Resubmissions

11-03-2024 21:22

240311-z8dsssgg58 10

01-09-2021 13:18

210901-5bmxjspa5s 10

01-09-2021 13:04

210901-te4btfspqa 10

01-09-2021 05:12

210901-4wnkwm1p3j 10

31-08-2021 21:47

210831-41rp97dma2 10

31-08-2021 19:51

210831-359awwatje 10

29-08-2021 11:37

210829-18htk4slyj 10

28-08-2021 23:10

210828-rt8b9gzxn6 10

28-08-2021 22:59

210828-zxgnh5j4w6 10

28-08-2021 11:31

210828-xrjs66aknj 10

Analysis

  • max time kernel
    1810s
  • max time network
    1717s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    24-08-2021 12:53

General

  • Target

    Setup (2).exe

  • Size

    631KB

  • MD5

    cb927513ff8ebff4dd52a47f7e42f934

  • SHA1

    0de47c02a8adc4940a6c18621b4e4a619641d029

  • SHA256

    fd5c970806fba1500cbb6af5328329aeb43b8de3f02d90ec5d8cd1d57711622f

  • SHA512

    988c8fd886a9155b7d190faf2ce6b34d910efcffcf1c6251f18a9d0c804a0ea26a89679273033ac98b200363c536426efd1ae9de445c34e660369abb06f0071c

Malware Config

Extracted

Path

C:\_readme.txt

Ransom Note
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-ykQaS2tRyB Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0328gDrgoC4j04vLx6lqyFlyzpTC55w9igCGDgaBYLhUjv3Rr
URLs

https://we.tl/t-ykQaS2tRyB

Extracted

Family

redline

Botnet

dibild2

C2

135.148.139.222:1494

Extracted

Family

redline

Botnet

24.08

C2

95.181.172.100:55640

Extracted

Family

redline

C2

205.185.119.191:18846

185.215.113.29:8678

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 14 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Downloads MZ/PE file
  • Executes dropped EXE 42 IoCs
  • Modifies extensions of user files 6 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Checks BIOS information in registry 2 TTPs 8 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 49 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 12 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 8 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Suspicious use of SetThreadContext 8 IoCs
  • Drops file in Program Files directory 5 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 9 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 2 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies system certificate store 2 TTPs 14 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 21 IoCs
  • Suspicious use of AdjustPrivilegeToken 19 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Setup (2).exe
    "C:\Users\Admin\AppData\Local\Temp\Setup (2).exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1864
    • C:\Users\Admin\Documents\otVD_LP1l85bLGezskQB60Pk.exe
      "C:\Users\Admin\Documents\otVD_LP1l85bLGezskQB60Pk.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      PID:1828
      • C:\Users\Admin\Documents\otVD_LP1l85bLGezskQB60Pk.exe
        C:\Users\Admin\Documents\otVD_LP1l85bLGezskQB60Pk.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:996
    • C:\Users\Admin\Documents\oNqmFFuUoyi_4XUOgFQB4wkv.exe
      "C:\Users\Admin\Documents\oNqmFFuUoyi_4XUOgFQB4wkv.exe"
      2⤵
      • Executes dropped EXE
      PID:308
    • C:\Users\Admin\Documents\o2UA8Wai9hYkiFuRd6Kr6L_S.exe
      "C:\Users\Admin\Documents\o2UA8Wai9hYkiFuRd6Kr6L_S.exe"
      2⤵
        PID:1400
      • C:\Users\Admin\Documents\8BGJNCqEwgntDOu5jd0ZIKbE.exe
        "C:\Users\Admin\Documents\8BGJNCqEwgntDOu5jd0ZIKbE.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        PID:828
        • C:\Users\Admin\Documents\8BGJNCqEwgntDOu5jd0ZIKbE.exe
          C:\Users\Admin\Documents\8BGJNCqEwgntDOu5jd0ZIKbE.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:1832
      • C:\Users\Admin\Documents\zc8Yjf3W2ltv_h6CY_1CWJgS.exe
        "C:\Users\Admin\Documents\zc8Yjf3W2ltv_h6CY_1CWJgS.exe"
        2⤵
        • Executes dropped EXE
        • Checks SCSI registry key(s)
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        PID:2028
      • C:\Users\Admin\Documents\fd4ouhq8Af_mEhLfwBSklX1Z.exe
        "C:\Users\Admin\Documents\fd4ouhq8Af_mEhLfwBSklX1Z.exe"
        2⤵
        • Executes dropped EXE
        PID:1600
      • C:\Users\Admin\Documents\uvFx4HzGtJVdNF39zLK7k65c.exe
        "C:\Users\Admin\Documents\uvFx4HzGtJVdNF39zLK7k65c.exe"
        2⤵
        • Executes dropped EXE
        • Checks SCSI registry key(s)
        • Suspicious behavior: MapViewOfSection
        PID:1992
      • C:\Users\Admin\Documents\LS1ifFsm1C16Ehevn_JT3kUl.exe
        "C:\Users\Admin\Documents\LS1ifFsm1C16Ehevn_JT3kUl.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        PID:2000
        • C:\Users\Admin\Documents\LS1ifFsm1C16Ehevn_JT3kUl.exe
          "C:\Users\Admin\Documents\LS1ifFsm1C16Ehevn_JT3kUl.exe"
          3⤵
          • Executes dropped EXE
          PID:1060
      • C:\Users\Admin\Documents\Jl1Q68LrRqQrlRqlngiMs4zn.exe
        "C:\Users\Admin\Documents\Jl1Q68LrRqQrlRqlngiMs4zn.exe"
        2⤵
        • Executes dropped EXE
        • Checks BIOS information in registry
        • Checks whether UAC is enabled
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of AdjustPrivilegeToken
        PID:2044
      • C:\Users\Admin\Documents\Byfr8UT2PGp4jDez4TDPC26A.exe
        "C:\Users\Admin\Documents\Byfr8UT2PGp4jDez4TDPC26A.exe"
        2⤵
        • Executes dropped EXE
        PID:540
      • C:\Users\Admin\Documents\HmwpI3JFKpIO1xNOr3VKmjWg.exe
        "C:\Users\Admin\Documents\HmwpI3JFKpIO1xNOr3VKmjWg.exe"
        2⤵
        • Executes dropped EXE
        • Checks BIOS information in registry
        • Checks whether UAC is enabled
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        PID:2024
      • C:\Users\Admin\Documents\DSYjfYEvd3d2kwVLyAZdnm7B.exe
        "C:\Users\Admin\Documents\DSYjfYEvd3d2kwVLyAZdnm7B.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:1876
        • C:\Users\Admin\Documents\DSYjfYEvd3d2kwVLyAZdnm7B.exe
          "C:\Users\Admin\Documents\DSYjfYEvd3d2kwVLyAZdnm7B.exe"
          3⤵
          • Executes dropped EXE
          • Modifies data under HKEY_USERS
          PID:2252
      • C:\Users\Admin\Documents\3zGoajUOoJqyPQE8qswlkKTP.exe
        "C:\Users\Admin\Documents\3zGoajUOoJqyPQE8qswlkKTP.exe"
        2⤵
        • Executes dropped EXE
        PID:1468
      • C:\Users\Admin\Documents\ZPNGTbSQTRPHBQ3VaaTJX2pi.exe
        "C:\Users\Admin\Documents\ZPNGTbSQTRPHBQ3VaaTJX2pi.exe"
        2⤵
        • Executes dropped EXE
        • Checks BIOS information in registry
        • Checks whether UAC is enabled
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        PID:924
      • C:\Users\Admin\Documents\zY5EbpHK3MviAN5_kfBxGWeY.exe
        "C:\Users\Admin\Documents\zY5EbpHK3MviAN5_kfBxGWeY.exe"
        2⤵
        • Executes dropped EXE
        • Checks BIOS information in registry
        • Checks whether UAC is enabled
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        PID:308
      • C:\Users\Admin\Documents\HbaRtHptTe3U38jA86BLHM9q.exe
        "C:\Users\Admin\Documents\HbaRtHptTe3U38jA86BLHM9q.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        PID:1296
        • C:\Program Files (x86)\Company\NewProduct\customer3.exe
          "C:\Program Files (x86)\Company\NewProduct\customer3.exe"
          3⤵
          • Executes dropped EXE
          PID:828
        • C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe
          "C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"
          3⤵
          • Executes dropped EXE
          PID:1100
        • C:\Program Files (x86)\Company\NewProduct\jooyu.exe
          "C:\Program Files (x86)\Company\NewProduct\jooyu.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Modifies system certificate store
          PID:832
          • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
            C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
            4⤵
            • Executes dropped EXE
            PID:2276
          • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
            C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
            4⤵
            • Executes dropped EXE
            PID:1160
      • C:\Users\Admin\Documents\sd23sOzTy0Zkd1ABCCoftC_x.exe
        "C:\Users\Admin\Documents\sd23sOzTy0Zkd1ABCCoftC_x.exe"
        2⤵
        • Executes dropped EXE
        PID:1404
      • C:\Users\Admin\Documents\VzLwVmYJtjgQ289obDuykf63.exe
        "C:\Users\Admin\Documents\VzLwVmYJtjgQ289obDuykf63.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:1776
      • C:\Users\Admin\Documents\Ip66eP9Iswm1NOAGKGF2PQEW.exe
        "C:\Users\Admin\Documents\Ip66eP9Iswm1NOAGKGF2PQEW.exe"
        2⤵
          PID:1376
        • C:\Users\Admin\Documents\HXhlhIm5YQIhfUlxoCVjsNGx.exe
          "C:\Users\Admin\Documents\HXhlhIm5YQIhfUlxoCVjsNGx.exe"
          2⤵
          • Executes dropped EXE
          PID:1372
          • C:\Windows\SysWOW64\mshta.exe
            "C:\Windows\System32\mshta.exe" vbSCRipt: ClOSe( creATEoBJEcT ( "WscRIpT.sHEll" ). RUN ( "Cmd /Q /C tYPe ""C:\Users\Admin\Documents\HXhlhIm5YQIhfUlxoCVjsNGx.exe"" > WO~L~OYJWS8EVL1.eXe && STaRt WO~L~oYjWS8EvL1.Exe -PifOcLbay~PF~N8a_e9RyKpu9 & if """" == """" for %W iN ( ""C:\Users\Admin\Documents\HXhlhIm5YQIhfUlxoCVjsNGx.exe"" ) do taskkill -IM ""%~nXW"" -f " ,0 , TRUE ) )
            3⤵
              PID:1348
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /Q /C tYPe "C:\Users\Admin\Documents\HXhlhIm5YQIhfUlxoCVjsNGx.exe" > WO~L~OYJWS8EVL1.eXe && STaRt WO~L~oYjWS8EvL1.Exe -PifOcLbay~PF~N8a_e9RyKpu9 & if "" =="" for %W iN ( "C:\Users\Admin\Documents\HXhlhIm5YQIhfUlxoCVjsNGx.exe" ) do taskkill -IM "%~nXW" -f
                4⤵
                • Loads dropped DLL
                PID:2552
                • C:\Users\Admin\AppData\Local\Temp\WO~L~OYJWS8EVL1.eXe
                  WO~L~oYjWS8EvL1.Exe -PifOcLbay~PF~N8a_e9RyKpu9
                  5⤵
                  • Executes dropped EXE
                  PID:2416
                  • C:\Windows\SysWOW64\mshta.exe
                    "C:\Windows\System32\mshta.exe" vbSCRipt: ClOSe( creATEoBJEcT ( "WscRIpT.sHEll" ). RUN ( "Cmd /Q /C tYPe ""C:\Users\Admin\AppData\Local\Temp\WO~L~OYJWS8EVL1.eXe"" > WO~L~OYJWS8EVL1.eXe && STaRt WO~L~oYjWS8EvL1.Exe -PifOcLbay~PF~N8a_e9RyKpu9 & if ""-PifOcLbay~PF~N8a_e9RyKpu9 "" == """" for %W iN ( ""C:\Users\Admin\AppData\Local\Temp\WO~L~OYJWS8EVL1.eXe"" ) do taskkill -IM ""%~nXW"" -f " ,0 , TRUE ) )
                    6⤵
                      PID:2412
                      • C:\Windows\SysWOW64\cmd.exe
                        "C:\Windows\System32\cmd.exe" /Q /C tYPe "C:\Users\Admin\AppData\Local\Temp\WO~L~OYJWS8EVL1.eXe" > WO~L~OYJWS8EVL1.eXe && STaRt WO~L~oYjWS8EvL1.Exe -PifOcLbay~PF~N8a_e9RyKpu9 & if "-PifOcLbay~PF~N8a_e9RyKpu9 " =="" for %W iN ( "C:\Users\Admin\AppData\Local\Temp\WO~L~OYJWS8EVL1.eXe" ) do taskkill -IM "%~nXW" -f
                        7⤵
                          PID:556
                    • C:\Windows\SysWOW64\taskkill.exe
                      taskkill -IM "HXhlhIm5YQIhfUlxoCVjsNGx.exe" -f
                      5⤵
                      • Kills process with taskkill
                      PID:2568
              • C:\Users\Admin\Documents\iw9YlNU5QxVjC7EmXFwjM0hH.exe
                "C:\Users\Admin\Documents\iw9YlNU5QxVjC7EmXFwjM0hH.exe"
                2⤵
                • Executes dropped EXE
                PID:1996
              • C:\Users\Admin\Documents\u0oywLTp8FnTAr9VDhXRLvDh.exe
                "C:\Users\Admin\Documents\u0oywLTp8FnTAr9VDhXRLvDh.exe"
                2⤵
                • Executes dropped EXE
                PID:1772
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c taskkill /im "u0oywLTp8FnTAr9VDhXRLvDh.exe" /f & erase "C:\Users\Admin\Documents\u0oywLTp8FnTAr9VDhXRLvDh.exe" & exit
                  3⤵
                    PID:2524
                    • C:\Windows\SysWOW64\taskkill.exe
                      taskkill /im "u0oywLTp8FnTAr9VDhXRLvDh.exe" /f
                      4⤵
                      • Kills process with taskkill
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2872
              • C:\Windows\SysWOW64\explorer.exe
                C:\Windows\SysWOW64\explorer.exe
                1⤵
                  PID:2780
                • C:\Windows\explorer.exe
                  C:\Windows\explorer.exe
                  1⤵
                    PID:2804
                  • C:\Users\Admin\AppData\Local\Temp\88BF.exe
                    C:\Users\Admin\AppData\Local\Temp\88BF.exe
                    1⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of SetThreadContext
                    PID:2932
                    • C:\Users\Admin\AppData\Local\Temp\88BF.exe
                      C:\Users\Admin\AppData\Local\Temp\88BF.exe
                      2⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Adds Run key to start application
                      • Modifies system certificate store
                      PID:1636
                      • C:\Windows\SysWOW64\icacls.exe
                        icacls "C:\Users\Admin\AppData\Local\a8dc1450-0033-4b01-8aec-195c760cc4f9" /deny *S-1-1-0:(OI)(CI)(DE,DC)
                        3⤵
                        • Modifies file permissions
                        PID:2724
                      • C:\Users\Admin\AppData\Local\Temp\88BF.exe
                        "C:\Users\Admin\AppData\Local\Temp\88BF.exe" --Admin IsNotAutoStart IsNotTask
                        3⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Suspicious use of SetThreadContext
                        PID:2276
                        • C:\Users\Admin\AppData\Local\Temp\88BF.exe
                          "C:\Users\Admin\AppData\Local\Temp\88BF.exe" --Admin IsNotAutoStart IsNotTask
                          4⤵
                          • Executes dropped EXE
                          • Modifies extensions of user files
                          • Loads dropped DLL
                          • Modifies system certificate store
                          PID:2700
                          • C:\Users\Admin\AppData\Local\5775cec2-7c25-40ca-beed-037f5f3b8402\build2.exe
                            "C:\Users\Admin\AppData\Local\5775cec2-7c25-40ca-beed-037f5f3b8402\build2.exe"
                            5⤵
                            • Executes dropped EXE
                            • Suspicious use of SetThreadContext
                            PID:1760
                            • C:\Users\Admin\AppData\Local\5775cec2-7c25-40ca-beed-037f5f3b8402\build2.exe
                              "C:\Users\Admin\AppData\Local\5775cec2-7c25-40ca-beed-037f5f3b8402\build2.exe"
                              6⤵
                                PID:2180
                            • C:\Users\Admin\AppData\Local\5775cec2-7c25-40ca-beed-037f5f3b8402\build3.exe
                              "C:\Users\Admin\AppData\Local\5775cec2-7c25-40ca-beed-037f5f3b8402\build3.exe"
                              5⤵
                              • Executes dropped EXE
                              • Suspicious use of SetThreadContext
                              PID:664
                              • C:\Users\Admin\AppData\Local\5775cec2-7c25-40ca-beed-037f5f3b8402\build3.exe
                                "C:\Users\Admin\AppData\Local\5775cec2-7c25-40ca-beed-037f5f3b8402\build3.exe"
                                6⤵
                                  PID:1952
                      • C:\Windows\system32\taskeng.exe
                        taskeng.exe {4F0AAB04-6F4C-41DD-A156-56903D89081A} S-1-5-21-2455352368-1077083310-2879168483-1000:QWOCTUPM\Admin:Interactive:[1]
                        1⤵
                          PID:2604
                          • C:\Users\Admin\AppData\Roaming\tducurr
                            C:\Users\Admin\AppData\Roaming\tducurr
                            2⤵
                            • Executes dropped EXE
                            PID:2960
                          • C:\Users\Admin\AppData\Roaming\dducurr
                            C:\Users\Admin\AppData\Roaming\dducurr
                            2⤵
                            • Executes dropped EXE
                            • Checks SCSI registry key(s)
                            • Suspicious behavior: MapViewOfSection
                            PID:3048
                          • C:\Users\Admin\AppData\Roaming\dducurr
                            C:\Users\Admin\AppData\Roaming\dducurr
                            2⤵
                            • Executes dropped EXE
                            PID:1664
                          • C:\Users\Admin\AppData\Local\a8dc1450-0033-4b01-8aec-195c760cc4f9\88BF.exe
                            C:\Users\Admin\AppData\Local\a8dc1450-0033-4b01-8aec-195c760cc4f9\88BF.exe --Task
                            2⤵
                            • Executes dropped EXE
                            • Suspicious use of SetThreadContext
                            PID:2352
                            • C:\Users\Admin\AppData\Local\a8dc1450-0033-4b01-8aec-195c760cc4f9\88BF.exe
                              C:\Users\Admin\AppData\Local\a8dc1450-0033-4b01-8aec-195c760cc4f9\88BF.exe --Task
                              3⤵
                                PID:2480
                          • C:\Windows\SysWOW64\explorer.exe
                            C:\Windows\SysWOW64\explorer.exe
                            1⤵
                              PID:2688
                            • C:\Windows\SysWOW64\explorer.exe
                              C:\Windows\SysWOW64\explorer.exe
                              1⤵
                                PID:2056
                              • C:\Windows\explorer.exe
                                C:\Windows\explorer.exe
                                1⤵
                                  PID:1076
                                • C:\Windows\SysWOW64\explorer.exe
                                  C:\Windows\SysWOW64\explorer.exe
                                  1⤵
                                    PID:2840
                                  • C:\Users\Admin\AppData\Local\Temp\C36F.exe
                                    C:\Users\Admin\AppData\Local\Temp\C36F.exe
                                    1⤵
                                    • Executes dropped EXE
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:2916
                                  • C:\Users\Admin\AppData\Local\Temp\41D3.exe
                                    C:\Users\Admin\AppData\Local\Temp\41D3.exe
                                    1⤵
                                    • Executes dropped EXE
                                    PID:2104
                                  • C:\Windows\SysWOW64\explorer.exe
                                    C:\Windows\SysWOW64\explorer.exe
                                    1⤵
                                      PID:2300
                                    • C:\Windows\explorer.exe
                                      C:\Windows\explorer.exe
                                      1⤵
                                        PID:628
                                      • C:\Windows\explorer.exe
                                        C:\Windows\explorer.exe
                                        1⤵
                                          PID:2064

                                        Network

                                        MITRE ATT&CK Matrix ATT&CK v6

                                        Persistence

                                        Modify Existing Service

                                        1
                                        T1031

                                        Registry Run Keys / Startup Folder

                                        1
                                        T1060

                                        Defense Evasion

                                        Modify Registry

                                        3
                                        T1112

                                        Disabling Security Tools

                                        1
                                        T1089

                                        Virtualization/Sandbox Evasion

                                        1
                                        T1497

                                        File Permissions Modification

                                        1
                                        T1222

                                        Install Root Certificate

                                        1
                                        T1130

                                        Credential Access

                                        Credentials in Files

                                        2
                                        T1081

                                        Discovery

                                        Query Registry

                                        5
                                        T1012

                                        Virtualization/Sandbox Evasion

                                        1
                                        T1497

                                        System Information Discovery

                                        5
                                        T1082

                                        Peripheral Device Discovery

                                        1
                                        T1120

                                        Collection

                                        Data from Local System

                                        2
                                        T1005

                                        Command and Control

                                        Web Service

                                        1
                                        T1102

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\Program Files (x86)\Company\NewProduct\customer3.exe
                                          MD5

                                          1daac0c9a48a79976539b0722f9c3d3b

                                          SHA1

                                          843218f70a6a7fd676121e447b5b74acb0d87100

                                          SHA256

                                          e496ce805aa5b3ed8e1898803a536c683d031c5a61b2a54e5c89e02c4febecdf

                                          SHA512

                                          2259e6e27e6ca6155b50bc0dfd8c3f9f1a31db53c8b4d1811e94e927e30aba2ded4c92a34dfee042d96bd5fd7cbfdbb73d168cc8d66f9b3a37df40980d6dfebc

                                        • C:\Users\Admin\Documents\3zGoajUOoJqyPQE8qswlkKTP.exe
                                          MD5

                                          32921634dd651cfd797d70c5b4add458

                                          SHA1

                                          1293a3c4487f1f6669354d0879cfe8bab88949bc

                                          SHA256

                                          963989f4b4d6e2d7c2281992ae5d62966726e81b5070b792399c7fd2017ca5ca

                                          SHA512

                                          0457f601823bfb5425cd37ead2954d42a12a7695f72973faf344a3689fbf9ee5752aa307b2057a101ff5e055743b30e8f28bc1b5754e0610b1f6f21cd31d460f

                                        • C:\Users\Admin\Documents\3zGoajUOoJqyPQE8qswlkKTP.exe
                                          MD5

                                          32921634dd651cfd797d70c5b4add458

                                          SHA1

                                          1293a3c4487f1f6669354d0879cfe8bab88949bc

                                          SHA256

                                          963989f4b4d6e2d7c2281992ae5d62966726e81b5070b792399c7fd2017ca5ca

                                          SHA512

                                          0457f601823bfb5425cd37ead2954d42a12a7695f72973faf344a3689fbf9ee5752aa307b2057a101ff5e055743b30e8f28bc1b5754e0610b1f6f21cd31d460f

                                        • C:\Users\Admin\Documents\8BGJNCqEwgntDOu5jd0ZIKbE.exe
                                          MD5

                                          29903569f45cc9979551427cc5d9fd99

                                          SHA1

                                          0487682dd1300b26cea9275a405c8ad3383a1583

                                          SHA256

                                          eec05dc9ade2a7ee74ea5fb115bdd687b457d1f81841238a61e9775d6cc4bfa6

                                          SHA512

                                          f8f29c163bfabc90ade4981523feb943656cc20a562e5b4f6f2c6788f781408aec39114a129e765332aa0022d154d4516e9cb56bc01762b114833fddb30d23fb

                                        • C:\Users\Admin\Documents\8BGJNCqEwgntDOu5jd0ZIKbE.exe
                                          MD5

                                          29903569f45cc9979551427cc5d9fd99

                                          SHA1

                                          0487682dd1300b26cea9275a405c8ad3383a1583

                                          SHA256

                                          eec05dc9ade2a7ee74ea5fb115bdd687b457d1f81841238a61e9775d6cc4bfa6

                                          SHA512

                                          f8f29c163bfabc90ade4981523feb943656cc20a562e5b4f6f2c6788f781408aec39114a129e765332aa0022d154d4516e9cb56bc01762b114833fddb30d23fb

                                        • C:\Users\Admin\Documents\8BGJNCqEwgntDOu5jd0ZIKbE.exe
                                          MD5

                                          29903569f45cc9979551427cc5d9fd99

                                          SHA1

                                          0487682dd1300b26cea9275a405c8ad3383a1583

                                          SHA256

                                          eec05dc9ade2a7ee74ea5fb115bdd687b457d1f81841238a61e9775d6cc4bfa6

                                          SHA512

                                          f8f29c163bfabc90ade4981523feb943656cc20a562e5b4f6f2c6788f781408aec39114a129e765332aa0022d154d4516e9cb56bc01762b114833fddb30d23fb

                                        • C:\Users\Admin\Documents\Byfr8UT2PGp4jDez4TDPC26A.exe
                                          MD5

                                          33e4d906579d1842adbddc6e3be27b5b

                                          SHA1

                                          9cc464b63f810e929cbb383de751bcac70d22020

                                          SHA256

                                          b9025aef29f9f9d3126d390e66df8c55a9c9f7c15520f9a59a963932ee86b815

                                          SHA512

                                          4c34f247d5e5ebbad752d7b28ce2c86b122eb82c789a05416f786ef0b265da92826530ee5003848c68f71b7dd3f20389f627ca18bf7981e1582837272ba9f798

                                        • C:\Users\Admin\Documents\Byfr8UT2PGp4jDez4TDPC26A.exe
                                          MD5

                                          33e4d906579d1842adbddc6e3be27b5b

                                          SHA1

                                          9cc464b63f810e929cbb383de751bcac70d22020

                                          SHA256

                                          b9025aef29f9f9d3126d390e66df8c55a9c9f7c15520f9a59a963932ee86b815

                                          SHA512

                                          4c34f247d5e5ebbad752d7b28ce2c86b122eb82c789a05416f786ef0b265da92826530ee5003848c68f71b7dd3f20389f627ca18bf7981e1582837272ba9f798

                                        • C:\Users\Admin\Documents\DSYjfYEvd3d2kwVLyAZdnm7B.exe
                                          MD5

                                          bbfa73f5dc7f0d888a0d731842789bc6

                                          SHA1

                                          4296b8152197dc85cccfe4398b78f53716db9c45

                                          SHA256

                                          98c781b3fd15d6c7c7624aa1a0c93910dd5d19722a1d9b8cb1c7b9673d311090

                                          SHA512

                                          2d371862311f7eca74a5207ad660af372ff66c3298681852a7691ef085923f5b28943e55c0ac61c071a4f8df58e97764cf988d59f08d4020cdf8466545f94c78

                                        • C:\Users\Admin\Documents\HXhlhIm5YQIhfUlxoCVjsNGx.exe
                                          MD5

                                          2d1621385f15454a5a309c8d07e32b7a

                                          SHA1

                                          7bfaa385f1833ed35f08b81ecd2f10c12e490345

                                          SHA256

                                          4b95ff6312411ed2eec0dc2fdb251d985b6e9892e1b2f61aadb94dea1b3eeb13

                                          SHA512

                                          b2c72707c5d8e953303ecd8a474bdea7c9afd267582bf9c7c7940e4efcdb7c36dd30888ff61591a2c72a8d68e50d7ed19cb1411327085c03bc23744fda9654fc

                                        • C:\Users\Admin\Documents\HXhlhIm5YQIhfUlxoCVjsNGx.exe
                                          MD5

                                          2d1621385f15454a5a309c8d07e32b7a

                                          SHA1

                                          7bfaa385f1833ed35f08b81ecd2f10c12e490345

                                          SHA256

                                          4b95ff6312411ed2eec0dc2fdb251d985b6e9892e1b2f61aadb94dea1b3eeb13

                                          SHA512

                                          b2c72707c5d8e953303ecd8a474bdea7c9afd267582bf9c7c7940e4efcdb7c36dd30888ff61591a2c72a8d68e50d7ed19cb1411327085c03bc23744fda9654fc

                                        • C:\Users\Admin\Documents\HbaRtHptTe3U38jA86BLHM9q.exe
                                          MD5

                                          6753c0fadc839415e31b170b5df98fc7

                                          SHA1

                                          7adbd92546bc0516013c0f6832ea272cf0606c60

                                          SHA256

                                          01550ee84ac5a220197177182fd2f3f9c9e845b416d06a384384e3cd62ecb569

                                          SHA512

                                          92c0264046f1293b02ccccbb3cb5b80510d2d3a1d1caff23815adb4c715d0aced08e57682c6dcb76fdca70eb46bc819db2a763f050f74de27fbb3946dca504ab

                                        • C:\Users\Admin\Documents\HbaRtHptTe3U38jA86BLHM9q.exe
                                          MD5

                                          6753c0fadc839415e31b170b5df98fc7

                                          SHA1

                                          7adbd92546bc0516013c0f6832ea272cf0606c60

                                          SHA256

                                          01550ee84ac5a220197177182fd2f3f9c9e845b416d06a384384e3cd62ecb569

                                          SHA512

                                          92c0264046f1293b02ccccbb3cb5b80510d2d3a1d1caff23815adb4c715d0aced08e57682c6dcb76fdca70eb46bc819db2a763f050f74de27fbb3946dca504ab

                                        • C:\Users\Admin\Documents\HmwpI3JFKpIO1xNOr3VKmjWg.exe
                                          MD5

                                          692911684e6458e42e803ffdc7b3bd50

                                          SHA1

                                          0b3eeef6468faa65165a3724d8b705633d5e2f1a

                                          SHA256

                                          b483fe7d29ce8eedcb3e1ec061e0f45bc44d0b48e4f21eaaf67a063388314ff7

                                          SHA512

                                          578120b24d3f7b882e4cdcc77265d282e8d2dce73bd54cee5dca67eac14da7bb2e633ab48a7c3047e1a1316feb42129f260527304a704a988b25a4ed9335f60d

                                        • C:\Users\Admin\Documents\Jl1Q68LrRqQrlRqlngiMs4zn.exe
                                          MD5

                                          2187ac1cdb84a5a172d51f50aa67f76a

                                          SHA1

                                          98dcaf5606c245d08f8ba6fdef95cd1e921a2624

                                          SHA256

                                          cb54b6471597a9417bcc042d0f0d6404518b647bd3757035a01e9de6aa109490

                                          SHA512

                                          ec0d1b7fe59d430213547e0651a92ebc38b4a57f7c4a30d60bc25306b407fd04e4427c93acb9c34df2e884b9c696cbf7da9ad44c90af25eb4922c72baa84a80e

                                        • C:\Users\Admin\Documents\LS1ifFsm1C16Ehevn_JT3kUl.exe
                                          MD5

                                          151b3bfa3c4ec4133447cc9da6c0aaed

                                          SHA1

                                          eb850cda0c643d20ee8f0107e41dcc59782cc98c

                                          SHA256

                                          7ffe925c0171e3c9a57fef66f91e070f6d91a9f4bb88666419b82e5fb76a935c

                                          SHA512

                                          c9b8ac01df581e509f94cb017d617bb3ddb663449f6ba71254e74ed316bb2f4f7dd737f4d5a6fa52311e0af09474d5cb9b6c905e57e680881ecef9323769379e

                                        • C:\Users\Admin\Documents\VzLwVmYJtjgQ289obDuykf63.exe
                                          MD5

                                          c7ccbd62c259a382501ff67408594011

                                          SHA1

                                          c1dca912e6c63e3730f261a3b4ba86dec0acd5f3

                                          SHA256

                                          8cfa7e9bc6cbd458cec18a25e6f763a3776802490e6b3d451d864c4dba50c437

                                          SHA512

                                          5f5958363820795f96fff6ad71bc1b59ec01a6a24876c5d22d48efaa49bc55373fca1f8e927c23547cdb494ba46b6d3871f377e607c97d9f10d4e0636ac7ef2b

                                        • C:\Users\Admin\Documents\ZPNGTbSQTRPHBQ3VaaTJX2pi.exe
                                          MD5

                                          b15db436045c3f484296acc6cff34a86

                                          SHA1

                                          346ae322b55e14611f10a64f336aaa9ff6fed68c

                                          SHA256

                                          dab2a18df66f2e74d0831a8b118de6b9df2642ac939cbad0552e30696d644193

                                          SHA512

                                          804bee37e0a6247ef2edb5dba8d4b6820ff10b0a4cb76e4c039a7242285836ed5255a1f297f8ba96168d9295558844a9fd7ec3a977207f339296a001543c1fd9

                                        • C:\Users\Admin\Documents\fd4ouhq8Af_mEhLfwBSklX1Z.exe
                                          MD5

                                          44bd483ec703442a2ecf6ea52e7cbacd

                                          SHA1

                                          5438628759dc6347f8988cdcf5bc68ca67d9acc6

                                          SHA256

                                          f4ec629473fbe96fa82fe1c1e30e6784144163d662e1c977acf5bc1d62b20c0b

                                          SHA512

                                          1a892a2ff0547fd7f8d3a06c4a6b86f59ccf2f4b4a9031197ba1c82cf58ad3f75488d1742e69f71c8d608c0dcca1e407fea7eefe3802702a98b598ccf4334fa0

                                        • C:\Users\Admin\Documents\fd4ouhq8Af_mEhLfwBSklX1Z.exe
                                          MD5

                                          44bd483ec703442a2ecf6ea52e7cbacd

                                          SHA1

                                          5438628759dc6347f8988cdcf5bc68ca67d9acc6

                                          SHA256

                                          f4ec629473fbe96fa82fe1c1e30e6784144163d662e1c977acf5bc1d62b20c0b

                                          SHA512

                                          1a892a2ff0547fd7f8d3a06c4a6b86f59ccf2f4b4a9031197ba1c82cf58ad3f75488d1742e69f71c8d608c0dcca1e407fea7eefe3802702a98b598ccf4334fa0

                                        • C:\Users\Admin\Documents\iw9YlNU5QxVjC7EmXFwjM0hH.exe
                                          MD5

                                          145bf5658332302310a7fe40ed77783d

                                          SHA1

                                          5370ac46379b8db9d9fca84f21d411687109486f

                                          SHA256

                                          bddcd5eba3036a21b11e6d6d3cbe84daf562db27814adf7e32b5cc103d3c25d3

                                          SHA512

                                          d3d9a8231f256efee7ce7ba6841d78c598dc912e7e5d503a9a094e6303d0f9f165a60c5370f353076b1f592d7d9ee6765d0ba4863a1c4935bb47e2ffa4ffb776

                                        • C:\Users\Admin\Documents\oNqmFFuUoyi_4XUOgFQB4wkv.exe
                                          MD5

                                          7714deedb24c3dcfa81dc660dd383492

                                          SHA1

                                          56fae3ab1186009430e175c73b914c77ed714cc0

                                          SHA256

                                          435badbad2fc138245a4771a74ebb9075658e294d1bcfcf191ccea466eea825c

                                          SHA512

                                          2cf05ac9470ab4e6d487ec9e4d7ab36fb2c8ce1405dba01b58934778829c7c4db703818087e0c5fbffe6cf821dfa190427e1205530409359ace2ad416e781c58

                                        • C:\Users\Admin\Documents\otVD_LP1l85bLGezskQB60Pk.exe
                                          MD5

                                          e10919e0d46d70eb27064f89cd6ba987

                                          SHA1

                                          d5e06c8e891fe78083c9e1213d54b8101e34ac32

                                          SHA256

                                          8b57cd06470e93abf9ea61e86839a3f7eb3b13fbb37c5fec34888652a65185c3

                                          SHA512

                                          0acf98d8d65a5af61f407bc6ffbcca04d4ada7d6de0d2552211059889451bd11e404391db11568f063a459f3a56765f6f3e279bc90dcd0ee30e0f918fffc9112

                                        • C:\Users\Admin\Documents\otVD_LP1l85bLGezskQB60Pk.exe
                                          MD5

                                          e10919e0d46d70eb27064f89cd6ba987

                                          SHA1

                                          d5e06c8e891fe78083c9e1213d54b8101e34ac32

                                          SHA256

                                          8b57cd06470e93abf9ea61e86839a3f7eb3b13fbb37c5fec34888652a65185c3

                                          SHA512

                                          0acf98d8d65a5af61f407bc6ffbcca04d4ada7d6de0d2552211059889451bd11e404391db11568f063a459f3a56765f6f3e279bc90dcd0ee30e0f918fffc9112

                                        • C:\Users\Admin\Documents\sd23sOzTy0Zkd1ABCCoftC_x.exe
                                          MD5

                                          58f5dca577a49a38ea439b3dc7b5f8d6

                                          SHA1

                                          175dc7a597935b1afeb8705bd3d7a556649b06cf

                                          SHA256

                                          857dd46102aea53f0cb7934b96410ebbc3e7988d38dcafdc8c0988f436533b98

                                          SHA512

                                          3c75c0cbbbc14bd25b4feb141fd1595ce02469da50432fb48400eb089d6150fe87831ccc775d921eeec697af7aad33a35fadcfd2ec775aeee1ce34355af7338a

                                        • C:\Users\Admin\Documents\u0oywLTp8FnTAr9VDhXRLvDh.exe
                                          MD5

                                          b46a8f39a877cbd10739667c5833c2bb

                                          SHA1

                                          ca12e39b1914f04adf984b0be948d145d672cb9d

                                          SHA256

                                          15ad913c094cd58fffa2067d86b75cf08fbcac95c16c2d68bab5b3498f059e31

                                          SHA512

                                          c6119162ecb98b968879c3da645ea203d9de415feb6d1d2715d0b98211d260785aaf73a60d039a2192c663ce9f00e93d7d84e4cb51c31ecfcac7adb4fbd387e0

                                        • C:\Users\Admin\Documents\uvFx4HzGtJVdNF39zLK7k65c.exe
                                          MD5

                                          8905c96d588cd083bc46fae8fd019049

                                          SHA1

                                          cc5bf2092a79cb4fc5c129882c6ef80cecaddfd3

                                          SHA256

                                          57b6d02c4b8d4153680004aecf35f8328a6f33c59b2ac7c7ee4ecb4e5af46465

                                          SHA512

                                          aaaa4e5da61fa2ce51eb439b934a29d4e42943762a91739048eace2cde383eeda30615c059ee3ced964e174e87492d2fd74b0b6dfccf2c0325923ff4aab9a2bc

                                        • C:\Users\Admin\Documents\zY5EbpHK3MviAN5_kfBxGWeY.exe
                                          MD5

                                          0a5500f0eaa61361493c6821a1bd3f31

                                          SHA1

                                          6ce25829ac6404025d51006cfc10ffbe69333152

                                          SHA256

                                          1583fceeae47160fd37427a55f1d2122f3654e528e29c55d64df145122515a55

                                          SHA512

                                          ea1e8554e35d8027262c9fb033afa1d539901b6580c5d7c38179eadf1ab0d7633a4b8d26b6ee0650176e567e0f36db1a99ece968b95dac9f56ae36b63908c243

                                        • C:\Users\Admin\Documents\zc8Yjf3W2ltv_h6CY_1CWJgS.exe
                                          MD5

                                          fce4cfedf3ccd080c13f6fc33e340100

                                          SHA1

                                          c215b130fcadcd265c76bac023322cfa93b6b35f

                                          SHA256

                                          e1cbebc0c9a675ca172e7de1908991f7b0bd0866c1bea9404ae10bc201de0fe6

                                          SHA512

                                          7386baba3d98715da1fd895b35211c01b174687eb7fa65773e04b31184f8d88dff3476249d1766257f04b05c18528aa5dec87dea6e5f5109d92dd96c6badd868

                                        • \Program Files (x86)\Company\NewProduct\customer3.exe
                                          MD5

                                          1daac0c9a48a79976539b0722f9c3d3b

                                          SHA1

                                          843218f70a6a7fd676121e447b5b74acb0d87100

                                          SHA256

                                          e496ce805aa5b3ed8e1898803a536c683d031c5a61b2a54e5c89e02c4febecdf

                                          SHA512

                                          2259e6e27e6ca6155b50bc0dfd8c3f9f1a31db53c8b4d1811e94e927e30aba2ded4c92a34dfee042d96bd5fd7cbfdbb73d168cc8d66f9b3a37df40980d6dfebc

                                        • \Program Files (x86)\Company\NewProduct\customer3.exe
                                          MD5

                                          1daac0c9a48a79976539b0722f9c3d3b

                                          SHA1

                                          843218f70a6a7fd676121e447b5b74acb0d87100

                                          SHA256

                                          e496ce805aa5b3ed8e1898803a536c683d031c5a61b2a54e5c89e02c4febecdf

                                          SHA512

                                          2259e6e27e6ca6155b50bc0dfd8c3f9f1a31db53c8b4d1811e94e927e30aba2ded4c92a34dfee042d96bd5fd7cbfdbb73d168cc8d66f9b3a37df40980d6dfebc

                                        • \Program Files (x86)\Company\NewProduct\md8_8eus.exe
                                          MD5

                                          ce11de1000560d312bf6ab0b5327e87b

                                          SHA1

                                          557f3f780cb0f694887ada330a87ba976cdb168f

                                          SHA256

                                          126daa976d1eaec1bd68eb53748caa325fc537f865051dd0d5f09d599175861a

                                          SHA512

                                          655b45bcf75a79c174caf6fae84560980511d068f67a89883f70b264e88983f729c604b3484fdcb8d8f8a83105e43d740fe70e7a006806136bc423453d769655

                                        • \Program Files (x86)\Company\NewProduct\md8_8eus.exe
                                          MD5

                                          ce11de1000560d312bf6ab0b5327e87b

                                          SHA1

                                          557f3f780cb0f694887ada330a87ba976cdb168f

                                          SHA256

                                          126daa976d1eaec1bd68eb53748caa325fc537f865051dd0d5f09d599175861a

                                          SHA512

                                          655b45bcf75a79c174caf6fae84560980511d068f67a89883f70b264e88983f729c604b3484fdcb8d8f8a83105e43d740fe70e7a006806136bc423453d769655

                                        • \Users\Admin\Documents\3zGoajUOoJqyPQE8qswlkKTP.exe
                                          MD5

                                          32921634dd651cfd797d70c5b4add458

                                          SHA1

                                          1293a3c4487f1f6669354d0879cfe8bab88949bc

                                          SHA256

                                          963989f4b4d6e2d7c2281992ae5d62966726e81b5070b792399c7fd2017ca5ca

                                          SHA512

                                          0457f601823bfb5425cd37ead2954d42a12a7695f72973faf344a3689fbf9ee5752aa307b2057a101ff5e055743b30e8f28bc1b5754e0610b1f6f21cd31d460f

                                        • \Users\Admin\Documents\8BGJNCqEwgntDOu5jd0ZIKbE.exe
                                          MD5

                                          29903569f45cc9979551427cc5d9fd99

                                          SHA1

                                          0487682dd1300b26cea9275a405c8ad3383a1583

                                          SHA256

                                          eec05dc9ade2a7ee74ea5fb115bdd687b457d1f81841238a61e9775d6cc4bfa6

                                          SHA512

                                          f8f29c163bfabc90ade4981523feb943656cc20a562e5b4f6f2c6788f781408aec39114a129e765332aa0022d154d4516e9cb56bc01762b114833fddb30d23fb

                                        • \Users\Admin\Documents\8BGJNCqEwgntDOu5jd0ZIKbE.exe
                                          MD5

                                          29903569f45cc9979551427cc5d9fd99

                                          SHA1

                                          0487682dd1300b26cea9275a405c8ad3383a1583

                                          SHA256

                                          eec05dc9ade2a7ee74ea5fb115bdd687b457d1f81841238a61e9775d6cc4bfa6

                                          SHA512

                                          f8f29c163bfabc90ade4981523feb943656cc20a562e5b4f6f2c6788f781408aec39114a129e765332aa0022d154d4516e9cb56bc01762b114833fddb30d23fb

                                        • \Users\Admin\Documents\Byfr8UT2PGp4jDez4TDPC26A.exe
                                          MD5

                                          33e4d906579d1842adbddc6e3be27b5b

                                          SHA1

                                          9cc464b63f810e929cbb383de751bcac70d22020

                                          SHA256

                                          b9025aef29f9f9d3126d390e66df8c55a9c9f7c15520f9a59a963932ee86b815

                                          SHA512

                                          4c34f247d5e5ebbad752d7b28ce2c86b122eb82c789a05416f786ef0b265da92826530ee5003848c68f71b7dd3f20389f627ca18bf7981e1582837272ba9f798

                                        • \Users\Admin\Documents\DSYjfYEvd3d2kwVLyAZdnm7B.exe
                                          MD5

                                          bbfa73f5dc7f0d888a0d731842789bc6

                                          SHA1

                                          4296b8152197dc85cccfe4398b78f53716db9c45

                                          SHA256

                                          98c781b3fd15d6c7c7624aa1a0c93910dd5d19722a1d9b8cb1c7b9673d311090

                                          SHA512

                                          2d371862311f7eca74a5207ad660af372ff66c3298681852a7691ef085923f5b28943e55c0ac61c071a4f8df58e97764cf988d59f08d4020cdf8466545f94c78

                                        • \Users\Admin\Documents\DSYjfYEvd3d2kwVLyAZdnm7B.exe
                                          MD5

                                          bbfa73f5dc7f0d888a0d731842789bc6

                                          SHA1

                                          4296b8152197dc85cccfe4398b78f53716db9c45

                                          SHA256

                                          98c781b3fd15d6c7c7624aa1a0c93910dd5d19722a1d9b8cb1c7b9673d311090

                                          SHA512

                                          2d371862311f7eca74a5207ad660af372ff66c3298681852a7691ef085923f5b28943e55c0ac61c071a4f8df58e97764cf988d59f08d4020cdf8466545f94c78

                                        • \Users\Admin\Documents\HXhlhIm5YQIhfUlxoCVjsNGx.exe
                                          MD5

                                          2d1621385f15454a5a309c8d07e32b7a

                                          SHA1

                                          7bfaa385f1833ed35f08b81ecd2f10c12e490345

                                          SHA256

                                          4b95ff6312411ed2eec0dc2fdb251d985b6e9892e1b2f61aadb94dea1b3eeb13

                                          SHA512

                                          b2c72707c5d8e953303ecd8a474bdea7c9afd267582bf9c7c7940e4efcdb7c36dd30888ff61591a2c72a8d68e50d7ed19cb1411327085c03bc23744fda9654fc

                                        • \Users\Admin\Documents\HbaRtHptTe3U38jA86BLHM9q.exe
                                          MD5

                                          6753c0fadc839415e31b170b5df98fc7

                                          SHA1

                                          7adbd92546bc0516013c0f6832ea272cf0606c60

                                          SHA256

                                          01550ee84ac5a220197177182fd2f3f9c9e845b416d06a384384e3cd62ecb569

                                          SHA512

                                          92c0264046f1293b02ccccbb3cb5b80510d2d3a1d1caff23815adb4c715d0aced08e57682c6dcb76fdca70eb46bc819db2a763f050f74de27fbb3946dca504ab

                                        • \Users\Admin\Documents\HmwpI3JFKpIO1xNOr3VKmjWg.exe
                                          MD5

                                          692911684e6458e42e803ffdc7b3bd50

                                          SHA1

                                          0b3eeef6468faa65165a3724d8b705633d5e2f1a

                                          SHA256

                                          b483fe7d29ce8eedcb3e1ec061e0f45bc44d0b48e4f21eaaf67a063388314ff7

                                          SHA512

                                          578120b24d3f7b882e4cdcc77265d282e8d2dce73bd54cee5dca67eac14da7bb2e633ab48a7c3047e1a1316feb42129f260527304a704a988b25a4ed9335f60d

                                        • \Users\Admin\Documents\Ip66eP9Iswm1NOAGKGF2PQEW.exe
                                          MD5

                                          592404767648b0afc3cab6fade2fb7d2

                                          SHA1

                                          bab615526528b498a09d76decbf86691807e7822

                                          SHA256

                                          3593247c384586966e5a0e28eb4c4174b31e93c78c7a9e8fef96ec42a152e509

                                          SHA512

                                          83819e4956ac6da21c4927fa6edee2b178bc89bcda8fb5f4d0767d0d8310393f50f0f7e76e1a963002626a8176abfa8d864c9229a41e5b61e1a24a32d379dda9

                                        • \Users\Admin\Documents\Ip66eP9Iswm1NOAGKGF2PQEW.exe
                                          MD5

                                          592404767648b0afc3cab6fade2fb7d2

                                          SHA1

                                          bab615526528b498a09d76decbf86691807e7822

                                          SHA256

                                          3593247c384586966e5a0e28eb4c4174b31e93c78c7a9e8fef96ec42a152e509

                                          SHA512

                                          83819e4956ac6da21c4927fa6edee2b178bc89bcda8fb5f4d0767d0d8310393f50f0f7e76e1a963002626a8176abfa8d864c9229a41e5b61e1a24a32d379dda9

                                        • \Users\Admin\Documents\Jl1Q68LrRqQrlRqlngiMs4zn.exe
                                          MD5

                                          2187ac1cdb84a5a172d51f50aa67f76a

                                          SHA1

                                          98dcaf5606c245d08f8ba6fdef95cd1e921a2624

                                          SHA256

                                          cb54b6471597a9417bcc042d0f0d6404518b647bd3757035a01e9de6aa109490

                                          SHA512

                                          ec0d1b7fe59d430213547e0651a92ebc38b4a57f7c4a30d60bc25306b407fd04e4427c93acb9c34df2e884b9c696cbf7da9ad44c90af25eb4922c72baa84a80e

                                        • \Users\Admin\Documents\LS1ifFsm1C16Ehevn_JT3kUl.exe
                                          MD5

                                          151b3bfa3c4ec4133447cc9da6c0aaed

                                          SHA1

                                          eb850cda0c643d20ee8f0107e41dcc59782cc98c

                                          SHA256

                                          7ffe925c0171e3c9a57fef66f91e070f6d91a9f4bb88666419b82e5fb76a935c

                                          SHA512

                                          c9b8ac01df581e509f94cb017d617bb3ddb663449f6ba71254e74ed316bb2f4f7dd737f4d5a6fa52311e0af09474d5cb9b6c905e57e680881ecef9323769379e

                                        • \Users\Admin\Documents\LS1ifFsm1C16Ehevn_JT3kUl.exe
                                          MD5

                                          151b3bfa3c4ec4133447cc9da6c0aaed

                                          SHA1

                                          eb850cda0c643d20ee8f0107e41dcc59782cc98c

                                          SHA256

                                          7ffe925c0171e3c9a57fef66f91e070f6d91a9f4bb88666419b82e5fb76a935c

                                          SHA512

                                          c9b8ac01df581e509f94cb017d617bb3ddb663449f6ba71254e74ed316bb2f4f7dd737f4d5a6fa52311e0af09474d5cb9b6c905e57e680881ecef9323769379e

                                        • \Users\Admin\Documents\VzLwVmYJtjgQ289obDuykf63.exe
                                          MD5

                                          c7ccbd62c259a382501ff67408594011

                                          SHA1

                                          c1dca912e6c63e3730f261a3b4ba86dec0acd5f3

                                          SHA256

                                          8cfa7e9bc6cbd458cec18a25e6f763a3776802490e6b3d451d864c4dba50c437

                                          SHA512

                                          5f5958363820795f96fff6ad71bc1b59ec01a6a24876c5d22d48efaa49bc55373fca1f8e927c23547cdb494ba46b6d3871f377e607c97d9f10d4e0636ac7ef2b

                                        • \Users\Admin\Documents\VzLwVmYJtjgQ289obDuykf63.exe
                                          MD5

                                          c7ccbd62c259a382501ff67408594011

                                          SHA1

                                          c1dca912e6c63e3730f261a3b4ba86dec0acd5f3

                                          SHA256

                                          8cfa7e9bc6cbd458cec18a25e6f763a3776802490e6b3d451d864c4dba50c437

                                          SHA512

                                          5f5958363820795f96fff6ad71bc1b59ec01a6a24876c5d22d48efaa49bc55373fca1f8e927c23547cdb494ba46b6d3871f377e607c97d9f10d4e0636ac7ef2b

                                        • \Users\Admin\Documents\ZPNGTbSQTRPHBQ3VaaTJX2pi.exe
                                          MD5

                                          b15db436045c3f484296acc6cff34a86

                                          SHA1

                                          346ae322b55e14611f10a64f336aaa9ff6fed68c

                                          SHA256

                                          dab2a18df66f2e74d0831a8b118de6b9df2642ac939cbad0552e30696d644193

                                          SHA512

                                          804bee37e0a6247ef2edb5dba8d4b6820ff10b0a4cb76e4c039a7242285836ed5255a1f297f8ba96168d9295558844a9fd7ec3a977207f339296a001543c1fd9

                                        • \Users\Admin\Documents\fd4ouhq8Af_mEhLfwBSklX1Z.exe
                                          MD5

                                          44bd483ec703442a2ecf6ea52e7cbacd

                                          SHA1

                                          5438628759dc6347f8988cdcf5bc68ca67d9acc6

                                          SHA256

                                          f4ec629473fbe96fa82fe1c1e30e6784144163d662e1c977acf5bc1d62b20c0b

                                          SHA512

                                          1a892a2ff0547fd7f8d3a06c4a6b86f59ccf2f4b4a9031197ba1c82cf58ad3f75488d1742e69f71c8d608c0dcca1e407fea7eefe3802702a98b598ccf4334fa0

                                        • \Users\Admin\Documents\iw9YlNU5QxVjC7EmXFwjM0hH.exe
                                          MD5

                                          145bf5658332302310a7fe40ed77783d

                                          SHA1

                                          5370ac46379b8db9d9fca84f21d411687109486f

                                          SHA256

                                          bddcd5eba3036a21b11e6d6d3cbe84daf562db27814adf7e32b5cc103d3c25d3

                                          SHA512

                                          d3d9a8231f256efee7ce7ba6841d78c598dc912e7e5d503a9a094e6303d0f9f165a60c5370f353076b1f592d7d9ee6765d0ba4863a1c4935bb47e2ffa4ffb776

                                        • \Users\Admin\Documents\iw9YlNU5QxVjC7EmXFwjM0hH.exe
                                          MD5

                                          145bf5658332302310a7fe40ed77783d

                                          SHA1

                                          5370ac46379b8db9d9fca84f21d411687109486f

                                          SHA256

                                          bddcd5eba3036a21b11e6d6d3cbe84daf562db27814adf7e32b5cc103d3c25d3

                                          SHA512

                                          d3d9a8231f256efee7ce7ba6841d78c598dc912e7e5d503a9a094e6303d0f9f165a60c5370f353076b1f592d7d9ee6765d0ba4863a1c4935bb47e2ffa4ffb776

                                        • \Users\Admin\Documents\o2UA8Wai9hYkiFuRd6Kr6L_S.exe
                                          MD5

                                          19e4c4f601f1459b6755776c7aec2604

                                          SHA1

                                          71d8398652a891d09492db64bc1458349ba4cdbc

                                          SHA256

                                          9460ffe580332fe64bb4f35bb63dc6a4302f3613718a04dc0986cea989160039

                                          SHA512

                                          f3142590ecc73245295b1cf0f2b4188fa547f35adb2103efba55db8629c730727ac0beef73034950aec0e87297f7be1acfb2bcffc6b238c4386499356f527696

                                        • \Users\Admin\Documents\otVD_LP1l85bLGezskQB60Pk.exe
                                          MD5

                                          e10919e0d46d70eb27064f89cd6ba987

                                          SHA1

                                          d5e06c8e891fe78083c9e1213d54b8101e34ac32

                                          SHA256

                                          8b57cd06470e93abf9ea61e86839a3f7eb3b13fbb37c5fec34888652a65185c3

                                          SHA512

                                          0acf98d8d65a5af61f407bc6ffbcca04d4ada7d6de0d2552211059889451bd11e404391db11568f063a459f3a56765f6f3e279bc90dcd0ee30e0f918fffc9112

                                        • \Users\Admin\Documents\otVD_LP1l85bLGezskQB60Pk.exe
                                          MD5

                                          e10919e0d46d70eb27064f89cd6ba987

                                          SHA1

                                          d5e06c8e891fe78083c9e1213d54b8101e34ac32

                                          SHA256

                                          8b57cd06470e93abf9ea61e86839a3f7eb3b13fbb37c5fec34888652a65185c3

                                          SHA512

                                          0acf98d8d65a5af61f407bc6ffbcca04d4ada7d6de0d2552211059889451bd11e404391db11568f063a459f3a56765f6f3e279bc90dcd0ee30e0f918fffc9112

                                        • \Users\Admin\Documents\sd23sOzTy0Zkd1ABCCoftC_x.exe
                                          MD5

                                          58f5dca577a49a38ea439b3dc7b5f8d6

                                          SHA1

                                          175dc7a597935b1afeb8705bd3d7a556649b06cf

                                          SHA256

                                          857dd46102aea53f0cb7934b96410ebbc3e7988d38dcafdc8c0988f436533b98

                                          SHA512

                                          3c75c0cbbbc14bd25b4feb141fd1595ce02469da50432fb48400eb089d6150fe87831ccc775d921eeec697af7aad33a35fadcfd2ec775aeee1ce34355af7338a

                                        • \Users\Admin\Documents\u0oywLTp8FnTAr9VDhXRLvDh.exe
                                          MD5

                                          b46a8f39a877cbd10739667c5833c2bb

                                          SHA1

                                          ca12e39b1914f04adf984b0be948d145d672cb9d

                                          SHA256

                                          15ad913c094cd58fffa2067d86b75cf08fbcac95c16c2d68bab5b3498f059e31

                                          SHA512

                                          c6119162ecb98b968879c3da645ea203d9de415feb6d1d2715d0b98211d260785aaf73a60d039a2192c663ce9f00e93d7d84e4cb51c31ecfcac7adb4fbd387e0

                                        • \Users\Admin\Documents\u0oywLTp8FnTAr9VDhXRLvDh.exe
                                          MD5

                                          b46a8f39a877cbd10739667c5833c2bb

                                          SHA1

                                          ca12e39b1914f04adf984b0be948d145d672cb9d

                                          SHA256

                                          15ad913c094cd58fffa2067d86b75cf08fbcac95c16c2d68bab5b3498f059e31

                                          SHA512

                                          c6119162ecb98b968879c3da645ea203d9de415feb6d1d2715d0b98211d260785aaf73a60d039a2192c663ce9f00e93d7d84e4cb51c31ecfcac7adb4fbd387e0

                                        • \Users\Admin\Documents\uvFx4HzGtJVdNF39zLK7k65c.exe
                                          MD5

                                          8905c96d588cd083bc46fae8fd019049

                                          SHA1

                                          cc5bf2092a79cb4fc5c129882c6ef80cecaddfd3

                                          SHA256

                                          57b6d02c4b8d4153680004aecf35f8328a6f33c59b2ac7c7ee4ecb4e5af46465

                                          SHA512

                                          aaaa4e5da61fa2ce51eb439b934a29d4e42943762a91739048eace2cde383eeda30615c059ee3ced964e174e87492d2fd74b0b6dfccf2c0325923ff4aab9a2bc

                                        • \Users\Admin\Documents\uvFx4HzGtJVdNF39zLK7k65c.exe
                                          MD5

                                          8905c96d588cd083bc46fae8fd019049

                                          SHA1

                                          cc5bf2092a79cb4fc5c129882c6ef80cecaddfd3

                                          SHA256

                                          57b6d02c4b8d4153680004aecf35f8328a6f33c59b2ac7c7ee4ecb4e5af46465

                                          SHA512

                                          aaaa4e5da61fa2ce51eb439b934a29d4e42943762a91739048eace2cde383eeda30615c059ee3ced964e174e87492d2fd74b0b6dfccf2c0325923ff4aab9a2bc

                                        • \Users\Admin\Documents\zY5EbpHK3MviAN5_kfBxGWeY.exe
                                          MD5

                                          0a5500f0eaa61361493c6821a1bd3f31

                                          SHA1

                                          6ce25829ac6404025d51006cfc10ffbe69333152

                                          SHA256

                                          1583fceeae47160fd37427a55f1d2122f3654e528e29c55d64df145122515a55

                                          SHA512

                                          ea1e8554e35d8027262c9fb033afa1d539901b6580c5d7c38179eadf1ab0d7633a4b8d26b6ee0650176e567e0f36db1a99ece968b95dac9f56ae36b63908c243

                                        • \Users\Admin\Documents\zc8Yjf3W2ltv_h6CY_1CWJgS.exe
                                          MD5

                                          fce4cfedf3ccd080c13f6fc33e340100

                                          SHA1

                                          c215b130fcadcd265c76bac023322cfa93b6b35f

                                          SHA256

                                          e1cbebc0c9a675ca172e7de1908991f7b0bd0866c1bea9404ae10bc201de0fe6

                                          SHA512

                                          7386baba3d98715da1fd895b35211c01b174687eb7fa65773e04b31184f8d88dff3476249d1766257f04b05c18528aa5dec87dea6e5f5109d92dd96c6badd868

                                        • \Users\Admin\Documents\zc8Yjf3W2ltv_h6CY_1CWJgS.exe
                                          MD5

                                          fce4cfedf3ccd080c13f6fc33e340100

                                          SHA1

                                          c215b130fcadcd265c76bac023322cfa93b6b35f

                                          SHA256

                                          e1cbebc0c9a675ca172e7de1908991f7b0bd0866c1bea9404ae10bc201de0fe6

                                          SHA512

                                          7386baba3d98715da1fd895b35211c01b174687eb7fa65773e04b31184f8d88dff3476249d1766257f04b05c18528aa5dec87dea6e5f5109d92dd96c6badd868

                                        • memory/308-129-0x0000000000000000-mapping.dmp
                                        • memory/308-191-0x0000000001140000-0x0000000001141000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/540-82-0x0000000000000000-mapping.dmp
                                        • memory/540-139-0x0000000000D70000-0x0000000000D71000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/556-255-0x0000000000000000-mapping.dmp
                                        • memory/628-237-0x0000000000000000-mapping.dmp
                                        • memory/664-249-0x0000000000000000-mapping.dmp
                                        • memory/828-149-0x0000000000880000-0x0000000000881000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/828-185-0x000007FEFB6A1000-0x000007FEFB6A3000-memory.dmp
                                          Filesize

                                          8KB

                                        • memory/828-74-0x0000000000000000-mapping.dmp
                                        • memory/828-155-0x0000000004A50000-0x0000000004A51000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/828-169-0x0000000000000000-mapping.dmp
                                        • memory/832-176-0x0000000000000000-mapping.dmp
                                        • memory/924-182-0x0000000000BE0000-0x0000000000BE1000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/924-109-0x0000000000000000-mapping.dmp
                                        • memory/996-222-0x0000000000400000-0x0000000000420000-memory.dmp
                                          Filesize

                                          128KB

                                        • memory/996-158-0x0000000000400000-0x0000000000420000-memory.dmp
                                          Filesize

                                          128KB

                                        • memory/996-161-0x000000000041A76A-mapping.dmp
                                        • memory/1060-200-0x0000000000400000-0x0000000000409000-memory.dmp
                                          Filesize

                                          36KB

                                        • memory/1060-201-0x0000000000402FAB-mapping.dmp
                                        • memory/1076-213-0x0000000000000000-mapping.dmp
                                        • memory/1100-173-0x0000000000000000-mapping.dmp
                                        • memory/1160-216-0x0000000000000000-mapping.dmp
                                        • memory/1296-127-0x0000000000000000-mapping.dmp
                                        • memory/1348-181-0x0000000000000000-mapping.dmp
                                        • memory/1372-126-0x0000000000000000-mapping.dmp
                                        • memory/1376-120-0x0000000000000000-mapping.dmp
                                        • memory/1400-72-0x0000000000000000-mapping.dmp
                                        • memory/1404-124-0x0000000000000000-mapping.dmp
                                        • memory/1468-156-0x0000000000CA0000-0x0000000000CA1000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/1468-101-0x0000000000000000-mapping.dmp
                                        • memory/1600-99-0x0000000000B50000-0x0000000000B51000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/1600-78-0x0000000000000000-mapping.dmp
                                        • memory/1636-228-0x0000000000400000-0x0000000000537000-memory.dmp
                                          Filesize

                                          1.2MB

                                        • memory/1636-229-0x0000000000424141-mapping.dmp
                                        • memory/1664-243-0x0000000000000000-mapping.dmp
                                        • memory/1760-248-0x0000000000000000-mapping.dmp
                                        • memory/1772-112-0x0000000000000000-mapping.dmp
                                        • memory/1776-122-0x0000000000000000-mapping.dmp
                                        • memory/1776-178-0x0000000002E90000-0x0000000002EAC000-memory.dmp
                                          Filesize

                                          112KB

                                        • memory/1776-183-0x0000000004870000-0x000000000488A000-memory.dmp
                                          Filesize

                                          104KB

                                        • memory/1828-64-0x0000000000000000-mapping.dmp
                                        • memory/1828-151-0x0000000000220000-0x0000000000221000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/1832-157-0x0000000000400000-0x0000000000420000-memory.dmp
                                          Filesize

                                          128KB

                                        • memory/1832-163-0x0000000000400000-0x0000000000420000-memory.dmp
                                          Filesize

                                          128KB

                                        • memory/1832-159-0x000000000041A616-mapping.dmp
                                        • memory/1864-61-0x0000000003C10000-0x0000000003D4F000-memory.dmp
                                          Filesize

                                          1.2MB

                                        • memory/1864-60-0x00000000754F1000-0x00000000754F3000-memory.dmp
                                          Filesize

                                          8KB

                                        • memory/1876-104-0x0000000000000000-mapping.dmp
                                        • memory/1992-90-0x0000000000000000-mapping.dmp
                                        • memory/1996-115-0x0000000000000000-mapping.dmp
                                        • memory/2000-87-0x0000000000000000-mapping.dmp
                                        • memory/2024-177-0x0000000000980000-0x0000000000981000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/2024-80-0x0000000000000000-mapping.dmp
                                        • memory/2028-69-0x0000000000000000-mapping.dmp
                                        • memory/2044-150-0x0000000000A70000-0x0000000000A71000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/2044-84-0x0000000000000000-mapping.dmp
                                        • memory/2056-210-0x0000000000000000-mapping.dmp
                                        • memory/2064-242-0x0000000000000000-mapping.dmp
                                        • memory/2104-223-0x0000000000000000-mapping.dmp
                                        • memory/2276-238-0x0000000000000000-mapping.dmp
                                        • memory/2276-188-0x0000000000000000-mapping.dmp
                                        • memory/2300-239-0x0000000000000000-mapping.dmp
                                        • memory/2352-244-0x0000000000000000-mapping.dmp
                                        • memory/2412-227-0x0000000000000000-mapping.dmp
                                        • memory/2416-219-0x0000000000000000-mapping.dmp
                                        • memory/2524-203-0x0000000000000000-mapping.dmp
                                        • memory/2552-194-0x0000000000000000-mapping.dmp
                                        • memory/2568-221-0x0000000000000000-mapping.dmp
                                        • memory/2688-208-0x0000000000000000-mapping.dmp
                                        • memory/2688-211-0x000000006A041000-0x000000006A043000-memory.dmp
                                          Filesize

                                          8KB

                                        • memory/2700-246-0x0000000000424141-mapping.dmp
                                        • memory/2724-235-0x0000000000000000-mapping.dmp
                                        • memory/2780-196-0x0000000000000000-mapping.dmp
                                        • memory/2804-198-0x0000000000000000-mapping.dmp
                                        • memory/2840-215-0x0000000000000000-mapping.dmp
                                        • memory/2872-204-0x0000000000000000-mapping.dmp
                                        • memory/2916-251-0x0000000004650000-0x000000000466C000-memory.dmp
                                          Filesize

                                          112KB

                                        • memory/2916-218-0x0000000000000000-mapping.dmp
                                        • memory/2916-232-0x0000000000320000-0x000000000033D000-memory.dmp
                                          Filesize

                                          116KB

                                        • memory/2932-205-0x0000000000000000-mapping.dmp
                                        • memory/2960-207-0x0000000000000000-mapping.dmp
                                        • memory/3048-206-0x0000000000000000-mapping.dmp