Resubmissions

12-08-2021 18:33

210812-z3kcywcakj 8

26-07-2021 16:00

210726-pcynvcchwn 10

25-07-2021 18:10

210725-m5zdsbkjn2 8

Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    26-07-2021 16:00

General

  • Target

    Star-Wars-Battlefron_330757428.exe

  • Size

    7.4MB

  • MD5

    1f916117907696b1166fd3b79e9905f9

  • SHA1

    50b83e0dcc2205b8e153ba5898498ef5ee01b943

  • SHA256

    6eafa7c61e42d196916baffa8392658241fe214d13edefeeffde6aa0619e3507

  • SHA512

    b472b663c0536f2ee6af7ce2c0d8450fbbbc0c32ceef8e22d66f600a19a92c60e5763ce481f3d69f146c4fcd39c75da8d904a081d60d3d2f0aa2d0efe7789048

Malware Config

Extracted

Family

redline

Botnet

230721

C2

cookiebrokrash.info:80

Extracted

Family

redline

Botnet

KO1000000

C2

qusenero.xyz:80

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 4 IoCs
  • Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
  • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
  • ACProtect 1.3x - 1.4x DLL software 2 IoCs

    Detects file using ACProtect software.

  • Blocklisted process makes network request 17 IoCs
  • Downloads MZ/PE file
  • Drops file in Drivers directory 3 IoCs
  • Executes dropped EXE 31 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 64 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Drops file in System32 directory 17 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • autoit_exe 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 26 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 8 IoCs
  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 22 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Star-Wars-Battlefron_330757428.exe
    "C:\Users\Admin\AppData\Local\Temp\Star-Wars-Battlefron_330757428.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1868
    • C:\Users\Admin\AppData\Local\Temp\is-P00DC.tmp\Star-Wars-Battlefron_330757428.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-P00DC.tmp\Star-Wars-Battlefron_330757428.tmp" /SL5="$2010E,7020769,1072640,C:\Users\Admin\AppData\Local\Temp\Star-Wars-Battlefron_330757428.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:1296
      • C:\Program Files (x86)\SEH Recovery Toolbox\SEHRecoveryToolboxLauncher.exe
        "C:\Program Files (x86)\SEH Recovery Toolbox\SEHRecoveryToolboxLauncher.exe" Star-Wars-Battlefron_330757428.exe
        3⤵
        • Executes dropped EXE
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1444
        • C:\Users\Admin\AppData\Local\Temp\FCSwNxFd\t7juNyLP8Z4mam.exe
          C:\Users\Admin\AppData\Local\Temp\FCSwNxFd\t7juNyLP8Z4mam.exe /usthree SUB=99f69862cabc9f37656311cddac8615f
          4⤵
          • Executes dropped EXE
          PID:2728
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2728 -s 732
            5⤵
            • Program crash
            • Suspicious behavior: EnumeratesProcesses
            PID:4984
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2728 -s 748
            5⤵
            • Program crash
            • Suspicious behavior: EnumeratesProcesses
            PID:2272
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2728 -s 848
            5⤵
            • Program crash
            • Suspicious behavior: EnumeratesProcesses
            PID:1176
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2728 -s 812
            5⤵
            • Program crash
            • Suspicious behavior: EnumeratesProcesses
            PID:4388
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2728 -s 952
            5⤵
            • Program crash
            PID:4816
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2728 -s 876
            5⤵
            • Program crash
            PID:4908
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2728 -s 1224
            5⤵
            • Program crash
            PID:4872
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2728 -s 1216
            5⤵
            • Program crash
            PID:5080
        • C:\Users\Admin\AppData\Local\Temp\fTYEnbJg\O5wqqxYa2OchwqPDuR.exe
          C:\Users\Admin\AppData\Local\Temp\fTYEnbJg\O5wqqxYa2OchwqPDuR.exe /quiet SILENT=1 AF=606x99f69862cabc9f37656311cddac8615f
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Enumerates connected drives
          • Modifies system certificate store
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:2696
          • C:\Windows\SysWOW64\msiexec.exe
            "C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Weather\Weather 1.0.0\install\FD7DF1F\Weather Installation.msi" /quiet SILENT=1 AF=606x99f69862cabc9f37656311cddac8615f AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\fTYEnbJg\O5wqqxYa2OchwqPDuR.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\fTYEnbJg\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1627056219 /quiet SILENT=1 AF=606x99f69862cabc9f37656311cddac8615f " AF="606x99f69862cabc9f37656311cddac8615f" AI_CONTROL_VISUAL_STYLE="16578540;16578540;14988840;12422912"
            5⤵
              PID:4636
          • C:\Users\Admin\AppData\Local\Temp\I3rQoici\AGaYQj9bD2.exe
            C:\Users\Admin\AppData\Local\Temp\I3rQoici\AGaYQj9bD2.exe /VERYSILENT
            4⤵
            • Executes dropped EXE
            • Checks computer location settings
            • Modifies system certificate store
            • Suspicious use of WriteProcessMemory
            PID:2704
            • C:\Users\Admin\AppData\Local\Temp\komarjoba.exe
              C:\Users\Admin\AppData\Local\Temp\komarjoba.exe
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:4372
              • C:\Users\Admin\AppData\Local\Temp\komarjoba.exe
                C:\Users\Admin\AppData\Local\Temp\komarjoba.exe
                6⤵
                • Executes dropped EXE
                PID:4668
              • C:\Users\Admin\AppData\Local\Temp\komarjoba.exe
                C:\Users\Admin\AppData\Local\Temp\komarjoba.exe
                6⤵
                • Executes dropped EXE
                PID:4260
            • C:\Users\Admin\AppData\Local\Temp\kamarjoba.exe
              C:\Users\Admin\AppData\Local\Temp\kamarjoba.exe
              5⤵
              • Executes dropped EXE
              PID:4672
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /k ping 0 & del C:\Users\Admin\AppData\Local\Temp\I3rQoici\AGaYQj9bD2.exe & exit
              5⤵
                PID:4280
                • C:\Windows\SysWOW64\PING.EXE
                  ping 0
                  6⤵
                  • Runs ping.exe
                  PID:2464
            • C:\Users\Admin\AppData\Local\Temp\9xgFkmVd\vpn.exe
              C:\Users\Admin\AppData\Local\Temp\9xgFkmVd\vpn.exe /silent /subid=510x99f69862cabc9f37656311cddac8615f
              4⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:4144
              • C:\Users\Admin\AppData\Local\Temp\is-83B32.tmp\vpn.tmp
                "C:\Users\Admin\AppData\Local\Temp\is-83B32.tmp\vpn.tmp" /SL5="$3030E,15170975,270336,C:\Users\Admin\AppData\Local\Temp\9xgFkmVd\vpn.exe" /silent /subid=510x99f69862cabc9f37656311cddac8615f
                5⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in Program Files directory
                • Modifies registry class
                • Modifies system certificate store
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of WriteProcessMemory
                PID:4192
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\uninstall.bat" "
                  6⤵
                  • Suspicious use of WriteProcessMemory
                  PID:4888
                  • C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exe
                    tapinstall.exe remove tap0901
                    7⤵
                    • Executes dropped EXE
                    • Checks SCSI registry key(s)
                    PID:5036
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\install.bat" "
                  6⤵
                  • Suspicious use of WriteProcessMemory
                  PID:5076
                  • C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exe
                    tapinstall.exe install OemVista.inf tap0901
                    7⤵
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    • Drops file in Windows directory
                    • Checks SCSI registry key(s)
                    • Modifies system certificate store
                    PID:4152
                • C:\Program Files (x86)\MaskVPN\mask_svc.exe
                  "C:\Program Files (x86)\MaskVPN\mask_svc.exe" uninstall
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  PID:4904
                • C:\Program Files (x86)\MaskVPN\mask_svc.exe
                  "C:\Program Files (x86)\MaskVPN\mask_svc.exe" install
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  PID:4312
      • C:\Windows\System32\rundll32.exe
        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
        1⤵
          PID:3724
        • C:\Windows\system32\msiexec.exe
          C:\Windows\system32\msiexec.exe /V
          1⤵
          • Enumerates connected drives
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4304
          • C:\Windows\syswow64\MsiExec.exe
            C:\Windows\syswow64\MsiExec.exe -Embedding 763D2312246424C84D4E8493163EA19D C
            2⤵
            • Loads dropped DLL
            PID:4508
          • C:\Windows\syswow64\MsiExec.exe
            C:\Windows\syswow64\MsiExec.exe -Embedding FD4B3888E36F732CA1C25A2E10DDF985
            2⤵
            • Blocklisted process makes network request
            • Loads dropped DLL
            PID:4752
          • C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\aipackagechainer.exe
            "C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\aipackagechainer.exe"
            2⤵
            • Executes dropped EXE
            • Adds Run key to start application
            PID:4284
            • C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\RequiredApplication_1\Weather_Installation.exe
              "C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\RequiredApplication_1\Weather_Installation.exe" -silent=1 -AF=606x99f69862cabc9f37656311cddac8615f -BF=default -uncf=default
              3⤵
              • Suspicious use of NtCreateProcessExOtherParentProcess
              • Executes dropped EXE
              • Loads dropped DLL
              • Adds Run key to start application
              PID:5080
              • C:\Users\Admin\AppData\Roaming\Weather\Weather.exe
                "C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" "--Lck7KQ"
                4⤵
                • Executes dropped EXE
                • Checks computer location settings
                • Loads dropped DLL
                PID:3764
                • C:\Users\Admin\AppData\Roaming\Weather\Weather.exe
                  C:\Users\Admin\AppData\Roaming\Weather\Weather.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Weather\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Weather\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Weather\User Data" --annotation=plat=Win64 --annotation=prod=Weather --annotation=ver=0.0.2 --initial-client-data=0x1e0,0x1e4,0x1e8,0x1bc,0x1ec,0x7ff8e7a79ec0,0x7ff8e7a79ed0,0x7ff8e7a79ee0
                  5⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  PID:4688
                • C:\Users\Admin\AppData\Roaming\Weather\Weather.exe
                  "C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=gpu-process --field-trial-handle=1520,13156288375222991249,15814239424587502869,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw3764_1844617819" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1568 /prefetch:2
                  5⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  PID:4592
                • C:\Users\Admin\AppData\Roaming\Weather\Weather.exe
                  "C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1520,13156288375222991249,15814239424587502869,131072 --lang=en-US --service-sandbox-type=network --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw3764_1844617819" --mojo-platform-channel-handle=2044 /prefetch:8
                  5⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  PID:2728
                • C:\Users\Admin\AppData\Roaming\Weather\Weather.exe
                  "C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1520,13156288375222991249,15814239424587502869,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw3764_1844617819" --mojo-platform-channel-handle=2056 /prefetch:8
                  5⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  PID:4692
                • C:\Users\Admin\AppData\Roaming\Weather\Weather.exe
                  "C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Weather\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1520,13156288375222991249,15814239424587502869,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw3764_1844617819" --nwjs --extension-process --enable-auto-reload --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --mojo-platform-channel-handle=2564 /prefetch:1
                  5⤵
                  • Executes dropped EXE
                  • Checks computer location settings
                  • Loads dropped DLL
                  PID:4176
                • C:\Users\Admin\AppData\Roaming\Weather\Weather.exe
                  "C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=gpu-process --field-trial-handle=1520,13156288375222991249,15814239424587502869,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw3764_1844617819" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2600 /prefetch:2
                  5⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  PID:5264
                • C:\Users\Admin\AppData\Roaming\Weather\Weather.exe
                  "C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1520,13156288375222991249,15814239424587502869,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw3764_1844617819" --mojo-platform-channel-handle=3292 /prefetch:8
                  5⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  PID:5648
                • C:\Users\Admin\AppData\Roaming\Weather\Weather.exe
                  "C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1520,13156288375222991249,15814239424587502869,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw3764_1844617819" --mojo-platform-channel-handle=3440 /prefetch:8
                  5⤵
                  • Executes dropped EXE
                  PID:5716
                • C:\Users\Admin\AppData\Roaming\Weather\Weather.exe
                  "C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1520,13156288375222991249,15814239424587502869,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw3764_1844617819" --mojo-platform-channel-handle=3404 /prefetch:8
                  5⤵
                  • Executes dropped EXE
                  PID:6024
                • C:\Users\Admin\AppData\Roaming\Weather\Weather.exe
                  "C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1520,13156288375222991249,15814239424587502869,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw3764_1844617819" --mojo-platform-channel-handle=2876 /prefetch:8
                  5⤵
                  • Executes dropped EXE
                  PID:6092
                • C:\Users\Admin\AppData\Roaming\Weather\Weather.exe
                  "C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1520,13156288375222991249,15814239424587502869,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw3764_1844617819" --mojo-platform-channel-handle=2292 /prefetch:8
                  5⤵
                  • Executes dropped EXE
                  PID:5288
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -NonInteractive -NoLogo -ExecutionPolicy AllSigned -Command "C:\Users\Admin\AppData\Local\Temp\AI_4595.ps1 -paths 'C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\file_deleter.ps1','C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\aipackagechainer.exe','C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites' -retry_count 10"
              3⤵
              • Blocklisted process makes network request
              PID:4124
        • \??\c:\windows\system32\svchost.exe
          c:\windows\system32\svchost.exe -k dcomlaunch -s DeviceInstall
          1⤵
          • Drops file in Windows directory
          • Checks SCSI registry key(s)
          • Suspicious use of WriteProcessMemory
          PID:4360
          • C:\Windows\system32\DrvInst.exe
            DrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{7b3757c4-3df7-7044-8540-2864e8fd0b56}\oemvista.inf" "9" "4d14a44ff" "0000000000000138" "WinSta0\Default" "0000000000000168" "208" "c:\program files (x86)\maskvpn\driver\win764"
            2⤵
            • Drops file in System32 directory
            • Drops file in Windows directory
            • Checks SCSI registry key(s)
            • Modifies data under HKEY_USERS
            PID:4424
          • C:\Windows\system32\DrvInst.exe
            DrvInst.exe "2" "211" "ROOT\NET\0000" "C:\Windows\INF\oem2.inf" "oemvista.inf:3beb73aff103cc24:tap0901.ndi:9.0.0.21:tap0901," "4d14a44ff" "0000000000000138"
            2⤵
            • Drops file in Drivers directory
            • Drops file in System32 directory
            • Drops file in Windows directory
            • Checks SCSI registry key(s)
            PID:3996
        • \??\c:\windows\system32\svchost.exe
          c:\windows\system32\svchost.exe -k netsvcs -s NetSetupSvc
          1⤵
            PID:4608
          • \??\c:\windows\system32\svchost.exe
            c:\windows\system32\svchost.exe -k netsvcs -s DsmSvc
            1⤵
            • Checks SCSI registry key(s)
            PID:4596
          • C:\Program Files (x86)\MaskVPN\mask_svc.exe
            "C:\Program Files (x86)\MaskVPN\mask_svc.exe"
            1⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Modifies data under HKEY_USERS
            PID:4588
            • C:\Program Files (x86)\MaskVPN\MaskVPNUpdate.exe
              MaskVPNUpdate.exe /silent
              2⤵
              • Executes dropped EXE
              • Drops file in Program Files directory
              • Suspicious use of SetWindowsHookEx
              PID:5988
          • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
            "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
            1⤵
            • Drops file in Windows directory
            • Modifies Internet Explorer settings
            • Modifies registry class
            • Suspicious use of SetWindowsHookEx
            PID:4424
          • C:\Windows\system32\browser_broker.exe
            C:\Windows\system32\browser_broker.exe -Embedding
            1⤵
            • Modifies Internet Explorer settings
            PID:4408
          • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
            "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
            1⤵
            • Modifies registry class
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of SetWindowsHookEx
            PID:1196
          • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
            "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
            1⤵
            • Modifies Internet Explorer settings
            • Modifies registry class
            PID:5064
          • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
            "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
            1⤵
            • Modifies registry class
            PID:4264
          • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
            "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
            1⤵
            • Modifies registry class
            PID:5792
          • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
            "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
            1⤵
            • Modifies registry class
            PID:5884

          Network

          MITRE ATT&CK Matrix ATT&CK v6

          Persistence

          Registry Run Keys / Startup Folder

          1
          T1060

          Defense Evasion

          Modify Registry

          3
          T1112

          Install Root Certificate

          1
          T1130

          Credential Access

          Credentials in Files

          2
          T1081

          Discovery

          Query Registry

          4
          T1012

          System Information Discovery

          4
          T1082

          Peripheral Device Discovery

          2
          T1120

          Remote System Discovery

          1
          T1018

          Collection

          Data from Local System

          2
          T1005

          Command and Control

          Web Service

          1
          T1102

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files (x86)\MaskVPN\driver\win764\OemVista.inf
            MD5

            87868193626dc756d10885f46d76f42e

            SHA1

            94a5ce8ed7633ed77531b6cb14ceb1927c5cae1f

            SHA256

            b5728e42ea12c67577cb9188b472005ee74399b6ac976e7f72b48409baee3b41

            SHA512

            79751330bed5c16d66baf3e5212be0950f312ffd5b80b78be66eaea3cc7115f8a9472d2a43b5ce702aa044f3b45fd572775ff86572150df91cc27866f88f8277

          • C:\Program Files (x86)\MaskVPN\driver\win764\install.bat
            MD5

            3a05ce392d84463b43858e26c48f9cbf

            SHA1

            78f624e2c81c3d745a45477d61749b8452c129f1

            SHA256

            5b56d8b121fc9a7f2d4e90edb1b29373cd2d06bac1c54ada8f6cb559b411180b

            SHA512

            8a31fda09f0fa7779c4fb0c0629d4d446957c8aaae0595759dd2b434e84a17ecb6ffe4beff973a245caf0452a0c04a488d2ae7b232d8559f3bd1bfd68fed7cf1

          • C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exe
            MD5

            d10f74d86cd350732657f542df533f82

            SHA1

            c54074f8f162a780819175e7169c43f6706ad46c

            SHA256

            c9963a3f8abf6fedc8f983a9655a387d67c752bd59b0d16fd6fc2396b4b4ca67

            SHA512

            0d7cb060e4a9482d4862ff47c9d6f52a060c4fb4e3b8388769fa2974ccf081af6bea7b1d4325c03d128bc4de6e0525d6e9bf3a42564391f2acd980435a0dd87e

          • C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exe
            MD5

            d10f74d86cd350732657f542df533f82

            SHA1

            c54074f8f162a780819175e7169c43f6706ad46c

            SHA256

            c9963a3f8abf6fedc8f983a9655a387d67c752bd59b0d16fd6fc2396b4b4ca67

            SHA512

            0d7cb060e4a9482d4862ff47c9d6f52a060c4fb4e3b8388769fa2974ccf081af6bea7b1d4325c03d128bc4de6e0525d6e9bf3a42564391f2acd980435a0dd87e

          • C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exe
            MD5

            d10f74d86cd350732657f542df533f82

            SHA1

            c54074f8f162a780819175e7169c43f6706ad46c

            SHA256

            c9963a3f8abf6fedc8f983a9655a387d67c752bd59b0d16fd6fc2396b4b4ca67

            SHA512

            0d7cb060e4a9482d4862ff47c9d6f52a060c4fb4e3b8388769fa2974ccf081af6bea7b1d4325c03d128bc4de6e0525d6e9bf3a42564391f2acd980435a0dd87e

          • C:\Program Files (x86)\MaskVPN\driver\win764\uninstall.bat
            MD5

            9133a44bfd841b8849bddead9957c2c3

            SHA1

            3c1d92aa3f6247a2e7ceeaf0b811cf584ae87591

            SHA256

            b8109f63a788470925ea267f1b6032bba281b1ac3afdf0c56412cb753df58392

            SHA512

            d7f5f99325b9c77939735df3a61097a24613f85e7acc2d84875f78f60b0b70e3504f34d9fff222c593e1daadd9db71080a23b588fe7009ce93b5a4cbe9785545

          • C:\Program Files (x86)\SEH Recovery Toolbox\SEHRecoveryToolboxLauncher.exe
            MD5

            56f12ac950b313c857c4de27ed86d334

            SHA1

            2fb150324007af4b7790af628c1ae0ccadf01b82

            SHA256

            caca1e988b91716e899e5a37d2fa97c17f0d5004cb751800e84c966291136f19

            SHA512

            08057cc1d38a53a8283acfc00ce4ed443afda1a8d7baa343f988f785df37402c8f4929d940c2d83a13fc43905dee3f323fbc0ad5fcfcb4346d8a156d1a722d86

          • C:\Program Files (x86)\SEH Recovery Toolbox\SEHRecoveryToolboxLauncher.exe
            MD5

            56f12ac950b313c857c4de27ed86d334

            SHA1

            2fb150324007af4b7790af628c1ae0ccadf01b82

            SHA256

            caca1e988b91716e899e5a37d2fa97c17f0d5004cb751800e84c966291136f19

            SHA512

            08057cc1d38a53a8283acfc00ce4ed443afda1a8d7baa343f988f785df37402c8f4929d940c2d83a13fc43905dee3f323fbc0ad5fcfcb4346d8a156d1a722d86

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\5080DC7A65DB6A5960ECD874088F3328_79CFD3DF2894C4BFDA2ADFD6675FA18B
            MD5

            a6227fbf058b4f2bf0a57f80a1c8df6d

            SHA1

            e7a18c8a31a327a8b3d1c214a2f93b15da92d649

            SHA256

            5e4a0581ba2a0a9baeaa2b2b5dc24dafab447a8893aacf61504500371c95b7ae

            SHA512

            fe7c2f3ec974f703ba8f075143749ab48a56485292ef24bf0b7d8bb83d0a861abf313eda9b0bb41a2856d9005342d1bb19b4339fbe9e765ef96ab649994b23db

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
            MD5

            f7dcb24540769805e5bb30d193944dce

            SHA1

            e26c583c562293356794937d9e2e6155d15449ee

            SHA256

            6b88c6ac55bbd6fea0ebe5a760d1ad2cfce251c59d0151a1400701cb927e36ea

            SHA512

            cb5ad678b0ef642bf492f32079fe77e8be20c02de267f04b545df346b25f3e4eb98bb568c4c2c483bb88f7d1826863cb515b570d620766e52476c8ee2931ea94

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7D11549FC90445E1CE90F96A21958A17_FB353789C9BBDA933068CD2920BDF3B7
            MD5

            e8113801d314e634816bef1c52467fb0

            SHA1

            cb487aef84defd81e5d504a810589f1244b468ad

            SHA256

            db6b8810527b608f28c85f1c63eb7600f481dc3fc1f9d0767893fca1f722bfe0

            SHA512

            abdc98b7e6d5c2d8356db941566ed3c07b68091a711e8a508812b029ade08e987c564f2289bd1f2996fcc1413bd2675cbb10cac297d779a5c41ecee750a339d9

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_2DBE917624E9880FE0C7C5570D56E691
            MD5

            dc4ea9550905f8b78acea95163bc8453

            SHA1

            cbef6fb487b231c4555361fef4424da5c8f7999e

            SHA256

            2288c86ef724a3b21b3fde737904e6c12ed0696dd40b4722e2a07d9786554099

            SHA512

            620d9daa9e1d0dbd75c76052628a8ec1f782e0d8db0747fa77f5104f2cea52a0e57be62b0909ceeece07b583df7ed7cabc4f9ac381f2442dd3741be235ebb5f2

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\5080DC7A65DB6A5960ECD874088F3328_79CFD3DF2894C4BFDA2ADFD6675FA18B
            MD5

            6cc00c0941ea712b069103049f6044b6

            SHA1

            46ea391331c4c1f7858674bea0274e993c18b036

            SHA256

            c5f11f649ecf34fd40369a05c1682c13bcb0c7c7774580ae7cde5265c88de537

            SHA512

            f2306a8cbb0b8f6715777b1bcb9aa916ddddb29cc40853e061a5a460ffcb01a98d3795803ddd5238f914cfc9a6a63c6e17d5e53091fd8c5926cfc17c4a55a34f

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
            MD5

            cdfde4de64b11820052e878bf33e8eb7

            SHA1

            1b2e0d8abce325dfda49d1bd5f037bfaf3f62638

            SHA256

            80ee2855955fc656dc6312b706f6a72d35efcedc624bf314ad0304f23d169809

            SHA512

            df4b0bdccd8f378023affc50817b6834468a975944e0918f1df30cec36aa142d61d6be2c66e184f5dab4681209d1df650ad0e73fbf0559797976373eec80d0c6

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7D11549FC90445E1CE90F96A21958A17_FB353789C9BBDA933068CD2920BDF3B7
            MD5

            9087c8b4679d50a78868d99a9c1cfa55

            SHA1

            2f5bdabe6d7b0b4374e2bae0f6eb7fdecd32751f

            SHA256

            5a6ae9bbc8fba31a16c42459f8ff1261c2854dd45b303354ee31637abff8bced

            SHA512

            3a460d1723036f084c532ef940a6782b06375472c85947cdd7279c3e91ffeb5e0b562a7d4e0d1ff004093547871d83ae98ebdbc819ffff4f2ff0d59e36864a06

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_2DBE917624E9880FE0C7C5570D56E691
            MD5

            6eceffd2547d398ef2e00e6a9574983d

            SHA1

            aa486603494e90b4fe6a3c2a0083980c938c76d8

            SHA256

            32acd89341d91feec6a577be0d399ddbf2b343019b97be0338b416bb0379fbbf

            SHA512

            5008b7bb7f03dc927877157df83b2b2923eb9fcdf4626da6c8c7ec362452a5eae9dd10e3b7a825d277b810224b0ade817ebf9d86167e28af18f150c281908451

          • C:\Users\Admin\AppData\Local\Temp\9xgFkmVd\vpn.exe
            MD5

            58b9b0a0f629821a30d3bdc209f2bc35

            SHA1

            0c72d88c82c77ad9deb3d4419223ae53ae2db11c

            SHA256

            7efe1de40aa8d940a966c9856f066865f789b6ed51c333e1b9b81274de7f95e6

            SHA512

            bc7dc1ff602c1f098f916661f57e1b435e2eb539094f75793297ffee15d5e4e97a87af168f04e3f90121c91acab6e218061dcc457b2f23c5c0e1d1d7b0ecc419

          • C:\Users\Admin\AppData\Local\Temp\9xgFkmVd\vpn.exe
            MD5

            58b9b0a0f629821a30d3bdc209f2bc35

            SHA1

            0c72d88c82c77ad9deb3d4419223ae53ae2db11c

            SHA256

            7efe1de40aa8d940a966c9856f066865f789b6ed51c333e1b9b81274de7f95e6

            SHA512

            bc7dc1ff602c1f098f916661f57e1b435e2eb539094f75793297ffee15d5e4e97a87af168f04e3f90121c91acab6e218061dcc457b2f23c5c0e1d1d7b0ecc419

          • C:\Users\Admin\AppData\Local\Temp\FCSwNxFd\t7juNyLP8Z4mam.exe
            MD5

            fc19036f80059e07dd840eea02d69e66

            SHA1

            06205eccce3b05f19181419b2993e7bb19a44bc7

            SHA256

            286ead735856f8e2b19aea60d06026357a07988548ae5e9d51eb00acd3b2f8c1

            SHA512

            f1d38d6b4477a59023ad78b4678ef3552d12367ff3231b4594a868ae5b9a1bd097f588b18dc0ebcb9d38f1a08b1fb2d03757d0b6a68a99ad9b2a5fb714bb34f0

          • C:\Users\Admin\AppData\Local\Temp\FCSwNxFd\t7juNyLP8Z4mam.exe
            MD5

            fc19036f80059e07dd840eea02d69e66

            SHA1

            06205eccce3b05f19181419b2993e7bb19a44bc7

            SHA256

            286ead735856f8e2b19aea60d06026357a07988548ae5e9d51eb00acd3b2f8c1

            SHA512

            f1d38d6b4477a59023ad78b4678ef3552d12367ff3231b4594a868ae5b9a1bd097f588b18dc0ebcb9d38f1a08b1fb2d03757d0b6a68a99ad9b2a5fb714bb34f0

          • C:\Users\Admin\AppData\Local\Temp\I3rQoici\AGaYQj9bD2.exe
            MD5

            85f22b767f3406ef67f3e7dcd95c1df0

            SHA1

            241b3446862efd90d775d2a6108accb91d89d2e0

            SHA256

            f854c706d7a751f6b22455fe11d91b85aa74c072c03ca3226c066f80c2f2c8d9

            SHA512

            a82cecfc0fcfaf9723a454ed8492c511bd0609d7b114ede015c89231904a048671e6891a903d4e00c2c7160a7453a44e155cac4ddd792072692c8f5d2efcf5e7

          • C:\Users\Admin\AppData\Local\Temp\I3rQoici\AGaYQj9bD2.exe
            MD5

            85f22b767f3406ef67f3e7dcd95c1df0

            SHA1

            241b3446862efd90d775d2a6108accb91d89d2e0

            SHA256

            f854c706d7a751f6b22455fe11d91b85aa74c072c03ca3226c066f80c2f2c8d9

            SHA512

            a82cecfc0fcfaf9723a454ed8492c511bd0609d7b114ede015c89231904a048671e6891a903d4e00c2c7160a7453a44e155cac4ddd792072692c8f5d2efcf5e7

          • C:\Users\Admin\AppData\Local\Temp\MSI7E20.tmp
            MD5

            20c782eb64c81ac14c83a853546a8924

            SHA1

            a1506933d294de07a7a2ae1fbc6be468f51371d6

            SHA256

            0ed6836d55180af20f71f7852e3d728f2defe22aa6d2526c54cfbbb4b48cc6a1

            SHA512

            aff21e3e00b39f8983d101a0c616ca84cc3dc72d6464a0dd331965cf6beccf9b45025a7db2042d6e8b05221d3eb5813445c8ada69ae96e2727a607398a3de3d9

          • C:\Users\Admin\AppData\Local\Temp\MSI80C1.tmp
            MD5

            20c782eb64c81ac14c83a853546a8924

            SHA1

            a1506933d294de07a7a2ae1fbc6be468f51371d6

            SHA256

            0ed6836d55180af20f71f7852e3d728f2defe22aa6d2526c54cfbbb4b48cc6a1

            SHA512

            aff21e3e00b39f8983d101a0c616ca84cc3dc72d6464a0dd331965cf6beccf9b45025a7db2042d6e8b05221d3eb5813445c8ada69ae96e2727a607398a3de3d9

          • C:\Users\Admin\AppData\Local\Temp\MSI817D.tmp
            MD5

            d51a7e3bce34c74638e89366deee2aab

            SHA1

            0e68022b52c288e8cdffe85739de1194253a7ef0

            SHA256

            7c6bdf16a0992db092b7f94c374b21de5d53e3043f5717a6eecae614432e0df5

            SHA512

            8ed246747cdd05cac352919d7ded3f14b1e523ccc1f7f172db85eed800b0c5d24475c270b34a7c25e7934467ace7e363542a586cdeb156bfc484f7417c3a4ab0

          • C:\Users\Admin\AppData\Local\Temp\fTYEnbJg\O5wqqxYa2OchwqPDuR.exe
            MD5

            e3f9b4619cc3f2d91cc6004f51482fda

            SHA1

            903786dc9be38c0951ce6d2ddac9172dc85a81fa

            SHA256

            4df9ef2cab713b21afcd28de0e31bb5ade13afe3cd609839bd10a1ec1cd17ed7

            SHA512

            92a1408e9426ec802236e9728f989070be2afd5dbecba526d09b7adb8484a9ff68074b4d6b7759c39d1e1749c4e7da035d005963895ba766114716e425b45432

          • C:\Users\Admin\AppData\Local\Temp\fTYEnbJg\O5wqqxYa2OchwqPDuR.exe
            MD5

            e3f9b4619cc3f2d91cc6004f51482fda

            SHA1

            903786dc9be38c0951ce6d2ddac9172dc85a81fa

            SHA256

            4df9ef2cab713b21afcd28de0e31bb5ade13afe3cd609839bd10a1ec1cd17ed7

            SHA512

            92a1408e9426ec802236e9728f989070be2afd5dbecba526d09b7adb8484a9ff68074b4d6b7759c39d1e1749c4e7da035d005963895ba766114716e425b45432

          • C:\Users\Admin\AppData\Local\Temp\is-83B32.tmp\vpn.tmp
            MD5

            b75b4cbad9bede0a2899b0e9d75b2f46

            SHA1

            28ea7a69657c875821905fc548c46da35acba64f

            SHA256

            79246b319c3e8e1deab495bdd86e3aa782dda4fb8e6dae7856df23be6314344d

            SHA512

            1cc1e29fcc373cde1cb8ea76f8b45a53cd142e7872ca537df624e0f00a91ad971a2df6f9b3e2d8c78be4be54d51383638d91136a75e1e47af94b968d0561abdf

          • C:\Users\Admin\AppData\Local\Temp\is-83B32.tmp\vpn.tmp
            MD5

            b75b4cbad9bede0a2899b0e9d75b2f46

            SHA1

            28ea7a69657c875821905fc548c46da35acba64f

            SHA256

            79246b319c3e8e1deab495bdd86e3aa782dda4fb8e6dae7856df23be6314344d

            SHA512

            1cc1e29fcc373cde1cb8ea76f8b45a53cd142e7872ca537df624e0f00a91ad971a2df6f9b3e2d8c78be4be54d51383638d91136a75e1e47af94b968d0561abdf

          • C:\Users\Admin\AppData\Local\Temp\is-P00DC.tmp\Star-Wars-Battlefron_330757428.tmp
            MD5

            1af5a1ed59fcb0e2f61839fae950a2f8

            SHA1

            917429dd437ff355c3061f25c4d1068a95420d2c

            SHA256

            b7767fd4addb557368ff1e605d358e0e36d39e526dc72bdd3eb28ff78a302ef9

            SHA512

            dc5e3bb735d728ab4d6dc50809e9f156c92e00dfaea68d78f7e7c7d4c22c6e351a46b256422401b9758273bbd04b9848ac7e8fde315d817a34c473dd4d4ae24e

          • C:\Users\Admin\AppData\Local\Temp\is-P00DC.tmp\Star-Wars-Battlefron_330757428.tmp
            MD5

            1af5a1ed59fcb0e2f61839fae950a2f8

            SHA1

            917429dd437ff355c3061f25c4d1068a95420d2c

            SHA256

            b7767fd4addb557368ff1e605d358e0e36d39e526dc72bdd3eb28ff78a302ef9

            SHA512

            dc5e3bb735d728ab4d6dc50809e9f156c92e00dfaea68d78f7e7c7d4c22c6e351a46b256422401b9758273bbd04b9848ac7e8fde315d817a34c473dd4d4ae24e

          • C:\Users\Admin\AppData\Local\Temp\komarjoba.exe
            MD5

            5aca77ba128b5cce7b993c77e663c25e

            SHA1

            51921ffaa2c3d5ac58e93f15c60cfc6d981ff05c

            SHA256

            2e8e59eb04b473054402a130152a2e666f57cd07c6a7116edf4a4ea5ec20b271

            SHA512

            a586f6409821b965d3aaf26578cf8dbccb9ad938aac1807561961c7be74766c3cca8571a2aeca3c74eec53fdc3ac7aa5a8c1b48ba2d47179df7210ce83f409d3

          • C:\Users\Admin\AppData\Local\Temp\komarjoba.exe
            MD5

            5aca77ba128b5cce7b993c77e663c25e

            SHA1

            51921ffaa2c3d5ac58e93f15c60cfc6d981ff05c

            SHA256

            2e8e59eb04b473054402a130152a2e666f57cd07c6a7116edf4a4ea5ec20b271

            SHA512

            a586f6409821b965d3aaf26578cf8dbccb9ad938aac1807561961c7be74766c3cca8571a2aeca3c74eec53fdc3ac7aa5a8c1b48ba2d47179df7210ce83f409d3

          • C:\Users\Admin\AppData\Local\Temp\komarjoba.exe
            MD5

            5aca77ba128b5cce7b993c77e663c25e

            SHA1

            51921ffaa2c3d5ac58e93f15c60cfc6d981ff05c

            SHA256

            2e8e59eb04b473054402a130152a2e666f57cd07c6a7116edf4a4ea5ec20b271

            SHA512

            a586f6409821b965d3aaf26578cf8dbccb9ad938aac1807561961c7be74766c3cca8571a2aeca3c74eec53fdc3ac7aa5a8c1b48ba2d47179df7210ce83f409d3

          • C:\Users\Admin\AppData\Local\Temp\{7b3757c4-3df7-7044-8540-2864e8fd0b56}\oemvista.inf
            MD5

            87868193626dc756d10885f46d76f42e

            SHA1

            94a5ce8ed7633ed77531b6cb14ceb1927c5cae1f

            SHA256

            b5728e42ea12c67577cb9188b472005ee74399b6ac976e7f72b48409baee3b41

            SHA512

            79751330bed5c16d66baf3e5212be0950f312ffd5b80b78be66eaea3cc7115f8a9472d2a43b5ce702aa044f3b45fd572775ff86572150df91cc27866f88f8277

          • C:\Users\Admin\AppData\Roaming\Weather\Weather 1.0.0\install\FD7DF1F\Weather Installation.msi
            MD5

            8984dadb5ea7c6bc563eeca6af6d4053

            SHA1

            a345cd7673fb0939fe40b50fcd10ba85d2bc45ea

            SHA256

            4acba0d120227e850911c16a9a3a65abaeeefabd1104f7303608e4ca673a9bbd

            SHA512

            7372a92789c37161a7ab0050c576922e0eaafde7d64b94655a465c7e103c1e9a078cabb36119613ee3c5731aa71e8d3134466645c7b4bd2aab3670e7b43a5193

          • C:\Windows\Installer\MSI889E.tmp
            MD5

            20c782eb64c81ac14c83a853546a8924

            SHA1

            a1506933d294de07a7a2ae1fbc6be468f51371d6

            SHA256

            0ed6836d55180af20f71f7852e3d728f2defe22aa6d2526c54cfbbb4b48cc6a1

            SHA512

            aff21e3e00b39f8983d101a0c616ca84cc3dc72d6464a0dd331965cf6beccf9b45025a7db2042d6e8b05221d3eb5813445c8ada69ae96e2727a607398a3de3d9

          • C:\Windows\Installer\MSI89A9.tmp
            MD5

            20c782eb64c81ac14c83a853546a8924

            SHA1

            a1506933d294de07a7a2ae1fbc6be468f51371d6

            SHA256

            0ed6836d55180af20f71f7852e3d728f2defe22aa6d2526c54cfbbb4b48cc6a1

            SHA512

            aff21e3e00b39f8983d101a0c616ca84cc3dc72d6464a0dd331965cf6beccf9b45025a7db2042d6e8b05221d3eb5813445c8ada69ae96e2727a607398a3de3d9

          • C:\Windows\Installer\MSI8A56.tmp
            MD5

            20c782eb64c81ac14c83a853546a8924

            SHA1

            a1506933d294de07a7a2ae1fbc6be468f51371d6

            SHA256

            0ed6836d55180af20f71f7852e3d728f2defe22aa6d2526c54cfbbb4b48cc6a1

            SHA512

            aff21e3e00b39f8983d101a0c616ca84cc3dc72d6464a0dd331965cf6beccf9b45025a7db2042d6e8b05221d3eb5813445c8ada69ae96e2727a607398a3de3d9

          • C:\Windows\Installer\MSI8C99.tmp
            MD5

            d51a7e3bce34c74638e89366deee2aab

            SHA1

            0e68022b52c288e8cdffe85739de1194253a7ef0

            SHA256

            7c6bdf16a0992db092b7f94c374b21de5d53e3043f5717a6eecae614432e0df5

            SHA512

            8ed246747cdd05cac352919d7ded3f14b1e523ccc1f7f172db85eed800b0c5d24475c270b34a7c25e7934467ace7e363542a586cdeb156bfc484f7417c3a4ab0

          • C:\Windows\Installer\MSI8DA3.tmp
            MD5

            4c4cfbe97422d3ff76b3cd00a3295b41

            SHA1

            b2c7a4c2476eee35c6fe508447e5d2025602b5db

            SHA256

            63f2dcea91cb937cbd2dbddb127f094791a6e07e8c182af8d9f459042fc62b53

            SHA512

            bfc332a46972a9a7353b1788aade66b316bccf226df3a1496c3a1468168bf9045bd6112759096fb5645cb323b641a4a2c6c32a980a3edab26f41e288a4f08c65

          • C:\Windows\Installer\MSI8EED.tmp
            MD5

            68dd02e76485cc29531b5bd8edbb1c51

            SHA1

            f20413b19d82362e15f340f36efd33cdace115cd

            SHA256

            f950436b53b8f0c94b239fff265d8edccb1897de12b5696eca0bf9a88fc4e7e7

            SHA512

            acb31b3a2a36b0cd4fbf67ffbe7441f7f227ca7530ba2fb98ff36a865f49b550e78ccd5db9fee33ca9a81465ae4421da7c96be12307a1b1b2f2f0a6237150737

          • \??\c:\PROGRA~2\maskvpn\driver\win764\tap0901.sys
            MD5

            d765f43cbea72d14c04af3d2b9c8e54b

            SHA1

            daebe266073616e5fc931c319470fcf42a06867a

            SHA256

            89c5ca1440df186497ce158eb71c0c6bf570a75b6bc1880eac7c87a0250201c0

            SHA512

            ff83225ed348aa8558fb3055ceb43863bad5cf775e410ed8acda7316b56cd5c9360e63ed71abbc8929f7dcf51fd9a948b16d58242a7a2b16108e696c11d548b2

          • \??\c:\program files (x86)\maskvpn\driver\win764\tap0901.cat
            MD5

            c757503bc0c5a6679e07fe15b93324d6

            SHA1

            6a81aa87e4b07c7fea176c8adf1b27ddcdd44573

            SHA256

            91ebea8ad199e97832cf91ea77328ed7ff49a1b5c06ddaacb0e420097a9b079e

            SHA512

            efd1507bc7aa0cd335b0e82cddde5f75c4d1e35490608d32f24a2bed0d0fbcac88919728e3b3312665bd1e60d3f13a325bdcef4acfddab0f8c2d9f4fb2454d99

          • \Users\Admin\AppData\Local\Temp\MSI7E20.tmp
            MD5

            20c782eb64c81ac14c83a853546a8924

            SHA1

            a1506933d294de07a7a2ae1fbc6be468f51371d6

            SHA256

            0ed6836d55180af20f71f7852e3d728f2defe22aa6d2526c54cfbbb4b48cc6a1

            SHA512

            aff21e3e00b39f8983d101a0c616ca84cc3dc72d6464a0dd331965cf6beccf9b45025a7db2042d6e8b05221d3eb5813445c8ada69ae96e2727a607398a3de3d9

          • \Users\Admin\AppData\Local\Temp\MSI80C1.tmp
            MD5

            20c782eb64c81ac14c83a853546a8924

            SHA1

            a1506933d294de07a7a2ae1fbc6be468f51371d6

            SHA256

            0ed6836d55180af20f71f7852e3d728f2defe22aa6d2526c54cfbbb4b48cc6a1

            SHA512

            aff21e3e00b39f8983d101a0c616ca84cc3dc72d6464a0dd331965cf6beccf9b45025a7db2042d6e8b05221d3eb5813445c8ada69ae96e2727a607398a3de3d9

          • \Users\Admin\AppData\Local\Temp\MSI817D.tmp
            MD5

            d51a7e3bce34c74638e89366deee2aab

            SHA1

            0e68022b52c288e8cdffe85739de1194253a7ef0

            SHA256

            7c6bdf16a0992db092b7f94c374b21de5d53e3043f5717a6eecae614432e0df5

            SHA512

            8ed246747cdd05cac352919d7ded3f14b1e523ccc1f7f172db85eed800b0c5d24475c270b34a7c25e7934467ace7e363542a586cdeb156bfc484f7417c3a4ab0

          • \Users\Admin\AppData\Local\Temp\is-DMJ1I.tmp\ApiTool.dll
            MD5

            b5e330f90e1bab5e5ee8ccb04e679687

            SHA1

            3360a68276a528e4b651c9019b6159315c3acca8

            SHA256

            2900d536923740fe530891f481e35e37262db5283a4b98047fe5335eacaf3441

            SHA512

            41ab8f239cfff8e5ddcff95cdf2ae11499d57b2ebe8f0786757a200047fd022bfd6975be95e9cfcc17c405e631f069b9951591cf74faf3e6a548191e63a8439c

          • \Users\Admin\AppData\Local\Temp\is-DMJ1I.tmp\ApiTool.dll
            MD5

            b5e330f90e1bab5e5ee8ccb04e679687

            SHA1

            3360a68276a528e4b651c9019b6159315c3acca8

            SHA256

            2900d536923740fe530891f481e35e37262db5283a4b98047fe5335eacaf3441

            SHA512

            41ab8f239cfff8e5ddcff95cdf2ae11499d57b2ebe8f0786757a200047fd022bfd6975be95e9cfcc17c405e631f069b9951591cf74faf3e6a548191e63a8439c

          • \Users\Admin\AppData\Local\Temp\is-DMJ1I.tmp\InnoCallback.dll
            MD5

            1c55ae5ef9980e3b1028447da6105c75

            SHA1

            f85218e10e6aa23b2f5a3ed512895b437e41b45c

            SHA256

            6afa2d104be6efe3d9a2ab96dbb75db31565dad64dd0b791e402ecc25529809f

            SHA512

            1ec4d52f49747b29cfd83e1a75fc6ae4101add68ada0b9add5770c10be6dffb004bb47d0854d50871ed8d77acf67d4e0445e97f0548a95c182e83b94ddf2eb6b

          • \Users\Admin\AppData\Local\Temp\is-DMJ1I.tmp\InnoCallback.dll
            MD5

            1c55ae5ef9980e3b1028447da6105c75

            SHA1

            f85218e10e6aa23b2f5a3ed512895b437e41b45c

            SHA256

            6afa2d104be6efe3d9a2ab96dbb75db31565dad64dd0b791e402ecc25529809f

            SHA512

            1ec4d52f49747b29cfd83e1a75fc6ae4101add68ada0b9add5770c10be6dffb004bb47d0854d50871ed8d77acf67d4e0445e97f0548a95c182e83b94ddf2eb6b

          • \Users\Admin\AppData\Local\Temp\is-DMJ1I.tmp\botva2.dll
            MD5

            ef899fa243c07b7b82b3a45f6ec36771

            SHA1

            4a86313cc8766dcad1c2b00c2b8f9bbe0cf8bbbe

            SHA256

            da7d0368712ee419952eb2640a65a7f24e39fb7872442ed4d2ee847ec4cfde77

            SHA512

            3f98b5ad9adfad2111ebd1d8cbab9ae423d624d1668cc64c0bfcdbfedf30c1ce3ea6bc6bcf70f7dd1b01172a4349e7c84fb75d395ee5af73866574c1d734c6e8

          • \Users\Admin\AppData\Local\Temp\is-DMJ1I.tmp\botva2.dll
            MD5

            ef899fa243c07b7b82b3a45f6ec36771

            SHA1

            4a86313cc8766dcad1c2b00c2b8f9bbe0cf8bbbe

            SHA256

            da7d0368712ee419952eb2640a65a7f24e39fb7872442ed4d2ee847ec4cfde77

            SHA512

            3f98b5ad9adfad2111ebd1d8cbab9ae423d624d1668cc64c0bfcdbfedf30c1ce3ea6bc6bcf70f7dd1b01172a4349e7c84fb75d395ee5af73866574c1d734c6e8

          • \Users\Admin\AppData\Local\Temp\is-DMJ1I.tmp\libMaskVPN.dll
            MD5

            3d88c579199498b224033b6b66638fb8

            SHA1

            6f6303288e2206efbf18e4716095059fada96fc4

            SHA256

            5bccb86319fc90210d065648937725b14b43fa0c96f9da56d9984e027adebbc3

            SHA512

            9740c521ed38643201ed4c2574628454723b9213f12e193c11477e64a2c03daa58d2a48e70df1a7e9654c50a80049f3cf213fd01f2b74e585c3a86027db19ec9

          • \Users\Admin\AppData\Local\Temp\is-DMJ1I.tmp\libMaskVPN.dll
            MD5

            3d88c579199498b224033b6b66638fb8

            SHA1

            6f6303288e2206efbf18e4716095059fada96fc4

            SHA256

            5bccb86319fc90210d065648937725b14b43fa0c96f9da56d9984e027adebbc3

            SHA512

            9740c521ed38643201ed4c2574628454723b9213f12e193c11477e64a2c03daa58d2a48e70df1a7e9654c50a80049f3cf213fd01f2b74e585c3a86027db19ec9

          • \Users\Admin\AppData\Local\Temp\is-GCOFE.tmp\_isetup\_isdecmp.dll
            MD5

            77d6d961f71a8c558513bed6fd0ad6f1

            SHA1

            122bb9ed6704b72250e4e31b5d5fc2f0476c4b6a

            SHA256

            5da7c8d33d3b7db46277012d92875c0b850c8abf1eb3c8c9c5b9532089a0bcf0

            SHA512

            b0921e2442b4cdec8cc479ba3751a01c0646a4804e2f4a5d5632fa2dbf54cc45d4cccffa4d5b522d42afc2f6a622e07882ed7e663c8462333b082e82503f335a

          • \Users\Admin\AppData\Local\Temp\is-GCOFE.tmp\_isetup\_isdecmp.dll
            MD5

            77d6d961f71a8c558513bed6fd0ad6f1

            SHA1

            122bb9ed6704b72250e4e31b5d5fc2f0476c4b6a

            SHA256

            5da7c8d33d3b7db46277012d92875c0b850c8abf1eb3c8c9c5b9532089a0bcf0

            SHA512

            b0921e2442b4cdec8cc479ba3751a01c0646a4804e2f4a5d5632fa2dbf54cc45d4cccffa4d5b522d42afc2f6a622e07882ed7e663c8462333b082e82503f335a

          • \Users\Admin\AppData\Roaming\Weather\Weather 1.0.0\install\decoder.dll
            MD5

            15aa573cee52cc4c11527dee98bea20c

            SHA1

            32fe5da57bbe66425c3d3c89a28e7125fb0097b3

            SHA256

            6889ea3a9d69f176351a389f92537d521abc851d1b71b47ab21c3b821cff8622

            SHA512

            4b357dc6eb8bdc152b63bc0a5f5bce6196cf65e02a71d32ee6568d477b359c2a4ab04892249cfdb8712eb5c8ab1a78e675db47f8b3150cf2c107dc61032cd085

          • \Windows\Installer\MSI889E.tmp
            MD5

            20c782eb64c81ac14c83a853546a8924

            SHA1

            a1506933d294de07a7a2ae1fbc6be468f51371d6

            SHA256

            0ed6836d55180af20f71f7852e3d728f2defe22aa6d2526c54cfbbb4b48cc6a1

            SHA512

            aff21e3e00b39f8983d101a0c616ca84cc3dc72d6464a0dd331965cf6beccf9b45025a7db2042d6e8b05221d3eb5813445c8ada69ae96e2727a607398a3de3d9

          • \Windows\Installer\MSI89A9.tmp
            MD5

            20c782eb64c81ac14c83a853546a8924

            SHA1

            a1506933d294de07a7a2ae1fbc6be468f51371d6

            SHA256

            0ed6836d55180af20f71f7852e3d728f2defe22aa6d2526c54cfbbb4b48cc6a1

            SHA512

            aff21e3e00b39f8983d101a0c616ca84cc3dc72d6464a0dd331965cf6beccf9b45025a7db2042d6e8b05221d3eb5813445c8ada69ae96e2727a607398a3de3d9

          • \Windows\Installer\MSI8A56.tmp
            MD5

            20c782eb64c81ac14c83a853546a8924

            SHA1

            a1506933d294de07a7a2ae1fbc6be468f51371d6

            SHA256

            0ed6836d55180af20f71f7852e3d728f2defe22aa6d2526c54cfbbb4b48cc6a1

            SHA512

            aff21e3e00b39f8983d101a0c616ca84cc3dc72d6464a0dd331965cf6beccf9b45025a7db2042d6e8b05221d3eb5813445c8ada69ae96e2727a607398a3de3d9

          • \Windows\Installer\MSI8C99.tmp
            MD5

            d51a7e3bce34c74638e89366deee2aab

            SHA1

            0e68022b52c288e8cdffe85739de1194253a7ef0

            SHA256

            7c6bdf16a0992db092b7f94c374b21de5d53e3043f5717a6eecae614432e0df5

            SHA512

            8ed246747cdd05cac352919d7ded3f14b1e523ccc1f7f172db85eed800b0c5d24475c270b34a7c25e7934467ace7e363542a586cdeb156bfc484f7417c3a4ab0

          • \Windows\Installer\MSI8DA3.tmp
            MD5

            4c4cfbe97422d3ff76b3cd00a3295b41

            SHA1

            b2c7a4c2476eee35c6fe508447e5d2025602b5db

            SHA256

            63f2dcea91cb937cbd2dbddb127f094791a6e07e8c182af8d9f459042fc62b53

            SHA512

            bfc332a46972a9a7353b1788aade66b316bccf226df3a1496c3a1468168bf9045bd6112759096fb5645cb323b641a4a2c6c32a980a3edab26f41e288a4f08c65

          • \Windows\Installer\MSI8EED.tmp
            MD5

            68dd02e76485cc29531b5bd8edbb1c51

            SHA1

            f20413b19d82362e15f340f36efd33cdace115cd

            SHA256

            f950436b53b8f0c94b239fff265d8edccb1897de12b5696eca0bf9a88fc4e7e7

            SHA512

            acb31b3a2a36b0cd4fbf67ffbe7441f7f227ca7530ba2fb98ff36a865f49b550e78ccd5db9fee33ca9a81465ae4421da7c96be12307a1b1b2f2f0a6237150737

          • memory/1296-121-0x00000000006D0000-0x000000000077E000-memory.dmp
            Filesize

            696KB

          • memory/1296-116-0x0000000000000000-mapping.dmp
          • memory/1296-120-0x0000000003451000-0x0000000003453000-memory.dmp
            Filesize

            8KB

          • memory/1444-127-0x00000000041B0000-0x00000000041B1000-memory.dmp
            Filesize

            4KB

          • memory/1444-126-0x0000000000400000-0x000000000170A000-memory.dmp
            Filesize

            19.0MB

          • memory/1444-123-0x0000000000000000-mapping.dmp
          • memory/1868-115-0x0000000000400000-0x0000000000514000-memory.dmp
            Filesize

            1.1MB

          • memory/2464-275-0x0000000000000000-mapping.dmp
          • memory/2696-132-0x0000000000000000-mapping.dmp
          • memory/2704-131-0x0000000000000000-mapping.dmp
          • memory/2728-128-0x0000000000000000-mapping.dmp
          • memory/2728-312-0x0000000000000000-mapping.dmp
          • memory/2728-152-0x0000000000490000-0x000000000053E000-memory.dmp
            Filesize

            696KB

          • memory/2728-153-0x0000000000400000-0x0000000000489000-memory.dmp
            Filesize

            548KB

          • memory/3764-277-0x0000000000000000-mapping.dmp
          • memory/3996-222-0x0000000000000000-mapping.dmp
          • memory/4124-285-0x0000000006EF0000-0x0000000006EF1000-memory.dmp
            Filesize

            4KB

          • memory/4124-290-0x0000000006ED0000-0x0000000006ED1000-memory.dmp
            Filesize

            4KB

          • memory/4124-283-0x0000000000E40000-0x0000000000E41000-memory.dmp
            Filesize

            4KB

          • memory/4124-291-0x0000000007F30000-0x0000000007F31000-memory.dmp
            Filesize

            4KB

          • memory/4124-289-0x0000000007770000-0x0000000007771000-memory.dmp
            Filesize

            4KB

          • memory/4124-284-0x0000000004820000-0x0000000004821000-memory.dmp
            Filesize

            4KB

          • memory/4124-280-0x0000000000000000-mapping.dmp
          • memory/4124-292-0x0000000004822000-0x0000000004823000-memory.dmp
            Filesize

            4KB

          • memory/4124-307-0x0000000004823000-0x0000000004824000-memory.dmp
            Filesize

            4KB

          • memory/4124-286-0x0000000006CD0000-0x0000000006CD1000-memory.dmp
            Filesize

            4KB

          • memory/4124-287-0x0000000007520000-0x0000000007521000-memory.dmp
            Filesize

            4KB

          • memory/4144-138-0x0000000000000000-mapping.dmp
          • memory/4144-142-0x0000000000400000-0x000000000044C000-memory.dmp
            Filesize

            304KB

          • memory/4152-214-0x0000000000000000-mapping.dmp
          • memory/4176-317-0x0000000000000000-mapping.dmp
          • memory/4192-143-0x0000000000000000-mapping.dmp
          • memory/4192-148-0x0000000006AF0000-0x0000000006DD0000-memory.dmp
            Filesize

            2.9MB

          • memory/4192-151-0x0000000000740000-0x0000000000741000-memory.dmp
            Filesize

            4KB

          • memory/4192-161-0x0000000008AE0000-0x0000000008AEF000-memory.dmp
            Filesize

            60KB

          • memory/4192-165-0x0000000008D30000-0x0000000008D45000-memory.dmp
            Filesize

            84KB

          • memory/4192-225-0x0000000000810000-0x0000000000811000-memory.dmp
            Filesize

            4KB

          • memory/4192-224-0x0000000008AD0000-0x0000000008AD1000-memory.dmp
            Filesize

            4KB

          • memory/4260-235-0x00000000054E0000-0x00000000054E1000-memory.dmp
            Filesize

            4KB

          • memory/4260-226-0x0000000000400000-0x000000000041E000-memory.dmp
            Filesize

            120KB

          • memory/4260-227-0x000000000041884A-mapping.dmp
          • memory/4260-233-0x0000000005A70000-0x0000000005A71000-memory.dmp
            Filesize

            4KB

          • memory/4260-264-0x0000000006DB0000-0x0000000006DB1000-memory.dmp
            Filesize

            4KB

          • memory/4260-234-0x0000000005480000-0x0000000005481000-memory.dmp
            Filesize

            4KB

          • memory/4260-263-0x00000000066B0000-0x00000000066B1000-memory.dmp
            Filesize

            4KB

          • memory/4260-240-0x0000000005460000-0x0000000005A66000-memory.dmp
            Filesize

            6.0MB

          • memory/4260-238-0x0000000005520000-0x0000000005521000-memory.dmp
            Filesize

            4KB

          • memory/4260-239-0x0000000005780000-0x0000000005781000-memory.dmp
            Filesize

            4KB

          • memory/4280-274-0x0000000000000000-mapping.dmp
          • memory/4284-272-0x0000000000000000-mapping.dmp
          • memory/4312-253-0x00000000001F0000-0x00000000001F1000-memory.dmp
            Filesize

            4KB

          • memory/4312-241-0x0000000000000000-mapping.dmp
          • memory/4312-243-0x0000000001820000-0x0000000001821000-memory.dmp
            Filesize

            4KB

          • memory/4312-244-0x0000000000400000-0x00000000015D7000-memory.dmp
            Filesize

            17.8MB

          • memory/4372-185-0x0000000005180000-0x0000000005181000-memory.dmp
            Filesize

            4KB

          • memory/4372-174-0x0000000005080000-0x0000000005081000-memory.dmp
            Filesize

            4KB

          • memory/4372-181-0x00000000056A0000-0x00000000056A1000-memory.dmp
            Filesize

            4KB

          • memory/4372-158-0x0000000000000000-mapping.dmp
          • memory/4372-170-0x0000000000810000-0x0000000000811000-memory.dmp
            Filesize

            4KB

          • memory/4372-177-0x0000000005020000-0x0000000005021000-memory.dmp
            Filesize

            4KB

          • memory/4424-220-0x0000000000000000-mapping.dmp
          • memory/4508-167-0x0000000000000000-mapping.dmp
          • memory/4588-265-0x0000000033AD0000-0x0000000033C96000-memory.dmp
            Filesize

            1.8MB

          • memory/4588-262-0x0000000000400000-0x00000000015D7000-memory.dmp
            Filesize

            17.8MB

          • memory/4588-266-0x0000000034450000-0x00000000345A8000-memory.dmp
            Filesize

            1.3MB

          • memory/4588-267-0x00000000345B0000-0x0000000034608000-memory.dmp
            Filesize

            352KB

          • memory/4592-311-0x0000000000000000-mapping.dmp
          • memory/4636-180-0x0000000000000000-mapping.dmp
          • memory/4672-247-0x0000000002770000-0x0000000002789000-memory.dmp
            Filesize

            100KB

          • memory/4672-252-0x00000000008B0000-0x00000000009FA000-memory.dmp
            Filesize

            1.3MB

          • memory/4672-270-0x00000000070D0000-0x00000000070D1000-memory.dmp
            Filesize

            4KB

          • memory/4672-237-0x0000000000000000-mapping.dmp
          • memory/4672-259-0x0000000004EE4000-0x0000000004EE6000-memory.dmp
            Filesize

            8KB

          • memory/4672-245-0x00000000026B0000-0x00000000026CB000-memory.dmp
            Filesize

            108KB

          • memory/4672-258-0x0000000004EE3000-0x0000000004EE4000-memory.dmp
            Filesize

            4KB

          • memory/4672-271-0x00000000074F0000-0x00000000074F1000-memory.dmp
            Filesize

            4KB

          • memory/4672-257-0x0000000004EE2000-0x0000000004EE3000-memory.dmp
            Filesize

            4KB

          • memory/4672-254-0x0000000000400000-0x00000000008AF000-memory.dmp
            Filesize

            4.7MB

          • memory/4672-256-0x0000000004EE0000-0x0000000004EE1000-memory.dmp
            Filesize

            4KB

          • memory/4688-308-0x0000000000000000-mapping.dmp
          • memory/4692-314-0x0000000000000000-mapping.dmp
          • memory/4752-192-0x0000000000000000-mapping.dmp
          • memory/4888-201-0x0000000000000000-mapping.dmp
          • memory/4904-229-0x0000000001830000-0x0000000001831000-memory.dmp
            Filesize

            4KB

          • memory/4904-230-0x0000000000400000-0x00000000015D7000-memory.dmp
            Filesize

            17.8MB

          • memory/4904-228-0x0000000001820000-0x0000000001821000-memory.dmp
            Filesize

            4KB

          • memory/4904-223-0x0000000000000000-mapping.dmp
          • memory/4904-236-0x00000000017E0000-0x000000000192A000-memory.dmp
            Filesize

            1.3MB

          • memory/5036-207-0x0000000000000000-mapping.dmp
          • memory/5076-210-0x0000000000000000-mapping.dmp
          • memory/5080-273-0x0000000000000000-mapping.dmp
          • memory/5264-327-0x0000000000000000-mapping.dmp
          • memory/5288-346-0x0000000000000000-mapping.dmp
          • memory/5648-332-0x0000000000000000-mapping.dmp
          • memory/5716-335-0x0000000000000000-mapping.dmp
          • memory/5988-338-0x0000000000000000-mapping.dmp
          • memory/5988-339-0x0000000000E40000-0x0000000000E41000-memory.dmp
            Filesize

            4KB

          • memory/6024-340-0x0000000000000000-mapping.dmp
          • memory/6092-343-0x0000000000000000-mapping.dmp