33f865

                • C:\Users\Admin\AppData\Local\Temp\download\ThunderFW.exe
                  MD5

                  f0372ff8a6148498b19e04203dbb9e69

                  SHA1

                  27fe4b5f8cb9464ab5ddc63e69c3c180b77dbde8

                  SHA256

                  298d334b630c77b70e66cf5e9c1924c7f0d498b02c2397e92e2d9efdff2e1bdf

                  SHA512

                  65d84817cdddb808b6e0ab964a4b41e96f7ce129e3cc8c253a31642efe73a9b7070638c22c659033e1479322aceea49d1afdceff54f8ed044b1513bffd33f865

                • C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                  MD5

                  b7161c0845a64ff6d7345b67ff97f3b0

                  SHA1

                  d223f855da541fe8e4c1d5c50cb26da0a1deb5fc

                  SHA256

                  fe9e28ff0b652e22a124b0a05382bc1ac48cbd9c7c76ca647b0c9f8542888f66

                  SHA512

                  98d8971ff20ba256cf886a9db416ac9366d2c6ad4ff51a65bd7e539974dc93f4c897f92d8c9c0319c69b27eacf05cd350a0302828e63190b03457a0eda57f680

                • C:\Users\Admin\AppData\Local\Temp\gdiview.msi
                  MD5

                  7cc103f6fd70c6f3a2d2b9fca0438182

                  SHA1

                  699bd8924a27516b405ea9a686604b53b4e23372

                  SHA256

                  dbd9f2128f0b92b21ef99a1d7a0f93f14ebe475dba436d8b1562677821b918a1

                  SHA512

                  92ec9590e32a0cf810fc5d15ca9d855c86e5b8cb17cf45dd68bcb972bd78692436535adf9f510259d604e0a8ba2e25c6d2616df242261eb7b09a0ca5c6c2c128

                • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                  MD5

                  7fee8223d6e4f82d6cd115a28f0b6d58

                  SHA1

                  1b89c25f25253df23426bd9ff6c9208f1202f58b

                  SHA256

                  a45317c374d54e322153afd73f0e90f1486638d77b7fd85746d091071bbecd59

                  SHA512

                  3ed900b83dd178637c2fd4e8444a899f17f12c4ec92a6f4de4fe544fe8d41b521c69b8f348343cb397d0e160f23e27429042d758b5fa5acac0bab5c3584bace4

                • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                  MD5

                  7fee8223d6e4f82d6cd115a28f0b6d58

                  SHA1

                  1b89c25f25253df23426bd9ff6c9208f1202f58b

                  SHA256

                  a45317c374d54e322153afd73f0e90f1486638d77b7fd85746d091071bbecd59

                  SHA512

                  3ed900b83dd178637c2fd4e8444a899f17f12c4ec92a6f4de4fe544fe8d41b521c69b8f348343cb397d0e160f23e27429042d758b5fa5acac0bab5c3584bace4

                • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                  MD5

                  a6279ec92ff948760ce53bba817d6a77

                  SHA1

                  5345505e12f9e4c6d569a226d50e71b5a572dce2

                  SHA256

                  8b581869bf8944a8e0aa169adea2a4afe47434123da477132880aff6a5032181

                  SHA512

                  213cb374f1273c899e0c88a20c0101a7c28024ce5046a2e0d7898bd182d918288bb80367fea4454c437c057ff9ed4fffd42be48a13ca73653021a6d63e1cfa9c

                • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                  MD5

                  a6279ec92ff948760ce53bba817d6a77

                  SHA1

                  5345505e12f9e4c6d569a226d50e71b5a572dce2

                  SHA256

                  8b581869bf8944a8e0aa169adea2a4afe47434123da477132880aff6a5032181

                  SHA512

                  213cb374f1273c899e0c88a20c0101a7c28024ce5046a2e0d7898bd182d918288bb80367fea4454c437c057ff9ed4fffd42be48a13ca73653021a6d63e1cfa9c

                • C:\Users\Admin\AppData\Roaming\1613225902607.exe
                  MD5

                  ef6f72358cb02551caebe720fbc55f95

                  SHA1

                  b5ee276e8d479c270eceb497606bd44ee09ff4b8

                  SHA256

                  6562bdcbf775e04d8238c2b52a4e8df5afa1e35d1d33d1e4508cfe040676c1e5

                  SHA512

                  ea3f0cf40ed3aa3e43b7a19ed6412027f76f9d2d738e040e6459415aa1e5ef13c29ca830a66430c33e492558f7c5f0cc86e1df9474322f231f8506e49c3a1a90

                • C:\Users\Admin\AppData\Roaming\1613225902607.exe
                  MD5

                  ef6f72358cb02551caebe720fbc55f95

                  SHA1

                  b5ee276e8d479c270eceb497606bd44ee09ff4b8

                  SHA256

                  6562bdcbf775e04d8238c2b52a4e8df5afa1e35d1d33d1e4508cfe040676c1e5

                  SHA512

                  ea3f0cf40ed3aa3e43b7a19ed6412027f76f9d2d738e040e6459415aa1e5ef13c29ca830a66430c33e492558f7c5f0cc86e1df9474322f231f8506e49c3a1a90

                • C:\Users\Admin\AppData\Roaming\1613225902607.txt
                  MD5

                  f3a55ae79aa1a18000ccac4d16761dcd

                  SHA1

                  7e2cf5c2a7147b4b172bd9347bbf45aca6beb0f3

                  SHA256

                  a77561badbf13eef0e2b0d278d81d7847bfa26c8f3765c2fb798ab4187675575

                  SHA512

                  5184cb5cc3278cccf387e7e576587fa33c87d62df1249d20542257443fb36ca67a71f63775c241dcb982542abfcb0918d29edc333addb234b0a46db29fd5c168

                • C:\Users\Admin\AppData\Roaming\1613225907079.exe
                  MD5

                  ef6f72358cb02551caebe720fbc55f95

                  SHA1

                  b5ee276e8d479c270eceb497606bd44ee09ff4b8

                  SHA256

                  6562bdcbf775e04d8238c2b52a4e8df5afa1e35d1d33d1e4508cfe040676c1e5

                  SHA512

                  ea3f0cf40ed3aa3e43b7a19ed6412027f76f9d2d738e040e6459415aa1e5ef13c29ca830a66430c33e492558f7c5f0cc86e1df9474322f231f8506e49c3a1a90

                • C:\Users\Admin\AppData\Roaming\1613225907079.exe
                  MD5

                  ef6f72358cb02551caebe720fbc55f95

                  SHA1

                  b5ee276e8d479c270eceb497606bd44ee09ff4b8

                  SHA256

                  6562bdcbf775e04d8238c2b52a4e8df5afa1e35d1d33d1e4508cfe040676c1e5

                  SHA512

                  ea3f0cf40ed3aa3e43b7a19ed6412027f76f9d2d738e040e6459415aa1e5ef13c29ca830a66430c33e492558f7c5f0cc86e1df9474322f231f8506e49c3a1a90

                • C:\Users\Admin\AppData\Roaming\1613225907079.txt
                  MD5

                  f3a55ae79aa1a18000ccac4d16761dcd

                  SHA1

                  7e2cf5c2a7147b4b172bd9347bbf45aca6beb0f3

                  SHA256

                  a77561badbf13eef0e2b0d278d81d7847bfa26c8f3765c2fb798ab4187675575

                  SHA512

                  5184cb5cc3278cccf387e7e576587fa33c87d62df1249d20542257443fb36ca67a71f63775c241dcb982542abfcb0918d29edc333addb234b0a46db29fd5c168

                • C:\Users\Admin\AppData\Roaming\1613225912796.exe
                  MD5

                  ef6f72358cb02551caebe720fbc55f95

                  SHA1

                  b5ee276e8d479c270eceb497606bd44ee09ff4b8

                  SHA256

                  6562bdcbf775e04d8238c2b52a4e8df5afa1e35d1d33d1e4508cfe040676c1e5

                  SHA512

                  ea3f0cf40ed3aa3e43b7a19ed6412027f76f9d2d738e040e6459415aa1e5ef13c29ca830a66430c33e492558f7c5f0cc86e1df9474322f231f8506e49c3a1a90

                • C:\Users\Admin\AppData\Roaming\1613225912796.exe
                  MD5

                  ef6f72358cb02551caebe720fbc55f95

                  SHA1

                  b5ee276e8d479c270eceb497606bd44ee09ff4b8

                  SHA256

                  6562bdcbf775e04d8238c2b52a4e8df5afa1e35d1d33d1e4508cfe040676c1e5

                  SHA512

                  ea3f0cf40ed3aa3e43b7a19ed6412027f76f9d2d738e040e6459415aa1e5ef13c29ca830a66430c33e492558f7c5f0cc86e1df9474322f231f8506e49c3a1a90

                • C:\Users\Admin\AppData\Roaming\1613225912796.txt
                  MD5

                  f3a55ae79aa1a18000ccac4d16761dcd

                  SHA1

                  7e2cf5c2a7147b4b172bd9347bbf45aca6beb0f3

                  SHA256

                  a77561badbf13eef0e2b0d278d81d7847bfa26c8f3765c2fb798ab4187675575

                  SHA512

                  5184cb5cc3278cccf387e7e576587fa33c87d62df1249d20542257443fb36ca67a71f63775c241dcb982542abfcb0918d29edc333addb234b0a46db29fd5c168

                • C:\Users\Admin\AppData\Roaming\67F2.tmp.exe
                  MD5

                  2d4ecfb8dd9c7b07167aad020b74b181

                  SHA1

                  3127054e14a3c5e27f416afd4e8c77c273e28dfc

                  SHA256

                  5f6b0a26009941606d348df72bf52e433e76495c9fb7633d477c21706e11150f

                  SHA512

                  51969b02df851e0d82b897ed79051da0fdd27553b56f18d93a74529ff8b19e9917aa7e96486c1991d4eca356d63fdae05d5803ae98f98a7894bbcce2176628c6

                • C:\Users\Admin\AppData\Roaming\67F2.tmp.exe
                  MD5

                  2d4ecfb8dd9c7b07167aad020b74b181

                  SHA1

                  3127054e14a3c5e27f416afd4e8c77c273e28dfc

                  SHA256

                  5f6b0a26009941606d348df72bf52e433e76495c9fb7633d477c21706e11150f

                  SHA512

                  51969b02df851e0d82b897ed79051da0fdd27553b56f18d93a74529ff8b19e9917aa7e96486c1991d4eca356d63fdae05d5803ae98f98a7894bbcce2176628c6

                • C:\Users\Admin\AppData\Roaming\67F2.tmp.exe
                  MD5

                  2d4ecfb8dd9c7b07167aad020b74b181

                  SHA1

                  3127054e14a3c5e27f416afd4e8c77c273e28dfc

                  SHA256

                  5f6b0a26009941606d348df72bf52e433e76495c9fb7633d477c21706e11150f

                  SHA512

                  51969b02df851e0d82b897ed79051da0fdd27553b56f18d93a74529ff8b19e9917aa7e96486c1991d4eca356d63fdae05d5803ae98f98a7894bbcce2176628c6

                • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2
                  MD5

                  00ca8697724f9d4ba6249ca1c2245495

                  SHA1

                  ebac63ba450a10f25fbc4f40ddd7d5baa6c9ae55

                  SHA256

                  fd9850c75157ea0200ce25e08d098ff6ea46b0ef8152f6adae3b9f93fac051bf

                  SHA512

                  eb8eaa1473400d2ab5449591bf79aac1f0b869b606ca29e8ea2385de6a2f1b87f6e408f921358ae0ea563f72b3d5bbab54974649c30d0b1dcdbd3faf5c33ca13

                • \??\Volume{0e932f02-0000-0000-0000-500600000000}\System Volume Information\SPP\OnlineMetadataCache\{ed78ba49-1757-4ce1-87d8-b561a31c8c40}_OnDiskSnapshotProp
                  MD5

                  3125bfecbf0d4331f9d0b3412cd32b5f

                  SHA1

                  afda2a27af28dfb25b8979ebccbb85ad532510b4

                  SHA256

                  e4e31711a062d972c31da0874d321f2d895ec8e9871cbfdd6a241ea0dd4d04e5

                  SHA512

                  d95e6187ae991d62f0335ea70234e24cceb0b9dc0ec27cb9477b7c112421c9aa759b511d18a6c3e6db0e816931968e69b3b18845f130b08014014ab9286200fc

                • \Users\Admin\AppData\Local\Temp\MSIED63.tmp
                  MD5

                  84878b1a26f8544bda4e069320ad8e7d

                  SHA1

                  51c6ee244f5f2fa35b563bffb91e37da848a759c

                  SHA256

                  809aab5eace34dfbfb2b3d45462d42b34fcb95b415201d0d625414b56e437444

                  SHA512

                  4742b84826961f590e0a2d6cc85a60b59ca4d300c58be5d0c33eb2315cefaf5627ae5ed908233ad51e188ce53ca861cf5cf8c1aa2620dc2667f83f98e627b549

                • memory/668-6-0x0000000000000000-mapping.dmp
                • memory/732-12-0x0000000000000000-mapping.dmp
                • memory/768-204-0x00000000001C0000-0x00000000001CA000-memory.dmp
                  Filesize

                  40KB

                • memory/768-205-0x0000000000400000-0x000000000040A000-memory.dmp
                  Filesize

                  40KB

                • memory/768-201-0x00000000725A0000-0x0000000072633000-memory.dmp
                  Filesize

                  588KB

                • memory/768-203-0x0000000000030000-0x000000000003A000-memory.dmp
                  Filesize

                  40KB

                • memory/768-202-0x0000000004FD0000-0x0000000004FD1000-memory.dmp
                  Filesize

                  4KB

                • memory/768-200-0x0000000000000000-mapping.dmp
                • memory/856-15-0x0000000000000000-mapping.dmp
                • memory/1092-49-0x00000000725A0000-0x0000000072633000-memory.dmp
                  Filesize

                  588KB

                • memory/1092-44-0x0000000000000000-mapping.dmp
                • memory/1092-58-0x0000000002F50000-0x00000000033FF000-memory.dmp
                  Filesize

                  4.7MB

                • memory/1188-33-0x0000000010000000-0x000000001033D000-memory.dmp
                  Filesize

                  3.2MB

                • memory/1188-23-0x0000000000000000-mapping.dmp
                • memory/1188-26-0x00000000725A0000-0x0000000072633000-memory.dmp
                  Filesize

                  588KB

                • memory/1224-178-0x00000000725A0000-0x0000000072633000-memory.dmp
                  Filesize

                  588KB

                • memory/1224-175-0x0000000000000000-mapping.dmp
                • memory/1324-71-0x0000000000000000-mapping.dmp
                • memory/1352-27-0x0000000000000000-mapping.dmp
                • memory/1628-50-0x0000000000000000-mapping.dmp
                • memory/1700-43-0x0000000000000000-mapping.dmp
                • memory/1700-57-0x0000000003750000-0x0000000003BFF000-memory.dmp
                  Filesize

                  4.7MB

                • memory/1700-47-0x00000000725A0000-0x0000000072633000-memory.dmp
                  Filesize

                  588KB

                • memory/2116-198-0x0000000000000000-mapping.dmp
                • memory/2292-51-0x0000000000000000-mapping.dmp
                • memory/2296-28-0x0000000000400000-0x0000000000983000-memory.dmp
                  Filesize

                  5.5MB

                • memory/2296-32-0x0000000000400000-0x0000000000983000-memory.dmp
                  Filesize

                  5.5MB

                • memory/2296-29-0x000000000066C0BC-mapping.dmp
                • memory/2756-111-0x0000000000000000-mapping.dmp
                • memory/2760-22-0x0000000000000000-mapping.dmp
                • memory/2868-219-0x0000000000890000-0x00000000008A6000-memory.dmp
                  Filesize

                  88KB

                • memory/2868-225-0x00000000008C0000-0x00000000008D6000-memory.dmp
                  Filesize

                  88KB

                • memory/2868-213-0x0000000000660000-0x0000000000676000-memory.dmp
                  Filesize

                  88KB

                • memory/2868-208-0x00000000056E0000-0x00000000056F6000-memory.dmp
                  Filesize

                  88KB

                • memory/3084-9-0x0000000000000000-mapping.dmp
                • memory/3280-34-0x0000000000000000-mapping.dmp
                • memory/3300-4-0x0000000000000000-mapping.dmp
                • memory/3696-36-0x0000000000000000-mapping.dmp
                • memory/4004-42-0x0000000000FE0000-0x0000000000FFB000-memory.dmp
                  Filesize

                  108KB

                • memory/4004-18-0x0000000000000000-mapping.dmp
                • memory/4004-31-0x00000000032C0000-0x000000000345C000-memory.dmp
                  Filesize

                  1.6MB

                • memory/4004-41-0x0000000000FF0000-0x0000000000FF1000-memory.dmp
                  Filesize

                  4KB

                • memory/4004-40-0x0000000003C90000-0x0000000003D7F000-memory.dmp
                  Filesize

                  956KB

                • memory/4088-179-0x0000000000000000-mapping.dmp
                • memory/4124-56-0x0000000000000000-mapping.dmp
                • memory/4180-100-0x0000000000000000-mapping.dmp
                • memory/4180-104-0x0000000000A00000-0x0000000000A01000-memory.dmp
                  Filesize

                  4KB

                • memory/4180-108-0x0000000000570000-0x00000000005B5000-memory.dmp
                  Filesize

                  276KB

                • memory/4240-69-0x00000000725A0000-0x0000000072633000-memory.dmp
                  Filesize

                  588KB

                • memory/4240-66-0x0000000000000000-mapping.dmp
                • memory/4244-110-0x0000000000000000-mapping.dmp
                • memory/4284-72-0x0000000000000000-mapping.dmp
                • memory/4308-186-0x00000000725A0000-0x0000000072633000-memory.dmp
                  Filesize

                  588KB

                • memory/4308-184-0x0000000000000000-mapping.dmp
                • memory/4312-80-0x0000018C6A810000-0x0000018C6A811000-memory.dmp
                  Filesize

                  4KB

                • memory/4312-73-0x00007FF601AE8270-mapping.dmp
                • memory/4312-74-0x00007FF95ABF0000-0x00007FF95AC6E000-memory.dmp
                  Filesize

                  504KB

                • memory/4316-114-0x0000000000000000-mapping.dmp
                • memory/4324-79-0x00000000725A0000-0x0000000072633000-memory.dmp
                  Filesize

                  588KB

                • memory/4324-75-0x0000000000000000-mapping.dmp
                • memory/4356-207-0x0000000000000000-mapping.dmp
                • memory/4364-121-0x0000000000F20000-0x0000000000F21000-memory.dmp
                  Filesize

                  4KB

                • memory/4364-115-0x0000000000000000-mapping.dmp
                • memory/4364-130-0x0000000000F30000-0x0000000000F32000-memory.dmp
                  Filesize

                  8KB

                • memory/4364-118-0x00007FF942950000-0x00007FF94333C000-memory.dmp
                  Filesize

                  9.9MB

                • memory/4364-119-0x0000000000910000-0x0000000000911000-memory.dmp
                  Filesize

                  4KB

                • memory/4364-122-0x0000000000F40000-0x0000000000F5E000-memory.dmp
                  Filesize

                  120KB

                • memory/4364-123-0x0000000000F60000-0x0000000000F61000-memory.dmp
                  Filesize

                  4KB

                • memory/4380-84-0x00007FF95ABF0000-0x00007FF95AC6E000-memory.dmp
                  Filesize

                  504KB

                • memory/4380-89-0x000001A31BDC0000-0x000001A31BDC1000-memory.dmp
                  Filesize

                  4KB

                • memory/4380-82-0x00007FF601AE8270-mapping.dmp
                • memory/4384-124-0x0000000000000000-mapping.dmp
                • memory/4384-135-0x00000000003E0000-0x00000000003E1000-memory.dmp
                  Filesize

                  4KB

                • memory/4384-131-0x0000000070650000-0x0000000070D3E000-memory.dmp
                  Filesize

                  6.9MB

                • memory/4388-142-0x0000000008300000-0x0000000008301000-memory.dmp
                  Filesize

                  4KB

                • memory/4388-132-0x0000000070650000-0x0000000070D3E000-memory.dmp
                  Filesize

                  6.9MB

                • memory/4388-141-0x0000000001660000-0x000000000166B000-memory.dmp
                  Filesize

                  44KB

                • memory/4388-139-0x00000000014D0000-0x00000000014D1000-memory.dmp
                  Filesize

                  4KB

                • memory/4388-127-0x0000000000000000-mapping.dmp
                • memory/4388-136-0x0000000000EC0000-0x0000000000EC1000-memory.dmp
                  Filesize

                  4KB

                • memory/4388-145-0x0000000007EE0000-0x0000000007EE1000-memory.dmp
                  Filesize

                  4KB

                • memory/4392-83-0x0000000000000000-mapping.dmp
                • memory/4392-88-0x00000000725A0000-0x0000000072633000-memory.dmp
                  Filesize

                  588KB

                • memory/4508-206-0x0000000000000000-mapping.dmp
                • memory/4560-91-0x0000000000000000-mapping.dmp
                • memory/4568-148-0x0000000005D40000-0x0000000005D41000-memory.dmp
                  Filesize

                  4KB

                • memory/4568-182-0x00000000070E0000-0x00000000070E1000-memory.dmp
                  Filesize

                  4KB

                • memory/4568-167-0x0000000005DE0000-0x0000000005DE1000-memory.dmp
                  Filesize

                  4KB

                • memory/4568-146-0x0000000000C40000-0x0000000000C41000-memory.dmp
                  Filesize

                  4KB

                • memory/4568-168-0x0000000005E60000-0x0000000005E61000-memory.dmp
                  Filesize

                  4KB

                • memory/4568-144-0x0000000070650000-0x0000000070D3E000-memory.dmp
                  Filesize

                  6.9MB

                • memory/4568-171-0x0000000005E70000-0x0000000005E71000-memory.dmp
                  Filesize

                  4KB

                • memory/4568-133-0x0000000000000000-mapping.dmp
                • memory/4568-173-0x0000000005EB0000-0x0000000005EB1000-memory.dmp
                  Filesize

                  4KB

                • memory/4568-174-0x0000000006040000-0x0000000006041000-memory.dmp
                  Filesize

                  4KB

                • memory/4568-190-0x0000000007EB0000-0x0000000007EB1000-memory.dmp
                  Filesize

                  4KB

                • memory/4568-189-0x0000000007780000-0x0000000007781000-memory.dmp
                  Filesize

                  4KB

                • memory/4568-187-0x0000000007350000-0x0000000007351000-memory.dmp
                  Filesize

                  4KB

                • memory/4568-166-0x0000000006480000-0x0000000006481000-memory.dmp
                  Filesize

                  4KB

                • memory/4568-159-0x0000000003A10000-0x0000000003A11000-memory.dmp
                  Filesize

                  4KB

                • memory/4568-154-0x0000000077294000-0x0000000077295000-memory.dmp
                  Filesize

                  4KB

                • memory/4568-183-0x00000000077E0000-0x00000000077E1000-memory.dmp
                  Filesize

                  4KB

                • memory/4620-199-0x00000000725A0000-0x0000000072633000-memory.dmp
                  Filesize

                  588KB

                • memory/4620-197-0x0000000000000000-mapping.dmp
                • memory/4628-140-0x0000000004520000-0x0000000004521000-memory.dmp
                  Filesize

                  4KB

                • memory/4740-97-0x0000000000D30000-0x0000000000D3D000-memory.dmp
                  Filesize

                  52KB

                • memory/4740-94-0x0000000000000000-mapping.dmp
                • memory/4740-103-0x0000000000400000-0x000000000044C000-memory.dmp
                  Filesize

                  304KB

                • memory/4796-169-0x0000000004930000-0x0000000004931000-memory.dmp
                  Filesize

                  4KB

                • memory/4796-170-0x0000000007DF0000-0x0000000007DF1000-memory.dmp
                  Filesize

                  4KB

                • memory/4796-149-0x0000000000000000-mapping.dmp
                • memory/4796-153-0x0000000070650000-0x0000000070D3E000-memory.dmp
                  Filesize

                  6.9MB

                • memory/4804-151-0x0000000000000000-mapping.dmp
                • memory/4812-163-0x0000000000000000-mapping.dmp
                • memory/4912-65-0x000002919B7A0000-0x000002919B7A1000-memory.dmp
                  Filesize

                  4KB

                • memory/4912-61-0x0000000010000000-0x0000000010057000-memory.dmp
                  Filesize

                  348KB

                • memory/4912-60-0x00007FF95ABF0000-0x00007FF95AC6E000-memory.dmp
                  Filesize

                  504KB

                • memory/4912-59-0x00007FF601AE8270-mapping.dmp
                • memory/4976-63-0x0000000004940000-0x0000000004941000-memory.dmp
                  Filesize

                  4KB

                • memory/4984-62-0x0000000000000000-mapping.dmp
                • memory/4988-192-0x00000000725A0000-0x0000000072633000-memory.dmp
                  Filesize

                  588KB

                • memory/4988-195-0x0000000000401000-0x000000000040C000-memory.dmp
                  Filesize

                  44KB

                • memory/4988-191-0x0000000000000000-mapping.dmp
                • memory/5036-193-0x0000000000000000-mapping.dmp
                • memory/5036-194-0x00000000725A0000-0x0000000072633000-memory.dmp
                  Filesize

                  588KB

                • memory/5036-196-0x00000000001E0000-0x00000000001E1000-memory.dmp
                  Filesize

                  4KB

                • memory/5048-64-0x0000000000000000-mapping.dmp
                • memory/5100-105-0x0000000000400000-0x0000000000448000-memory.dmp
                  Filesize

                  288KB

                • memory/5100-106-0x0000000000401480-mapping.dmp
                • memory/5100-109-0x0000000000400000-0x0000000000448000-memory.dmp
                  Filesize

                  288KB

                • memory/5364-209-0x00000000050F0000-0x00000000050F1000-memory.dmp
                  Filesize

                  4KB

                • memory/5660-214-0x0000000000000000-mapping.dmp
                • memory/5680-215-0x0000000005060000-0x0000000005061000-memory.dmp
                  Filesize

                  4KB

                • memory/5756-220-0x0000000000000000-mapping.dmp
                • memory/5784-221-0x0000000005070000-0x0000000005071000-memory.dmp
                  Filesize

                  4KB