Analysis

  • max time kernel
    150s
  • max time network
    165s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    24-07-2021 08:02

General

  • Target

    ECC5658C2D0B0B9FFDC2729950A19A84.exe

  • Size

    745KB

  • MD5

    ecc5658c2d0b0b9ffdc2729950a19a84

  • SHA1

    74c44fc17238b59a2bb9ad037dbc8c6c5e3ea240

  • SHA256

    0705af99615fdc12025b5449cb80591559a3f7a31037cd85dcc64ed0f7224fdc

  • SHA512

    c7cdd19676278f9f2393ef077e5eb18c5fa2ad93ca0420488999dedfcd8ef839edc1835a692cf4cc13521be7fdbfd5931195081b3888a40ef985c0bdefb7f49d

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://readinglistforjuly1.xyz/

http://readinglistforjuly2.xyz/

http://readinglistforjuly3.xyz/

http://readinglistforjuly4.xyz/

http://readinglistforjuly5.xyz/

http://readinglistforjuly6.xyz/

http://readinglistforjuly7.xyz/

http://readinglistforjuly8.xyz/

http://readinglistforjuly9.xyz/

http://readinglistforjuly10.xyz/

http://readinglistforjuly1.site/

http://readinglistforjuly2.site/

http://readinglistforjuly3.site/

http://readinglistforjuly4.site/

http://readinglistforjuly5.site/

http://readinglistforjuly6.site/

http://readinglistforjuly7.site/

http://readinglistforjuly8.site/

http://readinglistforjuly9.site/

http://readinglistforjuly10.site/

rc4.i32
rc4.i32

Extracted

Family

vidar

Version

39.7

Botnet

408

C2

https://shpak125.tumblr.com/

Attributes
  • profile_id

    408

Extracted

Family

redline

Botnet

123123123

C2

45.32.235.238:45555

Extracted

Family

redline

Botnet

555

C2

xaiandaran.xyz:80

Extracted

Family

redline

Botnet

NewInstallShop

C2

135.148.139.222:33569

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 6 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • suricata: ET MALWARE Generic Password Stealer User Agent Detected (RookIE)
  • suricata: ET MALWARE Potential Dridex.Maldoc Minimal Executable Request
  • suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
  • suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
  • suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
  • Checks for common network interception software 1 TTPs

    Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

  • Nirsoft 3 IoCs
  • Vidar Stealer 2 IoCs
  • Blocklisted process makes network request 48 IoCs
  • Downloads MZ/PE file
  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 28 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 43 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses 2FA software files, possible credential harvesting 2 TTPs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 9 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Program Files directory 36 IoCs
  • Drops file in Windows directory 33 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 16 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 21 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • c:\windows\system32\svchost.exe
    c:\windows\system32\svchost.exe -k netsvcs -s Winmgmt
    1⤵
      PID:2640
    • c:\windows\system32\svchost.exe
      c:\windows\system32\svchost.exe -k netsvcs -s WpnService
      1⤵
        PID:2656
      • c:\windows\system32\svchost.exe
        c:\windows\system32\svchost.exe -k netsvcs -s Browser
        1⤵
          PID:2556
        • c:\windows\system32\svchost.exe
          c:\windows\system32\svchost.exe -k netsvcs -s LanmanServer
          1⤵
            PID:2336
          • c:\windows\system32\svchost.exe
            c:\windows\system32\svchost.exe -k netsvcs -s IKEEXT
            1⤵
              PID:2328
            • c:\windows\system32\svchost.exe
              c:\windows\system32\svchost.exe -k netsvcs -s ShellHWDetection
              1⤵
                PID:1788
              • C:\Users\Admin\AppData\Local\Temp\ECC5658C2D0B0B9FFDC2729950A19A84.exe
                "C:\Users\Admin\AppData\Local\Temp\ECC5658C2D0B0B9FFDC2729950A19A84.exe"
                1⤵
                • Suspicious use of WriteProcessMemory
                PID:2256
                • C:\Users\Admin\AppData\Local\Temp\is-VUFCQ.tmp\ECC5658C2D0B0B9FFDC2729950A19A84.tmp
                  "C:\Users\Admin\AppData\Local\Temp\is-VUFCQ.tmp\ECC5658C2D0B0B9FFDC2729950A19A84.tmp" /SL5="$20110,506127,422400,C:\Users\Admin\AppData\Local\Temp\ECC5658C2D0B0B9FFDC2729950A19A84.exe"
                  2⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of WriteProcessMemory
                  PID:1216
                  • C:\Users\Admin\AppData\Local\Temp\is-6QO6K.tmp\aker_mi.exe
                    "C:\Users\Admin\AppData\Local\Temp\is-6QO6K.tmp\aker_mi.exe" /S /UID=rec7
                    3⤵
                    • Drops file in Drivers directory
                    • Executes dropped EXE
                    • Adds Run key to start application
                    • Drops file in Program Files directory
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:3964
                    • C:\Program Files\Microsoft Office 15\DJACXDHCYP\irecord.exe
                      "C:\Program Files\Microsoft Office 15\DJACXDHCYP\irecord.exe" /VERYSILENT
                      4⤵
                      • Executes dropped EXE
                      • Suspicious use of WriteProcessMemory
                      PID:3956
                      • C:\Users\Admin\AppData\Local\Temp\is-4QI6G.tmp\irecord.tmp
                        "C:\Users\Admin\AppData\Local\Temp\is-4QI6G.tmp\irecord.tmp" /SL5="$60050,5808768,66560,C:\Program Files\Microsoft Office 15\DJACXDHCYP\irecord.exe" /VERYSILENT
                        5⤵
                        • Executes dropped EXE
                        • Drops file in Program Files directory
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of FindShellTrayWindow
                        • Suspicious use of WriteProcessMemory
                        PID:4056
                        • C:\Program Files (x86)\i-record\I-Record.exe
                          "C:\Program Files (x86)\i-record\I-Record.exe" -silent -desktopShortcut -programMenu
                          6⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          PID:2760
                    • C:\Users\Admin\AppData\Local\Temp\5f-e2e49-d21-d14b5-b44b9d9633218\Wugaesebowa.exe
                      "C:\Users\Admin\AppData\Local\Temp\5f-e2e49-d21-d14b5-b44b9d9633218\Wugaesebowa.exe"
                      4⤵
                      • Executes dropped EXE
                      • Checks computer location settings
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3960
                    • C:\Users\Admin\AppData\Local\Temp\28-fd350-c09-c518e-ef21a6fd2789a\Pyxepubyve.exe
                      "C:\Users\Admin\AppData\Local\Temp\28-fd350-c09-c518e-ef21a6fd2789a\Pyxepubyve.exe"
                      4⤵
                      • Executes dropped EXE
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:2012
                      • C:\Windows\System32\cmd.exe
                        "C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\jyutebd0.il4\GcleanerEU.exe /eufive & exit
                        5⤵
                          PID:5496
                        • C:\Windows\System32\cmd.exe
                          "C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\qwipvuzf.pls\installer.exe /qn CAMPAIGN="654" & exit
                          5⤵
                          • Suspicious use of WriteProcessMemory
                          PID:6872
                          • C:\Users\Admin\AppData\Local\Temp\qwipvuzf.pls\installer.exe
                            C:\Users\Admin\AppData\Local\Temp\qwipvuzf.pls\installer.exe /qn CAMPAIGN="654"
                            6⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Enumerates connected drives
                            • Modifies system certificate store
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of FindShellTrayWindow
                            • Suspicious use of WriteProcessMemory
                            PID:6972
                            • C:\Windows\SysWOW64\msiexec.exe
                              "C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msi" /qn CAMPAIGN=654 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\qwipvuzf.pls\installer.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\qwipvuzf.pls\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1626854681 /qn CAMPAIGN=""654"" " CAMPAIGN="654"
                              7⤵
                                PID:5020
                          • C:\Windows\System32\cmd.exe
                            "C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\1zbhndoq.gr0\ufgaa.exe & exit
                            5⤵
                            • Suspicious use of WriteProcessMemory
                            PID:1216
                            • C:\Users\Admin\AppData\Local\Temp\1zbhndoq.gr0\ufgaa.exe
                              C:\Users\Admin\AppData\Local\Temp\1zbhndoq.gr0\ufgaa.exe
                              6⤵
                              • Executes dropped EXE
                              • Suspicious use of WriteProcessMemory
                              PID:4104
                              • C:\Users\Admin\AppData\Local\Temp\11111.exe
                                C:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                                7⤵
                                • Executes dropped EXE
                                PID:5576
                              • C:\Users\Admin\AppData\Local\Temp\11111.exe
                                C:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                                7⤵
                                • Executes dropped EXE
                                PID:6588
                              • C:\Users\Admin\AppData\Local\Temp\22222.exe
                                C:\Users\Admin\AppData\Local\Temp\22222.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                                7⤵
                                • Executes dropped EXE
                                PID:6384
                              • C:\Users\Admin\AppData\Local\Temp\22222.exe
                                C:\Users\Admin\AppData\Local\Temp\22222.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                                7⤵
                                • Executes dropped EXE
                                PID:4828
                          • C:\Windows\System32\cmd.exe
                            "C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ztci32nw.0dm\google-game.exe & exit
                            5⤵
                            • Suspicious use of WriteProcessMemory
                            PID:4824
                            • C:\Users\Admin\AppData\Local\Temp\ztci32nw.0dm\google-game.exe
                              C:\Users\Admin\AppData\Local\Temp\ztci32nw.0dm\google-game.exe
                              6⤵
                              • Executes dropped EXE
                              • Suspicious use of WriteProcessMemory
                              PID:4912
                              • C:\Users\Admin\AppData\Local\Temp\ztci32nw.0dm\google-game.exe
                                "C:\Users\Admin\AppData\Local\Temp\ztci32nw.0dm\google-game.exe" -a
                                7⤵
                                • Executes dropped EXE
                                PID:5048
                          • C:\Windows\System32\cmd.exe
                            "C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\gbdf2ydt.wyz\toolspab1.exe & exit
                            5⤵
                              PID:5336
                              • C:\Users\Admin\AppData\Local\Temp\gbdf2ydt.wyz\toolspab1.exe
                                C:\Users\Admin\AppData\Local\Temp\gbdf2ydt.wyz\toolspab1.exe
                                6⤵
                                • Executes dropped EXE
                                • Suspicious use of SetThreadContext
                                PID:6108
                                • C:\Users\Admin\AppData\Local\Temp\gbdf2ydt.wyz\toolspab1.exe
                                  C:\Users\Admin\AppData\Local\Temp\gbdf2ydt.wyz\toolspab1.exe
                                  7⤵
                                  • Executes dropped EXE
                                  • Checks SCSI registry key(s)
                                  • Suspicious behavior: MapViewOfSection
                                  PID:6660
                            • C:\Windows\System32\cmd.exe
                              "C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\gyfimyi1.2vl\GcleanerWW.exe /mixone & exit
                              5⤵
                                PID:5816
                      • c:\windows\system32\svchost.exe
                        c:\windows\system32\svchost.exe -k netsvcs -s SENS
                        1⤵
                          PID:1368
                        • c:\windows\system32\svchost.exe
                          c:\windows\system32\svchost.exe -k netsvcs -s UserManager
                          1⤵
                            PID:1244
                          • c:\windows\system32\svchost.exe
                            c:\windows\system32\svchost.exe -k netsvcs -s Themes
                            1⤵
                              PID:1188
                            • c:\windows\system32\svchost.exe
                              c:\windows\system32\svchost.exe -k netsvcs -s ProfSvc
                              1⤵
                                PID:1080
                              • c:\windows\system32\svchost.exe
                                c:\windows\system32\svchost.exe -k netsvcs -s Schedule
                                1⤵
                                • Drops file in System32 directory
                                • Modifies registry class
                                PID:684
                              • c:\windows\system32\svchost.exe
                                c:\windows\system32\svchost.exe -k netsvcs -s gpsvc
                                1⤵
                                  PID:68
                                • \??\c:\windows\system32\svchost.exe
                                  c:\windows\system32\svchost.exe -k netsvcs -s BITS
                                  1⤵
                                  • Suspicious use of SetThreadContext
                                  • Modifies registry class
                                  • Suspicious use of WriteProcessMemory
                                  PID:1876
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k SystemNetworkService
                                    2⤵
                                    • Drops file in System32 directory
                                    • Checks processor information in registry
                                    • Modifies data under HKEY_USERS
                                    • Modifies registry class
                                    PID:5428
                                • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
                                  "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
                                  1⤵
                                  • Drops file in Windows directory
                                  • Modifies Internet Explorer settings
                                  • Modifies registry class
                                  • Suspicious use of AdjustPrivilegeToken
                                  • Suspicious use of SetWindowsHookEx
                                  PID:7016
                                • C:\Windows\system32\browser_broker.exe
                                  C:\Windows\system32\browser_broker.exe -Embedding
                                  1⤵
                                  • Modifies Internet Explorer settings
                                  PID:7104
                                • C:\Windows\system32\msiexec.exe
                                  C:\Windows\system32\msiexec.exe /V
                                  1⤵
                                  • Enumerates connected drives
                                  • Drops file in Program Files directory
                                  • Drops file in Windows directory
                                  • Modifies data under HKEY_USERS
                                  • Modifies registry class
                                  • Suspicious use of AdjustPrivilegeToken
                                  • Suspicious use of WriteProcessMemory
                                  PID:4188
                                  • C:\Windows\syswow64\MsiExec.exe
                                    C:\Windows\syswow64\MsiExec.exe -Embedding FD842AB436712E7998DC5D7CC8B1AC2A C
                                    2⤵
                                    • Loads dropped DLL
                                    PID:4548
                                  • C:\Windows\syswow64\MsiExec.exe
                                    C:\Windows\syswow64\MsiExec.exe -Embedding A34D187C3F05C9684E0F5B4C02C70FCA
                                    2⤵
                                    • Blocklisted process makes network request
                                    • Loads dropped DLL
                                    PID:5460
                                    • C:\Windows\SysWOW64\taskkill.exe
                                      "C:\Windows\SysWOW64\taskkill.exe" /im AdvancedWindowsManager* /f
                                      3⤵
                                      • Kills process with taskkill
                                      PID:6044
                                  • C:\Windows\syswow64\MsiExec.exe
                                    C:\Windows\syswow64\MsiExec.exe -Embedding C034F9B7BBC45D0ACD99D4F79756885F E Global\MSI0000
                                    2⤵
                                    • Loads dropped DLL
                                    PID:7152
                                • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                  "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                  1⤵
                                  • Modifies registry class
                                  • Suspicious behavior: MapViewOfSection
                                  • Suspicious use of SetWindowsHookEx
                                  PID:4476
                                • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                  "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                  1⤵
                                  • Modifies Internet Explorer settings
                                  • Modifies registry class
                                  PID:4704
                                • C:\Windows\system32\rUNdlL32.eXe
                                  rUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main
                                  1⤵
                                  • Process spawned unexpected child process
                                  • Suspicious use of WriteProcessMemory
                                  PID:5264
                                  • C:\Windows\SysWOW64\rundll32.exe
                                    rUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main
                                    2⤵
                                    • Loads dropped DLL
                                    • Modifies registry class
                                    • Suspicious use of WriteProcessMemory
                                    PID:5284
                                • C:\Users\Admin\AppData\Local\Temp\B017.exe
                                  C:\Users\Admin\AppData\Local\Temp\B017.exe
                                  1⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetWindowsHookEx
                                  PID:5108
                                • C:\Users\Admin\AppData\Local\Temp\B17F.exe
                                  C:\Users\Admin\AppData\Local\Temp\B17F.exe
                                  1⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetThreadContext
                                  PID:4752
                                  • C:\Users\Admin\AppData\Local\Temp\B17F.exe
                                    C:\Users\Admin\AppData\Local\Temp\B17F.exe
                                    2⤵
                                    • Executes dropped EXE
                                    PID:6708
                                  • C:\Users\Admin\AppData\Local\Temp\B17F.exe
                                    C:\Users\Admin\AppData\Local\Temp\B17F.exe
                                    2⤵
                                    • Executes dropped EXE
                                    PID:3768
                                • C:\Users\Admin\AppData\Local\Temp\B47E.exe
                                  C:\Users\Admin\AppData\Local\Temp\B47E.exe
                                  1⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Checks processor information in registry
                                  PID:5384
                                  • C:\Windows\SysWOW64\cmd.exe
                                    "C:\Windows\System32\cmd.exe" /c taskkill /im B47E.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\B47E.exe" & del C:\ProgramData\*.dll & exit
                                    2⤵
                                      PID:6876
                                      • C:\Windows\SysWOW64\taskkill.exe
                                        taskkill /im B47E.exe /f
                                        3⤵
                                        • Kills process with taskkill
                                        PID:5984
                                      • C:\Windows\SysWOW64\timeout.exe
                                        timeout /t 6
                                        3⤵
                                        • Delays execution with timeout.exe
                                        PID:6388
                                  • C:\Users\Admin\AppData\Local\Temp\B6A3.exe
                                    C:\Users\Admin\AppData\Local\Temp\B6A3.exe
                                    1⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    PID:6832
                                  • C:\Users\Admin\AppData\Local\Temp\B934.exe
                                    C:\Users\Admin\AppData\Local\Temp\B934.exe
                                    1⤵
                                    • Executes dropped EXE
                                    PID:6852
                                  • C:\Users\Admin\AppData\Local\Temp\BD1D.exe
                                    C:\Users\Admin\AppData\Local\Temp\BD1D.exe
                                    1⤵
                                    • Executes dropped EXE
                                    PID:4120
                                    • C:\Users\Admin\AppData\Local\Temp\555.exe
                                      "C:\Users\Admin\AppData\Local\Temp\555.exe"
                                      2⤵
                                      • Executes dropped EXE
                                      PID:7072
                                    • C:\Users\Admin\AppData\Local\Temp\Hyphal.exe
                                      "C:\Users\Admin\AppData\Local\Temp\Hyphal.exe"
                                      2⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetThreadContext
                                      PID:6080
                                      • C:\Users\Admin\AppData\Local\Temp\Hyphal.exe
                                        C:\Users\Admin\AppData\Local\Temp\Hyphal.exe
                                        3⤵
                                        • Executes dropped EXE
                                        PID:6392
                                  • C:\Windows\SysWOW64\explorer.exe
                                    C:\Windows\SysWOW64\explorer.exe
                                    1⤵
                                      PID:4284
                                    • C:\Windows\explorer.exe
                                      C:\Windows\explorer.exe
                                      1⤵
                                        PID:4960
                                      • C:\Windows\SysWOW64\explorer.exe
                                        C:\Windows\SysWOW64\explorer.exe
                                        1⤵
                                          PID:5496
                                        • C:\Windows\explorer.exe
                                          C:\Windows\explorer.exe
                                          1⤵
                                            PID:6100
                                          • C:\Windows\SysWOW64\explorer.exe
                                            C:\Windows\SysWOW64\explorer.exe
                                            1⤵
                                              PID:4620
                                            • C:\Windows\explorer.exe
                                              C:\Windows\explorer.exe
                                              1⤵
                                                PID:2256
                                              • C:\Windows\SysWOW64\explorer.exe
                                                C:\Windows\SysWOW64\explorer.exe
                                                1⤵
                                                  PID:5164
                                                • C:\Windows\explorer.exe
                                                  C:\Windows\explorer.exe
                                                  1⤵
                                                    PID:5264
                                                  • C:\Windows\SysWOW64\explorer.exe
                                                    C:\Windows\SysWOW64\explorer.exe
                                                    1⤵
                                                      PID:6880

                                                    Network

                                                    MITRE ATT&CK Matrix ATT&CK v6

                                                    Persistence

                                                    Registry Run Keys / Startup Folder

                                                    1
                                                    T1060

                                                    Defense Evasion

                                                    Modify Registry

                                                    3
                                                    T1112

                                                    Install Root Certificate

                                                    1
                                                    T1130

                                                    Credential Access

                                                    Credentials in Files

                                                    4
                                                    T1081

                                                    Discovery

                                                    Software Discovery

                                                    1
                                                    T1518

                                                    Query Registry

                                                    5
                                                    T1012

                                                    System Information Discovery

                                                    5
                                                    T1082

                                                    Peripheral Device Discovery

                                                    2
                                                    T1120

                                                    Collection

                                                    Data from Local System

                                                    4
                                                    T1005

                                                    Command and Control

                                                    Web Service

                                                    1
                                                    T1102

                                                    Replay Monitor

                                                    Loading Replay Monitor...

                                                    Downloads

                                                    • C:\Program Files (x86)\i-record\AForge.Video.FFMPEG.dll
                                                      MD5

                                                      5f60669a79e4c4285325284ab662a0c0

                                                      SHA1

                                                      5b83f8f2799394df3751799605e9292b21b78504

                                                      SHA256

                                                      3f6aa370d70259dc55241950d669d2bf3dc7b57a0c45c6a2f8dec0d8c8cc35b0

                                                      SHA512

                                                      6ec9fe576daa4fde11a39a929dd23ab44297521c4d23352af1a78716cc3ec7927aa6949d5f7af638148e58e5b6d1d16043ad1a7b0dabb8103acc07d0d4c8a42f

                                                    • C:\Program Files (x86)\i-record\I-Record.exe
                                                      MD5

                                                      13c3ba689a19b325a19ab62cbe4c313c

                                                      SHA1

                                                      8b0ba8fc4eab09e5aa958699411479a1ce201a18

                                                      SHA256

                                                      696822fcdd3382ba02dfcce45ec4784d65ef44adf7d1fac2520b81f8ce007cf9

                                                      SHA512

                                                      387095ec1ccfd7f4e2dac8522fd72b3199447ad750133bf3719810952262321845f6590457ab4c950f5cf9c5fda93377710e7b8d940b04d6c80252f1ccf8033e

                                                    • C:\Program Files (x86)\i-record\I-Record.exe
                                                      MD5

                                                      13c3ba689a19b325a19ab62cbe4c313c

                                                      SHA1

                                                      8b0ba8fc4eab09e5aa958699411479a1ce201a18

                                                      SHA256

                                                      696822fcdd3382ba02dfcce45ec4784d65ef44adf7d1fac2520b81f8ce007cf9

                                                      SHA512

                                                      387095ec1ccfd7f4e2dac8522fd72b3199447ad750133bf3719810952262321845f6590457ab4c950f5cf9c5fda93377710e7b8d940b04d6c80252f1ccf8033e

                                                    • C:\Program Files (x86)\i-record\I-Record.exe.config
                                                      MD5

                                                      871947926c323ad2f2148248d9a46837

                                                      SHA1

                                                      0a70fe7442e14ecfadd2932c2fb46b8ddc04ba7a

                                                      SHA256

                                                      f3d7125a0e0f61c215f80b1d25e66c83cd20ed3166790348a53e0b7faf52550e

                                                      SHA512

                                                      58d9687495c839914d3aa6ae16677f43a0fa9a415dbd8336b0fcacd0c741724867b27d62a640c09828b902c69ac8f5d71c64cdadf87199e7637681a5b87da3b7

                                                    • C:\Program Files (x86)\i-record\avcodec-53.dll
                                                      MD5

                                                      65f639a2eda8db2a1ea40b5ddb5a2ed4

                                                      SHA1

                                                      3f32853740928c5e88b15fdc86c95a2ebd8aeb37

                                                      SHA256

                                                      e4e41c0c1c85e2aeaff1bea914880d2cb01b153a1a9ceddccaf05f8b5362210d

                                                      SHA512

                                                      980b6a5511716073d5eeb8b5437c6f23bda300402c64d05d2a54da614e3ef1412743ec5bb4100e54699d7a74f8c437560cb9faa67824cbbabdf1f9399945e21b

                                                    • C:\Program Files (x86)\i-record\avformat-53.dll
                                                      MD5

                                                      11340a55f155a904596bf3a13788a93a

                                                      SHA1

                                                      92a2f79717f71696ebde3c400aa52804eda5984e

                                                      SHA256

                                                      b26b2df18537b3df6706aa9e743d1a1e511a6fd21f7f7815f15ef96bb09a85e9

                                                      SHA512

                                                      2dc2bb8b0b4a38ddee62d85fdf7c551b0b77f5b9c7791cf82a00eea847f86006df5139874381dd6db739bb77ec008be9f32185ec71ca8be603f7fe515662c78b

                                                    • C:\Program Files (x86)\i-record\avutil-51.dll
                                                      MD5

                                                      78128217a6151041fc8f7f29960bdd2a

                                                      SHA1

                                                      a6fe2fa059334871181f60b626352e8325cbdda8

                                                      SHA256

                                                      678ca4d9f4d4ad1703006026afe3df5490664c05bb958b991c028ce9314757f7

                                                      SHA512

                                                      5f534a8b186797046526cfb29f95e89e90c555cf54cc8e99a801dfe9327433c9c0fd2cb63a335ade606075c9fab5173c1ad805242ceb04bc1fd78f37da166d84

                                                    • C:\Program Files (x86)\i-record\swscale-2.dll
                                                      MD5

                                                      564dca64680d608517721cdbe324b1d6

                                                      SHA1

                                                      f2683fa13772fc85c3ea4cffa3d896373a603ad3

                                                      SHA256

                                                      f9550ace57ce5b19add143e507179dc601a832b054963d1c3b5c003f1a8149cc

                                                      SHA512

                                                      1d80e9de29320201c988e8b11036c423d83620e99bcadec5142eb14b6513e49d9b41904e92154139e327cd5cc6f058b4bb467ee4fbb342794296e0dfe774dc75

                                                    • C:\Program Files\Microsoft Office 15\DJACXDHCYP\irecord.exe
                                                      MD5

                                                      f3e69396bfcb70ee59a828705593171a

                                                      SHA1

                                                      d4df6a67e0f7af5385613256dbf485e1f2886c55

                                                      SHA256

                                                      c970b8146afbd7347f5488fd821ae6ade4f355dcb29d764b7834ce8a1754105f

                                                      SHA512

                                                      4743b9bf562c1b8616f794493123160de95ba15451affacf286aff6d2af023a07d7942a8753c3fdccf8d294f99b46adee8ac58f6a29d42dea973a9de6a77d22f

                                                    • C:\Program Files\Microsoft Office 15\DJACXDHCYP\irecord.exe
                                                      MD5

                                                      f3e69396bfcb70ee59a828705593171a

                                                      SHA1

                                                      d4df6a67e0f7af5385613256dbf485e1f2886c55

                                                      SHA256

                                                      c970b8146afbd7347f5488fd821ae6ade4f355dcb29d764b7834ce8a1754105f

                                                      SHA512

                                                      4743b9bf562c1b8616f794493123160de95ba15451affacf286aff6d2af023a07d7942a8753c3fdccf8d294f99b46adee8ac58f6a29d42dea973a9de6a77d22f

                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8890A77645B73478F5B1DED18ACBF795_C090A8C88B266C6FF99A97210E92B44D
                                                      MD5

                                                      5d1d28434da762b3968a802ef2d0573a

                                                      SHA1

                                                      15afaa32d324dc137fa46f4b2338e842d4a5f5b2

                                                      SHA256

                                                      f943d64bc26babc54e66e9ddcca862480c99a173f9121478780df89059a58b1c

                                                      SHA512

                                                      2cdb10e722269b810a5b9b57078e4c4302524d534109739281d23899801db0b4fe63914f115363d134104b020d20587d172ecab01b98a6c59ac65063c17ea5c2

                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DA3B6E45325D5FFF28CF6BAD6065C907_7ACDCC18BE3F9272783F723CF7E4C78B
                                                      MD5

                                                      a744eb4d5c93e2d23ba15adaf6c23324

                                                      SHA1

                                                      49deade307c8eff8af2e3f3cc4730fe3afb43f6a

                                                      SHA256

                                                      ae05862d7f2eccac432cd146f7e78e44b0b9fff4f82637e62057700c7b0c4c1f

                                                      SHA512

                                                      7510d648498fd24bfd638dbe67c8bf269ea455007d3466d1770493292366542eeb1c0f17808ea5432a5a96736894ecf65183ffcaae00d1c71d14ec2b879e7f6b

                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8890A77645B73478F5B1DED18ACBF795_C090A8C88B266C6FF99A97210E92B44D
                                                      MD5

                                                      a220559d2898c3750210237265678c36

                                                      SHA1

                                                      4ec2569d0ea715b8d9eec2b5218c9fbec7639db9

                                                      SHA256

                                                      19805c36d401df7548dc41d077303478534f4be0d3e2777971a7b6f7b78ec1fd

                                                      SHA512

                                                      55f0f2af9c23fa38c38a3490f26674fa7ef63d14efafbf8dbb5668f4dcafa7257da99b1bee494bda8781aaf61a87f301fe119d62c532d6af1efe4c8d879fd51d

                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DA3B6E45325D5FFF28CF6BAD6065C907_7ACDCC18BE3F9272783F723CF7E4C78B
                                                      MD5

                                                      b910c1872c7fe276aeec65689247c193

                                                      SHA1

                                                      66d13cb4c6f019d2ea19a8624160d5bb4e12dc2d

                                                      SHA256

                                                      cb4b056065a4d41a3df9a15bba36b319392b26e727997c11ea981b36f1430b55

                                                      SHA512

                                                      7eafd8896fb3b3f4fae5c0d3e484896d9029f502ebd7a7ec05bd075aa69ea9122da52ed935f3873420416644e80872141b2416cd320d9c29fee3e5a1f929ad59

                                                    • C:\Users\Admin\AppData\Local\AdvinstAnalytics\6073fee5118372253d99d22b\1.0.0\tracking.ini
                                                      MD5

                                                      7820b4d7f6ef0d1ee075c57fbc24f3f1

                                                      SHA1

                                                      728eca84efac6263fedace775a3a85476b0ce740

                                                      SHA256

                                                      e3dc28905f4c6cbfe3db7e5ccf3b9c7a637b62d9111b1197d186ea315b169a9d

                                                      SHA512

                                                      ddb54f080f06764b08793f724f5f4d3582f6a74efce247540cd66d9026ef33a7a22682938befacd8d3280e850b6fc2628d1b78d82d1c27b9f5a64a0587df6350

                                                    • C:\Users\Admin\AppData\Local\Temp\11111.exe
                                                      MD5

                                                      cc0d6b6813f92dbf5be3ecacf44d662a

                                                      SHA1

                                                      b968c57a14ddada4128356f6e39fb66c6d864d3f

                                                      SHA256

                                                      0c2ade2993927f6de828e30c07156c19751b55650a05c965631ca0ea1c983498

                                                      SHA512

                                                      4d4275338cd8a089c25757440b876654b569d39bfd970109cceb09c29ca79c8f3b1fdfcc6316ef18a9eb68cddf0c2d6daa0fa27fafc1f27b8103b4aa1db1fbc5

                                                    • C:\Users\Admin\AppData\Local\Temp\11111.exe
                                                      MD5

                                                      cc0d6b6813f92dbf5be3ecacf44d662a

                                                      SHA1

                                                      b968c57a14ddada4128356f6e39fb66c6d864d3f

                                                      SHA256

                                                      0c2ade2993927f6de828e30c07156c19751b55650a05c965631ca0ea1c983498

                                                      SHA512

                                                      4d4275338cd8a089c25757440b876654b569d39bfd970109cceb09c29ca79c8f3b1fdfcc6316ef18a9eb68cddf0c2d6daa0fa27fafc1f27b8103b4aa1db1fbc5

                                                    • C:\Users\Admin\AppData\Local\Temp\1zbhndoq.gr0\ufgaa.exe
                                                      MD5

                                                      42895703b59dc2c0c1be5c12f080a21c

                                                      SHA1

                                                      b5b54397854855479889449bb8f29fd3c1bfa0e4

                                                      SHA256

                                                      9140eab286726d763311ae1d355c014f2b96b1b1e2fa3c0402b862957db4abf9

                                                      SHA512

                                                      93e5f17bf87e5c1539851953243b36dcc4860dae6bd512c94e0c0c37163b5e23ce7c45f232f5a5e1b7234317fc43cfdb2cd7faa248f487c27382f9a5dd63137d

                                                    • C:\Users\Admin\AppData\Local\Temp\1zbhndoq.gr0\ufgaa.exe
                                                      MD5

                                                      42895703b59dc2c0c1be5c12f080a21c

                                                      SHA1

                                                      b5b54397854855479889449bb8f29fd3c1bfa0e4

                                                      SHA256

                                                      9140eab286726d763311ae1d355c014f2b96b1b1e2fa3c0402b862957db4abf9

                                                      SHA512

                                                      93e5f17bf87e5c1539851953243b36dcc4860dae6bd512c94e0c0c37163b5e23ce7c45f232f5a5e1b7234317fc43cfdb2cd7faa248f487c27382f9a5dd63137d

                                                    • C:\Users\Admin\AppData\Local\Temp\28-fd350-c09-c518e-ef21a6fd2789a\Kenessey.txt
                                                      MD5

                                                      97384261b8bbf966df16e5ad509922db

                                                      SHA1

                                                      2fc42d37fee2c81d767e09fb298b70c748940f86

                                                      SHA256

                                                      9c0d294c05fc1d88d698034609bb81c0c69196327594e4c69d2915c80fd9850c

                                                      SHA512

                                                      b77fe2d86fbc5bd116d6a073eb447e76a74add3fa0d0b801f97535963241be3cdce1dbcaed603b78f020d0845b2d4bfc892ceb2a7d1c8f1d98abc4812ef5af21

                                                    • C:\Users\Admin\AppData\Local\Temp\28-fd350-c09-c518e-ef21a6fd2789a\Pyxepubyve.exe
                                                      MD5

                                                      08234236a84917a118c43650bd7ba631

                                                      SHA1

                                                      5c908bfd55cb9268790342f7ca69308ec324778f

                                                      SHA256

                                                      6acea85802aed51996a4a5fbdf177e1ab626e520071c49143dd5e40831dd06a4

                                                      SHA512

                                                      9cfd5f0a7ba4f328b6caa314769b717e96a2cd89e7cd1b91f92d4e3b78ee94b28b24b5f944faf595c7a5fd34a199ee372e643e4f6942ad675b27129f1b6486e0

                                                    • C:\Users\Admin\AppData\Local\Temp\28-fd350-c09-c518e-ef21a6fd2789a\Pyxepubyve.exe
                                                      MD5

                                                      08234236a84917a118c43650bd7ba631

                                                      SHA1

                                                      5c908bfd55cb9268790342f7ca69308ec324778f

                                                      SHA256

                                                      6acea85802aed51996a4a5fbdf177e1ab626e520071c49143dd5e40831dd06a4

                                                      SHA512

                                                      9cfd5f0a7ba4f328b6caa314769b717e96a2cd89e7cd1b91f92d4e3b78ee94b28b24b5f944faf595c7a5fd34a199ee372e643e4f6942ad675b27129f1b6486e0

                                                    • C:\Users\Admin\AppData\Local\Temp\28-fd350-c09-c518e-ef21a6fd2789a\Pyxepubyve.exe.config
                                                      MD5

                                                      98d2687aec923f98c37f7cda8de0eb19

                                                      SHA1

                                                      f6dcfcdcfe570340ecdbbd9e2a61f3cb4f281ba7

                                                      SHA256

                                                      8a94163256a722ef8cc140bcd115a5b8f8725c04fe158b129d47be81cb693465

                                                      SHA512

                                                      95c7290d59749df8df495e04789c1793265e0f34e0d091df5c0d4aefe1af4c8ac1f5460f1f198fc28c4c8c900827b8f22e2851957bbaea5914ea962b3a1d0590

                                                    • C:\Users\Admin\AppData\Local\Temp\5f-e2e49-d21-d14b5-b44b9d9633218\Wugaesebowa.exe
                                                      MD5

                                                      a9cb66c3dc3a7eeb0319ab185cad0bc0

                                                      SHA1

                                                      041ea4d822ade16f5273061a09547e77b8f8b69f

                                                      SHA256

                                                      0ca5662da7b7426c41de79d0276136403129c02adb6a8b4bf107eb38c7964ac9

                                                      SHA512

                                                      d5fc4d03a18dc4f1b77184fba154714d69580e3893ff9dc04b5d69839810a3d4140d1b16b017591e0a88bdad711edc90ab4f2a910a37a18f3158cb64dd70760b

                                                    • C:\Users\Admin\AppData\Local\Temp\5f-e2e49-d21-d14b5-b44b9d9633218\Wugaesebowa.exe
                                                      MD5

                                                      a9cb66c3dc3a7eeb0319ab185cad0bc0

                                                      SHA1

                                                      041ea4d822ade16f5273061a09547e77b8f8b69f

                                                      SHA256

                                                      0ca5662da7b7426c41de79d0276136403129c02adb6a8b4bf107eb38c7964ac9

                                                      SHA512

                                                      d5fc4d03a18dc4f1b77184fba154714d69580e3893ff9dc04b5d69839810a3d4140d1b16b017591e0a88bdad711edc90ab4f2a910a37a18f3158cb64dd70760b

                                                    • C:\Users\Admin\AppData\Local\Temp\5f-e2e49-d21-d14b5-b44b9d9633218\Wugaesebowa.exe.config
                                                      MD5

                                                      98d2687aec923f98c37f7cda8de0eb19

                                                      SHA1

                                                      f6dcfcdcfe570340ecdbbd9e2a61f3cb4f281ba7

                                                      SHA256

                                                      8a94163256a722ef8cc140bcd115a5b8f8725c04fe158b129d47be81cb693465

                                                      SHA512

                                                      95c7290d59749df8df495e04789c1793265e0f34e0d091df5c0d4aefe1af4c8ac1f5460f1f198fc28c4c8c900827b8f22e2851957bbaea5914ea962b3a1d0590

                                                    • C:\Users\Admin\AppData\Local\Temp\MSI3933.tmp
                                                      MD5

                                                      0981d5c068a9c33f4e8110f81ffbb92e

                                                      SHA1

                                                      badb871adf6f24aba6923b9b21b211cea2aeca77

                                                      SHA256

                                                      b3f5e10fb1b7352a6dbbcbb10ed605a8fda24f3f9c31f954835bd5a41eb6ea68

                                                      SHA512

                                                      59cccdcde1964e61fa63078fde776eee91c462d7d3db308ada02e27e6ce584c41ad1f7970642e02ce331d805215a2cc868fb0512c01accfa70cda52e9329e1d8

                                                    • C:\Users\Admin\AppData\Local\Temp\MSI3CCE.tmp
                                                      MD5

                                                      43d68e8389e7df33189d1c1a05a19ac8

                                                      SHA1

                                                      caf9cc610985e5cfdbae0c057233a6194ecbfed4

                                                      SHA256

                                                      85dc7518ad5aa46ef572f17050e3b004693784d1855cca9390da1143a64fceae

                                                      SHA512

                                                      58a76b4cb8f53cee73a8fc2afbd69388a1f2ea30ea3c0007beaa361cb0cc3d4d18c1fa8ccf036a2d2cf8fa07b01451000a704a626d95bd050afe6ba808e6de1e

                                                    • C:\Users\Admin\AppData\Local\Temp\axhub.dat
                                                      MD5

                                                      8b87ea329dff1fcf9fdf1dbf18f37b7d

                                                      SHA1

                                                      bc1e15a78b8c128a0b0f8a234d659737ec211214

                                                      SHA256

                                                      6572c5b64cbeba7e3e0e8dacccba32311e3d975a98cb7163287e65a48a2ab5ef

                                                      SHA512

                                                      a211a30d447d5c39ce8fd7f0a4ee053cbbfd6dd1a6c659be5be19aea52abf0fc1a2d769828971274517a229a091870a5151804a6f87ec36ae056566a05fb8e84

                                                    • C:\Users\Admin\AppData\Local\Temp\axhub.dll
                                                      MD5

                                                      1c7be730bdc4833afb7117d48c3fd513

                                                      SHA1

                                                      dc7e38cfe2ae4a117922306aead5a7544af646b8

                                                      SHA256

                                                      8206b4b3897ca45b9e083273f616902966e57091516844906e6ae2aefe63cef1

                                                      SHA512

                                                      7936c862a06b7ecdb6710a1bb62cbea149f75504b580c2f100945674c987f3eec53e9aa5915e32b4f74bcf46f2df9468f68a454400faebd909f933e8072e0f2e

                                                    • C:\Users\Admin\AppData\Local\Temp\gbdf2ydt.wyz\toolspab1.exe
                                                      MD5

                                                      db7231d95540d964f743751692e2204b

                                                      SHA1

                                                      0a30bd3b00e9d111c937c0b3fda15595221ccedf

                                                      SHA256

                                                      be68f9bc1919ff98df000a4e3124899127b1b56406503469864a96f19ed0d240

                                                      SHA512

                                                      fe5ef2ab93383e9dba2c06349ec3ce3010df7e4844fc2ff25ed39ad3544a7bde25b47a8ac00da5495d2f462278051f45838abd958e6b55c3974d87ac9cf0a343

                                                    • C:\Users\Admin\AppData\Local\Temp\gbdf2ydt.wyz\toolspab1.exe
                                                      MD5

                                                      db7231d95540d964f743751692e2204b

                                                      SHA1

                                                      0a30bd3b00e9d111c937c0b3fda15595221ccedf

                                                      SHA256

                                                      be68f9bc1919ff98df000a4e3124899127b1b56406503469864a96f19ed0d240

                                                      SHA512

                                                      fe5ef2ab93383e9dba2c06349ec3ce3010df7e4844fc2ff25ed39ad3544a7bde25b47a8ac00da5495d2f462278051f45838abd958e6b55c3974d87ac9cf0a343

                                                    • C:\Users\Admin\AppData\Local\Temp\is-4QI6G.tmp\irecord.tmp
                                                      MD5

                                                      b5ffb69c517bd2ee5411f7a24845c829

                                                      SHA1

                                                      1a470a89a3f03effe401bb77b246ced24f5bc539

                                                      SHA256

                                                      b09d330ec5fce569bc7ce5068ad6cafdb0d947fcc779b3362a424db1a2fa29be

                                                      SHA512

                                                      5a771ad4237a7ec0159bbba2179fadf067e6d09d80e9f1fb701ffd62ed0203192d20adbe9dd4df4bfb0191cdccecadaf71ecec4a52de06f8ef338905cbea3465

                                                    • C:\Users\Admin\AppData\Local\Temp\is-4QI6G.tmp\irecord.tmp
                                                      MD5

                                                      b5ffb69c517bd2ee5411f7a24845c829

                                                      SHA1

                                                      1a470a89a3f03effe401bb77b246ced24f5bc539

                                                      SHA256

                                                      b09d330ec5fce569bc7ce5068ad6cafdb0d947fcc779b3362a424db1a2fa29be

                                                      SHA512

                                                      5a771ad4237a7ec0159bbba2179fadf067e6d09d80e9f1fb701ffd62ed0203192d20adbe9dd4df4bfb0191cdccecadaf71ecec4a52de06f8ef338905cbea3465

                                                    • C:\Users\Admin\AppData\Local\Temp\is-6QO6K.tmp\aker_mi.exe
                                                      MD5

                                                      e89cc7f9d9069ec39c7fb5786b74950d

                                                      SHA1

                                                      624cdf4c84e891cd034c7c308475d45141c3abb3

                                                      SHA256

                                                      2e880dddd120d95db62386383b323dd62e9d21f2f10db67992cb06b4ad0cd21c

                                                      SHA512

                                                      42965c8718e3e0b11fe21cf9bbc1073e706504bce85a5b8ed2012e54d9e84cf46edc9dc074730466b63f972199d94bac391f82861e0e560da00f048d4875649b

                                                    • C:\Users\Admin\AppData\Local\Temp\is-6QO6K.tmp\aker_mi.exe
                                                      MD5

                                                      e89cc7f9d9069ec39c7fb5786b74950d

                                                      SHA1

                                                      624cdf4c84e891cd034c7c308475d45141c3abb3

                                                      SHA256

                                                      2e880dddd120d95db62386383b323dd62e9d21f2f10db67992cb06b4ad0cd21c

                                                      SHA512

                                                      42965c8718e3e0b11fe21cf9bbc1073e706504bce85a5b8ed2012e54d9e84cf46edc9dc074730466b63f972199d94bac391f82861e0e560da00f048d4875649b

                                                    • C:\Users\Admin\AppData\Local\Temp\is-VUFCQ.tmp\ECC5658C2D0B0B9FFDC2729950A19A84.tmp
                                                      MD5

                                                      5eaa32c9db3386c0c3814f763b79fbfa

                                                      SHA1

                                                      6f61dde4b43f24105015ba319aa834152fbd3272

                                                      SHA256

                                                      0922426040a1f9098f2ab69e81d42c15245c1fbd298ccb6691551fab5cc9aea5

                                                      SHA512

                                                      ce46e228bb5d3f63588b1ed992c48ea064b4ae27629058d44892812a4e34de0af84a91936a3d35ba84743366d2bb555754964da8c4fb804e7478c9b55111a757

                                                    • C:\Users\Admin\AppData\Local\Temp\jyutebd0.il4\GcleanerEU.exe
                                                      MD5

                                                      4f4adcbf8c6f66dcfc8a3282ac2bf10a

                                                      SHA1

                                                      c35a9fc52bb556c79f8fa540df587a2bf465b940

                                                      SHA256

                                                      6b3c238ebcf1f3c07cf0e556faa82c6b8fe96840ff4b6b7e9962a2d855843a0b

                                                      SHA512

                                                      0d15d65c1a988dfc8cc58f515a9bb56cbaf1ff5cb0a5554700bc9af20a26c0470a83c8eb46e16175154a6bcaad7e280bbfd837a768f9f094da770b7bd3849f88

                                                    • C:\Users\Admin\AppData\Local\Temp\qwipvuzf.pls\installer.exe
                                                      MD5

                                                      c313ddb7df24003d25bf62c5a218b215

                                                      SHA1

                                                      20a3404b7e17b530885fa0be130e784f827986ee

                                                      SHA256

                                                      e3bc81a59fc45dfdfcc57b0078437061cb8c3396e1d593fcf187e3cdf0373ed1

                                                      SHA512

                                                      542e2746626a066f3e875ae2f0d15e2c4beb5887376bb0218090f0e8492a6fdb11fa02b035d7d4200562811df7d2187b8a993a0b7f65489535919bdf11eb4cff

                                                    • C:\Users\Admin\AppData\Local\Temp\qwipvuzf.pls\installer.exe
                                                      MD5

                                                      c313ddb7df24003d25bf62c5a218b215

                                                      SHA1

                                                      20a3404b7e17b530885fa0be130e784f827986ee

                                                      SHA256

                                                      e3bc81a59fc45dfdfcc57b0078437061cb8c3396e1d593fcf187e3cdf0373ed1

                                                      SHA512

                                                      542e2746626a066f3e875ae2f0d15e2c4beb5887376bb0218090f0e8492a6fdb11fa02b035d7d4200562811df7d2187b8a993a0b7f65489535919bdf11eb4cff

                                                    • C:\Users\Admin\AppData\Local\Temp\ztci32nw.0dm\google-game.exe
                                                      MD5

                                                      4fc353c2a1efb09db10d6293d698c00a

                                                      SHA1

                                                      298d40527da37b9ccc5fb81c88a0643e7e3fba67

                                                      SHA256

                                                      7010d5ddded81107f17f04b164bdcf1d3f9cd3e84745f711ad5178356c13bff7

                                                      SHA512

                                                      7152f9de352f8089bb294e4f759fff3bfa6b01aaa6d383468178862369923ec53c5f68056c5499411293fa66673f5b885a4d539fba98cf068fb6ef6753110a47

                                                    • C:\Users\Admin\AppData\Local\Temp\ztci32nw.0dm\google-game.exe
                                                      MD5

                                                      4fc353c2a1efb09db10d6293d698c00a

                                                      SHA1

                                                      298d40527da37b9ccc5fb81c88a0643e7e3fba67

                                                      SHA256

                                                      7010d5ddded81107f17f04b164bdcf1d3f9cd3e84745f711ad5178356c13bff7

                                                      SHA512

                                                      7152f9de352f8089bb294e4f759fff3bfa6b01aaa6d383468178862369923ec53c5f68056c5499411293fa66673f5b885a4d539fba98cf068fb6ef6753110a47

                                                    • C:\Users\Admin\AppData\Local\Temp\ztci32nw.0dm\google-game.exe
                                                      MD5

                                                      4fc353c2a1efb09db10d6293d698c00a

                                                      SHA1

                                                      298d40527da37b9ccc5fb81c88a0643e7e3fba67

                                                      SHA256

                                                      7010d5ddded81107f17f04b164bdcf1d3f9cd3e84745f711ad5178356c13bff7

                                                      SHA512

                                                      7152f9de352f8089bb294e4f759fff3bfa6b01aaa6d383468178862369923ec53c5f68056c5499411293fa66673f5b885a4d539fba98cf068fb6ef6753110a47

                                                    • C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msi
                                                      MD5

                                                      98e537669f4ce0062f230a14bcfcaf35

                                                      SHA1

                                                      a19344f6a5e59c71f51e86119f5fa52030a92810

                                                      SHA256

                                                      6f515aac05311f411968ee6e48d287a1eb452e404ffeff75ee0530dcf3243735

                                                      SHA512

                                                      1ebc254289610be65882a6ceb1beebbf2be83006117f0a6ccbddd19ab7dc807978232a13ad5fa39b6f06f694d4f7c75760b773d70b87c0badef1da89bb7af3ac

                                                    • C:\Windows\Installer\MSI47E7.tmp
                                                      MD5

                                                      7468eca4e3b4dbea0711a81ae9e6e3f2

                                                      SHA1

                                                      4a0c34c342ee7c9df2a0d58d0b5e8bfe94d1251d

                                                      SHA256

                                                      73af1e816ec70be2a3e087af6ed7abc783c50c06b9df224f101e13a792df9837

                                                      SHA512

                                                      3f93a70c8cc05426e08a404c9d1922a46dd4122e7f42bc292f3b5064903a15e13069b58cb615918cc06deaf31bd5805a925cbd656aabc5d78068eb7224a63f56

                                                    • C:\Windows\Installer\MSI4E7F.tmp
                                                      MD5

                                                      0981d5c068a9c33f4e8110f81ffbb92e

                                                      SHA1

                                                      badb871adf6f24aba6923b9b21b211cea2aeca77

                                                      SHA256

                                                      b3f5e10fb1b7352a6dbbcbb10ed605a8fda24f3f9c31f954835bd5a41eb6ea68

                                                      SHA512

                                                      59cccdcde1964e61fa63078fde776eee91c462d7d3db308ada02e27e6ce584c41ad1f7970642e02ce331d805215a2cc868fb0512c01accfa70cda52e9329e1d8

                                                    • C:\Windows\Installer\MSI5055.tmp
                                                      MD5

                                                      0981d5c068a9c33f4e8110f81ffbb92e

                                                      SHA1

                                                      badb871adf6f24aba6923b9b21b211cea2aeca77

                                                      SHA256

                                                      b3f5e10fb1b7352a6dbbcbb10ed605a8fda24f3f9c31f954835bd5a41eb6ea68

                                                      SHA512

                                                      59cccdcde1964e61fa63078fde776eee91c462d7d3db308ada02e27e6ce584c41ad1f7970642e02ce331d805215a2cc868fb0512c01accfa70cda52e9329e1d8

                                                    • \Program Files (x86)\i-record\AForge.Video.FFMPEG.dll
                                                      MD5

                                                      5f60669a79e4c4285325284ab662a0c0

                                                      SHA1

                                                      5b83f8f2799394df3751799605e9292b21b78504

                                                      SHA256

                                                      3f6aa370d70259dc55241950d669d2bf3dc7b57a0c45c6a2f8dec0d8c8cc35b0

                                                      SHA512

                                                      6ec9fe576daa4fde11a39a929dd23ab44297521c4d23352af1a78716cc3ec7927aa6949d5f7af638148e58e5b6d1d16043ad1a7b0dabb8103acc07d0d4c8a42f

                                                    • \Program Files (x86)\i-record\AForge.Video.FFMPEG.dll
                                                      MD5

                                                      5f60669a79e4c4285325284ab662a0c0

                                                      SHA1

                                                      5b83f8f2799394df3751799605e9292b21b78504

                                                      SHA256

                                                      3f6aa370d70259dc55241950d669d2bf3dc7b57a0c45c6a2f8dec0d8c8cc35b0

                                                      SHA512

                                                      6ec9fe576daa4fde11a39a929dd23ab44297521c4d23352af1a78716cc3ec7927aa6949d5f7af638148e58e5b6d1d16043ad1a7b0dabb8103acc07d0d4c8a42f

                                                    • \Program Files (x86)\i-record\AForge.Video.FFMPEG.dll
                                                      MD5

                                                      5f60669a79e4c4285325284ab662a0c0

                                                      SHA1

                                                      5b83f8f2799394df3751799605e9292b21b78504

                                                      SHA256

                                                      3f6aa370d70259dc55241950d669d2bf3dc7b57a0c45c6a2f8dec0d8c8cc35b0

                                                      SHA512

                                                      6ec9fe576daa4fde11a39a929dd23ab44297521c4d23352af1a78716cc3ec7927aa6949d5f7af638148e58e5b6d1d16043ad1a7b0dabb8103acc07d0d4c8a42f

                                                    • \Program Files (x86)\i-record\avcodec-53.dll
                                                      MD5

                                                      65f639a2eda8db2a1ea40b5ddb5a2ed4

                                                      SHA1

                                                      3f32853740928c5e88b15fdc86c95a2ebd8aeb37

                                                      SHA256

                                                      e4e41c0c1c85e2aeaff1bea914880d2cb01b153a1a9ceddccaf05f8b5362210d

                                                      SHA512

                                                      980b6a5511716073d5eeb8b5437c6f23bda300402c64d05d2a54da614e3ef1412743ec5bb4100e54699d7a74f8c437560cb9faa67824cbbabdf1f9399945e21b

                                                    • \Program Files (x86)\i-record\avformat-53.dll
                                                      MD5

                                                      11340a55f155a904596bf3a13788a93a

                                                      SHA1

                                                      92a2f79717f71696ebde3c400aa52804eda5984e

                                                      SHA256

                                                      b26b2df18537b3df6706aa9e743d1a1e511a6fd21f7f7815f15ef96bb09a85e9

                                                      SHA512

                                                      2dc2bb8b0b4a38ddee62d85fdf7c551b0b77f5b9c7791cf82a00eea847f86006df5139874381dd6db739bb77ec008be9f32185ec71ca8be603f7fe515662c78b

                                                    • \Program Files (x86)\i-record\avformat-53.dll
                                                      MD5

                                                      11340a55f155a904596bf3a13788a93a

                                                      SHA1

                                                      92a2f79717f71696ebde3c400aa52804eda5984e

                                                      SHA256

                                                      b26b2df18537b3df6706aa9e743d1a1e511a6fd21f7f7815f15ef96bb09a85e9

                                                      SHA512

                                                      2dc2bb8b0b4a38ddee62d85fdf7c551b0b77f5b9c7791cf82a00eea847f86006df5139874381dd6db739bb77ec008be9f32185ec71ca8be603f7fe515662c78b

                                                    • \Program Files (x86)\i-record\avutil-51.dll
                                                      MD5

                                                      78128217a6151041fc8f7f29960bdd2a

                                                      SHA1

                                                      a6fe2fa059334871181f60b626352e8325cbdda8

                                                      SHA256

                                                      678ca4d9f4d4ad1703006026afe3df5490664c05bb958b991c028ce9314757f7

                                                      SHA512

                                                      5f534a8b186797046526cfb29f95e89e90c555cf54cc8e99a801dfe9327433c9c0fd2cb63a335ade606075c9fab5173c1ad805242ceb04bc1fd78f37da166d84

                                                    • \Program Files (x86)\i-record\swscale-2.dll
                                                      MD5

                                                      564dca64680d608517721cdbe324b1d6

                                                      SHA1

                                                      f2683fa13772fc85c3ea4cffa3d896373a603ad3

                                                      SHA256

                                                      f9550ace57ce5b19add143e507179dc601a832b054963d1c3b5c003f1a8149cc

                                                      SHA512

                                                      1d80e9de29320201c988e8b11036c423d83620e99bcadec5142eb14b6513e49d9b41904e92154139e327cd5cc6f058b4bb467ee4fbb342794296e0dfe774dc75

                                                    • \Users\Admin\AppData\Local\Temp\INA3902.tmp
                                                      MD5

                                                      7468eca4e3b4dbea0711a81ae9e6e3f2

                                                      SHA1

                                                      4a0c34c342ee7c9df2a0d58d0b5e8bfe94d1251d

                                                      SHA256

                                                      73af1e816ec70be2a3e087af6ed7abc783c50c06b9df224f101e13a792df9837

                                                      SHA512

                                                      3f93a70c8cc05426e08a404c9d1922a46dd4122e7f42bc292f3b5064903a15e13069b58cb615918cc06deaf31bd5805a925cbd656aabc5d78068eb7224a63f56

                                                    • \Users\Admin\AppData\Local\Temp\MSI3933.tmp
                                                      MD5

                                                      0981d5c068a9c33f4e8110f81ffbb92e

                                                      SHA1

                                                      badb871adf6f24aba6923b9b21b211cea2aeca77

                                                      SHA256

                                                      b3f5e10fb1b7352a6dbbcbb10ed605a8fda24f3f9c31f954835bd5a41eb6ea68

                                                      SHA512

                                                      59cccdcde1964e61fa63078fde776eee91c462d7d3db308ada02e27e6ce584c41ad1f7970642e02ce331d805215a2cc868fb0512c01accfa70cda52e9329e1d8

                                                    • \Users\Admin\AppData\Local\Temp\MSI3CCE.tmp
                                                      MD5

                                                      43d68e8389e7df33189d1c1a05a19ac8

                                                      SHA1

                                                      caf9cc610985e5cfdbae0c057233a6194ecbfed4

                                                      SHA256

                                                      85dc7518ad5aa46ef572f17050e3b004693784d1855cca9390da1143a64fceae

                                                      SHA512

                                                      58a76b4cb8f53cee73a8fc2afbd69388a1f2ea30ea3c0007beaa361cb0cc3d4d18c1fa8ccf036a2d2cf8fa07b01451000a704a626d95bd050afe6ba808e6de1e

                                                    • \Users\Admin\AppData\Local\Temp\axhub.dll
                                                      MD5

                                                      1c7be730bdc4833afb7117d48c3fd513

                                                      SHA1

                                                      dc7e38cfe2ae4a117922306aead5a7544af646b8

                                                      SHA256

                                                      8206b4b3897ca45b9e083273f616902966e57091516844906e6ae2aefe63cef1

                                                      SHA512

                                                      7936c862a06b7ecdb6710a1bb62cbea149f75504b580c2f100945674c987f3eec53e9aa5915e32b4f74bcf46f2df9468f68a454400faebd909f933e8072e0f2e

                                                    • \Users\Admin\AppData\Local\Temp\is-6QO6K.tmp\idp.dll
                                                      MD5

                                                      8f995688085bced38ba7795f60a5e1d3

                                                      SHA1

                                                      5b1ad67a149c05c50d6e388527af5c8a0af4343a

                                                      SHA256

                                                      203d7b61eac96de865ab3b586160e72c78d93ab5532b13d50ef27174126fd006

                                                      SHA512

                                                      043d41947ab69fc9297dcb5ad238acc2c35250d1172869945ed1a56894c10f93855f0210cbca41ceee9efb55fd56a35a4ec03c77e252409edc64bfb5fb821c35

                                                    • \Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\decoder.dll
                                                      MD5

                                                      2ca6d4ed5dd15fb7934c87e857f5ebfc

                                                      SHA1

                                                      383a55cc0ab890f41b71ca67e070ac7c903adeb6

                                                      SHA256

                                                      39412aacdcddc4b2b3cfeb126456edb125ce8cadb131ca5c23c031db4431c5fc

                                                      SHA512

                                                      ce11aa5bd7b0da4baf07146e8377ff0331c1d4b04aaa4408373b4dd0fe2c3f82c84b179d9a90d26cdaa02180f22276d96cf491f9ede66f5f1da6f43cc72e5ac4

                                                    • \Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\decoder.dll
                                                      MD5

                                                      2ca6d4ed5dd15fb7934c87e857f5ebfc

                                                      SHA1

                                                      383a55cc0ab890f41b71ca67e070ac7c903adeb6

                                                      SHA256

                                                      39412aacdcddc4b2b3cfeb126456edb125ce8cadb131ca5c23c031db4431c5fc

                                                      SHA512

                                                      ce11aa5bd7b0da4baf07146e8377ff0331c1d4b04aaa4408373b4dd0fe2c3f82c84b179d9a90d26cdaa02180f22276d96cf491f9ede66f5f1da6f43cc72e5ac4

                                                    • \Windows\Installer\MSI47E7.tmp
                                                      MD5

                                                      7468eca4e3b4dbea0711a81ae9e6e3f2

                                                      SHA1

                                                      4a0c34c342ee7c9df2a0d58d0b5e8bfe94d1251d

                                                      SHA256

                                                      73af1e816ec70be2a3e087af6ed7abc783c50c06b9df224f101e13a792df9837

                                                      SHA512

                                                      3f93a70c8cc05426e08a404c9d1922a46dd4122e7f42bc292f3b5064903a15e13069b58cb615918cc06deaf31bd5805a925cbd656aabc5d78068eb7224a63f56

                                                    • \Windows\Installer\MSI4E7F.tmp
                                                      MD5

                                                      0981d5c068a9c33f4e8110f81ffbb92e

                                                      SHA1

                                                      badb871adf6f24aba6923b9b21b211cea2aeca77

                                                      SHA256

                                                      b3f5e10fb1b7352a6dbbcbb10ed605a8fda24f3f9c31f954835bd5a41eb6ea68

                                                      SHA512

                                                      59cccdcde1964e61fa63078fde776eee91c462d7d3db308ada02e27e6ce584c41ad1f7970642e02ce331d805215a2cc868fb0512c01accfa70cda52e9329e1d8

                                                    • memory/68-236-0x000001F928680000-0x000001F9286F1000-memory.dmp
                                                      Filesize

                                                      452KB

                                                    • memory/684-269-0x000001AEBB140000-0x000001AEBB1B1000-memory.dmp
                                                      Filesize

                                                      452KB

                                                    • memory/1080-266-0x000001FF31200000-0x000001FF31271000-memory.dmp
                                                      Filesize

                                                      452KB

                                                    • memory/1188-265-0x000001E98CE40000-0x000001E98CEB1000-memory.dmp
                                                      Filesize

                                                      452KB

                                                    • memory/1216-115-0x0000000000000000-mapping.dmp
                                                    • memory/1216-119-0x00000000001E0000-0x00000000001E1000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/1216-180-0x0000000000000000-mapping.dmp
                                                    • memory/1244-270-0x0000023801620000-0x0000023801691000-memory.dmp
                                                      Filesize

                                                      452KB

                                                    • memory/1368-272-0x000002668DB90000-0x000002668DC01000-memory.dmp
                                                      Filesize

                                                      452KB

                                                    • memory/1788-274-0x00000230EEE40000-0x00000230EEEB1000-memory.dmp
                                                      Filesize

                                                      452KB

                                                    • memory/1876-235-0x000002328FF10000-0x000002328FF5C000-memory.dmp
                                                      Filesize

                                                      304KB

                                                    • memory/1876-237-0x000002328FFD0000-0x0000023290041000-memory.dmp
                                                      Filesize

                                                      452KB

                                                    • memory/2012-134-0x0000000000000000-mapping.dmp
                                                    • memory/2012-142-0x0000000002B20000-0x0000000002B22000-memory.dmp
                                                      Filesize

                                                      8KB

                                                    • memory/2012-165-0x0000000002B25000-0x0000000002B26000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/2012-162-0x0000000002B24000-0x0000000002B25000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/2012-143-0x0000000002B22000-0x0000000002B24000-memory.dmp
                                                      Filesize

                                                      8KB

                                                    • memory/2256-349-0x0000000000600000-0x000000000060C000-memory.dmp
                                                      Filesize

                                                      48KB

                                                    • memory/2256-347-0x0000000000000000-mapping.dmp
                                                    • memory/2256-348-0x0000000000610000-0x0000000000616000-memory.dmp
                                                      Filesize

                                                      24KB

                                                    • memory/2256-117-0x0000000000400000-0x000000000046D000-memory.dmp
                                                      Filesize

                                                      436KB

                                                    • memory/2328-261-0x000001C9CFF80000-0x000001C9CFFF1000-memory.dmp
                                                      Filesize

                                                      452KB

                                                    • memory/2336-264-0x00000243EBC80000-0x00000243EBCF1000-memory.dmp
                                                      Filesize

                                                      452KB

                                                    • memory/2556-240-0x000001A736000000-0x000001A736071000-memory.dmp
                                                      Filesize

                                                      452KB

                                                    • memory/2640-278-0x0000015D8D500000-0x0000015D8D571000-memory.dmp
                                                      Filesize

                                                      452KB

                                                    • memory/2656-279-0x000001CB60280000-0x000001CB602F1000-memory.dmp
                                                      Filesize

                                                      452KB

                                                    • memory/2760-166-0x0000000065EC0000-0x0000000067271000-memory.dmp
                                                      Filesize

                                                      19.7MB

                                                    • memory/2760-144-0x0000000000000000-mapping.dmp
                                                    • memory/2760-161-0x0000000005910000-0x0000000005B81000-memory.dmp
                                                      Filesize

                                                      2.4MB

                                                    • memory/2760-163-0x0000000002310000-0x0000000002311000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/2760-167-0x0000000005911000-0x0000000005B00000-memory.dmp
                                                      Filesize

                                                      1.9MB

                                                    • memory/2760-168-0x000000006AB00000-0x000000006AB51000-memory.dmp
                                                      Filesize

                                                      324KB

                                                    • memory/2760-169-0x0000000002311000-0x0000000002312000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/2760-170-0x0000000002315000-0x0000000002317000-memory.dmp
                                                      Filesize

                                                      8KB

                                                    • memory/2760-171-0x0000000002312000-0x0000000002313000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/3040-290-0x0000000003340000-0x0000000003356000-memory.dmp
                                                      Filesize

                                                      88KB

                                                    • memory/3768-337-0x00000000050E0000-0x00000000050E1000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/3768-326-0x0000000000418842-mapping.dmp
                                                    • memory/3768-333-0x0000000004E40000-0x0000000004E41000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/3768-332-0x0000000004E00000-0x0000000004E01000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/3768-331-0x0000000004DA0000-0x0000000004DA1000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/3768-358-0x0000000006920000-0x0000000006921000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/3768-330-0x00000000052F0000-0x00000000052F1000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/3768-357-0x0000000006220000-0x0000000006221000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/3768-364-0x0000000006EF0000-0x0000000006EF1000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/3768-325-0x0000000000400000-0x000000000041E000-memory.dmp
                                                      Filesize

                                                      120KB

                                                    • memory/3768-336-0x0000000004CE0000-0x00000000052E6000-memory.dmp
                                                      Filesize

                                                      6.0MB

                                                    • memory/3768-361-0x00000000064A0000-0x00000000064A1000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/3956-138-0x0000000000400000-0x0000000000417000-memory.dmp
                                                      Filesize

                                                      92KB

                                                    • memory/3956-124-0x0000000000000000-mapping.dmp
                                                    • memory/3960-128-0x0000000000000000-mapping.dmp
                                                    • memory/3960-139-0x0000000001640000-0x0000000001642000-memory.dmp
                                                      Filesize

                                                      8KB

                                                    • memory/3964-120-0x0000000000000000-mapping.dmp
                                                    • memory/3964-123-0x0000000000750000-0x0000000000752000-memory.dmp
                                                      Filesize

                                                      8KB

                                                    • memory/4056-129-0x0000000000000000-mapping.dmp
                                                    • memory/4056-140-0x00000000001E0000-0x00000000001E1000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/4104-195-0x0000027C96730000-0x0000027C96800000-memory.dmp
                                                      Filesize

                                                      832KB

                                                    • memory/4104-181-0x0000000000000000-mapping.dmp
                                                    • memory/4104-194-0x0000027C96270000-0x0000027C962DF000-memory.dmp
                                                      Filesize

                                                      444KB

                                                    • memory/4120-311-0x00000000001D0000-0x00000000001D1000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/4120-310-0x0000000000000000-mapping.dmp
                                                    • memory/4284-317-0x0000000000000000-mapping.dmp
                                                    • memory/4284-318-0x0000000000600000-0x0000000000674000-memory.dmp
                                                      Filesize

                                                      464KB

                                                    • memory/4284-319-0x0000000000330000-0x000000000039B000-memory.dmp
                                                      Filesize

                                                      428KB

                                                    • memory/4548-187-0x0000000000000000-mapping.dmp
                                                    • memory/4620-345-0x0000000003240000-0x0000000003245000-memory.dmp
                                                      Filesize

                                                      20KB

                                                    • memory/4620-346-0x0000000002FF0000-0x0000000002FF9000-memory.dmp
                                                      Filesize

                                                      36KB

                                                    • memory/4620-341-0x0000000000000000-mapping.dmp
                                                    • memory/4752-307-0x0000000005A40000-0x0000000005A41000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/4752-306-0x0000000005F50000-0x0000000005F51000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/4752-300-0x0000000000000000-mapping.dmp
                                                    • memory/4752-304-0x00000000057B0000-0x00000000057B1000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/4752-303-0x0000000005800000-0x0000000005801000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/4752-301-0x0000000000FE0000-0x0000000000FE1000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/4824-196-0x0000000000000000-mapping.dmp
                                                    • memory/4828-291-0x0000000000000000-mapping.dmp
                                                    • memory/4912-197-0x0000000000000000-mapping.dmp
                                                    • memory/4960-324-0x00000000003E0000-0x00000000003EC000-memory.dmp
                                                      Filesize

                                                      48KB

                                                    • memory/4960-323-0x00000000003F0000-0x00000000003F7000-memory.dmp
                                                      Filesize

                                                      28KB

                                                    • memory/4960-322-0x0000000000000000-mapping.dmp
                                                    • memory/5020-200-0x0000000000000000-mapping.dmp
                                                    • memory/5048-203-0x0000000000000000-mapping.dmp
                                                    • memory/5108-297-0x0000000000000000-mapping.dmp
                                                    • memory/5164-350-0x0000000000000000-mapping.dmp
                                                    • memory/5164-351-0x0000000000AB0000-0x0000000000AB4000-memory.dmp
                                                      Filesize

                                                      16KB

                                                    • memory/5164-352-0x0000000000AA0000-0x0000000000AA9000-memory.dmp
                                                      Filesize

                                                      36KB

                                                    • memory/5264-353-0x0000000000000000-mapping.dmp
                                                    • memory/5264-354-0x0000000000DA0000-0x0000000000DA5000-memory.dmp
                                                      Filesize

                                                      20KB

                                                    • memory/5264-355-0x0000000000D90000-0x0000000000D99000-memory.dmp
                                                      Filesize

                                                      36KB

                                                    • memory/5284-233-0x0000000000D90000-0x0000000000DED000-memory.dmp
                                                      Filesize

                                                      372KB

                                                    • memory/5284-212-0x0000000000000000-mapping.dmp
                                                    • memory/5284-226-0x0000000000C25000-0x0000000000D26000-memory.dmp
                                                      Filesize

                                                      1.0MB

                                                    • memory/5336-215-0x0000000000000000-mapping.dmp
                                                    • memory/5384-305-0x0000000000000000-mapping.dmp
                                                    • memory/5384-313-0x0000000002470000-0x000000000250D000-memory.dmp
                                                      Filesize

                                                      628KB

                                                    • memory/5384-314-0x0000000000400000-0x00000000008FA000-memory.dmp
                                                      Filesize

                                                      5.0MB

                                                    • memory/5428-295-0x00000166363A0000-0x00000166363BB000-memory.dmp
                                                      Filesize

                                                      108KB

                                                    • memory/5428-296-0x0000016637290000-0x0000016637396000-memory.dmp
                                                      Filesize

                                                      1.0MB

                                                    • memory/5428-218-0x00007FF7BE564060-mapping.dmp
                                                    • memory/5428-230-0x0000016634A20000-0x0000016634A91000-memory.dmp
                                                      Filesize

                                                      452KB

                                                    • memory/5460-220-0x0000000000000000-mapping.dmp
                                                    • memory/5496-172-0x0000000000000000-mapping.dmp
                                                    • memory/5496-335-0x0000000000320000-0x000000000032B000-memory.dmp
                                                      Filesize

                                                      44KB

                                                    • memory/5496-334-0x0000000000330000-0x0000000000337000-memory.dmp
                                                      Filesize

                                                      28KB

                                                    • memory/5496-327-0x0000000000000000-mapping.dmp
                                                    • memory/5576-231-0x0000000000400000-0x0000000000455000-memory.dmp
                                                      Filesize

                                                      340KB

                                                    • memory/5576-224-0x0000000000000000-mapping.dmp
                                                    • memory/5816-241-0x0000000000000000-mapping.dmp
                                                    • memory/5984-343-0x0000000000000000-mapping.dmp
                                                    • memory/6044-253-0x0000000000000000-mapping.dmp
                                                    • memory/6080-368-0x0000000000C00000-0x0000000000C01000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/6080-367-0x0000000000000000-mapping.dmp
                                                    • memory/6100-338-0x0000000000000000-mapping.dmp
                                                    • memory/6100-340-0x00000000007E0000-0x00000000007EF000-memory.dmp
                                                      Filesize

                                                      60KB

                                                    • memory/6100-339-0x00000000007F0000-0x00000000007F9000-memory.dmp
                                                      Filesize

                                                      36KB

                                                    • memory/6108-284-0x00000000009D0000-0x00000000009DA000-memory.dmp
                                                      Filesize

                                                      40KB

                                                    • memory/6108-256-0x0000000000000000-mapping.dmp
                                                    • memory/6384-288-0x0000000000000000-mapping.dmp
                                                    • memory/6388-344-0x0000000000000000-mapping.dmp
                                                    • memory/6392-388-0x0000000000400000-0x000000000041E000-memory.dmp
                                                      Filesize

                                                      120KB

                                                    • memory/6392-389-0x000000000041885A-mapping.dmp
                                                    • memory/6588-280-0x0000000000000000-mapping.dmp
                                                    • memory/6660-282-0x0000000000400000-0x0000000000409000-memory.dmp
                                                      Filesize

                                                      36KB

                                                    • memory/6660-283-0x0000000000402E1A-mapping.dmp
                                                    • memory/6832-308-0x0000000000000000-mapping.dmp
                                                    • memory/6832-315-0x0000000000A60000-0x0000000000AF1000-memory.dmp
                                                      Filesize

                                                      580KB

                                                    • memory/6832-316-0x0000000000400000-0x00000000008EC000-memory.dmp
                                                      Filesize

                                                      4.9MB

                                                    • memory/6852-309-0x0000000000000000-mapping.dmp
                                                    • memory/6852-321-0x0000000000400000-0x00000000008EC000-memory.dmp
                                                      Filesize

                                                      4.9MB

                                                    • memory/6852-320-0x0000000000970000-0x0000000000ABA000-memory.dmp
                                                      Filesize

                                                      1.3MB

                                                    • memory/6872-173-0x0000000000000000-mapping.dmp
                                                    • memory/6876-342-0x0000000000000000-mapping.dmp
                                                    • memory/6880-356-0x0000000000000000-mapping.dmp
                                                    • memory/6972-175-0x0000000000000000-mapping.dmp
                                                    • memory/7072-374-0x00000000029C0000-0x0000000002A1A000-memory.dmp
                                                      Filesize

                                                      360KB

                                                    • memory/7072-376-0x0000000002A50000-0x0000000002AA9000-memory.dmp
                                                      Filesize

                                                      356KB

                                                    • memory/7072-385-0x0000000005CA0000-0x0000000005CA1000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/7072-366-0x0000000000000000-mapping.dmp
                                                    • memory/7152-285-0x0000000000000000-mapping.dmp