Analysis

  • max time kernel
    567s
  • max time network
    570s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    10-03-2021 15:03

General

  • Target

    https://goo-gl.ru/ptHYa

  • Sample

    210310-lga9r7qtf6

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 4 IoCs
  • Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 2 IoCs

    Detects file using ACProtect software.

  • Blocklisted process makes network request 7 IoCs
  • Drops file in Drivers directory 3 IoCs
  • Executes dropped EXE 18 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 43 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 17 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 26 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 54 IoCs
  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 2 IoCs
  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 59 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 7 IoCs
  • Modifies system certificate store 2 TTPs 18 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://goo-gl.ru/ptHYa
    1⤵
    • Modifies Internet Explorer Phishing Filter
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4640
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4640 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:5020
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4640 CREDAT:148483 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1392
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:4292
    • C:\Users\Admin\AppData\Local\Temp\Temp1_sigma_519113452.zip\sigma_519113452.exe
      "C:\Users\Admin\AppData\Local\Temp\Temp1_sigma_519113452.zip\sigma_519113452.exe"
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:4356
      • C:\Users\Admin\AppData\Local\Temp\is-N5NQ7.tmp\sigma_519113452.tmp
        "C:\Users\Admin\AppData\Local\Temp\is-N5NQ7.tmp\sigma_519113452.tmp" /SL5="$30302,2818535,119296,C:\Users\Admin\AppData\Local\Temp\Temp1_sigma_519113452.zip\sigma_519113452.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:4480
        • C:\Program Files (x86)\Rem\inventore\Architecto.exe
          "C:\Program Files (x86)\Rem/\inventore\Architecto.exe" 536e20add075c9d78ad2c1422a6f9ec4
          3⤵
          • Executes dropped EXE
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2312
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 840
            4⤵
            • Program crash
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2908
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 816
            4⤵
            • Program crash
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3160
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 888
            4⤵
            • Program crash
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3864
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 980
            4⤵
            • Program crash
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2864
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 1020
            4⤵
            • Program crash
            • Suspicious use of AdjustPrivilegeToken
            PID:4592
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 960
            4⤵
            • Program crash
            • Suspicious use of AdjustPrivilegeToken
            PID:2476
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 1052
            4⤵
            • Program crash
            • Suspicious use of AdjustPrivilegeToken
            PID:4320
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 1076
            4⤵
            • Program crash
            • Suspicious use of AdjustPrivilegeToken
            PID:1568
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 1128
            4⤵
            • Program crash
            • Suspicious use of AdjustPrivilegeToken
            PID:2184
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 1156
            4⤵
            • Program crash
            • Suspicious use of AdjustPrivilegeToken
            PID:3720
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 996
            4⤵
            • Program crash
            • Suspicious use of AdjustPrivilegeToken
            PID:1520
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 1528
            4⤵
            • Program crash
            • Suspicious use of AdjustPrivilegeToken
            PID:3136
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 1504
            4⤵
            • Program crash
            • Suspicious use of AdjustPrivilegeToken
            PID:4456
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 1608
            4⤵
            • Program crash
            • Suspicious use of AdjustPrivilegeToken
            PID:4920
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 1596
            4⤵
            • Program crash
            • Suspicious use of AdjustPrivilegeToken
            PID:4824
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 1504
            4⤵
            • Program crash
            • Suspicious use of AdjustPrivilegeToken
            PID:3972
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 948
            4⤵
            • Program crash
            • Suspicious use of AdjustPrivilegeToken
            PID:440
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 1756
            4⤵
            • Program crash
            • Suspicious use of AdjustPrivilegeToken
            PID:4148
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 1588
            4⤵
            • Program crash
            • Suspicious use of AdjustPrivilegeToken
            PID:1016
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 1760
            4⤵
            • Program crash
            • Suspicious use of AdjustPrivilegeToken
            PID:1008
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 1812
            4⤵
            • Program crash
            • Suspicious use of AdjustPrivilegeToken
            PID:828
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 1832
            4⤵
            • Program crash
            • Suspicious use of AdjustPrivilegeToken
            PID:376
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 1868
            4⤵
            • Program crash
            • Suspicious use of AdjustPrivilegeToken
            PID:4780
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 1728
            4⤵
            • Program crash
            • Suspicious use of AdjustPrivilegeToken
            PID:2188
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 1900
            4⤵
            • Program crash
            • Suspicious use of AdjustPrivilegeToken
            PID:2144
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 1980
            4⤵
            • Program crash
            • Suspicious use of AdjustPrivilegeToken
            PID:4860
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 1976
            4⤵
            • Program crash
            • Suspicious use of AdjustPrivilegeToken
            PID:1152
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 1936
            4⤵
            • Program crash
            • Suspicious use of AdjustPrivilegeToken
            PID:3464
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 1888
            4⤵
            • Program crash
            • Suspicious use of AdjustPrivilegeToken
            PID:4112
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 1940
            4⤵
            • Program crash
            • Suspicious use of AdjustPrivilegeToken
            PID:1248
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 1916
            4⤵
            • Program crash
            • Suspicious use of AdjustPrivilegeToken
            PID:4828
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 1920
            4⤵
            • Program crash
            • Suspicious use of AdjustPrivilegeToken
            PID:4732
          • C:\Users\Admin\AppData\Local\Temp\BTPHi3h8\H7TmAucOwDdlT4JLMW.exe
            C:\Users\Admin\AppData\Local\Temp\BTPHi3h8\H7TmAucOwDdlT4JLMW.exe /VERYSILENT
            4⤵
            • Executes dropped EXE
            • Modifies system certificate store
            • Suspicious use of WriteProcessMemory
            PID:4808
            • C:\Users\Admin\AppData\Local\Temp\1499884026.exe
              C:\Users\Admin\AppData\Local\Temp\1499884026.exe
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:4404
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                6⤵
                  PID:4532
              • C:\Users\Admin\AppData\Local\Temp\749307645.exe
                C:\Users\Admin\AppData\Local\Temp\749307645.exe
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:3976
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                  6⤵
                    PID:4088
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\system32\cmd.exe" /k ping 0 & del C:\Users\Admin\AppData\Local\Temp\BTPHi3h8\H7TmAucOwDdlT4JLMW.exe & exit
                  5⤵
                    PID:4560
                    • C:\Windows\SysWOW64\PING.EXE
                      ping 0
                      6⤵
                      • Runs ping.exe
                      PID:3968
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 1816
                  4⤵
                  • Program crash
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4296
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 1760
                  4⤵
                  • Program crash
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4080
                • C:\Users\Admin\AppData\Local\Temp\84m3tzia\vpn.exe
                  C:\Users\Admin\AppData\Local\Temp\84m3tzia\vpn.exe /silent /subid=510x536e20add075c9d78ad2c1422a6f9ec4
                  4⤵
                  • Executes dropped EXE
                  • Suspicious use of WriteProcessMemory
                  PID:3944
                  • C:\Users\Admin\AppData\Local\Temp\is-GAUV3.tmp\vpn.tmp
                    "C:\Users\Admin\AppData\Local\Temp\is-GAUV3.tmp\vpn.tmp" /SL5="$10440,15170975,270336,C:\Users\Admin\AppData\Local\Temp\84m3tzia\vpn.exe" /silent /subid=510x536e20add075c9d78ad2c1422a6f9ec4
                    5⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Drops file in Program Files directory
                    • Modifies registry class
                    • Modifies system certificate store
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of WriteProcessMemory
                    PID:2920
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\uninstall.bat" "
                      6⤵
                      • Suspicious use of WriteProcessMemory
                      PID:4752
                      • C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exe
                        tapinstall.exe remove tap0901
                        7⤵
                        • Executes dropped EXE
                        • Checks SCSI registry key(s)
                        PID:1176
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\install.bat" "
                      6⤵
                      • Suspicious use of WriteProcessMemory
                      PID:4812
                      • C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exe
                        tapinstall.exe install OemVista.inf tap0901
                        7⤵
                        • Executes dropped EXE
                        • Drops file in System32 directory
                        • Drops file in Windows directory
                        • Checks SCSI registry key(s)
                        • Modifies system certificate store
                        PID:2176
                    • C:\Program Files (x86)\MaskVPN\mask_svc.exe
                      "C:\Program Files (x86)\MaskVPN\mask_svc.exe" uninstall
                      6⤵
                      • Executes dropped EXE
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      PID:2108
                    • C:\Program Files (x86)\MaskVPN\mask_svc.exe
                      "C:\Program Files (x86)\MaskVPN\mask_svc.exe" install
                      6⤵
                      • Executes dropped EXE
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      PID:4956
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 1524
                  4⤵
                  • Program crash
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2984
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 1872
                  4⤵
                  • Program crash
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4620
                • C:\Users\Admin\AppData\Local\Temp\zk0wuKZM\9HHytXbBNDOTS5.exe
                  C:\Users\Admin\AppData\Local\Temp\zk0wuKZM\9HHytXbBNDOTS5.exe /usthree SUB=536e20add075c9d78ad2c1422a6f9ec4
                  4⤵
                  • Executes dropped EXE
                  PID:4604
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 4604 -s 652
                    5⤵
                    • Program crash
                    PID:4084
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 4604 -s 700
                    5⤵
                    • Program crash
                    PID:4984
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 4604 -s 768
                    5⤵
                    • Program crash
                    PID:4568
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 4604 -s 812
                    5⤵
                    • Drops file in System32 directory
                    • Drops file in Windows directory
                    • Program crash
                    • Checks SCSI registry key(s)
                    • Modifies data under HKEY_USERS
                    PID:4788
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 4604 -s 900
                    5⤵
                    • Program crash
                    PID:3676
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 4604 -s 932
                    5⤵
                    • Program crash
                    PID:2024
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 4604 -s 1136
                    5⤵
                    • Suspicious use of NtCreateProcessExOtherParentProcess
                    • Program crash
                    PID:1396
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 1732
                  4⤵
                  • Program crash
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4448
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 1872
                  4⤵
                  • Program crash
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1564
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 1596
                  4⤵
                  • Program crash
                  • Suspicious use of AdjustPrivilegeToken
                  PID:5036
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 1576
                  4⤵
                  • Program crash
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3304
                • C:\Users\Admin\AppData\Local\Temp\cqJ8vRss\7EoQL20.exe
                  C:\Users\Admin\AppData\Local\Temp\cqJ8vRss\7EoQL20.exe /quiet SILENT=1 AF=721__536e20add075c9d78ad2c1422a6f9ec4
                  4⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Enumerates connected drives
                  • Modifies system certificate store
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of FindShellTrayWindow
                  PID:3140
                  • C:\Windows\SysWOW64\msiexec.exe
                    "C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Weather\Weather 1.0.0\install\FD7DF1F\Weather Installation.msi" /quiet SILENT=1 AF=721__536e20add075c9d78ad2c1422a6f9ec4 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\cqJ8vRss\7EoQL20.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\cqJ8vRss\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1615129142 /quiet SILENT=1 AF=721__536e20add075c9d78ad2c1422a6f9ec4 " AF="721__536e20add075c9d78ad2c1422a6f9ec4" AI_CONTROL_VISUAL_STYLE="16578540;16578540;14988840;12422912"
                    5⤵
                      PID:4680
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 1828
                    4⤵
                    • Program crash
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4708
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 1864
                    4⤵
                    • Program crash
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1596
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 1876
                    4⤵
                    • Program crash
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2192
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 2016
                    4⤵
                    • Program crash
                    PID:2856
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 1908
                    4⤵
                    • Program crash
                    PID:1572
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 1980
                    4⤵
                    • Program crash
                    PID:3932
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 472
                    4⤵
                    • Program crash
                    PID:4056
            • C:\Windows\system32\msiexec.exe
              C:\Windows\system32\msiexec.exe /V
              1⤵
              • Enumerates connected drives
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:4700
              • C:\Windows\syswow64\MsiExec.exe
                C:\Windows\syswow64\MsiExec.exe -Embedding 1D6C028C202F15A57388029E5E2E1885 C
                2⤵
                • Loads dropped DLL
                PID:4516
              • C:\Windows\syswow64\MsiExec.exe
                C:\Windows\syswow64\MsiExec.exe -Embedding 21AB7C40A379A4619DD4C29C1F70417B
                2⤵
                • Blocklisted process makes network request
                • Loads dropped DLL
                PID:2200
              • C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\aipackagechainer.exe
                "C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\aipackagechainer.exe"
                2⤵
                • Executes dropped EXE
                • Adds Run key to start application
                • Drops file in Windows directory
                PID:2132
                • C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\RequiredApplication_1\Weather_Installation.exe
                  "C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\RequiredApplication_1\Weather_Installation.exe" -silent=1 -AF=721__536e20add075c9d78ad2c1422a6f9ec4 -BF=default -uncf=default
                  3⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Adds Run key to start application
                  PID:4832
                  • C:\Users\Admin\AppData\Roaming\Weather\Weather.exe
                    "C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" "--anbfs"
                    4⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    PID:4616
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\EXE1DDF.bat" "
                  3⤵
                    PID:228
                    • C:\Windows\SysWOW64\attrib.exe
                      C:\Windows\System32\attrib.exe -r "C:\Users\Admin\AppData\Roaming\Weather\Weather\PREREQ~1\AIPACK~1.EXE"
                      4⤵
                      • Views/modifies file attributes
                      PID:4396
                    • C:\Windows\SysWOW64\timeout.exe
                      C:\Windows\System32\timeout.exe 5
                      4⤵
                      • Delays execution with timeout.exe
                      PID:1720
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\EXE1E1F.bat" "
                    3⤵
                      PID:4720
                      • C:\Windows\SysWOW64\attrib.exe
                        C:\Windows\System32\attrib.exe -r "C:\Users\Admin\AppData\Roaming\Weather\Weather\PREREQ~1"
                        4⤵
                        • Views/modifies file attributes
                        PID:4892
                      • C:\Windows\SysWOW64\timeout.exe
                        C:\Windows\System32\timeout.exe 5
                        4⤵
                        • Delays execution with timeout.exe
                        PID:1636
                • \??\c:\windows\system32\svchost.exe
                  c:\windows\system32\svchost.exe -k dcomlaunch -s DeviceInstall
                  1⤵
                  • Drops file in Windows directory
                  • Checks SCSI registry key(s)
                  PID:4608
                  • C:\Windows\system32\DrvInst.exe
                    DrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{744d9ad1-5661-074e-856d-72594e507661}\oemvista.inf" "9" "4d14a44ff" "0000000000000178" "WinSta0\Default" "000000000000017C" "208" "c:\program files (x86)\maskvpn\driver\win764"
                    2⤵
                      PID:4788
                    • C:\Windows\system32\DrvInst.exe
                      DrvInst.exe "2" "211" "ROOT\NET\0000" "C:\Windows\INF\oem2.inf" "oemvista.inf:3beb73aff103cc24:tap0901.ndi:9.0.0.21:tap0901," "4d14a44ff" "0000000000000178"
                      2⤵
                      • Drops file in Drivers directory
                      • Drops file in System32 directory
                      • Drops file in Windows directory
                      • Checks SCSI registry key(s)
                      PID:3004
                  • \??\c:\windows\system32\svchost.exe
                    c:\windows\system32\svchost.exe -k netsvcs -s NetSetupSvc
                    1⤵
                      PID:2140
                    • \??\c:\windows\system32\svchost.exe
                      c:\windows\system32\svchost.exe -k netsvcs -s DsmSvc
                      1⤵
                      • Checks SCSI registry key(s)
                      PID:1412
                    • C:\Program Files (x86)\MaskVPN\mask_svc.exe
                      "C:\Program Files (x86)\MaskVPN\mask_svc.exe"
                      1⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • Modifies data under HKEY_USERS
                      PID:5092
                    • C:\Users\Admin\Documents\setup.exe
                      "C:\Users\Admin\Documents\setup.exe"
                      1⤵
                      • Executes dropped EXE
                      • Writes to the Master Boot Record (MBR)
                      • Suspicious use of SetWindowsHookEx
                      PID:2804

                    Network

                    MITRE ATT&CK Matrix ATT&CK v6

                    Persistence

                    Registry Run Keys / Startup Folder

                    1
                    T1060

                    Bootkit

                    1
                    T1067

                    Hidden Files and Directories

                    1
                    T1158

                    Defense Evasion

                    Modify Registry

                    4
                    T1112

                    Install Root Certificate

                    1
                    T1130

                    Hidden Files and Directories

                    1
                    T1158

                    Discovery

                    Query Registry

                    3
                    T1012

                    Peripheral Device Discovery

                    2
                    T1120

                    System Information Discovery

                    3
                    T1082

                    Remote System Discovery

                    1
                    T1018

                    Command and Control

                    Web Service

                    1
                    T1102

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Program Files (x86)\MaskVPN\driver\win764\OemVista.inf
                      MD5

                      87868193626dc756d10885f46d76f42e

                      SHA1

                      94a5ce8ed7633ed77531b6cb14ceb1927c5cae1f

                      SHA256

                      b5728e42ea12c67577cb9188b472005ee74399b6ac976e7f72b48409baee3b41

                      SHA512

                      79751330bed5c16d66baf3e5212be0950f312ffd5b80b78be66eaea3cc7115f8a9472d2a43b5ce702aa044f3b45fd572775ff86572150df91cc27866f88f8277

                    • C:\Program Files (x86)\MaskVPN\driver\win764\install.bat
                      MD5

                      3a05ce392d84463b43858e26c48f9cbf

                      SHA1

                      78f624e2c81c3d745a45477d61749b8452c129f1

                      SHA256

                      5b56d8b121fc9a7f2d4e90edb1b29373cd2d06bac1c54ada8f6cb559b411180b

                      SHA512

                      8a31fda09f0fa7779c4fb0c0629d4d446957c8aaae0595759dd2b434e84a17ecb6ffe4beff973a245caf0452a0c04a488d2ae7b232d8559f3bd1bfd68fed7cf1

                    • C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exe
                      MD5

                      d10f74d86cd350732657f542df533f82

                      SHA1

                      c54074f8f162a780819175e7169c43f6706ad46c

                      SHA256

                      c9963a3f8abf6fedc8f983a9655a387d67c752bd59b0d16fd6fc2396b4b4ca67

                      SHA512

                      0d7cb060e4a9482d4862ff47c9d6f52a060c4fb4e3b8388769fa2974ccf081af6bea7b1d4325c03d128bc4de6e0525d6e9bf3a42564391f2acd980435a0dd87e

                    • C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exe
                      MD5

                      d10f74d86cd350732657f542df533f82

                      SHA1

                      c54074f8f162a780819175e7169c43f6706ad46c

                      SHA256

                      c9963a3f8abf6fedc8f983a9655a387d67c752bd59b0d16fd6fc2396b4b4ca67

                      SHA512

                      0d7cb060e4a9482d4862ff47c9d6f52a060c4fb4e3b8388769fa2974ccf081af6bea7b1d4325c03d128bc4de6e0525d6e9bf3a42564391f2acd980435a0dd87e

                    • C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exe
                      MD5

                      d10f74d86cd350732657f542df533f82

                      SHA1

                      c54074f8f162a780819175e7169c43f6706ad46c

                      SHA256

                      c9963a3f8abf6fedc8f983a9655a387d67c752bd59b0d16fd6fc2396b4b4ca67

                      SHA512

                      0d7cb060e4a9482d4862ff47c9d6f52a060c4fb4e3b8388769fa2974ccf081af6bea7b1d4325c03d128bc4de6e0525d6e9bf3a42564391f2acd980435a0dd87e

                    • C:\Program Files (x86)\MaskVPN\driver\win764\uninstall.bat
                      MD5

                      9133a44bfd841b8849bddead9957c2c3

                      SHA1

                      3c1d92aa3f6247a2e7ceeaf0b811cf584ae87591

                      SHA256

                      b8109f63a788470925ea267f1b6032bba281b1ac3afdf0c56412cb753df58392

                      SHA512

                      d7f5f99325b9c77939735df3a61097a24613f85e7acc2d84875f78f60b0b70e3504f34d9fff222c593e1daadd9db71080a23b588fe7009ce93b5a4cbe9785545

                    • C:\Program Files (x86)\Rem\inventore\Architecto.exe
                      MD5

                      abec295c82ec5f11f2179b67eb370d5e

                      SHA1

                      b21a71fef02a242b9e0f5e7ed3408082d54bed26

                      SHA256

                      46cd8b69e61c8a13df0dccac98410be9de61335fb14b0fb77c632e90948a037e

                      SHA512

                      ad8c5da603c86d4280fa4d4fe6a3007a703d3c0ef34873d5d6c412a7620af10a59b66b5d1a38b7be33fdd60b6430b3fc4052f24b80c8cf56f5ea25210855596f

                    • C:\Program Files (x86)\Rem\inventore\Architecto.exe
                      MD5

                      abec295c82ec5f11f2179b67eb370d5e

                      SHA1

                      b21a71fef02a242b9e0f5e7ed3408082d54bed26

                      SHA256

                      46cd8b69e61c8a13df0dccac98410be9de61335fb14b0fb77c632e90948a037e

                      SHA512

                      ad8c5da603c86d4280fa4d4fe6a3007a703d3c0ef34873d5d6c412a7620af10a59b66b5d1a38b7be33fdd60b6430b3fc4052f24b80c8cf56f5ea25210855596f

                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\644B8874112055B5E195ECB0E8F243A4
                      MD5

                      50d07e64e3238da3764e519781a4c457

                      SHA1

                      df7812d8516572253185a1a09440450a7719ec1d

                      SHA256

                      2d6e623cbde0b5632db298f854119721d4974159da4125481674bfb41c61688e

                      SHA512

                      7628988e2822282b47c3796238bd87aac5b73e596fa4b5bfa57746890bc2cddc0e0fb445ddc27b1431c029bcd5d1787f64adb7f777583e7d097a8095832ceb48

                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27
                      MD5

                      4cee81433c0ffbcf97c3b9949360053a

                      SHA1

                      837f1b54d8f0563bfebfc41b043ed282d06db277

                      SHA256

                      0dc7dcd4eddde284122c5cbb8ed5aaa5b34d6b35a90c0dc2fa5e72ecc7f6485e

                      SHA512

                      02337634b958f9855fcf2be26225ee1a1538dd951d4539853b3663d5a784526c3c3a98417053216cf31e85a8e95bcd388696ac1f4ac39c275dc0f4a493ca9c72

                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
                      MD5

                      9c364bf8a0f6e43c4b8f6ba17ba53580

                      SHA1

                      9a4d3a93a1f0620fea084bbc2ccfd6134a43f9e2

                      SHA256

                      235804fea5a88c3350ed1cd4857c2950ac6e1b7586e6a23c130c0a06d2ac3f6a

                      SHA512

                      10f849127482f85d86e6b7a37e37ae5dd2110f1440aa47373d4feb34375c7a7df74b236f5bcf43bb454edf986203d032f79aabb20612079c52bd83c15551983e

                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F9C8BE050DD03D62E7AB35100A7DC1EF
                      MD5

                      137c9ffb2389a629e3b027e2389fb949

                      SHA1

                      df7e95f365b6be2ba4183300b4fb7d809c019ec6

                      SHA256

                      acb9295369223900cf3c85e1a1f80e3b77e7daf8703b09d35adcbaef14895a7a

                      SHA512

                      346ebc491e1a3ab4c6982b8617697af86680480faeb10425345143e2324cdd508e8413a9b6a0459b6d276158c270e4188e6dbcf243c726aecb694eae8836690e

                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\644B8874112055B5E195ECB0E8F243A4
                      MD5

                      4b969f499a279886cb30cf5125c95044

                      SHA1

                      3ceeb84e3554fab1e4651ceebc24aeb4fc366ee5

                      SHA256

                      ad6ff1fdb5362d8b2ae6c6e3e807b562770e1bd5f0dc5aea6c71f850e0c00024

                      SHA512

                      c6d0ef2202f39158fc1104132cfc65ea872706d2875e3d9eae2baa2479edb4cc5a1db69d9a04cfb5dbbc486f9e588fb9093b6ad28d14c3317f2aea99c9b4ada4

                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27
                      MD5

                      d5351d1e84392c8b669589f810b5ff67

                      SHA1

                      3e5f2eeed86566aedecf5088e6cf0cda6bf3de89

                      SHA256

                      44112dcd2ff26f7e72580968cbe7131fc99a4842e1e7ddae77cfed820dc8c9df

                      SHA512

                      e06e8e5f7eab9e40c40f1c16a646014f45be95e2a65339a62eebe9e4939422b01d322b801fdc47b2aa005b1d2525f4bca54730096273fd17302a53751f2144e6

                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
                      MD5

                      55a2170af44a470240dcfc99d9924c3f

                      SHA1

                      8beeeb43eb0b57b27d118f1642830936c99ded4d

                      SHA256

                      28c437e4e211ddaab0c7159a3390d34f8232da361230bf8713853a517dca9a4c

                      SHA512

                      c12f5f4b5824a37b8f40edd41bc751c7f8971b2217851489f3ca8461283c136e779377f0676a3ab81b4aa1fb6e6dee374d1cdd99ee1b3ca95d7793f0f6bc4147

                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F9C8BE050DD03D62E7AB35100A7DC1EF
                      MD5

                      ba0f77e6ee3305e8152ef6a34577c4e7

                      SHA1

                      7e0ee8d57198b44db8721f79d23622f3ba2497cc

                      SHA256

                      852210e61b2cb74c8564e6b74753fde51c0a3c45de6901508f903642d5b97b07

                      SHA512

                      2e0dea22c5c163f9ab287795afcab6371041ae56d1f05c35471fc6904b8f07cf69482ef33535d46bfd773fabbef7f47a773ae5dab660842164eade360060cf39

                    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\versionlist.xml
                      MD5

                      1a545d0052b581fbb2ab4c52133846bc

                      SHA1

                      62f3266a9b9925cd6d98658b92adec673cbe3dd3

                      SHA256

                      557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1

                      SHA512

                      bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d

                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\0PZ2C2W1\sigma_519113452.zip.ompuhhw.partial
                      MD5

                      1e693ec7a966ddd46445dc605ad722b9

                      SHA1

                      79dfbdcc91e3bb12301623cada63a7862c501cb4

                      SHA256

                      2b8fef418dcefa8dbdbba130c915ff9578f523213e5be2019996dc374d576b9d

                      SHA512

                      2987f4afbc702f2934a37f2868dc48deca5e3fe1b3c73ad0d12c90f5e8a8a5bb302825aeda520560c418f6f00af37754a05acdd6c7241adfbbcdbeb05baa97cb

                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\1E6CK7BD.cookie
                      MD5

                      876889e653bbae97d27e1d9e0a9ccfd7

                      SHA1

                      131a6ef7d106cefea3438d704e188f675cc1c489

                      SHA256

                      438a186f5fce0fdd2a9150d39a2f67d7618497e192a6bb23568de5f0387ffd53

                      SHA512

                      cbc5a97eaced0665858384a46cb4ded7d145bc20863063ba3b3921a968bdf7e382ff50ef160651cf56b2a2ed8232ad13ff35b72ef2d305419ba8381ae4eb95f2

                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\30N5NJAH.cookie
                      MD5

                      4142c2ddf984cae2edf5f554c1bdd3e8

                      SHA1

                      acce43520a91d95ecfcc0dddfa9ac87906d9fb84

                      SHA256

                      6c5cd886fd545ea7c6288352c4bd5f80d3ea1a15806bcb21b564f227cec7ab9b

                      SHA512

                      fe7b7f8662f744a68eae30547e877ef7cb854a2092ef185e87c0f9ce83e93d753af061c91a69a393e12c1277231fd9bbc320c9845959ebb9c596de1fd948bbd7

                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\91GI900X.cookie
                      MD5

                      9b939e2aaa7e697c47e0189d453dfa98

                      SHA1

                      0a5db86112e44e17422b04f4add0275576ffd017

                      SHA256

                      59461d5d49846379d38c8880d9bb6d296b5ce5412daf3256381df1d652f31341

                      SHA512

                      88bc8b65294e43fce7a95d77564bf7617536b2beeb3d2c68434f44d8eff9692e72bb6af79ccfb47f927f3bde05e4491b61e6dd0139732a51fa1112d21bf7d151

                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\9I1OQ3R0.cookie
                      MD5

                      7cc5d840ce1db9348e05730025057b54

                      SHA1

                      428335cdec3b8fadf7eda20c5222cf06239b8fb7

                      SHA256

                      5168b8a3d3f34cfe2792834e3199e10497be1e68a03d619b75522fd4594b72af

                      SHA512

                      0398de0255cc2774455791188fa88d2cd8ed042df42b574a1d6f6b44e4858bb12cf627962a3d18bf5b0b648bc05120e81838254c20205db2e428f89d336c5cd9

                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\U9TYXTQJ.cookie
                      MD5

                      65d66eee8b3b8104d2fdcaaed7d57c90

                      SHA1

                      84d5d1077d259bff8e75ba3f1632c29ec7d1a755

                      SHA256

                      92898f064e9cce8a992f845adca1ec1970cb95eed04c6667e201ab337320d4cb

                      SHA512

                      bcf3826eec8b754ddfca76cb9dc9c01e3fa607392acbedf1908602ee4b093da72cc4cfaa4c46e6a3e69ede4ac0b5fa47c002497069f70bf3856d97c26da0a4db

                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\VHXZPCHF.cookie
                      MD5

                      0054eaba5666f2a07b1528841ac90f70

                      SHA1

                      05950e979b04224facee67e493c4f1490976228b

                      SHA256

                      3a93d57c27e2b0ded29d201cd87b11648dafaac612499ee5d433d6bd3ce6f767

                      SHA512

                      b0fcb4401a60f5bd3857379b12f36eabdd7251fe60c83322b7d43407350ade18c7a13dbc0dc66e73412563defd1025236d2bd3718c3d0a8f4820319fdf40793e

                    • C:\Users\Admin\AppData\Local\Temp\1499884026.exe
                      MD5

                      7fc6acd5ea62e19c1f920529b5dd3a47

                      SHA1

                      7992101624d2a2773af419144fe2a28edc48a177

                      SHA256

                      d2b17fc7e783eb8674ccacac869fde27f3dbe5c02cfd3eb8d83c100c3faf176a

                      SHA512

                      0d7515d835db3e3a71579a12504638e8139a9c3bfa23c98a98d8dc1ca7b6eb0fcac8e380d4a4ef5e476bac992de0725576e6b70d9037eedd2d47a4caae1f2590

                    • C:\Users\Admin\AppData\Local\Temp\1499884026.exe
                      MD5

                      7fc6acd5ea62e19c1f920529b5dd3a47

                      SHA1

                      7992101624d2a2773af419144fe2a28edc48a177

                      SHA256

                      d2b17fc7e783eb8674ccacac869fde27f3dbe5c02cfd3eb8d83c100c3faf176a

                      SHA512

                      0d7515d835db3e3a71579a12504638e8139a9c3bfa23c98a98d8dc1ca7b6eb0fcac8e380d4a4ef5e476bac992de0725576e6b70d9037eedd2d47a4caae1f2590

                    • C:\Users\Admin\AppData\Local\Temp\749307645.exe
                      MD5

                      5d5715e6d88a05857c45ac37f6f1ff30

                      SHA1

                      798c96c08f1694d3737779d9da34b3a1b2412269

                      SHA256

                      dd6ed83393e86373d04455ef9901cebc8ccdcaf88db0b50972f9f7fa57fb94b9

                      SHA512

                      14b7af38112bdb60ae5aece1674195135fdd222fd047cd5d3dcf9ce635641dbed22583d4e22e3a9bffaa276954b1716438a7220634159c6bfda204376ad1c7d8

                    • C:\Users\Admin\AppData\Local\Temp\749307645.exe
                      MD5

                      5d5715e6d88a05857c45ac37f6f1ff30

                      SHA1

                      798c96c08f1694d3737779d9da34b3a1b2412269

                      SHA256

                      dd6ed83393e86373d04455ef9901cebc8ccdcaf88db0b50972f9f7fa57fb94b9

                      SHA512

                      14b7af38112bdb60ae5aece1674195135fdd222fd047cd5d3dcf9ce635641dbed22583d4e22e3a9bffaa276954b1716438a7220634159c6bfda204376ad1c7d8

                    • C:\Users\Admin\AppData\Local\Temp\84m3tzia\vpn.exe
                      MD5

                      a9487e1960820eb2ba0019491d3b08ce

                      SHA1

                      349b4568ddf57b5c6c1e4a715b27029b287b3b4a

                      SHA256

                      123c95cf9e3813be75fe6d337b6a66f8c06898ae2d4b0b3e69e2e14954ff4776

                      SHA512

                      dab78aff75017f039f7fee67f3967ba9dd468430f9f1ecffde07de70964131931208ee6dd97a19399d5f44d3ab8b5d21abcd3d2766b1caaf970e1bd1d69ae0dc

                    • C:\Users\Admin\AppData\Local\Temp\84m3tzia\vpn.exe
                      MD5

                      a9487e1960820eb2ba0019491d3b08ce

                      SHA1

                      349b4568ddf57b5c6c1e4a715b27029b287b3b4a

                      SHA256

                      123c95cf9e3813be75fe6d337b6a66f8c06898ae2d4b0b3e69e2e14954ff4776

                      SHA512

                      dab78aff75017f039f7fee67f3967ba9dd468430f9f1ecffde07de70964131931208ee6dd97a19399d5f44d3ab8b5d21abcd3d2766b1caaf970e1bd1d69ae0dc

                    • C:\Users\Admin\AppData\Local\Temp\BTPHi3h8\H7TmAucOwDdlT4JLMW.exe
                      MD5

                      ea4deb27dc3ac469028845b7357ad724

                      SHA1

                      367aa70238370e4bdea65c60f80c083d159dddea

                      SHA256

                      e99a09d95411ec9e268c8dfbbb5025b882684e60856fbf483046a50ec12f3eb7

                      SHA512

                      9fe8b68c5c94df9453ca29d63e6727461ba7779c380d5479a21e7123bdc4579c704279ca949857c84d8fdd02652cf61df1e9bb3319bfaed151745c24eeeb1096

                    • C:\Users\Admin\AppData\Local\Temp\BTPHi3h8\H7TmAucOwDdlT4JLMW.exe
                      MD5

                      ea4deb27dc3ac469028845b7357ad724

                      SHA1

                      367aa70238370e4bdea65c60f80c083d159dddea

                      SHA256

                      e99a09d95411ec9e268c8dfbbb5025b882684e60856fbf483046a50ec12f3eb7

                      SHA512

                      9fe8b68c5c94df9453ca29d63e6727461ba7779c380d5479a21e7123bdc4579c704279ca949857c84d8fdd02652cf61df1e9bb3319bfaed151745c24eeeb1096

                    • C:\Users\Admin\AppData\Local\Temp\MSIF1A5.tmp
                      MD5

                      2160822ba37161cbacff695771afa2ed

                      SHA1

                      87b5fd899791d245b1ed7eb5a7f0f0e8ec5cf79f

                      SHA256

                      6c7fa74530bb1140309ba0803cb240bc3e54e507c4abd790cf2dd49834435bcb

                      SHA512

                      061454ee65ad95f19890f7336278a72538a805f565ae80a0fe5eabca546d401eae18cf08c2274733ccc755439b7c8d8925919d0131ec0a28789e6c3bc2614011

                    • C:\Users\Admin\AppData\Local\Temp\MSIF763.tmp
                      MD5

                      2160822ba37161cbacff695771afa2ed

                      SHA1

                      87b5fd899791d245b1ed7eb5a7f0f0e8ec5cf79f

                      SHA256

                      6c7fa74530bb1140309ba0803cb240bc3e54e507c4abd790cf2dd49834435bcb

                      SHA512

                      061454ee65ad95f19890f7336278a72538a805f565ae80a0fe5eabca546d401eae18cf08c2274733ccc755439b7c8d8925919d0131ec0a28789e6c3bc2614011

                    • C:\Users\Admin\AppData\Local\Temp\MSIF86D.tmp
                      MD5

                      e922ff8f49a4734f442bcd26b4a05ba8

                      SHA1

                      13e0dcc761282b31a9e21118035768cf75145045

                      SHA256

                      f2fd2ccb8d8412753ca7aa3d402f29b8280bbd4f7170d53f613e05f742f13a22

                      SHA512

                      0d395483f4ac9af3f011990612517641d4e6734e184faa0f17b4525aab729350ad5b9737a1c0f0164ec81775a41fb21dc90b72609a7ab25a37c4d2a19f253a0e

                    • C:\Users\Admin\AppData\Local\Temp\cqJ8vRss\7EoQL20.exe
                      MD5

                      1a856846f12c83ec2b60e85008092b53

                      SHA1

                      13613110f02316be6e9616dc3c8b9d1907c2a594

                      SHA256

                      2bda319fd4d0c4c053bc806b10a13575e9f38825c97ce67aa957fcf02cc45138

                      SHA512

                      51b2e0c89e218017f40949589dc98e332d227b19598be9f8b93d5303570126c4fd39873b7098a4d17d377293c6befc960e313a2f6e33b33afa42d47e59c30ca9

                    • C:\Users\Admin\AppData\Local\Temp\cqJ8vRss\7EoQL20.exe
                      MD5

                      1a856846f12c83ec2b60e85008092b53

                      SHA1

                      13613110f02316be6e9616dc3c8b9d1907c2a594

                      SHA256

                      2bda319fd4d0c4c053bc806b10a13575e9f38825c97ce67aa957fcf02cc45138

                      SHA512

                      51b2e0c89e218017f40949589dc98e332d227b19598be9f8b93d5303570126c4fd39873b7098a4d17d377293c6befc960e313a2f6e33b33afa42d47e59c30ca9

                    • C:\Users\Admin\AppData\Local\Temp\is-GAUV3.tmp\vpn.tmp
                      MD5

                      08ae6b558839412d71c7e63c2ccee469

                      SHA1

                      8864aada0d862a58bd94bcdaedb7cd5bb7747a00

                      SHA256

                      45a8436696aeff3ffd6e502ee9709dcffd4ee6967c873b89c634233dbb3b9834

                      SHA512

                      1b41a4be48ba8a3cd48b11085faf1124c220fc74cea76976ce52875954f3bcfa857954d3914805db4ffdc32b562b2afbed1ed58668ed4d6e5628bf6c67a9cf75

                    • C:\Users\Admin\AppData\Local\Temp\is-GAUV3.tmp\vpn.tmp
                      MD5

                      08ae6b558839412d71c7e63c2ccee469

                      SHA1

                      8864aada0d862a58bd94bcdaedb7cd5bb7747a00

                      SHA256

                      45a8436696aeff3ffd6e502ee9709dcffd4ee6967c873b89c634233dbb3b9834

                      SHA512

                      1b41a4be48ba8a3cd48b11085faf1124c220fc74cea76976ce52875954f3bcfa857954d3914805db4ffdc32b562b2afbed1ed58668ed4d6e5628bf6c67a9cf75

                    • C:\Users\Admin\AppData\Local\Temp\is-N5NQ7.tmp\sigma_519113452.tmp
                      MD5

                      ce9501d639d11ab993d448910aefe479

                      SHA1

                      0b411ca79303059eddc490d9cfda27c135bbd9d8

                      SHA256

                      b97c3a288eeac5924616e5a0746f5608741d8428bfbbcaa7cd4b41026d6256fd

                      SHA512

                      945f6a1e6de5ae03dcd1e76d39320fea95c0f9fad3181bfd18770793f34573eaca9659fc9b1f765efeaa64ef75c1d5dab06438628c646d993a1ab6b6f6a3ea02

                    • C:\Users\Admin\AppData\Local\Temp\is-N5NQ7.tmp\sigma_519113452.tmp
                      MD5

                      ce9501d639d11ab993d448910aefe479

                      SHA1

                      0b411ca79303059eddc490d9cfda27c135bbd9d8

                      SHA256

                      b97c3a288eeac5924616e5a0746f5608741d8428bfbbcaa7cd4b41026d6256fd

                      SHA512

                      945f6a1e6de5ae03dcd1e76d39320fea95c0f9fad3181bfd18770793f34573eaca9659fc9b1f765efeaa64ef75c1d5dab06438628c646d993a1ab6b6f6a3ea02

                    • C:\Users\Admin\AppData\Local\Temp\zk0wuKZM\9HHytXbBNDOTS5.exe
                      MD5

                      444dcd10203988dd18151750cf1545cf

                      SHA1

                      7497bb691153df2fbc20666b38ceb01defb266fa

                      SHA256

                      01af20708c748e723ab58002df57864baad0287f21ec389a5e0d8b80aae82a84

                      SHA512

                      9228da7e3a2573847edbb76790862bbf3a6d381691ca4c4ec12d722e0fa8680a60df785972a836395c6e21c73684886b0f39c69409e071a0e86d39008a10cde9

                    • C:\Users\Admin\AppData\Local\Temp\zk0wuKZM\9HHytXbBNDOTS5.exe
                      MD5

                      444dcd10203988dd18151750cf1545cf

                      SHA1

                      7497bb691153df2fbc20666b38ceb01defb266fa

                      SHA256

                      01af20708c748e723ab58002df57864baad0287f21ec389a5e0d8b80aae82a84

                      SHA512

                      9228da7e3a2573847edbb76790862bbf3a6d381691ca4c4ec12d722e0fa8680a60df785972a836395c6e21c73684886b0f39c69409e071a0e86d39008a10cde9

                    • C:\Users\Admin\AppData\Local\Temp\{744D9~1\tap0901.cat
                      MD5

                      c757503bc0c5a6679e07fe15b93324d6

                      SHA1

                      6a81aa87e4b07c7fea176c8adf1b27ddcdd44573

                      SHA256

                      91ebea8ad199e97832cf91ea77328ed7ff49a1b5c06ddaacb0e420097a9b079e

                      SHA512

                      efd1507bc7aa0cd335b0e82cddde5f75c4d1e35490608d32f24a2bed0d0fbcac88919728e3b3312665bd1e60d3f13a325bdcef4acfddab0f8c2d9f4fb2454d99

                    • C:\Users\Admin\AppData\Local\Temp\{744D9~1\tap0901.sys
                      MD5

                      d765f43cbea72d14c04af3d2b9c8e54b

                      SHA1

                      daebe266073616e5fc931c319470fcf42a06867a

                      SHA256

                      89c5ca1440df186497ce158eb71c0c6bf570a75b6bc1880eac7c87a0250201c0

                      SHA512

                      ff83225ed348aa8558fb3055ceb43863bad5cf775e410ed8acda7316b56cd5c9360e63ed71abbc8929f7dcf51fd9a948b16d58242a7a2b16108e696c11d548b2

                    • C:\Users\Admin\AppData\Local\Temp\{744d9ad1-5661-074e-856d-72594e507661}\oemvista.inf
                      MD5

                      87868193626dc756d10885f46d76f42e

                      SHA1

                      94a5ce8ed7633ed77531b6cb14ceb1927c5cae1f

                      SHA256

                      b5728e42ea12c67577cb9188b472005ee74399b6ac976e7f72b48409baee3b41

                      SHA512

                      79751330bed5c16d66baf3e5212be0950f312ffd5b80b78be66eaea3cc7115f8a9472d2a43b5ce702aa044f3b45fd572775ff86572150df91cc27866f88f8277

                    • C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\oemvista.inf
                      MD5

                      87868193626dc756d10885f46d76f42e

                      SHA1

                      94a5ce8ed7633ed77531b6cb14ceb1927c5cae1f

                      SHA256

                      b5728e42ea12c67577cb9188b472005ee74399b6ac976e7f72b48409baee3b41

                      SHA512

                      79751330bed5c16d66baf3e5212be0950f312ffd5b80b78be66eaea3cc7115f8a9472d2a43b5ce702aa044f3b45fd572775ff86572150df91cc27866f88f8277

                    • \??\c:\PROGRA~2\maskvpn\driver\win764\tap0901.sys
                      MD5

                      d765f43cbea72d14c04af3d2b9c8e54b

                      SHA1

                      daebe266073616e5fc931c319470fcf42a06867a

                      SHA256

                      89c5ca1440df186497ce158eb71c0c6bf570a75b6bc1880eac7c87a0250201c0

                      SHA512

                      ff83225ed348aa8558fb3055ceb43863bad5cf775e410ed8acda7316b56cd5c9360e63ed71abbc8929f7dcf51fd9a948b16d58242a7a2b16108e696c11d548b2

                    • \??\c:\program files (x86)\maskvpn\driver\win764\tap0901.cat
                      MD5

                      c757503bc0c5a6679e07fe15b93324d6

                      SHA1

                      6a81aa87e4b07c7fea176c8adf1b27ddcdd44573

                      SHA256

                      91ebea8ad199e97832cf91ea77328ed7ff49a1b5c06ddaacb0e420097a9b079e

                      SHA512

                      efd1507bc7aa0cd335b0e82cddde5f75c4d1e35490608d32f24a2bed0d0fbcac88919728e3b3312665bd1e60d3f13a325bdcef4acfddab0f8c2d9f4fb2454d99

                    • \Users\Admin\AppData\Local\Temp\MSIF1A5.tmp
                      MD5

                      2160822ba37161cbacff695771afa2ed

                      SHA1

                      87b5fd899791d245b1ed7eb5a7f0f0e8ec5cf79f

                      SHA256

                      6c7fa74530bb1140309ba0803cb240bc3e54e507c4abd790cf2dd49834435bcb

                      SHA512

                      061454ee65ad95f19890f7336278a72538a805f565ae80a0fe5eabca546d401eae18cf08c2274733ccc755439b7c8d8925919d0131ec0a28789e6c3bc2614011

                    • \Users\Admin\AppData\Local\Temp\MSIF763.tmp
                      MD5

                      2160822ba37161cbacff695771afa2ed

                      SHA1

                      87b5fd899791d245b1ed7eb5a7f0f0e8ec5cf79f

                      SHA256

                      6c7fa74530bb1140309ba0803cb240bc3e54e507c4abd790cf2dd49834435bcb

                      SHA512

                      061454ee65ad95f19890f7336278a72538a805f565ae80a0fe5eabca546d401eae18cf08c2274733ccc755439b7c8d8925919d0131ec0a28789e6c3bc2614011

                    • \Users\Admin\AppData\Local\Temp\MSIF86D.tmp
                      MD5

                      e922ff8f49a4734f442bcd26b4a05ba8

                      SHA1

                      13e0dcc761282b31a9e21118035768cf75145045

                      SHA256

                      f2fd2ccb8d8412753ca7aa3d402f29b8280bbd4f7170d53f613e05f742f13a22

                      SHA512

                      0d395483f4ac9af3f011990612517641d4e6734e184faa0f17b4525aab729350ad5b9737a1c0f0164ec81775a41fb21dc90b72609a7ab25a37c4d2a19f253a0e

                    • \Users\Admin\AppData\Local\Temp\is-2VVOR.tmp\_isetup\_iscrypt.dll
                      MD5

                      a69559718ab506675e907fe49deb71e9

                      SHA1

                      bc8f404ffdb1960b50c12ff9413c893b56f2e36f

                      SHA256

                      2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

                      SHA512

                      e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

                    • \Users\Admin\AppData\Local\Temp\is-2VVOR.tmp\_isetup\_isdecmp.dll
                      MD5

                      a813d18268affd4763dde940246dc7e5

                      SHA1

                      c7366e1fd925c17cc6068001bd38eaef5b42852f

                      SHA256

                      e19781aabe466dd8779cb9c8fa41bbb73375447066bb34e876cf388a6ed63c64

                      SHA512

                      b310ed4cd2e94381c00a6a370fcb7cc867ebe425d705b69caaaaffdafbab91f72d357966916053e72e68ecf712f2af7585500c58bb53ec3e1d539179fcb45fb4

                    • \Users\Admin\AppData\Local\Temp\is-2VVOR.tmp\_isetup\_isdecmp.dll
                      MD5

                      a813d18268affd4763dde940246dc7e5

                      SHA1

                      c7366e1fd925c17cc6068001bd38eaef5b42852f

                      SHA256

                      e19781aabe466dd8779cb9c8fa41bbb73375447066bb34e876cf388a6ed63c64

                      SHA512

                      b310ed4cd2e94381c00a6a370fcb7cc867ebe425d705b69caaaaffdafbab91f72d357966916053e72e68ecf712f2af7585500c58bb53ec3e1d539179fcb45fb4

                    • \Users\Admin\AppData\Local\Temp\is-8MGGT.tmp\ApiTool.dll
                      MD5

                      b5e330f90e1bab5e5ee8ccb04e679687

                      SHA1

                      3360a68276a528e4b651c9019b6159315c3acca8

                      SHA256

                      2900d536923740fe530891f481e35e37262db5283a4b98047fe5335eacaf3441

                      SHA512

                      41ab8f239cfff8e5ddcff95cdf2ae11499d57b2ebe8f0786757a200047fd022bfd6975be95e9cfcc17c405e631f069b9951591cf74faf3e6a548191e63a8439c

                    • \Users\Admin\AppData\Local\Temp\is-8MGGT.tmp\ApiTool.dll
                      MD5

                      b5e330f90e1bab5e5ee8ccb04e679687

                      SHA1

                      3360a68276a528e4b651c9019b6159315c3acca8

                      SHA256

                      2900d536923740fe530891f481e35e37262db5283a4b98047fe5335eacaf3441

                      SHA512

                      41ab8f239cfff8e5ddcff95cdf2ae11499d57b2ebe8f0786757a200047fd022bfd6975be95e9cfcc17c405e631f069b9951591cf74faf3e6a548191e63a8439c

                    • \Users\Admin\AppData\Local\Temp\is-8MGGT.tmp\InnoCallback.dll
                      MD5

                      1c55ae5ef9980e3b1028447da6105c75

                      SHA1

                      f85218e10e6aa23b2f5a3ed512895b437e41b45c

                      SHA256

                      6afa2d104be6efe3d9a2ab96dbb75db31565dad64dd0b791e402ecc25529809f

                      SHA512

                      1ec4d52f49747b29cfd83e1a75fc6ae4101add68ada0b9add5770c10be6dffb004bb47d0854d50871ed8d77acf67d4e0445e97f0548a95c182e83b94ddf2eb6b

                    • \Users\Admin\AppData\Local\Temp\is-8MGGT.tmp\InnoCallback.dll
                      MD5

                      1c55ae5ef9980e3b1028447da6105c75

                      SHA1

                      f85218e10e6aa23b2f5a3ed512895b437e41b45c

                      SHA256

                      6afa2d104be6efe3d9a2ab96dbb75db31565dad64dd0b791e402ecc25529809f

                      SHA512

                      1ec4d52f49747b29cfd83e1a75fc6ae4101add68ada0b9add5770c10be6dffb004bb47d0854d50871ed8d77acf67d4e0445e97f0548a95c182e83b94ddf2eb6b

                    • \Users\Admin\AppData\Local\Temp\is-8MGGT.tmp\botva2.dll
                      MD5

                      ef899fa243c07b7b82b3a45f6ec36771

                      SHA1

                      4a86313cc8766dcad1c2b00c2b8f9bbe0cf8bbbe

                      SHA256

                      da7d0368712ee419952eb2640a65a7f24e39fb7872442ed4d2ee847ec4cfde77

                      SHA512

                      3f98b5ad9adfad2111ebd1d8cbab9ae423d624d1668cc64c0bfcdbfedf30c1ce3ea6bc6bcf70f7dd1b01172a4349e7c84fb75d395ee5af73866574c1d734c6e8

                    • \Users\Admin\AppData\Local\Temp\is-8MGGT.tmp\botva2.dll
                      MD5

                      ef899fa243c07b7b82b3a45f6ec36771

                      SHA1

                      4a86313cc8766dcad1c2b00c2b8f9bbe0cf8bbbe

                      SHA256

                      da7d0368712ee419952eb2640a65a7f24e39fb7872442ed4d2ee847ec4cfde77

                      SHA512

                      3f98b5ad9adfad2111ebd1d8cbab9ae423d624d1668cc64c0bfcdbfedf30c1ce3ea6bc6bcf70f7dd1b01172a4349e7c84fb75d395ee5af73866574c1d734c6e8

                    • \Users\Admin\AppData\Local\Temp\is-8MGGT.tmp\libMaskVPN.dll
                      MD5

                      3d88c579199498b224033b6b66638fb8

                      SHA1

                      6f6303288e2206efbf18e4716095059fada96fc4

                      SHA256

                      5bccb86319fc90210d065648937725b14b43fa0c96f9da56d9984e027adebbc3

                      SHA512

                      9740c521ed38643201ed4c2574628454723b9213f12e193c11477e64a2c03daa58d2a48e70df1a7e9654c50a80049f3cf213fd01f2b74e585c3a86027db19ec9

                    • \Users\Admin\AppData\Local\Temp\is-8MGGT.tmp\libMaskVPN.dll
                      MD5

                      3d88c579199498b224033b6b66638fb8

                      SHA1

                      6f6303288e2206efbf18e4716095059fada96fc4

                      SHA256

                      5bccb86319fc90210d065648937725b14b43fa0c96f9da56d9984e027adebbc3

                      SHA512

                      9740c521ed38643201ed4c2574628454723b9213f12e193c11477e64a2c03daa58d2a48e70df1a7e9654c50a80049f3cf213fd01f2b74e585c3a86027db19ec9

                    • \Users\Admin\AppData\Roaming\Weather\Weather 1.0.0\install\decoder.dll
                      MD5

                      fddee40c512e40f05ed565f1a00e85f1

                      SHA1

                      2f0096e7418d19d8df8515f9899e87ca6671b517

                      SHA256

                      f7ab1e969edfece0c89bd4d79ce3cc70ff46e460da4d9d90b1ef91f3a0716265

                      SHA512

                      6845cb0f841572e7c516b8401eab4aadcdd492613ffb09ccd07ce254d6748ddde4b3b566b3e8fb2ea841c8fd5977d6f1fddaadda81e0f39d8736323e750c8127

                    • memory/228-249-0x0000000000000000-mapping.dmp
                    • memory/376-57-0x0000000004100000-0x0000000004101000-memory.dmp
                      Filesize

                      4KB

                    • memory/440-52-0x0000000004360000-0x0000000004361000-memory.dmp
                      Filesize

                      4KB

                    • memory/828-56-0x00000000050F0000-0x00000000050F1000-memory.dmp
                      Filesize

                      4KB

                    • memory/1008-55-0x0000000004330000-0x0000000004331000-memory.dmp
                      Filesize

                      4KB

                    • memory/1016-54-0x00000000047C0000-0x00000000047C1000-memory.dmp
                      Filesize

                      4KB

                    • memory/1152-62-0x00000000041B0000-0x00000000041B1000-memory.dmp
                      Filesize

                      4KB

                    • memory/1176-139-0x0000000000000000-mapping.dmp
                    • memory/1248-65-0x0000000004D60000-0x0000000004D61000-memory.dmp
                      Filesize

                      4KB

                    • memory/1392-14-0x0000000000000000-mapping.dmp
                    • memory/1396-222-0x0000000004D30000-0x0000000004D31000-memory.dmp
                      Filesize

                      4KB

                    • memory/1520-46-0x0000000004740000-0x0000000004741000-memory.dmp
                      Filesize

                      4KB

                    • memory/1564-109-0x0000000004190000-0x0000000004191000-memory.dmp
                      Filesize

                      4KB

                    • memory/1568-43-0x0000000004610000-0x0000000004611000-memory.dmp
                      Filesize

                      4KB

                    • memory/1572-170-0x0000000004180000-0x0000000004181000-memory.dmp
                      Filesize

                      4KB

                    • memory/1596-138-0x0000000004230000-0x0000000004231000-memory.dmp
                      Filesize

                      4KB

                    • memory/1636-253-0x0000000000000000-mapping.dmp
                    • memory/1720-254-0x0000000000000000-mapping.dmp
                    • memory/2024-217-0x0000000004970000-0x0000000004971000-memory.dmp
                      Filesize

                      4KB

                    • memory/2108-204-0x0000000000000000-mapping.dmp
                    • memory/2108-208-0x00000000000F0000-0x00000000000F1000-memory.dmp
                      Filesize

                      4KB

                    • memory/2108-209-0x0000000000400000-0x00000000015D7000-memory.dmp
                      Filesize

                      17.8MB

                    • memory/2108-210-0x00000000000E0000-0x00000000000E1000-memory.dmp
                      Filesize

                      4KB

                    • memory/2132-246-0x0000000000000000-mapping.dmp
                    • memory/2144-60-0x0000000004030000-0x0000000004031000-memory.dmp
                      Filesize

                      4KB

                    • memory/2176-144-0x0000000000000000-mapping.dmp
                    • memory/2184-44-0x0000000004460000-0x0000000004461000-memory.dmp
                      Filesize

                      4KB

                    • memory/2188-59-0x0000000004DE0000-0x0000000004DE1000-memory.dmp
                      Filesize

                      4KB

                    • memory/2192-148-0x0000000003F80000-0x0000000003F81000-memory.dmp
                      Filesize

                      4KB

                    • memory/2200-194-0x0000000000000000-mapping.dmp
                    • memory/2312-31-0x0000000004510000-0x0000000004511000-memory.dmp
                      Filesize

                      4KB

                    • memory/2312-33-0x0000000000400000-0x000000000145E000-memory.dmp
                      Filesize

                      16.4MB

                    • memory/2312-34-0x0000000001980000-0x0000000001981000-memory.dmp
                      Filesize

                      4KB

                    • memory/2312-29-0x0000000000000000-mapping.dmp
                    • memory/2312-32-0x0000000004D10000-0x0000000004D11000-memory.dmp
                      Filesize

                      4KB

                    • memory/2476-41-0x0000000004200000-0x0000000004201000-memory.dmp
                      Filesize

                      4KB

                    • memory/2804-245-0x0000000000C90000-0x0000000000C91000-memory.dmp
                      Filesize

                      4KB

                    • memory/2856-159-0x0000000004A30000-0x0000000004A31000-memory.dmp
                      Filesize

                      4KB

                    • memory/2864-39-0x0000000004F10000-0x0000000004F11000-memory.dmp
                      Filesize

                      4KB

                    • memory/2908-35-0x0000000004F80000-0x0000000004F81000-memory.dmp
                      Filesize

                      4KB

                    • memory/2920-82-0x0000000000000000-mapping.dmp
                    • memory/2920-107-0x00000000093D0000-0x00000000093D1000-memory.dmp
                      Filesize

                      4KB

                    • memory/2920-102-0x00000000093E1000-0x00000000093E9000-memory.dmp
                      Filesize

                      32KB

                    • memory/2920-90-0x0000000007421000-0x0000000007606000-memory.dmp
                      Filesize

                      1.9MB

                    • memory/2920-97-0x00000000022F0000-0x00000000022F1000-memory.dmp
                      Filesize

                      4KB

                    • memory/2920-87-0x0000000000730000-0x0000000000731000-memory.dmp
                      Filesize

                      4KB

                    • memory/2920-105-0x0000000009681000-0x000000000968D000-memory.dmp
                      Filesize

                      48KB

                    • memory/2984-81-0x0000000004C10000-0x0000000004C11000-memory.dmp
                      Filesize

                      4KB

                    • memory/3004-178-0x0000000000000000-mapping.dmp
                    • memory/3136-47-0x0000000004ED0000-0x0000000004ED1000-memory.dmp
                      Filesize

                      4KB

                    • memory/3140-129-0x0000000000000000-mapping.dmp
                    • memory/3160-37-0x0000000004AD0000-0x0000000004AD1000-memory.dmp
                      Filesize

                      4KB

                    • memory/3304-130-0x00000000042C0000-0x00000000042C1000-memory.dmp
                      Filesize

                      4KB

                    • memory/3464-63-0x0000000004470000-0x0000000004471000-memory.dmp
                      Filesize

                      4KB

                    • memory/3676-205-0x0000000004860000-0x0000000004861000-memory.dmp
                      Filesize

                      4KB

                    • memory/3720-45-0x00000000043A0000-0x00000000043A1000-memory.dmp
                      Filesize

                      4KB

                    • memory/3864-38-0x0000000004CC0000-0x0000000004CC1000-memory.dmp
                      Filesize

                      4KB

                    • memory/3932-179-0x00000000043A0000-0x00000000043A1000-memory.dmp
                      Filesize

                      4KB

                    • memory/3944-73-0x0000000000000000-mapping.dmp
                    • memory/3944-80-0x0000000000401000-0x0000000000417000-memory.dmp
                      Filesize

                      88KB

                    • memory/3968-166-0x0000000000000000-mapping.dmp
                    • memory/3972-51-0x0000000004D20000-0x0000000004D21000-memory.dmp
                      Filesize

                      4KB

                    • memory/3976-134-0x0000000005230000-0x0000000005231000-memory.dmp
                      Filesize

                      4KB

                    • memory/3976-122-0x000000006E1A0000-0x000000006E88E000-memory.dmp
                      Filesize

                      6.9MB

                    • memory/3976-118-0x0000000000000000-mapping.dmp
                    • memory/3976-125-0x00000000008D0000-0x00000000008D1000-memory.dmp
                      Filesize

                      4KB

                    • memory/4056-187-0x0000000004E10000-0x0000000004E11000-memory.dmp
                      Filesize

                      4KB

                    • memory/4080-72-0x0000000004650000-0x0000000004651000-memory.dmp
                      Filesize

                      4KB

                    • memory/4084-172-0x0000000004EF0000-0x0000000004EF1000-memory.dmp
                      Filesize

                      4KB

                    • memory/4084-171-0x0000000004EF0000-0x0000000004EF1000-memory.dmp
                      Filesize

                      4KB

                    • memory/4088-151-0x000000006E1A0000-0x000000006E88E000-memory.dmp
                      Filesize

                      6.9MB

                    • memory/4088-150-0x000000000041F38E-mapping.dmp
                    • memory/4088-149-0x0000000000400000-0x0000000000426000-memory.dmp
                      Filesize

                      152KB

                    • memory/4088-163-0x0000000004F20000-0x0000000004F21000-memory.dmp
                      Filesize

                      4KB

                    • memory/4112-64-0x0000000005050000-0x0000000005051000-memory.dmp
                      Filesize

                      4KB

                    • memory/4148-53-0x00000000041A0000-0x00000000041A1000-memory.dmp
                      Filesize

                      4KB

                    • memory/4296-71-0x00000000044F0000-0x00000000044F1000-memory.dmp
                      Filesize

                      4KB

                    • memory/4320-42-0x00000000047B0000-0x00000000047B1000-memory.dmp
                      Filesize

                      4KB

                    • memory/4356-26-0x0000000000401000-0x0000000000412000-memory.dmp
                      Filesize

                      68KB

                    • memory/4396-252-0x0000000000000000-mapping.dmp
                    • memory/4404-74-0x0000000000000000-mapping.dmp
                    • memory/4404-86-0x0000000004F40000-0x0000000004F41000-memory.dmp
                      Filesize

                      4KB

                    • memory/4404-93-0x0000000004F10000-0x0000000004F11000-memory.dmp
                      Filesize

                      4KB

                    • memory/4404-91-0x0000000005020000-0x0000000005021000-memory.dmp
                      Filesize

                      4KB

                    • memory/4404-79-0x000000006E1A0000-0x000000006E88E000-memory.dmp
                      Filesize

                      6.9MB

                    • memory/4404-83-0x0000000000770000-0x0000000000771000-memory.dmp
                      Filesize

                      4KB

                    • memory/4448-108-0x0000000004250000-0x0000000004251000-memory.dmp
                      Filesize

                      4KB

                    • memory/4456-48-0x0000000004C80000-0x0000000004C81000-memory.dmp
                      Filesize

                      4KB

                    • memory/4480-27-0x0000000002200000-0x0000000002201000-memory.dmp
                      Filesize

                      4KB

                    • memory/4480-20-0x0000000000000000-mapping.dmp
                    • memory/4480-24-0x00000000031C1000-0x00000000031C3000-memory.dmp
                      Filesize

                      8KB

                    • memory/4516-156-0x0000000000000000-mapping.dmp
                    • memory/4532-190-0x0000000006190000-0x0000000006191000-memory.dmp
                      Filesize

                      4KB

                    • memory/4532-211-0x0000000006F20000-0x0000000006F21000-memory.dmp
                      Filesize

                      4KB

                    • memory/4532-110-0x0000000000400000-0x0000000000426000-memory.dmp
                      Filesize

                      152KB

                    • memory/4532-111-0x000000000041F38E-mapping.dmp
                    • memory/4532-112-0x000000006E1A0000-0x000000006E88E000-memory.dmp
                      Filesize

                      6.9MB

                    • memory/4532-212-0x0000000007620000-0x0000000007621000-memory.dmp
                      Filesize

                      4KB

                    • memory/4532-214-0x0000000008050000-0x0000000008051000-memory.dmp
                      Filesize

                      4KB

                    • memory/4532-189-0x0000000005F30000-0x0000000005F31000-memory.dmp
                      Filesize

                      4KB

                    • memory/4532-237-0x0000000007290000-0x0000000007291000-memory.dmp
                      Filesize

                      4KB

                    • memory/4532-121-0x00000000018E0000-0x00000000018E1000-memory.dmp
                      Filesize

                      4KB

                    • memory/4532-215-0x0000000007190000-0x0000000007191000-memory.dmp
                      Filesize

                      4KB

                    • memory/4532-185-0x0000000006400000-0x0000000006401000-memory.dmp
                      Filesize

                      4KB

                    • memory/4532-186-0x0000000005E90000-0x0000000005E91000-memory.dmp
                      Filesize

                      4KB

                    • memory/4532-213-0x00000000070F0000-0x00000000070F1000-memory.dmp
                      Filesize

                      4KB

                    • memory/4532-188-0x0000000005EF0000-0x0000000005EF1000-memory.dmp
                      Filesize

                      4KB

                    • memory/4560-157-0x0000000000000000-mapping.dmp
                    • memory/4568-191-0x00000000049A0000-0x00000000049A1000-memory.dmp
                      Filesize

                      4KB

                    • memory/4592-40-0x00000000045A0000-0x00000000045A1000-memory.dmp
                      Filesize

                      4KB

                    • memory/4604-117-0x0000000002F20000-0x0000000002F21000-memory.dmp
                      Filesize

                      4KB

                    • memory/4604-92-0x0000000000000000-mapping.dmp
                    • memory/4604-123-0x0000000002CE0000-0x0000000002D2C000-memory.dmp
                      Filesize

                      304KB

                    • memory/4604-124-0x0000000000400000-0x0000000000450000-memory.dmp
                      Filesize

                      320KB

                    • memory/4616-248-0x0000000000000000-mapping.dmp
                    • memory/4620-96-0x0000000004660000-0x0000000004661000-memory.dmp
                      Filesize

                      4KB

                    • memory/4680-180-0x0000000000000000-mapping.dmp
                    • memory/4708-135-0x0000000004A20000-0x0000000004A21000-memory.dmp
                      Filesize

                      4KB

                    • memory/4720-250-0x0000000000000000-mapping.dmp
                    • memory/4732-67-0x0000000004F60000-0x0000000004F61000-memory.dmp
                      Filesize

                      4KB

                    • memory/4752-136-0x0000000000000000-mapping.dmp
                    • memory/4780-58-0x0000000004880000-0x0000000004881000-memory.dmp
                      Filesize

                      4KB

                    • memory/4788-196-0x0000000003F20000-0x0000000003F21000-memory.dmp
                      Filesize

                      4KB

                    • memory/4788-158-0x0000000000000000-mapping.dmp
                    • memory/4808-68-0x0000000000000000-mapping.dmp
                    • memory/4812-142-0x0000000000000000-mapping.dmp
                    • memory/4824-50-0x00000000046B0000-0x00000000046B1000-memory.dmp
                      Filesize

                      4KB

                    • memory/4828-66-0x0000000004DD0000-0x0000000004DD1000-memory.dmp
                      Filesize

                      4KB

                    • memory/4832-247-0x0000000000000000-mapping.dmp
                    • memory/4860-61-0x0000000004710000-0x0000000004711000-memory.dmp
                      Filesize

                      4KB

                    • memory/4892-251-0x0000000000000000-mapping.dmp
                    • memory/4920-49-0x00000000041C0000-0x00000000041C1000-memory.dmp
                      Filesize

                      4KB

                    • memory/4956-220-0x0000000000180000-0x0000000000181000-memory.dmp
                      Filesize

                      4KB

                    • memory/4956-229-0x0000000000160000-0x0000000000161000-memory.dmp
                      Filesize

                      4KB

                    • memory/4956-221-0x0000000000400000-0x00000000015D7000-memory.dmp
                      Filesize

                      17.8MB

                    • memory/4956-216-0x0000000000000000-mapping.dmp
                    • memory/4984-182-0x0000000004E20000-0x0000000004E21000-memory.dmp
                      Filesize

                      4KB

                    • memory/5020-2-0x0000000000000000-mapping.dmp
                    • memory/5036-116-0x0000000004A80000-0x0000000004A81000-memory.dmp
                      Filesize

                      4KB

                    • memory/5092-242-0x0000000034201000-0x00000000342EA000-memory.dmp
                      Filesize

                      932KB

                    • memory/5092-243-0x0000000034361000-0x000000003439F000-memory.dmp
                      Filesize

                      248KB

                    • memory/5092-241-0x0000000033AC1000-0x0000000033C40000-memory.dmp
                      Filesize

                      1.5MB

                    • memory/5092-240-0x0000000001820000-0x0000000001821000-memory.dmp
                      Filesize

                      4KB

                    • memory/5092-239-0x0000000000400000-0x00000000015D7000-memory.dmp
                      Filesize

                      17.8MB

                    • memory/5092-238-0x0000000001940000-0x0000000001941000-memory.dmp
                      Filesize

                      4KB