Analysis
-
max time kernel
136s -
max time network
161s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
21-10-2021 21:26
Static task
static1
General
-
Target
bbe067edf24c7ed3076281646e84e3c3d3643205189076e3e2f023a0a7830cc5.exe
-
Size
347KB
-
MD5
f2abae5000fe712654372a7adb2321f4
-
SHA1
44f3e6c1483732aa4353afefc2e07eb7f5542a06
-
SHA256
bbe067edf24c7ed3076281646e84e3c3d3643205189076e3e2f023a0a7830cc5
-
SHA512
ad943733ddf2e6077597b614cdd045e8ed6e82010808342d53e2108ccdf5c92b7541f24700f4829cfdef84efc54c6d4735185e895810c7db7a6c3f073f3d59de
Malware Config
Extracted
cryptbot
veoalm42.top
moruhx04.top
-
payload_url
http://tynjua14.top/download.php?file=lv.exe
Extracted
danabot
192.119.110.73:443
192.236.147.159:443
192.210.222.88:443
-
embedded_hash
F4711E27D559B4AEB1A081A1EB0AC465
-
type
loader
Extracted
danabot
2052
4
192.119.110.73:443
192.236.147.159:443
192.210.222.88:443
-
embedded_hash
F4711E27D559B4AEB1A081A1EB0AC465
-
type
main
Signatures
-
Danabot Loader Component 8 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\GIRQUG~1.DLL DanabotLoader2021 \Users\Admin\AppData\Local\Temp\GIRQUG~1.DLL DanabotLoader2021 behavioral1/memory/2080-173-0x0000000000E10000-0x0000000000F74000-memory.dmp DanabotLoader2021 \Users\Admin\AppData\Local\Temp\GIRQUG~1.DLL DanabotLoader2021 \Users\Admin\AppData\Local\Temp\GIRQUG~1.DLL DanabotLoader2021 behavioral1/memory/2228-181-0x0000000000A20000-0x0000000000B84000-memory.dmp DanabotLoader2021 \Users\Admin\AppData\Local\Temp\GIRQUG~1.DLL DanabotLoader2021 \Users\Admin\AppData\Local\Temp\GIRQUG~1.DLL DanabotLoader2021 -
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Blocklisted process makes network request 6 IoCs
Processes:
WScript.exerundll32.exeflow pid process 47 2244 WScript.exe 48 2244 WScript.exe 50 2244 WScript.exe 52 2244 WScript.exe 54 2244 WScript.exe 55 2080 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 5 IoCs
Processes:
File.exeundirk.exeyoicksvp.exeIntelRapid.exegirqugdcbym.exepid process 672 File.exe 1484 undirk.exe 1940 yoicksvp.exe 1084 IntelRapid.exe 1032 girqugdcbym.exe -
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
undirk.exeyoicksvp.exeIntelRapid.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion undirk.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion undirk.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion yoicksvp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion yoicksvp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion IntelRapid.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion IntelRapid.exe -
Drops startup file 1 IoCs
Processes:
undirk.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IntelRapid.lnk undirk.exe -
Loads dropped DLL 5 IoCs
Processes:
File.exerundll32.exeRUNDLL32.EXEpid process 672 File.exe 2080 rundll32.exe 2080 rundll32.exe 2228 RUNDLL32.EXE 2228 RUNDLL32.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\lizard\undirk.exe themida C:\Users\Admin\AppData\Local\Temp\lizard\undirk.exe themida behavioral1/memory/1484-143-0x00007FF62D390000-0x00007FF62DD17000-memory.dmp themida behavioral1/memory/1484-144-0x00007FF62D390000-0x00007FF62DD17000-memory.dmp themida behavioral1/memory/1484-145-0x00007FF62D390000-0x00007FF62DD17000-memory.dmp themida C:\Users\Admin\AppData\Local\Temp\lizard\yoicksvp.exe themida C:\Users\Admin\AppData\Local\Temp\lizard\yoicksvp.exe themida C:\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe themida C:\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe themida behavioral1/memory/1940-153-0x00000000011F0000-0x0000000001854000-memory.dmp themida behavioral1/memory/1940-154-0x00000000011F0000-0x0000000001854000-memory.dmp themida behavioral1/memory/1084-156-0x00007FF658D00000-0x00007FF659687000-memory.dmp themida behavioral1/memory/1940-157-0x00000000011F0000-0x0000000001854000-memory.dmp themida behavioral1/memory/1940-155-0x00000000011F0000-0x0000000001854000-memory.dmp themida behavioral1/memory/1084-158-0x00007FF658D00000-0x00007FF659687000-memory.dmp themida behavioral1/memory/1084-159-0x00007FF658D00000-0x00007FF659687000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
undirk.exeyoicksvp.exeIntelRapid.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA undirk.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA yoicksvp.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA IntelRapid.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 28 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
Processes:
undirk.exeyoicksvp.exeIntelRapid.exepid process 1484 undirk.exe 1940 yoicksvp.exe 1084 IntelRapid.exe -
Drops file in Program Files directory 4 IoCs
Processes:
File.exerundll32.exedescription ioc process File created C:\Program Files (x86)\foler\olader\acppage.dll File.exe File created C:\Program Files (x86)\foler\olader\adprovider.dll File.exe File created C:\Program Files (x86)\foler\olader\acledit.dll File.exe File created C:\PROGRA~3\zohplghndapsm.tmp rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 31 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
RUNDLL32.EXEyoicksvp.exebbe067edf24c7ed3076281646e84e3c3d3643205189076e3e2f023a0a7830cc5.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 RUNDLL32.EXE Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier RUNDLL32.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RUNDLL32.EXE Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString yoicksvp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Revision RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Status RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString bbe067edf24c7ed3076281646e84e3c3d3643205189076e3e2f023a0a7830cc5.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 yoicksvp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Component Information RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Platform Specific Field 1 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString RUNDLL32.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 bbe067edf24c7ed3076281646e84e3c3d3643205189076e3e2f023a0a7830cc5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Revision RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier RUNDLL32.EXE Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet RUNDLL32.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Previous Update Revision RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data RUNDLL32.EXE -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 708 timeout.exe -
Modifies registry class 1 IoCs
Processes:
yoicksvp.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings yoicksvp.exe -
Processes:
WScript.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 WScript.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
IntelRapid.exepid process 1084 IntelRapid.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
yoicksvp.exepid process 1940 yoicksvp.exe 1940 yoicksvp.exe -
Suspicious use of WriteProcessMemory 31 IoCs
Processes:
bbe067edf24c7ed3076281646e84e3c3d3643205189076e3e2f023a0a7830cc5.exeFile.execmd.exeundirk.exeyoicksvp.exegirqugdcbym.exerundll32.exedescription pid process target process PID 896 wrote to memory of 672 896 bbe067edf24c7ed3076281646e84e3c3d3643205189076e3e2f023a0a7830cc5.exe File.exe PID 896 wrote to memory of 672 896 bbe067edf24c7ed3076281646e84e3c3d3643205189076e3e2f023a0a7830cc5.exe File.exe PID 896 wrote to memory of 672 896 bbe067edf24c7ed3076281646e84e3c3d3643205189076e3e2f023a0a7830cc5.exe File.exe PID 896 wrote to memory of 1652 896 bbe067edf24c7ed3076281646e84e3c3d3643205189076e3e2f023a0a7830cc5.exe cmd.exe PID 896 wrote to memory of 1652 896 bbe067edf24c7ed3076281646e84e3c3d3643205189076e3e2f023a0a7830cc5.exe cmd.exe PID 896 wrote to memory of 1652 896 bbe067edf24c7ed3076281646e84e3c3d3643205189076e3e2f023a0a7830cc5.exe cmd.exe PID 672 wrote to memory of 1484 672 File.exe undirk.exe PID 672 wrote to memory of 1484 672 File.exe undirk.exe PID 672 wrote to memory of 1940 672 File.exe yoicksvp.exe PID 672 wrote to memory of 1940 672 File.exe yoicksvp.exe PID 672 wrote to memory of 1940 672 File.exe yoicksvp.exe PID 1652 wrote to memory of 708 1652 cmd.exe timeout.exe PID 1652 wrote to memory of 708 1652 cmd.exe timeout.exe PID 1652 wrote to memory of 708 1652 cmd.exe timeout.exe PID 1484 wrote to memory of 1084 1484 undirk.exe IntelRapid.exe PID 1484 wrote to memory of 1084 1484 undirk.exe IntelRapid.exe PID 1940 wrote to memory of 1032 1940 yoicksvp.exe girqugdcbym.exe PID 1940 wrote to memory of 1032 1940 yoicksvp.exe girqugdcbym.exe PID 1940 wrote to memory of 1032 1940 yoicksvp.exe girqugdcbym.exe PID 1940 wrote to memory of 1124 1940 yoicksvp.exe WScript.exe PID 1940 wrote to memory of 1124 1940 yoicksvp.exe WScript.exe PID 1940 wrote to memory of 1124 1940 yoicksvp.exe WScript.exe PID 1032 wrote to memory of 2080 1032 girqugdcbym.exe rundll32.exe PID 1032 wrote to memory of 2080 1032 girqugdcbym.exe rundll32.exe PID 1032 wrote to memory of 2080 1032 girqugdcbym.exe rundll32.exe PID 1940 wrote to memory of 2244 1940 yoicksvp.exe WScript.exe PID 1940 wrote to memory of 2244 1940 yoicksvp.exe WScript.exe PID 1940 wrote to memory of 2244 1940 yoicksvp.exe WScript.exe PID 2080 wrote to memory of 2228 2080 rundll32.exe RUNDLL32.EXE PID 2080 wrote to memory of 2228 2080 rundll32.exe RUNDLL32.EXE PID 2080 wrote to memory of 2228 2080 rundll32.exe RUNDLL32.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\bbe067edf24c7ed3076281646e84e3c3d3643205189076e3e2f023a0a7830cc5.exe"C:\Users\Admin\AppData\Local\Temp\bbe067edf24c7ed3076281646e84e3c3d3643205189076e3e2f023a0a7830cc5.exe"1⤵
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\File.exe"C:\Users\Admin\AppData\Local\Temp\File.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\lizard\undirk.exe"C:\Users\Admin\AppData\Local\Temp\lizard\undirk.exe"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Drops startup file
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe"C:\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe"4⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: AddClipboardFormatListener
-
C:\Users\Admin\AppData\Local\Temp\lizard\yoicksvp.exe"C:\Users\Admin\AppData\Local\Temp\lizard\yoicksvp.exe"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\girqugdcbym.exe"C:\Users\Admin\AppData\Local\Temp\girqugdcbym.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\GIRQUG~1.DLL,s C:\Users\Admin\AppData\Local\Temp\GIRQUG~1.EXE5⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\RUNDLL32.EXEC:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\AppData\Local\Temp\GIRQUG~1.DLL,c2MQeUJ6UUg46⤵
- Loads dropped DLL
- Checks processor information in registry
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath C:\Users\Admin\AppData\Local\Temp\GIRQUG~1.DLL7⤵
-
C:\Windows\SysWOW64\RUNDLL32.EXEC:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\AppData\Local\Temp\GIRQUG~1.DLL,Pz0BWlRRbkQ=7⤵
-
C:\Windows\system32\rundll32.exeC:\Windows\system32\rundll32.exe C:\Windows\system32\shell32.dll,#61 196388⤵
-
C:\Windows\system32\ctfmon.exectfmon.exe9⤵
-
C:\Windows\SysWOW64\RUNDLL32.EXEC:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\AppData\Local\Temp\58cfb4a6.dll,Start7⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmpD8F.tmp.ps1"7⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmp7498.tmp.ps1"7⤵
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\wrwqrcjl.vbs"4⤵
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\hxroqbov.vbs"4⤵
- Blocklisted process makes network request
- Modifies system certificate store
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\PnlWnfNMuy & timeout 4 & del /f /q "C:\Users\Admin\AppData\Local\Temp\bbe067edf24c7ed3076281646e84e3c3d3643205189076e3e2f023a0a7830cc5.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 43⤵
- Delays execution with timeout.exe
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\PROGRA~3\zohplghndapsm.tmpMD5
554c1f9448acf87138db0674825523f2
SHA1e2f5a6b7c14a3b24112f976cfdee42e777fffc41
SHA2563680e9f202492b96587e42ddcb526334c610b5d632aeac2f293ceb0aa44fcf2e
SHA512df26403958e3a40277984700a51e495177caa01e89d1e39657fdf9c4a70b4e0973b481d91ddfdc94f280bb53816cd0c02e4e072cd8f5a36957f623039c48c10a
-
C:\PROGRA~3\zohplghndapsm.tmpMD5
554c1f9448acf87138db0674825523f2
SHA1e2f5a6b7c14a3b24112f976cfdee42e777fffc41
SHA2563680e9f202492b96587e42ddcb526334c610b5d632aeac2f293ceb0aa44fcf2e
SHA512df26403958e3a40277984700a51e495177caa01e89d1e39657fdf9c4a70b4e0973b481d91ddfdc94f280bb53816cd0c02e4e072cd8f5a36957f623039c48c10a
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logMD5
f7a808b5711f58fb4f85476c1bb24ac3
SHA1fbdf9670d622e8fc3446ad4f53fbbd83016f03d1
SHA256de4aadfe00c4cf41434a12450cdc69d37cb2d9cec951b074c3b5e7bfce9e94ec
SHA512866848d13e999e6a1a79d77c33adb642d78d0a11adee293fca411b4ed5f7bf85324f90b3031148a66ac10dccc577d3c2a7c1ab6ed4237360de9911c27516a5af
-
C:\Users\Admin\AppData\Local\Temp\58cfb4a6.dllMD5
5951f0afa96cda14623b4cce74d58cca
SHA1ad4a21bd28a3065037b1ea40fab4d7c4d7549fde
SHA2568b64b8bfd9e36cc40c273deccd4301a6c2ab44df03b976530c1bc517d7220bce
SHA512b098f302ad3446edafa5d9914f4697cbf7731b7c2ae31bc513de532115d7c672bec17e810d153eb0dbaae5b5782c1ac55351377231f7aa6502a3d9c223d55071
-
C:\Users\Admin\AppData\Local\Temp\File.exeMD5
63c6959237b662401a9f78e799d34db1
SHA1688bd3512930d53cb565468d86941884858c2b52
SHA256e3d5b6d0c39c747762c25d021c7a8aedaa7a30beb9af9187d15aea7178ea9758
SHA5125d905e409449b3f9cf3622b371340f19772a7ed7624bef784521c32b5e9c6242bbbd3b4e0ffc7ce01a88ed6410685312533dc4d1c5723289e29e6edb8bfe3ee1
-
C:\Users\Admin\AppData\Local\Temp\File.exeMD5
63c6959237b662401a9f78e799d34db1
SHA1688bd3512930d53cb565468d86941884858c2b52
SHA256e3d5b6d0c39c747762c25d021c7a8aedaa7a30beb9af9187d15aea7178ea9758
SHA5125d905e409449b3f9cf3622b371340f19772a7ed7624bef784521c32b5e9c6242bbbd3b4e0ffc7ce01a88ed6410685312533dc4d1c5723289e29e6edb8bfe3ee1
-
C:\Users\Admin\AppData\Local\Temp\GIRQUG~1.DLLMD5
c01e0a69cb506cf6d7f884e3115e693b
SHA118f3fd4f3cb4dfbe4878662ab97e30a214708c00
SHA2560dff0a4f21cbdd40745c3cde9b5d7a5ae782e4b61ab0d185eab23733da40fe42
SHA512a5fe1ca632cd174b2c2b658a0d903a7a8f900610fa0cdd71831407d88e37416c3800c7d142f87610c98e7e7f5e69cb213bc68dec501d1e33c2ebe730d4fa235d
-
C:\Users\Admin\AppData\Local\Temp\PnlWnfNMuy\HDFEEF~1.ZIPMD5
de998aded8567761fa7b7c3b003c0e6c
SHA1a02c267700bc51b6e3fa6ac95d6350e1cf25ed33
SHA2563a5a31e5b2ed7aa5dd2b2be42f0c622d25b60b3e81667aba31f2293823f31537
SHA51280fd3808a6eef1643fb3605bc6088f39476e16388435de726cb9e38da2f008a6c0af758f4712789fbf46afe1debefc17acf033d44c6e3656c573706d123bdd5d
-
C:\Users\Admin\AppData\Local\Temp\PnlWnfNMuy\YNOOUI~1.ZIPMD5
0b69554712fa0fa9b4067d1efb7323ce
SHA145f9457be6cf3c910b017e57cc924b33ff598a34
SHA2565fe302c05836075a2c8f7ba0dea14c8b2ce3c16a155b621d6ff81a1474e7b799
SHA5127df80a643fdec4e4ae8bc2ba9d8ad2b9aecdfb90954a45c5bc40232135ee94c7e6885d0ed749f0aaa4ceadcec43f3b7678e2844ca5d3db32aa02f0666edbffe0
-
C:\Users\Admin\AppData\Local\Temp\PnlWnfNMuy\_Files\_Chrome\DEFAUL~1.BINMD5
dc2f254b5562f0d42df820a0c3d577f9
SHA116109f6ddd0ce94200daed7323617f43b604f42a
SHA25619afe2b33cc988fb44548cc87f1b467d37a20e74f53b4d71c7c4050c2527f178
SHA512ac0ab6311eefc114412ccfbb4895e19aae0a129171ae7ffeb85a37c5a99a6b89ce795b58681162fc48931306f67c0b1004049665d0171a2c1e6a0ceaca1023d2
-
C:\Users\Admin\AppData\Local\Temp\PnlWnfNMuy\_Files\_Chrome\DEFAUL~1.DBMD5
b608d407fc15adea97c26936bc6f03f6
SHA1953e7420801c76393902c0d6bb56148947e41571
SHA256b281ce54125d4250a80f48fcc02a8eea53f2c35c3b726e2512c3d493da0013bf
SHA512cc96ddf4bf90d6aaa9d86803cb2aa30cd8e9b295aee1bd5544b88aeab63dc60bb1d4641e846c9771bab51aabbfbcd984c6d3ee83b96f5b65d09c0841d464b9e4
-
C:\Users\Admin\AppData\Local\Temp\PnlWnfNMuy\_Files\_Chrome\DEFAUL~2.DBMD5
055c8c5c47424f3c2e7a6fc2ee904032
SHA15952781d22cff35d94861fac25d89a39af6d0a87
SHA256531b3121bd59938df4933972344d936a67e75d8b1741807a8a51c898d185dd2a
SHA512c2772893695f49cb185add62c35284779b20d45adc01184f1912613fa8b2d70c8e785f0d7cfa3bfaf1d2d58e7cdc74f4304fd973a956601927719d6d370dd57a
-
C:\Users\Admin\AppData\Local\Temp\PnlWnfNMuy\_Files\_Chrome\DEFAUL~3.DBMD5
8ee018331e95a610680a789192a9d362
SHA1e1fba0ac3f3d8689acf6c2ee26afdfd0c8e02df9
SHA25694354ea6703c5ef5fa052aeb1d29715587d80300858ebc063a61c02b7e6e9575
SHA5124b89b5adc77641e497eda7db62a48fee7b4b8dda83bff637cac850645d31deb93aafee5afeb41390e07fd16505a63f418b6cb153a1d35777c483e2d6d3f783b4
-
C:\Users\Admin\AppData\Local\Temp\PnlWnfNMuy\_Files\_INFOR~1.TXTMD5
910b264f2c5f08acbbbe72e62bd82d96
SHA121d277a7522edc1799a72ae1daca0227b4694eea
SHA256514a915d52adec7819e6d779dad162aac353dac3b3af825016793f069a357176
SHA512be2ec21154e9add9a18cb6fbd6a56be2ced15d6dc8d2b71660878133d3259e373790cab8c8ddd67bc63e23627df3dd156684af46a3bddcf849f5410e411035d2
-
C:\Users\Admin\AppData\Local\Temp\PnlWnfNMuy\_Files\_SCREE~1.JPEMD5
ded9c97f1f04e6588251784a841f194d
SHA103912c7a0e2a02c7a2a32f704d3e7ee7ed743b37
SHA256698139145f65804fdda7240dc7f5bf1648251245d5d67e30eeeb47a99727a17e
SHA512b6d45bba5a7ae93acf13c67365df9fbee85b5a3ea2b9f48832ea8803cb29fd027a2c8840620912141a5ca32920fb67091e3bf01a2aae45a987ff5dc838f29f6c
-
C:\Users\Admin\AppData\Local\Temp\PnlWnfNMuy\files_\SCREEN~1.JPGMD5
ded9c97f1f04e6588251784a841f194d
SHA103912c7a0e2a02c7a2a32f704d3e7ee7ed743b37
SHA256698139145f65804fdda7240dc7f5bf1648251245d5d67e30eeeb47a99727a17e
SHA512b6d45bba5a7ae93acf13c67365df9fbee85b5a3ea2b9f48832ea8803cb29fd027a2c8840620912141a5ca32920fb67091e3bf01a2aae45a987ff5dc838f29f6c
-
C:\Users\Admin\AppData\Local\Temp\PnlWnfNMuy\files_\SYSTEM~1.TXTMD5
910b264f2c5f08acbbbe72e62bd82d96
SHA121d277a7522edc1799a72ae1daca0227b4694eea
SHA256514a915d52adec7819e6d779dad162aac353dac3b3af825016793f069a357176
SHA512be2ec21154e9add9a18cb6fbd6a56be2ced15d6dc8d2b71660878133d3259e373790cab8c8ddd67bc63e23627df3dd156684af46a3bddcf849f5410e411035d2
-
C:\Users\Admin\AppData\Local\Temp\PnlWnfNMuy\files_\_Chrome\DEFAUL~1.BINMD5
dc2f254b5562f0d42df820a0c3d577f9
SHA116109f6ddd0ce94200daed7323617f43b604f42a
SHA25619afe2b33cc988fb44548cc87f1b467d37a20e74f53b4d71c7c4050c2527f178
SHA512ac0ab6311eefc114412ccfbb4895e19aae0a129171ae7ffeb85a37c5a99a6b89ce795b58681162fc48931306f67c0b1004049665d0171a2c1e6a0ceaca1023d2
-
C:\Users\Admin\AppData\Local\Temp\PnlWnfNMuy\files_\_Chrome\DEFAUL~1.DBMD5
b608d407fc15adea97c26936bc6f03f6
SHA1953e7420801c76393902c0d6bb56148947e41571
SHA256b281ce54125d4250a80f48fcc02a8eea53f2c35c3b726e2512c3d493da0013bf
SHA512cc96ddf4bf90d6aaa9d86803cb2aa30cd8e9b295aee1bd5544b88aeab63dc60bb1d4641e846c9771bab51aabbfbcd984c6d3ee83b96f5b65d09c0841d464b9e4
-
C:\Users\Admin\AppData\Local\Temp\PnlWnfNMuy\files_\_Chrome\DEFAUL~2.DBMD5
055c8c5c47424f3c2e7a6fc2ee904032
SHA15952781d22cff35d94861fac25d89a39af6d0a87
SHA256531b3121bd59938df4933972344d936a67e75d8b1741807a8a51c898d185dd2a
SHA512c2772893695f49cb185add62c35284779b20d45adc01184f1912613fa8b2d70c8e785f0d7cfa3bfaf1d2d58e7cdc74f4304fd973a956601927719d6d370dd57a
-
C:\Users\Admin\AppData\Local\Temp\PnlWnfNMuy\files_\_Chrome\DEFAUL~3.DBMD5
8ee018331e95a610680a789192a9d362
SHA1e1fba0ac3f3d8689acf6c2ee26afdfd0c8e02df9
SHA25694354ea6703c5ef5fa052aeb1d29715587d80300858ebc063a61c02b7e6e9575
SHA5124b89b5adc77641e497eda7db62a48fee7b4b8dda83bff637cac850645d31deb93aafee5afeb41390e07fd16505a63f418b6cb153a1d35777c483e2d6d3f783b4
-
C:\Users\Admin\AppData\Local\Temp\girqugdcbym.exeMD5
24ca51b618666a5a044fcd3692f12c29
SHA18071b7e9e41602ce1e9b8b2d674a2f85c3fd007d
SHA256db3cffa16f2e8436dc53c4418072f1b0c80f94966b9c01e204808dc1857aa8bb
SHA51267044870ef92e5eeaa40e1a1ec9ff9e4f23b123383bf7a26692c29a2c079b843b6091fff4f4672c585dbb4175675aea1b42dc3df5f36fa1bea064949fea06523
-
C:\Users\Admin\AppData\Local\Temp\girqugdcbym.exeMD5
24ca51b618666a5a044fcd3692f12c29
SHA18071b7e9e41602ce1e9b8b2d674a2f85c3fd007d
SHA256db3cffa16f2e8436dc53c4418072f1b0c80f94966b9c01e204808dc1857aa8bb
SHA51267044870ef92e5eeaa40e1a1ec9ff9e4f23b123383bf7a26692c29a2c079b843b6091fff4f4672c585dbb4175675aea1b42dc3df5f36fa1bea064949fea06523
-
C:\Users\Admin\AppData\Local\Temp\hxroqbov.vbsMD5
52a78c9d972566ec3f3b92524413ffd5
SHA116889f2e16a15425bc43a2e9bec2e607037403c7
SHA256bfbf427beea303a2b541e087a60f590042bb178e7858a8db9cdc38ace7c9feda
SHA51247efb6415d808c16e5776fed22ad7ee871302dfa0f6e2e6e70a0907ed1f9c5cb0e85b98f138b07341467d4b6c27a0ab928b53f937c473b2d2a679a48c964d9b5
-
C:\Users\Admin\AppData\Local\Temp\lizard\undirk.exeMD5
202dc043812831e9b306adbfafc2e536
SHA1c8a49139042291b0c92af1fee36b0c5102b2f626
SHA2569ba7f0102bb108d023be94985cdf4f3ed80e5e260e4dda531a212cecce0d1d39
SHA51257344c9ef3b5ba67d4ffc32f19852a3f31168fde2a4fdd4e0d644a93dfb8d0eb9203dac586364d9b8083dfe025c117a7c557226bd0f4bd8e20fcdbf316421bf2
-
C:\Users\Admin\AppData\Local\Temp\lizard\undirk.exeMD5
202dc043812831e9b306adbfafc2e536
SHA1c8a49139042291b0c92af1fee36b0c5102b2f626
SHA2569ba7f0102bb108d023be94985cdf4f3ed80e5e260e4dda531a212cecce0d1d39
SHA51257344c9ef3b5ba67d4ffc32f19852a3f31168fde2a4fdd4e0d644a93dfb8d0eb9203dac586364d9b8083dfe025c117a7c557226bd0f4bd8e20fcdbf316421bf2
-
C:\Users\Admin\AppData\Local\Temp\lizard\yoicksvp.exeMD5
4456a0ad06e8801583ffde598d485c06
SHA1e650d544876b5eaf36f796876dd0e593dcc733a2
SHA25693bcaad9df41e2b94537d8f74fca47676bf736fc77626d3ec5296177503c9937
SHA51222d1e2693c6913032a53bf1a3a0642e828afe56c80c46e2fb9fb739fa644ee8c30238387e6b9d4374860ba2b63ebb34d433dd902b229235ca4ac86c80d8e7db3
-
C:\Users\Admin\AppData\Local\Temp\lizard\yoicksvp.exeMD5
4456a0ad06e8801583ffde598d485c06
SHA1e650d544876b5eaf36f796876dd0e593dcc733a2
SHA25693bcaad9df41e2b94537d8f74fca47676bf736fc77626d3ec5296177503c9937
SHA51222d1e2693c6913032a53bf1a3a0642e828afe56c80c46e2fb9fb739fa644ee8c30238387e6b9d4374860ba2b63ebb34d433dd902b229235ca4ac86c80d8e7db3
-
C:\Users\Admin\AppData\Local\Temp\tmpD8F.tmp.ps1MD5
82912bab55e641747eabb17c8b52b0b7
SHA17f671130272ba51621a9813aed078ba0d0b39e26
SHA25647e63710cb8cb34ce926707f78de0d02c120e1a7ddb7bcc420b0948f733c9e78
SHA512295068483b4a6f1ad08ab72e426e6360fae60f05ed3dc7264a7f554964aa5fb086b4327f93f978638e036cd765a1603ae5c7553f193e733cf21520ffe90a3a93
-
C:\Users\Admin\AppData\Local\Temp\tmpD90.tmpMD5
c416c12d1b2b1da8c8655e393b544362
SHA1fb1a43cd8e1c556c2d25f361f42a21293c29e447
SHA2560600d59103840dff210778179fdfba904dcb737a4bfdb35384608698c86ea046
SHA512cb6d3636be4330aa2fd577c3636d0b7165f92ee817e98f21180ba0c918eb76f4e38f025086593a0e508234ca981cfec2c53482b0e9cc0acfa885fefbdf89913c
-
C:\Users\Admin\AppData\Local\Temp\wrwqrcjl.vbsMD5
ac2c3ce2f78ac3af39bf92e0aad5af06
SHA127f5948a6c455695fa2f5e937b640b78ed1f0cec
SHA256125edca24067a3cd3f381041c387f2564fa0198461ab9e9a7d0b92fa6df9874b
SHA51250045a992a93028deafc229d379b33236c50e3bed3216b28ccdc69c7f4a97c3ef8bdb91b33910beb97488cda0b9d66cf9ff3b4148f2ddf58e69e695e8a330c8b
-
C:\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exeMD5
202dc043812831e9b306adbfafc2e536
SHA1c8a49139042291b0c92af1fee36b0c5102b2f626
SHA2569ba7f0102bb108d023be94985cdf4f3ed80e5e260e4dda531a212cecce0d1d39
SHA51257344c9ef3b5ba67d4ffc32f19852a3f31168fde2a4fdd4e0d644a93dfb8d0eb9203dac586364d9b8083dfe025c117a7c557226bd0f4bd8e20fcdbf316421bf2
-
C:\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exeMD5
202dc043812831e9b306adbfafc2e536
SHA1c8a49139042291b0c92af1fee36b0c5102b2f626
SHA2569ba7f0102bb108d023be94985cdf4f3ed80e5e260e4dda531a212cecce0d1d39
SHA51257344c9ef3b5ba67d4ffc32f19852a3f31168fde2a4fdd4e0d644a93dfb8d0eb9203dac586364d9b8083dfe025c117a7c557226bd0f4bd8e20fcdbf316421bf2
-
\Users\Admin\AppData\Local\Temp\58cfb4a6.dllMD5
5951f0afa96cda14623b4cce74d58cca
SHA1ad4a21bd28a3065037b1ea40fab4d7c4d7549fde
SHA2568b64b8bfd9e36cc40c273deccd4301a6c2ab44df03b976530c1bc517d7220bce
SHA512b098f302ad3446edafa5d9914f4697cbf7731b7c2ae31bc513de532115d7c672bec17e810d153eb0dbaae5b5782c1ac55351377231f7aa6502a3d9c223d55071
-
\Users\Admin\AppData\Local\Temp\GIRQUG~1.DLLMD5
c01e0a69cb506cf6d7f884e3115e693b
SHA118f3fd4f3cb4dfbe4878662ab97e30a214708c00
SHA2560dff0a4f21cbdd40745c3cde9b5d7a5ae782e4b61ab0d185eab23733da40fe42
SHA512a5fe1ca632cd174b2c2b658a0d903a7a8f900610fa0cdd71831407d88e37416c3800c7d142f87610c98e7e7f5e69cb213bc68dec501d1e33c2ebe730d4fa235d
-
\Users\Admin\AppData\Local\Temp\GIRQUG~1.DLLMD5
c01e0a69cb506cf6d7f884e3115e693b
SHA118f3fd4f3cb4dfbe4878662ab97e30a214708c00
SHA2560dff0a4f21cbdd40745c3cde9b5d7a5ae782e4b61ab0d185eab23733da40fe42
SHA512a5fe1ca632cd174b2c2b658a0d903a7a8f900610fa0cdd71831407d88e37416c3800c7d142f87610c98e7e7f5e69cb213bc68dec501d1e33c2ebe730d4fa235d
-
\Users\Admin\AppData\Local\Temp\GIRQUG~1.DLLMD5
c01e0a69cb506cf6d7f884e3115e693b
SHA118f3fd4f3cb4dfbe4878662ab97e30a214708c00
SHA2560dff0a4f21cbdd40745c3cde9b5d7a5ae782e4b61ab0d185eab23733da40fe42
SHA512a5fe1ca632cd174b2c2b658a0d903a7a8f900610fa0cdd71831407d88e37416c3800c7d142f87610c98e7e7f5e69cb213bc68dec501d1e33c2ebe730d4fa235d
-
\Users\Admin\AppData\Local\Temp\GIRQUG~1.DLLMD5
c01e0a69cb506cf6d7f884e3115e693b
SHA118f3fd4f3cb4dfbe4878662ab97e30a214708c00
SHA2560dff0a4f21cbdd40745c3cde9b5d7a5ae782e4b61ab0d185eab23733da40fe42
SHA512a5fe1ca632cd174b2c2b658a0d903a7a8f900610fa0cdd71831407d88e37416c3800c7d142f87610c98e7e7f5e69cb213bc68dec501d1e33c2ebe730d4fa235d
-
\Users\Admin\AppData\Local\Temp\GIRQUG~1.DLLMD5
c01e0a69cb506cf6d7f884e3115e693b
SHA118f3fd4f3cb4dfbe4878662ab97e30a214708c00
SHA2560dff0a4f21cbdd40745c3cde9b5d7a5ae782e4b61ab0d185eab23733da40fe42
SHA512a5fe1ca632cd174b2c2b658a0d903a7a8f900610fa0cdd71831407d88e37416c3800c7d142f87610c98e7e7f5e69cb213bc68dec501d1e33c2ebe730d4fa235d
-
\Users\Admin\AppData\Local\Temp\nszA594.tmp\UAC.dllMD5
adb29e6b186daa765dc750128649b63d
SHA1160cbdc4cb0ac2c142d361df138c537aa7e708c9
SHA2562f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08
SHA512b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada
-
memory/672-121-0x0000000000000000-mapping.dmp
-
memory/688-212-0x0000000000000000-mapping.dmp
-
memory/708-149-0x0000000000000000-mapping.dmp
-
memory/896-119-0x0000000003090000-0x00000000030D5000-memory.dmpFilesize
276KB
-
memory/896-120-0x0000000000400000-0x0000000002F1D000-memory.dmpFilesize
43.1MB
-
memory/896-118-0x0000000002F20000-0x000000000306A000-memory.dmpFilesize
1.3MB
-
memory/904-209-0x0000000005CE0000-0x0000000005E20000-memory.dmpFilesize
1.2MB
-
memory/904-205-0x0000000005CE0000-0x0000000005E20000-memory.dmpFilesize
1.2MB
-
memory/904-208-0x0000000005CE0000-0x0000000005E20000-memory.dmpFilesize
1.2MB
-
memory/904-195-0x0000000004C31000-0x0000000005C15000-memory.dmpFilesize
15.9MB
-
memory/904-197-0x0000000000570000-0x0000000000571000-memory.dmpFilesize
4KB
-
memory/904-201-0x0000000005E50000-0x0000000005E51000-memory.dmpFilesize
4KB
-
memory/904-203-0x0000000005CE0000-0x0000000005E20000-memory.dmpFilesize
1.2MB
-
memory/904-207-0x0000000005E60000-0x0000000005E61000-memory.dmpFilesize
4KB
-
memory/904-206-0x0000000005CE0000-0x0000000005E20000-memory.dmpFilesize
1.2MB
-
memory/904-202-0x0000000005CE0000-0x0000000005E20000-memory.dmpFilesize
1.2MB
-
memory/904-189-0x0000000000000000-mapping.dmp
-
memory/1032-172-0x0000000000400000-0x0000000002FE8000-memory.dmpFilesize
43.9MB
-
memory/1032-161-0x0000000000000000-mapping.dmp
-
memory/1032-169-0x0000000004EE0000-0x0000000004FE7000-memory.dmpFilesize
1.0MB
-
memory/1032-167-0x0000000004DF0000-0x0000000004EE0000-memory.dmpFilesize
960KB
-
memory/1084-158-0x00007FF658D00000-0x00007FF659687000-memory.dmpFilesize
9.5MB
-
memory/1084-159-0x00007FF658D00000-0x00007FF659687000-memory.dmpFilesize
9.5MB
-
memory/1084-156-0x00007FF658D00000-0x00007FF659687000-memory.dmpFilesize
9.5MB
-
memory/1084-150-0x0000000000000000-mapping.dmp
-
memory/1124-164-0x0000000000000000-mapping.dmp
-
memory/1484-140-0x0000000000000000-mapping.dmp
-
memory/1484-145-0x00007FF62D390000-0x00007FF62DD17000-memory.dmpFilesize
9.5MB
-
memory/1484-143-0x00007FF62D390000-0x00007FF62DD17000-memory.dmpFilesize
9.5MB
-
memory/1484-144-0x00007FF62D390000-0x00007FF62DD17000-memory.dmpFilesize
9.5MB
-
memory/1524-222-0x0000000000000000-mapping.dmp
-
memory/1524-230-0x0000000004DD2000-0x0000000004DD3000-memory.dmpFilesize
4KB
-
memory/1524-243-0x00000000033C0000-0x00000000033C1000-memory.dmpFilesize
4KB
-
memory/1524-240-0x0000000007470000-0x0000000007471000-memory.dmpFilesize
4KB
-
memory/1524-224-0x00000000033C0000-0x00000000033C1000-memory.dmpFilesize
4KB
-
memory/1524-223-0x00000000033C0000-0x00000000033C1000-memory.dmpFilesize
4KB
-
memory/1524-273-0x0000000004DD3000-0x0000000004DD4000-memory.dmpFilesize
4KB
-
memory/1524-228-0x0000000004DD0000-0x0000000004DD1000-memory.dmpFilesize
4KB
-
memory/1652-125-0x0000000000000000-mapping.dmp
-
memory/1940-153-0x00000000011F0000-0x0000000001854000-memory.dmpFilesize
6.4MB
-
memory/1940-154-0x00000000011F0000-0x0000000001854000-memory.dmpFilesize
6.4MB
-
memory/1940-146-0x0000000000000000-mapping.dmp
-
memory/1940-155-0x00000000011F0000-0x0000000001854000-memory.dmpFilesize
6.4MB
-
memory/1940-160-0x0000000077D40000-0x0000000077ECE000-memory.dmpFilesize
1.6MB
-
memory/1940-157-0x00000000011F0000-0x0000000001854000-memory.dmpFilesize
6.4MB
-
memory/2080-177-0x0000000000F80000-0x0000000000F81000-memory.dmpFilesize
4KB
-
memory/2080-176-0x0000000004AA1000-0x0000000005A85000-memory.dmpFilesize
15.9MB
-
memory/2080-173-0x0000000000E10000-0x0000000000F74000-memory.dmpFilesize
1.4MB
-
memory/2080-166-0x0000000000000000-mapping.dmp
-
memory/2148-218-0x0000000000000000-mapping.dmp
-
memory/2228-183-0x0000000004731000-0x0000000005715000-memory.dmpFilesize
15.9MB
-
memory/2228-184-0x0000000000ED0000-0x0000000000ED1000-memory.dmpFilesize
4KB
-
memory/2228-178-0x0000000000000000-mapping.dmp
-
memory/2228-181-0x0000000000A20000-0x0000000000B84000-memory.dmpFilesize
1.4MB
-
memory/2244-174-0x0000000000000000-mapping.dmp
-
memory/2996-411-0x0000000006B02000-0x0000000006B03000-memory.dmpFilesize
4KB
-
memory/2996-409-0x0000000006B00000-0x0000000006B01000-memory.dmpFilesize
4KB
-
memory/2996-386-0x0000000000000000-mapping.dmp
-
memory/3804-249-0x000000007EF80000-0x000000007EF81000-memory.dmpFilesize
4KB
-
memory/3804-187-0x0000000004AA0000-0x0000000004AA1000-memory.dmpFilesize
4KB
-
memory/3804-220-0x0000000007D00000-0x0000000007D01000-memory.dmpFilesize
4KB
-
memory/3804-221-0x0000000007F10000-0x0000000007F11000-memory.dmpFilesize
4KB
-
memory/3804-194-0x0000000007022000-0x0000000007023000-memory.dmpFilesize
4KB
-
memory/3804-193-0x0000000007020000-0x0000000007021000-memory.dmpFilesize
4KB
-
memory/3804-190-0x0000000007660000-0x0000000007661000-memory.dmpFilesize
4KB
-
memory/3804-188-0x0000000006F20000-0x0000000006F21000-memory.dmpFilesize
4KB
-
memory/3804-186-0x0000000004AA0000-0x0000000004AA1000-memory.dmpFilesize
4KB
-
memory/3804-233-0x00000000086D0000-0x00000000086D1000-memory.dmpFilesize
4KB
-
memory/3804-237-0x0000000004AA0000-0x0000000004AA1000-memory.dmpFilesize
4KB
-
memory/3804-196-0x0000000007C90000-0x0000000007C91000-memory.dmpFilesize
4KB
-
memory/3804-185-0x0000000000000000-mapping.dmp
-
memory/3804-200-0x0000000007F90000-0x0000000007F91000-memory.dmpFilesize
4KB
-
memory/3804-199-0x0000000007EA0000-0x0000000007EA1000-memory.dmpFilesize
4KB
-
memory/3804-248-0x0000000009380000-0x00000000093B3000-memory.dmpFilesize
204KB
-
memory/3804-270-0x0000000007023000-0x0000000007024000-memory.dmpFilesize
4KB
-
memory/3804-198-0x0000000007D30000-0x0000000007D31000-memory.dmpFilesize
4KB
-
memory/3856-217-0x00000000001C0000-0x0000000000360000-memory.dmpFilesize
1.6MB
-
memory/3856-210-0x00007FF76A2A5FD0-mapping.dmp
-
memory/3856-214-0x00000242FE340000-0x00000242FE342000-memory.dmpFilesize
8KB
-
memory/3856-213-0x00000242FE340000-0x00000242FE342000-memory.dmpFilesize
8KB
-
memory/3856-219-0x00000242FE560000-0x00000242FE712000-memory.dmpFilesize
1.7MB