Analysis

  • max time kernel
    162s
  • max time network
    166s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    29-08-2021 02:16

General

  • Target

    5b9805d7b48c07d06c115c68f6453126.exe

  • Size

    142KB

  • MD5

    5b9805d7b48c07d06c115c68f6453126

  • SHA1

    5d9fd16789e50eeb8dde5cfe06562328ae1620e2

  • SHA256

    5739ea70dbe1a9d014b42300149b2ccbcf628cf08af00053708003caf3bbc14d

  • SHA512

    2e19f2979ebea298e526586cd858f1da2ba19ef0a3903244f6dcd930cc478b5034014fb4d9df3f568eb04fdb8a6329847609834ec330002728ea1858fd7528c2

Malware Config

Extracted

Path

C:\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT

Family

buran

Ransom Note
!!! ALL YOUR FILES ARE ENCRYPTED !!! All your files, documents, photos, databases and other important files are encrypted. You are not able to decrypt it by yourself! The only method of recovering files is to purchase an unique private key. Only we can give you this key and only we can recover your files. PAY FAST 500$=0.013 btc or the price will increase tomorrow bitcoin address bc1qqxnp9z0ff8x852dyflp5r9r6rzse8jl5hzmqz8 To be sure we have the decryptor and it works you can send an email: [email protected] and decrypt one file for free. But this file should be of not valuable! Do you really want to restore your files? [email protected] TELEGRAM @ payfast290 Your personal ID: 8F6-B18-765 Attention! * Do not rename encrypted files. * Do not try to decrypt your data using third party software, it may cause permanent data loss. * Decryption of your files with the help of third parties may cause increased price (they add their fee to our) or you can become a victim of a scam.

Extracted

Family

smokeloader

Version

2020

C2

http://readinglistforaugust1.xyz/

http://readinglistforaugust2.xyz/

http://readinglistforaugust3.xyz/

http://readinglistforaugust4.xyz/

http://readinglistforaugust5.xyz/

http://readinglistforaugust6.xyz/

http://readinglistforaugust7.xyz/

http://readinglistforaugust8.xyz/

http://readinglistforaugust9.xyz/

http://readinglistforaugust10.xyz/

http://readinglistforaugust1.site/

http://readinglistforaugust2.site/

http://readinglistforaugust3.site/

http://readinglistforaugust4.site/

http://readinglistforaugust5.site/

http://readinglistforaugust6.site/

http://readinglistforaugust7.site/

http://readinglistforaugust8.site/

http://readinglistforaugust9.site/

http://readinglistforaugust10.site/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

WORD1

C2

94.26.249.88:1902

Extracted

Family

redline

Botnet

Sergey

C2

51.254.68.139:15009

Extracted

Family

raccoon

Botnet

20d9c80657d1d0fda9625cbd629ba419b8a34404

Attributes
  • url4cnc

    https://telete.in/hfuimoneymake

rc4.plain
rc4.plain

Extracted

Family

raccoon

Botnet

d02c5d65069fc7ce1993e7c52edf0c9c4c195c81

Attributes
  • url4cnc

    https://telete.in/open3entershift

rc4.plain
rc4.plain

Signatures

  • Buran

    Ransomware-as-a-service based on the VegaLocker family first identified in 2019.

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 31 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
  • Turns off Windows Defender SpyNet reporting 2 TTPs
  • UAC bypass 3 TTPs
  • Windows security bypass 2 TTPs
  • suricata: ET MALWARE Sharik/Smoke CnC Beacon 11

    suricata: ET MALWARE Sharik/Smoke CnC Beacon 11

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Nirsoft 3 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 45 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 6 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Windows security modification 2 TTPs 10 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 28 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 15 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Interacts with shadow copies 2 TTPs 2 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 47 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5b9805d7b48c07d06c115c68f6453126.exe
    "C:\Users\Admin\AppData\Local\Temp\5b9805d7b48c07d06c115c68f6453126.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:764
    • C:\Users\Admin\AppData\Local\Temp\5b9805d7b48c07d06c115c68f6453126.exe
      "C:\Users\Admin\AppData\Local\Temp\5b9805d7b48c07d06c115c68f6453126.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:68
  • C:\Users\Admin\AppData\Local\Temp\BF7.exe
    C:\Users\Admin\AppData\Local\Temp\BF7.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2300
    • C:\Users\Admin\AppData\Local\Temp\BF7.exe
      C:\Users\Admin\AppData\Local\Temp\BF7.exe
      2⤵
      • Executes dropped EXE
      PID:1308
    • C:\Users\Admin\AppData\Local\Temp\BF7.exe
      C:\Users\Admin\AppData\Local\Temp\BF7.exe
      2⤵
      • Executes dropped EXE
      PID:3956
    • C:\Users\Admin\AppData\Local\Temp\BF7.exe
      C:\Users\Admin\AppData\Local\Temp\BF7.exe
      2⤵
      • Executes dropped EXE
      PID:1252
    • C:\Users\Admin\AppData\Local\Temp\BF7.exe
      C:\Users\Admin\AppData\Local\Temp\BF7.exe
      2⤵
      • Executes dropped EXE
      PID:2832
    • C:\Users\Admin\AppData\Local\Temp\BF7.exe
      C:\Users\Admin\AppData\Local\Temp\BF7.exe
      2⤵
      • Executes dropped EXE
      PID:3180
    • C:\Users\Admin\AppData\Local\Temp\BF7.exe
      C:\Users\Admin\AppData\Local\Temp\BF7.exe
      2⤵
      • Executes dropped EXE
      PID:4408
    • C:\Users\Admin\AppData\Local\Temp\BF7.exe
      C:\Users\Admin\AppData\Local\Temp\BF7.exe
      2⤵
      • Executes dropped EXE
      PID:5000
    • C:\Users\Admin\AppData\Local\Temp\BF7.exe
      C:\Users\Admin\AppData\Local\Temp\BF7.exe
      2⤵
      • Executes dropped EXE
      PID:4400
    • C:\Users\Admin\AppData\Local\Temp\BF7.exe
      C:\Users\Admin\AppData\Local\Temp\BF7.exe
      2⤵
      • Executes dropped EXE
      PID:416
    • C:\Users\Admin\AppData\Local\Temp\BF7.exe
      C:\Users\Admin\AppData\Local\Temp\BF7.exe
      2⤵
      • Executes dropped EXE
      PID:4988
    • C:\Users\Admin\AppData\Local\Temp\BF7.exe
      C:\Users\Admin\AppData\Local\Temp\BF7.exe
      2⤵
      • Executes dropped EXE
      PID:4792
    • C:\Users\Admin\AppData\Local\Temp\BF7.exe
      C:\Users\Admin\AppData\Local\Temp\BF7.exe
      2⤵
      • Executes dropped EXE
      PID:1404
    • C:\Users\Admin\AppData\Local\Temp\BF7.exe
      C:\Users\Admin\AppData\Local\Temp\BF7.exe
      2⤵
      • Executes dropped EXE
      PID:4508
    • C:\Users\Admin\AppData\Local\Temp\BF7.exe
      C:\Users\Admin\AppData\Local\Temp\BF7.exe
      2⤵
      • Executes dropped EXE
      PID:5688
    • C:\Users\Admin\AppData\Local\Temp\BF7.exe
      C:\Users\Admin\AppData\Local\Temp\BF7.exe
      2⤵
      • Executes dropped EXE
      PID:5116
    • C:\Users\Admin\AppData\Local\Temp\BF7.exe
      C:\Users\Admin\AppData\Local\Temp\BF7.exe
      2⤵
      • Executes dropped EXE
      PID:5948
    • C:\Users\Admin\AppData\Local\Temp\BF7.exe
      C:\Users\Admin\AppData\Local\Temp\BF7.exe
      2⤵
      • Executes dropped EXE
      PID:5936
    • C:\Users\Admin\AppData\Local\Temp\BF7.exe
      C:\Users\Admin\AppData\Local\Temp\BF7.exe
      2⤵
      • Executes dropped EXE
      PID:5808
    • C:\Users\Admin\AppData\Local\Temp\BF7.exe
      C:\Users\Admin\AppData\Local\Temp\BF7.exe
      2⤵
      • Executes dropped EXE
      PID:5908
    • C:\Users\Admin\AppData\Local\Temp\BF7.exe
      C:\Users\Admin\AppData\Local\Temp\BF7.exe
      2⤵
      • Executes dropped EXE
      PID:6100
    • C:\Users\Admin\AppData\Local\Temp\BF7.exe
      C:\Users\Admin\AppData\Local\Temp\BF7.exe
      2⤵
      • Executes dropped EXE
      PID:5196
    • C:\Users\Admin\AppData\Local\Temp\BF7.exe
      C:\Users\Admin\AppData\Local\Temp\BF7.exe
      2⤵
      • Executes dropped EXE
      PID:5400
    • C:\Users\Admin\AppData\Local\Temp\BF7.exe
      C:\Users\Admin\AppData\Local\Temp\BF7.exe
      2⤵
      • Executes dropped EXE
      PID:5716
    • C:\Users\Admin\AppData\Local\Temp\BF7.exe
      C:\Users\Admin\AppData\Local\Temp\BF7.exe
      2⤵
      • Executes dropped EXE
      PID:5964
    • C:\Users\Admin\AppData\Local\Temp\BF7.exe
      C:\Users\Admin\AppData\Local\Temp\BF7.exe
      2⤵
      • Executes dropped EXE
      PID:6028
    • C:\Users\Admin\AppData\Local\Temp\BF7.exe
      C:\Users\Admin\AppData\Local\Temp\BF7.exe
      2⤵
      • Executes dropped EXE
      PID:4208
    • C:\Users\Admin\AppData\Local\Temp\BF7.exe
      C:\Users\Admin\AppData\Local\Temp\BF7.exe
      2⤵
      • Executes dropped EXE
      PID:4616
    • C:\Users\Admin\AppData\Local\Temp\BF7.exe
      C:\Users\Admin\AppData\Local\Temp\BF7.exe
      2⤵
      • Executes dropped EXE
      PID:5440
    • C:\Users\Admin\AppData\Local\Temp\BF7.exe
      C:\Users\Admin\AppData\Local\Temp\BF7.exe
      2⤵
      • Executes dropped EXE
      PID:5356
    • C:\Users\Admin\AppData\Local\Temp\BF7.exe
      C:\Users\Admin\AppData\Local\Temp\BF7.exe
      2⤵
      • Executes dropped EXE
      PID:4600
    • C:\Users\Admin\AppData\Local\Temp\BF7.exe
      C:\Users\Admin\AppData\Local\Temp\BF7.exe
      2⤵
      • Executes dropped EXE
      PID:4736
    • C:\Users\Admin\AppData\Local\Temp\BF7.exe
      C:\Users\Admin\AppData\Local\Temp\BF7.exe
      2⤵
      • Executes dropped EXE
      PID:4456
    • C:\Users\Admin\AppData\Local\Temp\BF7.exe
      C:\Users\Admin\AppData\Local\Temp\BF7.exe
      2⤵
      • Executes dropped EXE
      PID:5696
    • C:\Users\Admin\AppData\Local\Temp\BF7.exe
      C:\Users\Admin\AppData\Local\Temp\BF7.exe
      2⤵
        PID:4964
    • C:\Users\Admin\AppData\Local\Temp\1407.exe
      C:\Users\Admin\AppData\Local\Temp\1407.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:3140
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3140 -s 736
        2⤵
        • Program crash
        • Suspicious use of AdjustPrivilegeToken
        PID:2164
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3140 -s 748
        2⤵
        • Program crash
        • Suspicious use of AdjustPrivilegeToken
        PID:1008
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3140 -s 672
        2⤵
        • Program crash
        • Suspicious use of AdjustPrivilegeToken
        PID:1664
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3140 -s 892
        2⤵
        • Program crash
        • Suspicious use of AdjustPrivilegeToken
        PID:2792
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3140 -s 1184
        2⤵
        • Program crash
        • Suspicious use of AdjustPrivilegeToken
        PID:4160
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3140 -s 1232
        2⤵
        • Program crash
        • Suspicious use of AdjustPrivilegeToken
        PID:4304
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3140 -s 1276
        2⤵
        • Program crash
        • Suspicious use of AdjustPrivilegeToken
        PID:4480
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3140 -s 1192
        2⤵
        • Program crash
        • Suspicious use of AdjustPrivilegeToken
        PID:4712
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3140 -s 1172
        2⤵
        • Program crash
        • Suspicious use of AdjustPrivilegeToken
        PID:5036
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3140 -s 1152
        2⤵
        • Program crash
        • Suspicious use of AdjustPrivilegeToken
        PID:4248
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3140 -s 824
        2⤵
        • Program crash
        • Suspicious use of AdjustPrivilegeToken
        PID:4664
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3140 -s 1352
        2⤵
        • Program crash
        • Suspicious use of AdjustPrivilegeToken
        PID:5028
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3140 -s 1420
        2⤵
        • Program crash
        PID:4336
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3140 -s 1400
        2⤵
        • Suspicious use of NtCreateProcessExOtherParentProcess
        • Program crash
        PID:4748
    • C:\Users\Admin\AppData\Local\Temp\14A4.exe
      C:\Users\Admin\AppData\Local\Temp\14A4.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:392
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        2⤵
          PID:1184
      • C:\Users\Admin\AppData\Local\Temp\1C85.exe
        C:\Users\Admin\AppData\Local\Temp\1C85.exe
        1⤵
        • Executes dropped EXE
        • Checks BIOS information in registry
        • Checks whether UAC is enabled
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of AdjustPrivilegeToken
        PID:8
      • C:\Users\Admin\AppData\Local\Temp\3434.exe
        C:\Users\Admin\AppData\Local\Temp\3434.exe
        1⤵
        • Executes dropped EXE
        • Checks BIOS information in registry
        • Checks whether UAC is enabled
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of AdjustPrivilegeToken
        PID:188
      • C:\Users\Admin\AppData\Local\Temp\36D5.exe
        C:\Users\Admin\AppData\Local\Temp\36D5.exe
        1⤵
        • Executes dropped EXE
        • Windows security modification
        • Checks whether UAC is enabled
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        • System policy modification
        PID:1216
        • C:\Users\Admin\AppData\Local\Temp\4b483648-fc14-486e-b67c-643270f2c877\AdvancedRun.exe
          "C:\Users\Admin\AppData\Local\Temp\4b483648-fc14-486e-b67c-643270f2c877\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\4b483648-fc14-486e-b67c-643270f2c877\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run
          2⤵
            PID:3036
            • C:\Users\Admin\AppData\Local\Temp\4b483648-fc14-486e-b67c-643270f2c877\AdvancedRun.exe
              "C:\Users\Admin\AppData\Local\Temp\4b483648-fc14-486e-b67c-643270f2c877\AdvancedRun.exe" /SpecialRun 4101d8 3036
              3⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              PID:3932
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\36D5.exe" -Force
            2⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:4528
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\36D5.exe" -Force
            2⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:4556
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe
            2⤵
              PID:4604
          • C:\Users\Admin\AppData\Local\Temp\3E48.exe
            C:\Users\Admin\AppData\Local\Temp\3E48.exe
            1⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of AdjustPrivilegeToken
            PID:1284
            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\smss.exe
              "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\smss.exe" -start
              2⤵
              • Executes dropped EXE
              • Enumerates connected drives
              PID:5084
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\system32\cmd.exe" /C wmic shadowcopy delete
                3⤵
                  PID:5396
                  • C:\Windows\SysWOW64\Wbem\WMIC.exe
                    wmic shadowcopy delete
                    4⤵
                      PID:5796
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\system32\cmd.exe" /C bcdedit /set {default} recoveryenabled no
                    3⤵
                      PID:5416
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\system32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures
                      3⤵
                        PID:5436
                      • C:\Windows\SysWOW64\cmd.exe
                        "C:\Windows\system32\cmd.exe" /C vssadmin delete shadows /all /quiet
                        3⤵
                          PID:5616
                          • C:\Windows\SysWOW64\vssadmin.exe
                            vssadmin delete shadows /all /quiet
                            4⤵
                            • Interacts with shadow copies
                            PID:6092
                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\smss.exe
                          "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\smss.exe" -agent 0
                          3⤵
                          • Executes dropped EXE
                          • Drops file in Program Files directory
                          PID:4800
                        • C:\Windows\SysWOW64\cmd.exe
                          "C:\Windows\system32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\~temp001.bat
                          3⤵
                            PID:5724
                            • C:\Windows\SysWOW64\Wbem\WMIC.exe
                              wmic shadowcopy delete
                              4⤵
                                PID:5356
                              • C:\Windows\SysWOW64\vssadmin.exe
                                vssadmin delete shadows /all /quiet
                                4⤵
                                • Interacts with shadow copies
                                PID:6044
                            • C:\Windows\SysWOW64\cmd.exe
                              "C:\Windows\system32\cmd.exe" /C wbadmin delete catalog -quiet
                              3⤵
                                PID:5568
                            • C:\Windows\SysWOW64\notepad.exe
                              notepad.exe
                              2⤵
                                PID:5112
                            • C:\Users\Admin\AppData\Local\Temp\4416.exe
                              C:\Users\Admin\AppData\Local\Temp\4416.exe
                              1⤵
                              • Executes dropped EXE
                              PID:4100
                            • C:\Windows\SysWOW64\explorer.exe
                              C:\Windows\SysWOW64\explorer.exe
                              1⤵
                                PID:4136
                              • C:\Windows\explorer.exe
                                C:\Windows\explorer.exe
                                1⤵
                                  PID:4244
                                • C:\Windows\SysWOW64\explorer.exe
                                  C:\Windows\SysWOW64\explorer.exe
                                  1⤵
                                    PID:4444
                                  • C:\Windows\explorer.exe
                                    C:\Windows\explorer.exe
                                    1⤵
                                    • Suspicious behavior: MapViewOfSection
                                    PID:4580
                                  • C:\Windows\SysWOW64\explorer.exe
                                    C:\Windows\SysWOW64\explorer.exe
                                    1⤵
                                      PID:4780
                                    • C:\Windows\explorer.exe
                                      C:\Windows\explorer.exe
                                      1⤵
                                      • Suspicious behavior: MapViewOfSection
                                      PID:4976
                                    • C:\Windows\SysWOW64\explorer.exe
                                      C:\Windows\SysWOW64\explorer.exe
                                      1⤵
                                        PID:1092
                                      • C:\Windows\explorer.exe
                                        C:\Windows\explorer.exe
                                        1⤵
                                        • Suspicious behavior: MapViewOfSection
                                        PID:4376
                                      • C:\Windows\SysWOW64\explorer.exe
                                        C:\Windows\SysWOW64\explorer.exe
                                        1⤵
                                          PID:4500
                                        • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
                                          "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
                                          1⤵
                                          • Executes dropped EXE
                                          • Drops file in Windows directory
                                          • Modifies Internet Explorer settings
                                          • Modifies registry class
                                          • Suspicious use of AdjustPrivilegeToken
                                          • Suspicious use of SetWindowsHookEx
                                          PID:3036
                                        • C:\Windows\system32\browser_broker.exe
                                          C:\Windows\system32\browser_broker.exe -Embedding
                                          1⤵
                                          • Modifies Internet Explorer settings
                                          PID:3744
                                        • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                          "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                          1⤵
                                          • Modifies registry class
                                          • Suspicious behavior: MapViewOfSection
                                          • Suspicious use of SetWindowsHookEx
                                          PID:2924
                                        • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                          "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                          1⤵
                                          • Modifies Internet Explorer settings
                                          • Modifies registry class
                                          PID:1124
                                        • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                          "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                          1⤵
                                          • Modifies registry class
                                          PID:5160
                                        • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                          "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                          1⤵
                                          • Modifies registry class
                                          PID:5428
                                          • C:\Windows\system32\WerFault.exe
                                            C:\Windows\system32\WerFault.exe -u -p 5428 -s 1300
                                            2⤵
                                            • Program crash
                                            PID:5788
                                        • C:\Windows\system32\vssvc.exe
                                          C:\Windows\system32\vssvc.exe
                                          1⤵
                                            PID:6132

                                          Network

                                          MITRE ATT&CK Enterprise v6

                                          Replay Monitor

                                          Loading Replay Monitor...

                                          Downloads

                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3F26ED5DE6B4E859CCCA6035ECB8D9CB

                                            MD5

                                            5703edef7cb0f99305a6b18845e0443e

                                            SHA1

                                            fb6f022ebde210306e1a6575462d6451e98af454

                                            SHA256

                                            e4ce02059eb175c30879041d610db7b8798cdf57a4c67afc83c125c2db36e883

                                            SHA512

                                            4631853bda1498ff3cace6a348fd2d6770edd0fec166707c3afebff09644f34e29a7a6dd3e9cb167c40e8b5fa1fbbc80ba26d80b4d939daf56278c276b07ada4

                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\204C1AA6F6114E6A513754A2AB5760FA_0673414C08DE7F919AE3F6C4CC65AEEE

                                            MD5

                                            888f7457c332ac5e1897316e159f58c1

                                            SHA1

                                            a3047c6e978158dfae29b5735e8131ec1b30703d

                                            SHA256

                                            c2c14652875bfeb1ed529202da6d45eb974acab193c005908cf90b8c5cf3dd41

                                            SHA512

                                            0abdc5f78ade2f56b0f1954adc0479b5dcc88d401bfac95754e7dd80adefe7375a426fd89f81b657ebe9c113092524dcbd1e80c39a4bec51ccd93bc0bc3a5aff

                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

                                            MD5

                                            939460925953ce88e1086341b8a11bda

                                            SHA1

                                            06249b891050a9fac128ccfee943aeb5bede1c7b

                                            SHA256

                                            d4da3c5ff04a3b677eb77b1bfedc14e29ebd0d01c476d44a0b1a2366447ab016

                                            SHA512

                                            a8dc3eb58a4a550cc2551463a3d813396caf3f2b65f5b13c8e339a4a32652895ee15c23eb5ba833eca4e7c22331a622657cf5bd64098f0c54e43b4e92fe65f30

                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3F26ED5DE6B4E859CCCA6035ECB8D9CB

                                            MD5

                                            3cd37fb3e53677f5c500ff8c58a11139

                                            SHA1

                                            f9c554d77d0ecf110709f423842f3772d5343a33

                                            SHA256

                                            132f8fcd8328afbb5007bbe38e85706ca6c52afc8c9c05b3031c15768912faec

                                            SHA512

                                            4d6180407b97c291f91eb4efda049c288c950e3b117235cd820865566c0b0d06534e32faf47354a65c899d88a1fc04729ef838c647c4992fa573127fc4a449d3

                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\204C1AA6F6114E6A513754A2AB5760FA_0673414C08DE7F919AE3F6C4CC65AEEE

                                            MD5

                                            3c3335133555e57694453aff254c5a47

                                            SHA1

                                            87e860c8e36a737984976b60b385a986826b8a81

                                            SHA256

                                            30ae84a28309c24a780a9f8740c34fadf73084d8435c5859fa1a115d3e794ca9

                                            SHA512

                                            be62fc586e0037669d0f8edfc85b07883cb3c4cb6c3400ec93acea8ed41b7d645114f9e04486fcc71dae1d0002edd82b1a50c8ce7fb4b0323579989a44f348fd

                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

                                            MD5

                                            84335a96b9fa0b1fa66670d4c2437712

                                            SHA1

                                            3913c1c67bde9f712e996501fe1b02582f68c19e

                                            SHA256

                                            697e16ed03d85d1065c00570f41273b18d12c8ea6407340a29bde347e3d5342d

                                            SHA512

                                            2e4ef49e1acf610f9c222715355d7e9ae9dc583a3a677a6228b0a001efd3a62f07dd587a61a51b7043a05d0637314341a1c36e77dce50c83c69a558e7fd6799e

                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\DRMDU4BX\0SXKS93V.htm

                                            MD5

                                            b1cd7c031debba3a5c77b39b6791c1a7

                                            SHA1

                                            e5d91e14e9c685b06f00e550d9e189deb2075f76

                                            SHA256

                                            57ba053f075e0b80f747f3102ed985687c16a8754d109e7c4d33633269a36aaa

                                            SHA512

                                            d2bbefdc1effb52a38964c4cec5990a5a226248eca36f99e446c0c5704436f666bf1cb514e73b8991411d497d3325ecc646cbd5065c364e92ab6b9c5f1ad4a72

                                          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\AN7EQHV8\ms.jsll-3.min[1].js

                                            MD5

                                            ccae1a322614793101c4ef997ca5391d

                                            SHA1

                                            b9ebf7a470e73abe4e084b1c92f63941776d7a36

                                            SHA256

                                            a60a21679789c18261f76e71be70f3fa9690235e590b4b894fc571a4f620b4a8

                                            SHA512

                                            1953efc5d167bed03316f00ba33a630cfddd87bc482827dcf7090f514077737fba75307ba96fce44fc1df05f342347b72ca23930e3c438a4d98b68c2cfaee1b2

                                          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\R3VQ3FZK\jsll-4[1].js

                                            MD5

                                            211e123b593464f3fef68f0b6e00127a

                                            SHA1

                                            0fae8254d06b487f09a003cb8f610f96a95465d1

                                            SHA256

                                            589303ca15fba4fe95432dbb456ff614d0f2ad12d99f8671f0443a7f0cf48dff

                                            SHA512

                                            dad54d7941a7588675ea9dd11275a60fb6290e1582d1c7a4acb50642af3c2a4aa35e32edd8fa9dd01ce7fd777247d2706d5672a201633bf918b525936e93b14b

                                          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\Z8XV31NT\SegoeUI-Roman-VF_web[1].woff2

                                            MD5

                                            bca97218dca3cb15ce0284cbcb452890

                                            SHA1

                                            635298cbbd72b74b1762acc7dad6c79de4b3670d

                                            SHA256

                                            63c12051016796d92bcf4bc20b4881057475e6dfa4937c29c9e16054814ab47d

                                            SHA512

                                            6e850842d1e353a5457262c5c78d20704e8bd24b532368ba5e5dfc7a4b63059d536296b597fd3ccbd541aa8f89083a79d50aaa1b5e65b4d23fc37bfd806f0545

                                          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\Z8XV31NT\latest[1].woff2

                                            MD5

                                            2835ee281b077ca8ac7285702007c894

                                            SHA1

                                            2e3d4d912aaf1c3f1f30d95c2c4fcea1b7bbc29a

                                            SHA256

                                            e172a02b68f977a57a1690507df809db1e43130f0161961709a36dbd70b4d25f

                                            SHA512

                                            80881c074df064795f9cc5aa187bea92f0e258bf9f6b970e61e9d50ee812913bf454cecbe7fd9e151bdaef700ce68253697f545ac56d4e7ef7ade7814a1dbc5a

                                          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\12B578593FDE07EC53D020B1D5DEBF3B_5D74C2DB556F94499BCD6D74A36958A3

                                            MD5

                                            4e686224c37a730a4aadb70db2804207

                                            SHA1

                                            6758bfdc1b2c681b6cf5ae5188d6d2d04b60c2b2

                                            SHA256

                                            25f03a6809f350c7af0445ab24e344c67a7ad4f1eb50cea8c063c7f5770cd793

                                            SHA512

                                            60163763ceda062f92c8e7df0426cee4bb45f4086a9e14024a5e51f0e0014796f02e4c90ca6870a905b8a1c3aac5080a307b88ec3899f4b0e8c417ace265308b

                                          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\2A7611428D62805A3E4E5BC4103D82E4_D0FA13DADFB59BDF00C474952E166CC1

                                            MD5

                                            11ed211d0de6c53fb199f8f12c4bddb1

                                            SHA1

                                            49c109717b62c6d3cd41a74b13c98df827ad3df8

                                            SHA256

                                            2aabb5032e558d1c592da8b5423ce04d048805e44dc6997efd3001775e0e684e

                                            SHA512

                                            96fdbec6a16dc44f36b301238cc68bce2f6999ed8f20e564ff261773bf8632a3fa1e406963720b1581499b558c73f0b251e9041fd66e93058c892b90817fc82a

                                          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63

                                            MD5

                                            d31b8c7e7e6b0b99d9a5eefedbb5311a

                                            SHA1

                                            e9b21cb157adeb3c0604209708916793281e0bbd

                                            SHA256

                                            8d0521db3fdc8a5926445be5ecc928f2798299b0552c18a8efd67ef92c9f9383

                                            SHA512

                                            2530ba930a385ea14caab5396ddccfa46b741d9b438ce9b7c04f24be9f7c5a6b3e071db5b0207365394e801ac3565156d963cfd080ea8f1fdc368c2a873ff38f

                                          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_AD319D6DA1A11BC83AC8B4E4D3638231

                                            MD5

                                            8bade12cb93fa677dc899f335efc59c8

                                            SHA1

                                            016dfce32ae425c25196a16b2e94f6e7e2af85b5

                                            SHA256

                                            e167fa475636227b2c2c040a8c55ed7ac9ae7a6e86dcc37bb1bc476b317f01a3

                                            SHA512

                                            7d3b3b06c9b9addfeba924a641f4c12b254ed392e2cf84905355245799aa9efdde7fbb89f09fe4e207b253f37848a7c5764bcff830b499a53696c201feeabf2f

                                          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_C5130A0BDC8C859A2757D77746C10868

                                            MD5

                                            3e7334346a21246edfd854e2acff4c1f

                                            SHA1

                                            68adcec50bc6dd6a31c3d0e353f53952174ce5b7

                                            SHA256

                                            93b0076970a36b3e40727260215f442c884a897876fe0c3d122a103968e0f9b3

                                            SHA512

                                            39d8d71104149b36f8e47275f75b67934ca2679f6b8d529e87bd44220c75f34b77ab15c44bba2f599e04a9c05ea64400b28a8c4e63d166abd2a3c353442e14c9

                                          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04

                                            MD5

                                            02b7af4ac16552d53edd324ffa85e773

                                            SHA1

                                            9a6415b20fcedb43efdf933813a1f20ad58471a9

                                            SHA256

                                            f183f7a31d577496a91e25ff3a901e0da4a26c6fa6e2698b27fadf9ef5967fc5

                                            SHA512

                                            3f031a915b30cae457af873c50a0ffc883b3e49a583168ff2dcefa068dbe27da2596781e104c8bd4f6fe95b563f2fa7a2dccf2edb7864aefc8fcaf008e6066a2

                                          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\12B578593FDE07EC53D020B1D5DEBF3B_5D74C2DB556F94499BCD6D74A36958A3

                                            MD5

                                            3574083043d08048bf4c3d342e0c0370

                                            SHA1

                                            7d9171aff87f2c5805fcacc513c49b2a1431a66b

                                            SHA256

                                            999e6a6c21cc2fed68d5a89ab1ec2e076784a1ffdadf2249a0b30b00a6912c51

                                            SHA512

                                            f2c728ec1aadfbc9252b01731cc1937ecdd5ff71e8ecd896db9d1e1fb05d7485618e9cf495d63c579c5cf57eed08b554709cdd03914e98fe7a2e509c746bd75b

                                          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\2A7611428D62805A3E4E5BC4103D82E4_D0FA13DADFB59BDF00C474952E166CC1

                                            MD5

                                            253231884f0449366ba3904c22fbc775

                                            SHA1

                                            2e1bcb14333f3e8401799f29c9d651ba87a5a077

                                            SHA256

                                            bb59227ac67c2ccebc373eb336e977e438a4561baa90dc25e27cb1bca2679e13

                                            SHA512

                                            3e66db3ff4d38cd39a9c2fab71067c768d942bd57ebd2177a29b115d156c2d1d841450b3d46ad0741bf6dc3572bc62321797f378fc8129e18dd845696e90b8c9

                                          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\2A7611428D62805A3E4E5BC4103D82E4_D0FA13DADFB59BDF00C474952E166CC1

                                            MD5

                                            2a64afb8935bd9df0b4335bec321e8a2

                                            SHA1

                                            73b6f21ea6922517da20340b3b001dc1a00bbdde

                                            SHA256

                                            60128a0c96af458f51dc676ceb9ac51006b8d0ab9d2e3d67ae04532e7a15631a

                                            SHA512

                                            333340a5540a5966604a2ba36928e3e21426b3c84674181f2768b4d0552396a737249f18edcae89cc22031d4118601c3a123e97c27c1e5b25ca7ddeec5e1a82b

                                          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63

                                            MD5

                                            25e37cb34e5245f79ddd4036b507ced3

                                            SHA1

                                            de0b077479ad99d3a1ae406df6e2a7ac9f81b6c7

                                            SHA256

                                            797f1711f79e6f9459dfee60329b42b5663c8caf976b2b9bc4645ae3d011e94f

                                            SHA512

                                            b891976a78d160084f62b00edee6024e420d1ccbe391ba61318d21d563e29d0599cd32ef3f991fb8671f33426287096fb29d189af3766b0994fafb21157312de

                                          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63

                                            MD5

                                            25e37cb34e5245f79ddd4036b507ced3

                                            SHA1

                                            de0b077479ad99d3a1ae406df6e2a7ac9f81b6c7

                                            SHA256

                                            797f1711f79e6f9459dfee60329b42b5663c8caf976b2b9bc4645ae3d011e94f

                                            SHA512

                                            b891976a78d160084f62b00edee6024e420d1ccbe391ba61318d21d563e29d0599cd32ef3f991fb8671f33426287096fb29d189af3766b0994fafb21157312de

                                          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_AD319D6DA1A11BC83AC8B4E4D3638231

                                            MD5

                                            aa78b8b30566f964eb8e3de7bd335174

                                            SHA1

                                            dd303582a7a7b7e7f3a1ee8d39428d278e0320b7

                                            SHA256

                                            3a1e4466e04b6e4a04e672afb0f7b26d2ea80b2ad78a7c1dfb19e10f427cee69

                                            SHA512

                                            d90175657717909ac10fddb30efd08236d44bc1a1d04fff4e73aecb41811efdac892cd9d5229ec2dd3b7b0f70844a1ac6d5a6b8ae6208290f96fbfdd3de2ff99

                                          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_C5130A0BDC8C859A2757D77746C10868

                                            MD5

                                            666de185bca6ecc866c37892bd5f423a

                                            SHA1

                                            c68cccbf6b27fc8b9558ef93894fd1b1540f11b4

                                            SHA256

                                            9b47005a08ebba5304cb826d8cc2fa85a672eed8a5b3bfcf894fa360b15f1f7d

                                            SHA512

                                            109f3b33b02676619f9756de309f8879a506446993a0064a0d83cce989050f97096438a2097b1189ce984ccd60bab059788915fbfcf88957fdcaabaf1c4697e3

                                          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04

                                            MD5

                                            0a310b15e892ab25f4c1dfbf40540b8a

                                            SHA1

                                            305b0d335bcb3f64e18ca58237a200f6ecaa727b

                                            SHA256

                                            4fd21d8800e9202e021e11c60123c3f14d1a11a75f28377b1862fdfc4437bab0

                                            SHA512

                                            6f5844fbe4ff657bd7d2f22dd0d69589c96d8796b5d7160b7bd7ef4f4b6dae3506eba11e7f7b04a3350e040aac09ca9504a20dc3c0a787eb57a09fd90e10815f

                                          • C:\Users\Admin\AppData\Local\Temp\1407.exe

                                            MD5

                                            e5509d55d22e60402457e60be6ed85ce

                                            SHA1

                                            762d6334e098d9cbd028e7f2a83c0d77ff2c2086

                                            SHA256

                                            0c054e57af039fad6d57bd187b0646c16f64bc5430087db8939a0c5fa75f72c9

                                            SHA512

                                            21bab40514c678c4f6d38960cd25bf512d91c75f5900e8f679b31d4e34d0b638ff067194ca7ca1f5ccbbc5e137d636a1cd0cb85ffd19bd28301ef397534cefed

                                          • C:\Users\Admin\AppData\Local\Temp\1407.exe

                                            MD5

                                            e5509d55d22e60402457e60be6ed85ce

                                            SHA1

                                            762d6334e098d9cbd028e7f2a83c0d77ff2c2086

                                            SHA256

                                            0c054e57af039fad6d57bd187b0646c16f64bc5430087db8939a0c5fa75f72c9

                                            SHA512

                                            21bab40514c678c4f6d38960cd25bf512d91c75f5900e8f679b31d4e34d0b638ff067194ca7ca1f5ccbbc5e137d636a1cd0cb85ffd19bd28301ef397534cefed

                                          • C:\Users\Admin\AppData\Local\Temp\14A4.exe

                                            MD5

                                            af706e535a57ea4a789f311567870803

                                            SHA1

                                            3578e1893aee7f4e9cdd1dcf0f8d9292804b21ca

                                            SHA256

                                            c30c4c74da8351ad23e8466a314a32243f7c1e82af117a89961eaaecb57b320b

                                            SHA512

                                            5545a9ad07cce205ea755c6ac5307b961c25a4da73a6fc2c2af3620a44664ef5ea949144e750749cfcf7223497df3e662b96f5803d6b4a8559b749a01f97d333

                                          • C:\Users\Admin\AppData\Local\Temp\14A4.exe

                                            MD5

                                            af706e535a57ea4a789f311567870803

                                            SHA1

                                            3578e1893aee7f4e9cdd1dcf0f8d9292804b21ca

                                            SHA256

                                            c30c4c74da8351ad23e8466a314a32243f7c1e82af117a89961eaaecb57b320b

                                            SHA512

                                            5545a9ad07cce205ea755c6ac5307b961c25a4da73a6fc2c2af3620a44664ef5ea949144e750749cfcf7223497df3e662b96f5803d6b4a8559b749a01f97d333

                                          • C:\Users\Admin\AppData\Local\Temp\1C85.exe

                                            MD5

                                            067a8002b76c49e820a9421fa3029c86

                                            SHA1

                                            fbf589bf5e44768d9ed07f6b361472e3b54bcb58

                                            SHA256

                                            9fdf1b38392cacb2490a8093fc910e2af3817e92ab459304d721919a63cbfe64

                                            SHA512

                                            4986054c30b069cc145dde03244589eb06513211723ca11cd97204c748b43c07b6f16bab7b9203c3d53a20176879eb467debf90bde43a5a66d23587243fed03a

                                          • C:\Users\Admin\AppData\Local\Temp\1C85.exe

                                            MD5

                                            067a8002b76c49e820a9421fa3029c86

                                            SHA1

                                            fbf589bf5e44768d9ed07f6b361472e3b54bcb58

                                            SHA256

                                            9fdf1b38392cacb2490a8093fc910e2af3817e92ab459304d721919a63cbfe64

                                            SHA512

                                            4986054c30b069cc145dde03244589eb06513211723ca11cd97204c748b43c07b6f16bab7b9203c3d53a20176879eb467debf90bde43a5a66d23587243fed03a

                                          • C:\Users\Admin\AppData\Local\Temp\3434.exe

                                            MD5

                                            f19e1f71dd14af5671f5550fba6c8998

                                            SHA1

                                            8ef9d670f6bafed77cd9720533dfb15b79982a40

                                            SHA256

                                            49398cbf38dc71aca96c6726f9c914a04ee49a9350943896435fc776be640b60

                                            SHA512

                                            095a90dfba1f0b175109ad1dfa2134c5488793ba80decd7a63ce3f0d3060b19d950e75d150c743a72d82b089cfad2ab31111aa7a82fd69f03d420686dda4a610

                                          • C:\Users\Admin\AppData\Local\Temp\3434.exe

                                            MD5

                                            f19e1f71dd14af5671f5550fba6c8998

                                            SHA1

                                            8ef9d670f6bafed77cd9720533dfb15b79982a40

                                            SHA256

                                            49398cbf38dc71aca96c6726f9c914a04ee49a9350943896435fc776be640b60

                                            SHA512

                                            095a90dfba1f0b175109ad1dfa2134c5488793ba80decd7a63ce3f0d3060b19d950e75d150c743a72d82b089cfad2ab31111aa7a82fd69f03d420686dda4a610

                                          • C:\Users\Admin\AppData\Local\Temp\36D5.exe

                                            MD5

                                            6a2d7f7373c59ff8be992d223b17f97f

                                            SHA1

                                            e4bfe1e9fdb7560968da08e1dfe6ed8005a97223

                                            SHA256

                                            3b8cef83d5f3b667281c3c8512b2e21d06e34a3fe7952d171854a36f557f80a9

                                            SHA512

                                            f8719c97f97ceb16ce63b832bd393edb3ef87d8d7aac1d975243cd4aac62e2775eae2b1fd2d0314348144c1b38d19b31222f70c33fdd3133a483e9392d2de0c6

                                          • C:\Users\Admin\AppData\Local\Temp\36D5.exe

                                            MD5

                                            6a2d7f7373c59ff8be992d223b17f97f

                                            SHA1

                                            e4bfe1e9fdb7560968da08e1dfe6ed8005a97223

                                            SHA256

                                            3b8cef83d5f3b667281c3c8512b2e21d06e34a3fe7952d171854a36f557f80a9

                                            SHA512

                                            f8719c97f97ceb16ce63b832bd393edb3ef87d8d7aac1d975243cd4aac62e2775eae2b1fd2d0314348144c1b38d19b31222f70c33fdd3133a483e9392d2de0c6

                                          • C:\Users\Admin\AppData\Local\Temp\3E48.exe

                                            MD5

                                            bdfde890a781bf135e6eb4339ff9424f

                                            SHA1

                                            a5bfca4601242d3ff52962432efb15ab9202217f

                                            SHA256

                                            b7972505fc2b3b41383bc9022824130ef912145ff1d858555536df477c3a59f5

                                            SHA512

                                            7af519bbda4994a15789520a56b4a961187aa64ef284830a0e8a083cb5257f9606a7e4647278ce9e2c01995f627dc83aa0750b9f7a1273218618f65af0f2a15b

                                          • C:\Users\Admin\AppData\Local\Temp\3E48.exe

                                            MD5

                                            bdfde890a781bf135e6eb4339ff9424f

                                            SHA1

                                            a5bfca4601242d3ff52962432efb15ab9202217f

                                            SHA256

                                            b7972505fc2b3b41383bc9022824130ef912145ff1d858555536df477c3a59f5

                                            SHA512

                                            7af519bbda4994a15789520a56b4a961187aa64ef284830a0e8a083cb5257f9606a7e4647278ce9e2c01995f627dc83aa0750b9f7a1273218618f65af0f2a15b

                                          • C:\Users\Admin\AppData\Local\Temp\4416.exe

                                            MD5

                                            e99afcbb149ba6dfbdd90c034b88fe73

                                            SHA1

                                            be974111ad0a8f3870d09706ea07b5438f418798

                                            SHA256

                                            924b9935b1f2be85aa36e0158f0a55c1200cdf9046077a5b491f1aeb034c2353

                                            SHA512

                                            bf8b1f544ab9e689068f94b7ee5cfbe304b3756308d022be2e487216dd01aed0fcc2ac76e5d6b4c2f434a1125a88d5c71a2ecdafdb7bddd82447e77601c6b4a9

                                          • C:\Users\Admin\AppData\Local\Temp\4416.exe

                                            MD5

                                            e99afcbb149ba6dfbdd90c034b88fe73

                                            SHA1

                                            be974111ad0a8f3870d09706ea07b5438f418798

                                            SHA256

                                            924b9935b1f2be85aa36e0158f0a55c1200cdf9046077a5b491f1aeb034c2353

                                            SHA512

                                            bf8b1f544ab9e689068f94b7ee5cfbe304b3756308d022be2e487216dd01aed0fcc2ac76e5d6b4c2f434a1125a88d5c71a2ecdafdb7bddd82447e77601c6b4a9

                                          • C:\Users\Admin\AppData\Local\Temp\4b483648-fc14-486e-b67c-643270f2c877\AdvancedRun.exe

                                            MD5

                                            17fc12902f4769af3a9271eb4e2dacce

                                            SHA1

                                            9a4a1581cc3971579574f837e110f3bd6d529dab

                                            SHA256

                                            29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

                                            SHA512

                                            036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

                                          • C:\Users\Admin\AppData\Local\Temp\4b483648-fc14-486e-b67c-643270f2c877\AdvancedRun.exe

                                            MD5

                                            17fc12902f4769af3a9271eb4e2dacce

                                            SHA1

                                            9a4a1581cc3971579574f837e110f3bd6d529dab

                                            SHA256

                                            29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

                                            SHA512

                                            036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

                                          • C:\Users\Admin\AppData\Local\Temp\4b483648-fc14-486e-b67c-643270f2c877\AdvancedRun.exe

                                            MD5

                                            17fc12902f4769af3a9271eb4e2dacce

                                            SHA1

                                            9a4a1581cc3971579574f837e110f3bd6d529dab

                                            SHA256

                                            29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

                                            SHA512

                                            036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

                                          • C:\Users\Admin\AppData\Local\Temp\BF7.exe

                                            MD5

                                            b9d3baf6cab644ab4033810e111863be

                                            SHA1

                                            76993e1f57ae6aceedd5f1bb7c03dd2ace89b2a7

                                            SHA256

                                            30fa13380d4f6eb546d26737e7122bff6af8cb1b35d3bfe0537895736231717e

                                            SHA512

                                            a247465ddbb1dd8cd5c684d7646cd9ee1caabf0efa8f5b4626128bfc2de48117fc7a6f2828649a85d05ab6ba5b3789e82f0bcc2fbc8a0efcf083f7b443e9e152

                                          • C:\Users\Admin\AppData\Local\Temp\BF7.exe

                                            MD5

                                            b9d3baf6cab644ab4033810e111863be

                                            SHA1

                                            76993e1f57ae6aceedd5f1bb7c03dd2ace89b2a7

                                            SHA256

                                            30fa13380d4f6eb546d26737e7122bff6af8cb1b35d3bfe0537895736231717e

                                            SHA512

                                            a247465ddbb1dd8cd5c684d7646cd9ee1caabf0efa8f5b4626128bfc2de48117fc7a6f2828649a85d05ab6ba5b3789e82f0bcc2fbc8a0efcf083f7b443e9e152

                                          • C:\Users\Admin\AppData\Local\Temp\BF7.exe

                                            MD5

                                            b9d3baf6cab644ab4033810e111863be

                                            SHA1

                                            76993e1f57ae6aceedd5f1bb7c03dd2ace89b2a7

                                            SHA256

                                            30fa13380d4f6eb546d26737e7122bff6af8cb1b35d3bfe0537895736231717e

                                            SHA512

                                            a247465ddbb1dd8cd5c684d7646cd9ee1caabf0efa8f5b4626128bfc2de48117fc7a6f2828649a85d05ab6ba5b3789e82f0bcc2fbc8a0efcf083f7b443e9e152

                                          • C:\Users\Admin\AppData\Local\Temp\BF7.exe

                                            MD5

                                            b9d3baf6cab644ab4033810e111863be

                                            SHA1

                                            76993e1f57ae6aceedd5f1bb7c03dd2ace89b2a7

                                            SHA256

                                            30fa13380d4f6eb546d26737e7122bff6af8cb1b35d3bfe0537895736231717e

                                            SHA512

                                            a247465ddbb1dd8cd5c684d7646cd9ee1caabf0efa8f5b4626128bfc2de48117fc7a6f2828649a85d05ab6ba5b3789e82f0bcc2fbc8a0efcf083f7b443e9e152

                                          • C:\Users\Admin\AppData\Local\Temp\BF7.exe

                                            MD5

                                            b9d3baf6cab644ab4033810e111863be

                                            SHA1

                                            76993e1f57ae6aceedd5f1bb7c03dd2ace89b2a7

                                            SHA256

                                            30fa13380d4f6eb546d26737e7122bff6af8cb1b35d3bfe0537895736231717e

                                            SHA512

                                            a247465ddbb1dd8cd5c684d7646cd9ee1caabf0efa8f5b4626128bfc2de48117fc7a6f2828649a85d05ab6ba5b3789e82f0bcc2fbc8a0efcf083f7b443e9e152

                                          • C:\Users\Admin\AppData\Local\Temp\BF7.exe

                                            MD5

                                            b9d3baf6cab644ab4033810e111863be

                                            SHA1

                                            76993e1f57ae6aceedd5f1bb7c03dd2ace89b2a7

                                            SHA256

                                            30fa13380d4f6eb546d26737e7122bff6af8cb1b35d3bfe0537895736231717e

                                            SHA512

                                            a247465ddbb1dd8cd5c684d7646cd9ee1caabf0efa8f5b4626128bfc2de48117fc7a6f2828649a85d05ab6ba5b3789e82f0bcc2fbc8a0efcf083f7b443e9e152

                                          • C:\Users\Admin\AppData\Local\Temp\BF7.exe

                                            MD5

                                            b9d3baf6cab644ab4033810e111863be

                                            SHA1

                                            76993e1f57ae6aceedd5f1bb7c03dd2ace89b2a7

                                            SHA256

                                            30fa13380d4f6eb546d26737e7122bff6af8cb1b35d3bfe0537895736231717e

                                            SHA512

                                            a247465ddbb1dd8cd5c684d7646cd9ee1caabf0efa8f5b4626128bfc2de48117fc7a6f2828649a85d05ab6ba5b3789e82f0bcc2fbc8a0efcf083f7b443e9e152

                                          • C:\Users\Admin\AppData\Local\Temp\BF7.exe

                                            MD5

                                            b9d3baf6cab644ab4033810e111863be

                                            SHA1

                                            76993e1f57ae6aceedd5f1bb7c03dd2ace89b2a7

                                            SHA256

                                            30fa13380d4f6eb546d26737e7122bff6af8cb1b35d3bfe0537895736231717e

                                            SHA512

                                            a247465ddbb1dd8cd5c684d7646cd9ee1caabf0efa8f5b4626128bfc2de48117fc7a6f2828649a85d05ab6ba5b3789e82f0bcc2fbc8a0efcf083f7b443e9e152

                                          • C:\Users\Admin\AppData\Local\Temp\BF7.exe

                                            MD5

                                            b9d3baf6cab644ab4033810e111863be

                                            SHA1

                                            76993e1f57ae6aceedd5f1bb7c03dd2ace89b2a7

                                            SHA256

                                            30fa13380d4f6eb546d26737e7122bff6af8cb1b35d3bfe0537895736231717e

                                            SHA512

                                            a247465ddbb1dd8cd5c684d7646cd9ee1caabf0efa8f5b4626128bfc2de48117fc7a6f2828649a85d05ab6ba5b3789e82f0bcc2fbc8a0efcf083f7b443e9e152

                                          • C:\Users\Admin\AppData\Local\Temp\BF7.exe

                                            MD5

                                            b9d3baf6cab644ab4033810e111863be

                                            SHA1

                                            76993e1f57ae6aceedd5f1bb7c03dd2ace89b2a7

                                            SHA256

                                            30fa13380d4f6eb546d26737e7122bff6af8cb1b35d3bfe0537895736231717e

                                            SHA512

                                            a247465ddbb1dd8cd5c684d7646cd9ee1caabf0efa8f5b4626128bfc2de48117fc7a6f2828649a85d05ab6ba5b3789e82f0bcc2fbc8a0efcf083f7b443e9e152

                                          • C:\Users\Admin\AppData\Local\Temp\BF7.exe

                                            MD5

                                            b9d3baf6cab644ab4033810e111863be

                                            SHA1

                                            76993e1f57ae6aceedd5f1bb7c03dd2ace89b2a7

                                            SHA256

                                            30fa13380d4f6eb546d26737e7122bff6af8cb1b35d3bfe0537895736231717e

                                            SHA512

                                            a247465ddbb1dd8cd5c684d7646cd9ee1caabf0efa8f5b4626128bfc2de48117fc7a6f2828649a85d05ab6ba5b3789e82f0bcc2fbc8a0efcf083f7b443e9e152

                                          • C:\Users\Admin\AppData\Local\Temp\BF7.exe

                                            MD5

                                            b9d3baf6cab644ab4033810e111863be

                                            SHA1

                                            76993e1f57ae6aceedd5f1bb7c03dd2ace89b2a7

                                            SHA256

                                            30fa13380d4f6eb546d26737e7122bff6af8cb1b35d3bfe0537895736231717e

                                            SHA512

                                            a247465ddbb1dd8cd5c684d7646cd9ee1caabf0efa8f5b4626128bfc2de48117fc7a6f2828649a85d05ab6ba5b3789e82f0bcc2fbc8a0efcf083f7b443e9e152

                                          • C:\Users\Admin\AppData\Local\Temp\BF7.exe

                                            MD5

                                            b9d3baf6cab644ab4033810e111863be

                                            SHA1

                                            76993e1f57ae6aceedd5f1bb7c03dd2ace89b2a7

                                            SHA256

                                            30fa13380d4f6eb546d26737e7122bff6af8cb1b35d3bfe0537895736231717e

                                            SHA512

                                            a247465ddbb1dd8cd5c684d7646cd9ee1caabf0efa8f5b4626128bfc2de48117fc7a6f2828649a85d05ab6ba5b3789e82f0bcc2fbc8a0efcf083f7b443e9e152

                                          • C:\Users\Admin\AppData\Local\Temp\BF7.exe

                                            MD5

                                            b9d3baf6cab644ab4033810e111863be

                                            SHA1

                                            76993e1f57ae6aceedd5f1bb7c03dd2ace89b2a7

                                            SHA256

                                            30fa13380d4f6eb546d26737e7122bff6af8cb1b35d3bfe0537895736231717e

                                            SHA512

                                            a247465ddbb1dd8cd5c684d7646cd9ee1caabf0efa8f5b4626128bfc2de48117fc7a6f2828649a85d05ab6ba5b3789e82f0bcc2fbc8a0efcf083f7b443e9e152

                                          • C:\Users\Admin\AppData\Local\Temp\BF7.exe

                                            MD5

                                            b9d3baf6cab644ab4033810e111863be

                                            SHA1

                                            76993e1f57ae6aceedd5f1bb7c03dd2ace89b2a7

                                            SHA256

                                            30fa13380d4f6eb546d26737e7122bff6af8cb1b35d3bfe0537895736231717e

                                            SHA512

                                            a247465ddbb1dd8cd5c684d7646cd9ee1caabf0efa8f5b4626128bfc2de48117fc7a6f2828649a85d05ab6ba5b3789e82f0bcc2fbc8a0efcf083f7b443e9e152

                                          • C:\Users\Admin\AppData\Local\Temp\BF7.exe

                                            MD5

                                            b9d3baf6cab644ab4033810e111863be

                                            SHA1

                                            76993e1f57ae6aceedd5f1bb7c03dd2ace89b2a7

                                            SHA256

                                            30fa13380d4f6eb546d26737e7122bff6af8cb1b35d3bfe0537895736231717e

                                            SHA512

                                            a247465ddbb1dd8cd5c684d7646cd9ee1caabf0efa8f5b4626128bfc2de48117fc7a6f2828649a85d05ab6ba5b3789e82f0bcc2fbc8a0efcf083f7b443e9e152

                                          • C:\Users\Admin\AppData\Local\Temp\BF7.exe

                                            MD5

                                            b9d3baf6cab644ab4033810e111863be

                                            SHA1

                                            76993e1f57ae6aceedd5f1bb7c03dd2ace89b2a7

                                            SHA256

                                            30fa13380d4f6eb546d26737e7122bff6af8cb1b35d3bfe0537895736231717e

                                            SHA512

                                            a247465ddbb1dd8cd5c684d7646cd9ee1caabf0efa8f5b4626128bfc2de48117fc7a6f2828649a85d05ab6ba5b3789e82f0bcc2fbc8a0efcf083f7b443e9e152

                                          • C:\Users\Admin\AppData\Local\Temp\BF7.exe

                                            MD5

                                            b9d3baf6cab644ab4033810e111863be

                                            SHA1

                                            76993e1f57ae6aceedd5f1bb7c03dd2ace89b2a7

                                            SHA256

                                            30fa13380d4f6eb546d26737e7122bff6af8cb1b35d3bfe0537895736231717e

                                            SHA512

                                            a247465ddbb1dd8cd5c684d7646cd9ee1caabf0efa8f5b4626128bfc2de48117fc7a6f2828649a85d05ab6ba5b3789e82f0bcc2fbc8a0efcf083f7b443e9e152

                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\smss.exe

                                            MD5

                                            bdfde890a781bf135e6eb4339ff9424f

                                            SHA1

                                            a5bfca4601242d3ff52962432efb15ab9202217f

                                            SHA256

                                            b7972505fc2b3b41383bc9022824130ef912145ff1d858555536df477c3a59f5

                                            SHA512

                                            7af519bbda4994a15789520a56b4a961187aa64ef284830a0e8a083cb5257f9606a7e4647278ce9e2c01995f627dc83aa0750b9f7a1273218618f65af0f2a15b

                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\smss.exe

                                            MD5

                                            bdfde890a781bf135e6eb4339ff9424f

                                            SHA1

                                            a5bfca4601242d3ff52962432efb15ab9202217f

                                            SHA256

                                            b7972505fc2b3b41383bc9022824130ef912145ff1d858555536df477c3a59f5

                                            SHA512

                                            7af519bbda4994a15789520a56b4a961187aa64ef284830a0e8a083cb5257f9606a7e4647278ce9e2c01995f627dc83aa0750b9f7a1273218618f65af0f2a15b

                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\smss.exe

                                            MD5

                                            bdfde890a781bf135e6eb4339ff9424f

                                            SHA1

                                            a5bfca4601242d3ff52962432efb15ab9202217f

                                            SHA256

                                            b7972505fc2b3b41383bc9022824130ef912145ff1d858555536df477c3a59f5

                                            SHA512

                                            7af519bbda4994a15789520a56b4a961187aa64ef284830a0e8a083cb5257f9606a7e4647278ce9e2c01995f627dc83aa0750b9f7a1273218618f65af0f2a15b

                                          • \Users\Admin\AppData\LocalLow\sqlite3.dll

                                            MD5

                                            f964811b68f9f1487c2b41e1aef576ce

                                            SHA1

                                            b423959793f14b1416bc3b7051bed58a1034025f

                                            SHA256

                                            83bc57dcf282264f2b00c21ce0339eac20fcb7401f7c5472c0cd0c014844e5f7

                                            SHA512

                                            565b1a7291c6fcb63205907fcd9e72fc2e11ca945afc4468c378edba882e2f314c2ac21a7263880ff7d4b84c2a1678024c1ac9971ac1c1de2bfa4248ec0f98c4

                                          • memory/8-176-0x00000000060D0000-0x00000000060D1000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/8-161-0x0000000001230000-0x0000000001231000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/8-146-0x0000000000000000-mapping.dmp

                                          • memory/8-162-0x0000000077D80000-0x0000000077F0E000-memory.dmp

                                            Filesize

                                            1.6MB

                                          • memory/68-115-0x0000000000402FAB-mapping.dmp

                                          • memory/68-114-0x0000000000400000-0x0000000000409000-memory.dmp

                                            Filesize

                                            36KB

                                          • memory/188-210-0x0000000077D80000-0x0000000077F0E000-memory.dmp

                                            Filesize

                                            1.6MB

                                          • memory/188-221-0x0000000005F00000-0x0000000005F01000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/188-207-0x0000000000B50000-0x0000000000B51000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/188-181-0x0000000000000000-mapping.dmp

                                          • memory/392-134-0x0000000004D90000-0x0000000004D91000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/392-129-0x0000000000000000-mapping.dmp

                                          • memory/392-135-0x00000000055A0000-0x00000000055D1000-memory.dmp

                                            Filesize

                                            196KB

                                          • memory/392-132-0x0000000000440000-0x0000000000441000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/416-393-0x000000000041C5E2-mapping.dmp

                                          • memory/416-425-0x0000000004D60000-0x0000000005366000-memory.dmp

                                            Filesize

                                            6.0MB

                                          • memory/764-116-0x00000000020C0000-0x00000000020CA000-memory.dmp

                                            Filesize

                                            40KB

                                          • memory/1092-319-0x0000000000BC0000-0x0000000000BC4000-memory.dmp

                                            Filesize

                                            16KB

                                          • memory/1092-322-0x0000000000BB0000-0x0000000000BB9000-memory.dmp

                                            Filesize

                                            36KB

                                          • memory/1092-316-0x0000000000000000-mapping.dmp

                                          • memory/1124-596-0x00000231F9D40000-0x00000231F9D41000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/1124-686-0x00000231F9E90000-0x00000231F9E91000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/1124-689-0x00000231F9EE0000-0x00000231F9EE1000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/1124-597-0x00000231F9E10000-0x00000231F9E11000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/1124-598-0x00000231F9E30000-0x00000231F9E31000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/1184-137-0x000000000041A68E-mapping.dmp

                                          • memory/1184-136-0x0000000000400000-0x0000000000420000-memory.dmp

                                            Filesize

                                            128KB

                                          • memory/1184-159-0x0000000005650000-0x0000000005C56000-memory.dmp

                                            Filesize

                                            6.0MB

                                          • memory/1216-206-0x0000000005050000-0x0000000005051000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/1216-197-0x0000000000820000-0x0000000000821000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/1216-200-0x0000000005170000-0x0000000005171000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/1216-191-0x0000000000000000-mapping.dmp

                                          • memory/1216-202-0x0000000005310000-0x0000000005382000-memory.dmp

                                            Filesize

                                            456KB

                                          • memory/1216-204-0x0000000005890000-0x0000000005891000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/1216-208-0x0000000005450000-0x0000000005451000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/1252-184-0x000000000041C5E2-mapping.dmp

                                          • memory/1252-205-0x00000000053F0000-0x00000000059F6000-memory.dmp

                                            Filesize

                                            6.0MB

                                          • memory/1284-216-0x0000000000000000-mapping.dmp

                                          • memory/1308-147-0x0000000005100000-0x0000000005101000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/1308-150-0x0000000005230000-0x0000000005231000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/1308-145-0x00000000056B0000-0x00000000056B1000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/1308-139-0x000000000041C5E2-mapping.dmp

                                          • memory/1308-138-0x0000000000400000-0x0000000000422000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/1308-158-0x00000000050A0000-0x00000000056A6000-memory.dmp

                                            Filesize

                                            6.0MB

                                          • memory/1308-155-0x00000000051A0000-0x00000000051A1000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/1308-153-0x0000000005160000-0x0000000005161000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/2300-121-0x0000000000060000-0x0000000000061000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/2300-123-0x0000000004A10000-0x0000000004A11000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/2300-118-0x0000000000000000-mapping.dmp

                                          • memory/2300-124-0x00000000049B0000-0x00000000049B1000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/2300-125-0x0000000004990000-0x0000000004A06000-memory.dmp

                                            Filesize

                                            472KB

                                          • memory/2536-117-0x0000000000870000-0x0000000000886000-memory.dmp

                                            Filesize

                                            88KB

                                          • memory/2832-223-0x000000000041C5E2-mapping.dmp

                                          • memory/2832-238-0x0000000004DF0000-0x00000000053F6000-memory.dmp

                                            Filesize

                                            6.0MB

                                          • memory/2924-573-0x000001989AAE0000-0x000001989AAE1000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/2924-590-0x000001989ABE0000-0x000001989ABE1000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/2924-570-0x000001989A9F0000-0x000001989A9F1000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/3036-219-0x0000000000000000-mapping.dmp

                                          • memory/3140-189-0x0000000001F70000-0x0000000001FFF000-memory.dmp

                                            Filesize

                                            572KB

                                          • memory/3140-126-0x0000000000000000-mapping.dmp

                                          • memory/3140-192-0x0000000000400000-0x0000000001DB7000-memory.dmp

                                            Filesize

                                            25.7MB

                                          • memory/3180-250-0x000000000041C5E2-mapping.dmp

                                          • memory/3180-268-0x0000000005590000-0x0000000005B96000-memory.dmp

                                            Filesize

                                            6.0MB

                                          • memory/3932-232-0x0000000000000000-mapping.dmp

                                          • memory/3956-170-0x000000000041C5E2-mapping.dmp

                                          • memory/3956-180-0x00000000055A0000-0x0000000005BA6000-memory.dmp

                                            Filesize

                                            6.0MB

                                          • memory/4100-355-0x00000000038E0000-0x000000000396F000-memory.dmp

                                            Filesize

                                            572KB

                                          • memory/4100-358-0x0000000000400000-0x0000000001DB7000-memory.dmp

                                            Filesize

                                            25.7MB

                                          • memory/4100-235-0x0000000000000000-mapping.dmp

                                          • memory/4136-239-0x0000000000000000-mapping.dmp

                                          • memory/4136-243-0x00000000004D0000-0x0000000000544000-memory.dmp

                                            Filesize

                                            464KB

                                          • memory/4136-244-0x0000000000460000-0x00000000004CB000-memory.dmp

                                            Filesize

                                            428KB

                                          • memory/4208-1009-0x000000000041C5E2-mapping.dmp

                                          • memory/4244-252-0x0000000000720000-0x0000000000727000-memory.dmp

                                            Filesize

                                            28KB

                                          • memory/4244-255-0x0000000000710000-0x000000000071C000-memory.dmp

                                            Filesize

                                            48KB

                                          • memory/4244-245-0x0000000000000000-mapping.dmp

                                          • memory/4376-337-0x0000000001080000-0x0000000001089000-memory.dmp

                                            Filesize

                                            36KB

                                          • memory/4376-336-0x0000000001090000-0x0000000001095000-memory.dmp

                                            Filesize

                                            20KB

                                          • memory/4376-325-0x0000000000000000-mapping.dmp

                                          • memory/4400-364-0x000000000041C5E2-mapping.dmp

                                          • memory/4400-374-0x0000000004FB0000-0x00000000055B6000-memory.dmp

                                            Filesize

                                            6.0MB

                                          • memory/4408-289-0x000000000041C5E2-mapping.dmp

                                          • memory/4408-321-0x00000000050B0000-0x00000000056B6000-memory.dmp

                                            Filesize

                                            6.0MB

                                          • memory/4444-265-0x00000000032F0000-0x00000000032F7000-memory.dmp

                                            Filesize

                                            28KB

                                          • memory/4444-256-0x0000000000000000-mapping.dmp

                                          • memory/4444-267-0x00000000032E0000-0x00000000032EB000-memory.dmp

                                            Filesize

                                            44KB

                                          • memory/4456-1059-0x000000000041C5E2-mapping.dmp

                                          • memory/4500-340-0x0000000000000000-mapping.dmp

                                          • memory/4500-350-0x0000000000D90000-0x0000000000D95000-memory.dmp

                                            Filesize

                                            20KB

                                          • memory/4500-351-0x0000000000D80000-0x0000000000D89000-memory.dmp

                                            Filesize

                                            36KB

                                          • memory/4508-668-0x000000000041C5E2-mapping.dmp

                                          • memory/4508-694-0x0000000004D40000-0x0000000005346000-memory.dmp

                                            Filesize

                                            6.0MB

                                          • memory/4528-288-0x0000000007042000-0x0000000007043000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/4528-427-0x0000000007043000-0x0000000007044000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/4528-286-0x0000000007040000-0x0000000007041000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/4528-412-0x000000007F7C0000-0x000000007F7C1000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/4528-263-0x0000000000000000-mapping.dmp

                                          • memory/4556-264-0x0000000000000000-mapping.dmp

                                          • memory/4556-291-0x0000000007040000-0x0000000007041000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/4556-408-0x000000007FC70000-0x000000007FC71000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/4556-302-0x0000000007042000-0x0000000007043000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/4556-426-0x0000000007043000-0x0000000007044000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/4580-270-0x0000000000640000-0x0000000000649000-memory.dmp

                                            Filesize

                                            36KB

                                          • memory/4580-266-0x0000000000000000-mapping.dmp

                                          • memory/4580-272-0x0000000000630000-0x000000000063F000-memory.dmp

                                            Filesize

                                            60KB

                                          • memory/4600-1039-0x000000000041C5E2-mapping.dmp

                                          • memory/4604-271-0x000000000041C5C6-mapping.dmp

                                          • memory/4616-1019-0x000000000041C5E2-mapping.dmp

                                          • memory/4736-1049-0x000000000041C5E2-mapping.dmp

                                          • memory/4780-298-0x00000000003A0000-0x00000000003A9000-memory.dmp

                                            Filesize

                                            36KB

                                          • memory/4780-281-0x0000000000000000-mapping.dmp

                                          • memory/4780-295-0x00000000003B0000-0x00000000003B5000-memory.dmp

                                            Filesize

                                            20KB

                                          • memory/4792-531-0x000000000041C5E2-mapping.dmp

                                          • memory/4792-567-0x0000000005590000-0x0000000005B96000-memory.dmp

                                            Filesize

                                            6.0MB

                                          • memory/4800-938-0x0000000000000000-mapping.dmp

                                          • memory/4976-299-0x0000000000000000-mapping.dmp

                                          • memory/4976-318-0x0000000000DB0000-0x0000000000DB6000-memory.dmp

                                            Filesize

                                            24KB

                                          • memory/4976-320-0x0000000000DA0000-0x0000000000DAC000-memory.dmp

                                            Filesize

                                            48KB

                                          • memory/4988-454-0x000000000041C5E2-mapping.dmp

                                          • memory/4988-478-0x0000000005310000-0x0000000005916000-memory.dmp

                                            Filesize

                                            6.0MB

                                          • memory/5000-339-0x000000000041C5E2-mapping.dmp

                                          • memory/5000-353-0x0000000005360000-0x0000000005966000-memory.dmp

                                            Filesize

                                            6.0MB

                                          • memory/5084-308-0x0000000000000000-mapping.dmp

                                          • memory/5112-311-0x0000000000000000-mapping.dmp

                                          • memory/5112-500-0x00000000005F0000-0x00000000005F1000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/5116-859-0x000000000041C5E2-mapping.dmp

                                          • memory/5160-615-0x0000017E3CDC0000-0x0000017E3CDC1000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/5160-613-0x0000017E3CB00000-0x0000017E3CB01000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/5160-618-0x0000017E3CDE0000-0x0000017E3CDE1000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/5356-958-0x0000000000000000-mapping.dmp

                                          • memory/5396-930-0x0000000000000000-mapping.dmp

                                          • memory/5400-989-0x000000000041C5E2-mapping.dmp

                                          • memory/5416-931-0x0000000000000000-mapping.dmp

                                          • memory/5436-933-0x0000000000000000-mapping.dmp

                                          • memory/5440-1029-0x000000000041C5E2-mapping.dmp

                                          • memory/5568-934-0x0000000000000000-mapping.dmp

                                          • memory/5616-935-0x0000000000000000-mapping.dmp

                                          • memory/5688-767-0x000000000041C5E2-mapping.dmp

                                          • memory/5716-999-0x000000000041C5E2-mapping.dmp

                                          • memory/5724-936-0x0000000000000000-mapping.dmp

                                          • memory/5796-955-0x0000000000000000-mapping.dmp

                                          • memory/5808-969-0x000000000041C5E2-mapping.dmp

                                          • memory/5948-943-0x000000000041C5E2-mapping.dmp

                                          • memory/6044-967-0x0000000000000000-mapping.dmp

                                          • memory/6092-956-0x0000000000000000-mapping.dmp

                                          • memory/6100-979-0x000000000041C5E2-mapping.dmp