Analysis

  • max time kernel
    145s
  • max time network
    156s
  • platform
    windows10_x64
  • resource
    win10-de-20210920
  • submitted
    21-10-2021 12:47

General

  • Target

    Software-update-patc_579570356.exe

  • Size

    4.7MB

  • MD5

    c027026e244f74549a49e1f98216719c

  • SHA1

    9e9b4459e9225a432eef8f97b9193707dd7247b5

  • SHA256

    bd20ddd34d178d08736818991be6d5d8e4d62d81180d1d293ffafb1418bf2781

  • SHA512

    68953341f9dc46daae4e738bd4418bca5edb22035958ddba46de86cf6e44c8731f49f52763f3addc6e4d5a6cfcb48ee5b1345a2727ba7983b07a9322ae2713d7

Malware Config

Extracted

Family

vidar

Version

41.5

Botnet

223

C2

https://mas.to/@xeroxxx

Attributes
  • profile_id

    223

Extracted

Family

redline

Botnet

lllolly666123

C2

87.251.71.82:80

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 2 IoCs
  • Registers COM server for autorun 1 TTPs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)

    suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)

  • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

    suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

  • suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload

    suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload

  • ACProtect 1.3x - 1.4x DLL software 2 IoCs

    Detects file using ACProtect software.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Vidar Stealer 1 IoCs
  • Blocklisted process makes network request 16 IoCs
  • Downloads MZ/PE file
  • Drops file in Drivers directory 3 IoCs
  • Executes dropped EXE 27 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 63 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses 2FA software files, possible credential harvesting 2 TTPs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Drops file in System32 directory 17 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • autoit_exe 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 28 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 22 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 54 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Software-update-patc_579570356.exe
    "C:\Users\Admin\AppData\Local\Temp\Software-update-patc_579570356.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1016
    • C:\Users\Admin\AppData\Local\Temp\is-9IDKL.tmp\Software-update-patc_579570356.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-9IDKL.tmp\Software-update-patc_579570356.tmp" /SL5="$30056,4499537,466944,C:\Users\Admin\AppData\Local\Temp\Software-update-patc_579570356.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:3180
      • C:\Program Files (x86)\Autem\rerum\Voluptatem.exe
        "C:\Program Files (x86)\Autem/\rerum\Voluptatem.exe" b0ad3d01dc1c01fd7e87a06144c12f59
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1236
        • C:\Users\Admin\AppData\Local\Temp\8ANBeA0Y\ngJ4KYIqXAm.exe
          C:\Users\Admin\AppData\Local\Temp\8ANBeA0Y\ngJ4KYIqXAm.exe /usthree SUB=b0ad3d01dc1c01fd7e87a06144c12f59
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:1352
          • C:\Users\Admin\AppData\Local\Temp\8ANBeA0Y\ngJ4KYIqXAm.exe
            C:\Users\Admin\AppData\Local\Temp\8ANBeA0Y\ngJ4KYIqXAm.exe /usthree SUB=b0ad3d01dc1c01fd7e87a06144c12f59
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:364
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /c taskkill /im "ngJ4KYIqXAm.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\8ANBeA0Y\ngJ4KYIqXAm.exe" & exit
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:772
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /im "ngJ4KYIqXAm.exe" /f
                7⤵
                • Kills process with taskkill
                PID:2108
        • C:\Users\Admin\AppData\Local\Temp\bX0OvowK\NGwzB2r9aN5.exe
          C:\Users\Admin\AppData\Local\Temp\bX0OvowK\NGwzB2r9aN5.exe /VERYSILENT
          4⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Modifies system certificate store
          • Suspicious use of WriteProcessMemory
          PID:3740
          • C:\Users\Admin\AppData\Local\Temp\Zembra.exe
            C:\Users\Admin\AppData\Local\Temp\Zembra.exe
            5⤵
            • Executes dropped EXE
            • Checks BIOS information in registry
            • Identifies Wine through registry keys
            • Loads dropped DLL
            • Checks whether UAC is enabled
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Checks processor information in registry
            • Suspicious behavior: EnumeratesProcesses
            PID:2676
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /c taskkill /im Zembra.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\Zembra.exe" & del C:\ProgramData\*.dll & exit
              6⤵
                PID:4312
                • C:\Windows\SysWOW64\taskkill.exe
                  taskkill /im Zembra.exe /f
                  7⤵
                  • Kills process with taskkill
                  PID:4204
                • C:\Windows\SysWOW64\timeout.exe
                  timeout /t 6
                  7⤵
                  • Delays execution with timeout.exe
                  PID:2224
            • C:\Users\Admin\AppData\Local\Temp\ZembraBro.exe
              C:\Users\Admin\AppData\Local\Temp\ZembraBro.exe
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious behavior: EnumeratesProcesses
              PID:4596
              • C:\Users\Admin\AppData\Local\Temp\ZembraBro.exe
                "C:\Users\Admin\AppData\Local\Temp\ZembraBro.exe"
                6⤵
                • Executes dropped EXE
                PID:4892
              • C:\Users\Admin\AppData\Local\Temp\ZembraBro.exe
                "C:\Users\Admin\AppData\Local\Temp\ZembraBro.exe"
                6⤵
                • Executes dropped EXE
                PID:4900
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /k ping 0 & del C:\Users\Admin\AppData\Local\Temp\bX0OvowK\NGwzB2r9aN5.exe & exit
              5⤵
                PID:4272
                • C:\Windows\SysWOW64\PING.EXE
                  ping 0
                  6⤵
                  • Runs ping.exe
                  PID:3792
            • C:\Users\Admin\AppData\Local\Temp\DzEW2X23\vpn.exe
              C:\Users\Admin\AppData\Local\Temp\DzEW2X23\vpn.exe /silent /subid=510xb0ad3d01dc1c01fd7e87a06144c12f59
              4⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:512
              • C:\Users\Admin\AppData\Local\Temp\is-RT934.tmp\vpn.tmp
                "C:\Users\Admin\AppData\Local\Temp\is-RT934.tmp\vpn.tmp" /SL5="$B007A,15170975,270336,C:\Users\Admin\AppData\Local\Temp\DzEW2X23\vpn.exe" /silent /subid=510xb0ad3d01dc1c01fd7e87a06144c12f59
                5⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in Program Files directory
                • Modifies registry class
                • Modifies system certificate store
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of WriteProcessMemory
                PID:2840
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\uninstall.bat" "
                  6⤵
                  • Suspicious use of WriteProcessMemory
                  PID:4200
                  • C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exe
                    tapinstall.exe remove tap0901
                    7⤵
                    • Executes dropped EXE
                    • Checks SCSI registry key(s)
                    PID:4288
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\install.bat" "
                  6⤵
                  • Suspicious use of WriteProcessMemory
                  PID:4340
                  • C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exe
                    tapinstall.exe install OemVista.inf tap0901
                    7⤵
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    • Drops file in Windows directory
                    • Checks SCSI registry key(s)
                    • Modifies system certificate store
                    PID:4416
                • C:\Program Files (x86)\MaskVPN\mask_svc.exe
                  "C:\Program Files (x86)\MaskVPN\mask_svc.exe" uninstall
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4848
                • C:\Program Files (x86)\MaskVPN\mask_svc.exe
                  "C:\Program Files (x86)\MaskVPN\mask_svc.exe" install
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • Suspicious behavior: EnumeratesProcesses
                  PID:5096
            • C:\Users\Admin\AppData\Local\Temp\bd5Wf0Eo\2GOf1N6oz4c.exe
              C:\Users\Admin\AppData\Local\Temp\bd5Wf0Eo\2GOf1N6oz4c.exe /quiet SILENT=1 AF=606xb0ad3d01dc1c01fd7e87a06144c12f59
              4⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Enumerates connected drives
              • Modifies system certificate store
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of WriteProcessMemory
              PID:1448
              • C:\Windows\SysWOW64\msiexec.exe
                "C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Weather\Weather 1.0.0\install\FD7DF1F\Weather Installation.msi" /quiet SILENT=1 AF=606xb0ad3d01dc1c01fd7e87a06144c12f59 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\bd5Wf0Eo\2GOf1N6oz4c.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\bd5Wf0Eo\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1634561072 /quiet SILENT=1 AF=606xb0ad3d01dc1c01fd7e87a06144c12f59 " AF="606xb0ad3d01dc1c01fd7e87a06144c12f59" AI_EXTEND_GLASS="26"
                5⤵
                  PID:2808
        • C:\Windows\system32\OpenWith.exe
          C:\Windows\system32\OpenWith.exe -Embedding
          1⤵
          • Suspicious use of SetWindowsHookEx
          PID:3296
        • C:\Windows\System32\rundll32.exe
          C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
          1⤵
            PID:1196
          • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.196.0921.0007\FileSyncConfig.exe
            "C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.196.0921.0007\FileSyncConfig.exe"
            1⤵
            • Modifies registry class
            PID:1948
          • C:\Windows\system32\msiexec.exe
            C:\Windows\system32\msiexec.exe /V
            1⤵
            • Enumerates connected drives
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1932
            • C:\Windows\syswow64\MsiExec.exe
              C:\Windows\syswow64\MsiExec.exe -Embedding 43C01B92443B7D7BC08E5C47E693C8ED C
              2⤵
              • Loads dropped DLL
              PID:2972
            • C:\Windows\syswow64\MsiExec.exe
              C:\Windows\syswow64\MsiExec.exe -Embedding 52408769B148704DEED9884831BBB40A
              2⤵
              • Blocklisted process makes network request
              • Loads dropped DLL
              PID:2844
            • C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\aipackagechainer.exe
              "C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\aipackagechainer.exe"
              2⤵
              • Executes dropped EXE
              • Adds Run key to start application
              PID:4396
              • C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\RequiredApplication_1\Weather_Installation.exe
                "C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\RequiredApplication_1\Weather_Installation.exe" -silent=1 -AF=606xb0ad3d01dc1c01fd7e87a06144c12f59 -BF=default -uncf=default
                3⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Adds Run key to start application
                PID:4928
                • C:\Users\Admin\AppData\Roaming\Weather\Weather.exe
                  "C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" "--U4miRxC"
                  4⤵
                  • Executes dropped EXE
                  • Checks computer location settings
                  • Loads dropped DLL
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4100
                  • C:\Users\Admin\AppData\Roaming\Weather\Weather.exe
                    C:\Users\Admin\AppData\Roaming\Weather\Weather.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Weather\User Data" /prefetch:7 --monitor-self --monitor-self-argument=--type=crashpad-handler "--monitor-self-argument=--user-data-dir=C:\Users\Admin\AppData\Local\Weather\User Data" --monitor-self-argument=/prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Weather\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Weather\User Data" --annotation=plat=Win64 --annotation=prod=Weather --annotation=ver=0.0.2 --initial-client-data=0x1cc,0x1c8,0x1c4,0x1f0,0x1c0,0x7ffef3459ec0,0x7ffef3459ed0,0x7ffef3459ee0
                    5⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    PID:4724
                    • C:\Users\Admin\AppData\Roaming\Weather\Weather.exe
                      C:\Users\Admin\AppData\Roaming\Weather\Weather.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Weather\User Data" /prefetch:7 --no-periodic-tasks --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Weather\User Data\Crashpad" --annotation=plat=Win64 --annotation=prod=Weather --annotation=ver=0.0.2 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ff6ef094e60,0x7ff6ef094e70,0x7ff6ef094e80
                      6⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      PID:2304
                  • C:\Users\Admin\AppData\Roaming\Weather\Weather.exe
                    "C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=gpu-process --field-trial-handle=1720,15290926196276264631,1339195391040954178,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw4100_1304158960" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1708 /prefetch:2
                    5⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious behavior: EnumeratesProcesses
                    PID:4340
                  • C:\Users\Admin\AppData\Roaming\Weather\Weather.exe
                    "C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1720,15290926196276264631,1339195391040954178,131072 --lang=de --service-sandbox-type=network --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw4100_1304158960" --mojo-platform-channel-handle=1768 /prefetch:8
                    5⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious behavior: EnumeratesProcesses
                    PID:1436
                  • C:\Users\Admin\AppData\Roaming\Weather\Weather.exe
                    "C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1720,15290926196276264631,1339195391040954178,131072 --lang=de --service-sandbox-type=none --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw4100_1304158960" --mojo-platform-channel-handle=2124 /prefetch:8
                    5⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious behavior: EnumeratesProcesses
                    PID:5088
                  • C:\Users\Admin\AppData\Roaming\Weather\Weather.exe
                    "C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Weather\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1720,15290926196276264631,1339195391040954178,131072 --lang=de --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw4100_1304158960" --nwjs --extension-process --enable-auto-reload --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --mojo-platform-channel-handle=2568 /prefetch:1
                    5⤵
                    • Executes dropped EXE
                    • Checks computer location settings
                    • Loads dropped DLL
                    • Suspicious behavior: EnumeratesProcesses
                    PID:4844
                  • C:\Users\Admin\AppData\Roaming\Weather\Weather.exe
                    "C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=gpu-process --field-trial-handle=1720,15290926196276264631,1339195391040954178,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw4100_1304158960" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=1876 /prefetch:2
                    5⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious behavior: EnumeratesProcesses
                    PID:3224
                  • C:\Users\Admin\AppData\Roaming\Weather\Weather.exe
                    "C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1720,15290926196276264631,1339195391040954178,131072 --lang=de --service-sandbox-type=none --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw4100_1304158960" --mojo-platform-channel-handle=3040 /prefetch:8
                    5⤵
                      PID:1452
                    • C:\Users\Admin\AppData\Roaming\Weather\Weather.exe
                      "C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1720,15290926196276264631,1339195391040954178,131072 --lang=de --service-sandbox-type=none --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw4100_1304158960" --mojo-platform-channel-handle=3288 /prefetch:8
                      5⤵
                        PID:5240
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -NonInteractive -NoLogo -ExecutionPolicy AllSigned -Command "C:\Users\Admin\AppData\Local\Temp\AI_A54F.ps1 -paths 'C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\file_deleter.ps1','C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\aipackagechainer.exe','C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites' -retry_count 10"
                    3⤵
                    • Blocklisted process makes network request
                    • Suspicious behavior: EnumeratesProcesses
                    PID:4204
              • \??\c:\windows\system32\svchost.exe
                c:\windows\system32\svchost.exe -k dcomlaunch -s DeviceInstall
                1⤵
                • Drops file in Windows directory
                • Checks SCSI registry key(s)
                • Suspicious use of WriteProcessMemory
                PID:4516
                • C:\Windows\system32\DrvInst.exe
                  DrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{78791155-f4c0-7949-9db8-422019ffc35a}\oemvista.inf" "9" "4d14a44ff" "0000000000000174" "WinSta0\Default" "0000000000000178" "208" "c:\program files (x86)\maskvpn\driver\win764"
                  2⤵
                  • Drops file in System32 directory
                  • Drops file in Windows directory
                  • Checks SCSI registry key(s)
                  • Modifies data under HKEY_USERS
                  PID:4548
                • C:\Windows\system32\DrvInst.exe
                  DrvInst.exe "2" "211" "ROOT\NET\0000" "C:\Windows\INF\oem2.inf" "oemvista.inf:3beb73aff103cc24:tap0901.ndi:9.0.0.21:tap0901," "4d14a44ff" "0000000000000174"
                  2⤵
                  • Drops file in Drivers directory
                  • Drops file in System32 directory
                  • Drops file in Windows directory
                  • Checks SCSI registry key(s)
                  PID:4652
              • \??\c:\windows\system32\svchost.exe
                c:\windows\system32\svchost.exe -k netsvcs -s NetSetupSvc
                1⤵
                  PID:4700
                • \??\c:\windows\system32\svchost.exe
                  c:\windows\system32\svchost.exe -k netsvcs -s DsmSvc
                  1⤵
                  • Checks SCSI registry key(s)
                  PID:4692
                • C:\Program Files (x86)\MaskVPN\mask_svc.exe
                  "C:\Program Files (x86)\MaskVPN\mask_svc.exe"
                  1⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • Modifies data under HKEY_USERS
                  • Suspicious behavior: EnumeratesProcesses
                  PID:2108
                • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
                  "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
                  1⤵
                  • Drops file in Windows directory
                  • Modifies Internet Explorer settings
                  • Modifies registry class
                  • Suspicious use of SetWindowsHookEx
                  PID:2756
                • C:\Windows\system32\browser_broker.exe
                  C:\Windows\system32\browser_broker.exe -Embedding
                  1⤵
                  • Modifies Internet Explorer settings
                  PID:1864
                • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                  "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                  1⤵
                  • Modifies registry class
                  • Suspicious behavior: MapViewOfSection
                  • Suspicious use of SetWindowsHookEx
                  PID:4120
                • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                  "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                  1⤵
                  • Drops file in Windows directory
                  • Modifies Internet Explorer settings
                  • Modifies registry class
                  PID:1108
                • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                  "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                  1⤵
                  • Modifies registry class
                  PID:4704

                Network

                MITRE ATT&CK Matrix ATT&CK v6

                Persistence

                Registry Run Keys / Startup Folder

                2
                T1060

                Defense Evasion

                Virtualization/Sandbox Evasion

                2
                T1497

                Modify Registry

                3
                T1112

                Install Root Certificate

                1
                T1130

                Credential Access

                Credentials in Files

                3
                T1081

                Discovery

                Query Registry

                8
                T1012

                Virtualization/Sandbox Evasion

                2
                T1497

                System Information Discovery

                7
                T1082

                Peripheral Device Discovery

                2
                T1120

                Remote System Discovery

                1
                T1018

                Collection

                Data from Local System

                3
                T1005

                Command and Control

                Web Service

                1
                T1102

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Program Files (x86)\Autem\rerum\Voluptatem.exe
                  MD5

                  0c56ac590273d1feb7c0564c809915a5

                  SHA1

                  2a17747673000c17634113e634e4166152a88688

                  SHA256

                  850f46f685e44dcbafd8a61fa5881b0f4471cf3441342b3fe8c0a2559ec4c15e

                  SHA512

                  95a86884d2950687064ddb348184133e26c56c617297ee992daefa05ff7f1cf8e544208048462ac173d66ed5eb291fd6d860d324721a1441d76a11a62df8ebc4

                • C:\Program Files (x86)\MaskVPN\driver\win764\OemVista.inf
                  MD5

                  87868193626dc756d10885f46d76f42e

                  SHA1

                  94a5ce8ed7633ed77531b6cb14ceb1927c5cae1f

                  SHA256

                  b5728e42ea12c67577cb9188b472005ee74399b6ac976e7f72b48409baee3b41

                  SHA512

                  79751330bed5c16d66baf3e5212be0950f312ffd5b80b78be66eaea3cc7115f8a9472d2a43b5ce702aa044f3b45fd572775ff86572150df91cc27866f88f8277

                • C:\Program Files (x86)\MaskVPN\driver\win764\install.bat
                  MD5

                  3a05ce392d84463b43858e26c48f9cbf

                  SHA1

                  78f624e2c81c3d745a45477d61749b8452c129f1

                  SHA256

                  5b56d8b121fc9a7f2d4e90edb1b29373cd2d06bac1c54ada8f6cb559b411180b

                  SHA512

                  8a31fda09f0fa7779c4fb0c0629d4d446957c8aaae0595759dd2b434e84a17ecb6ffe4beff973a245caf0452a0c04a488d2ae7b232d8559f3bd1bfd68fed7cf1

                • C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exe
                  MD5

                  d10f74d86cd350732657f542df533f82

                  SHA1

                  c54074f8f162a780819175e7169c43f6706ad46c

                  SHA256

                  c9963a3f8abf6fedc8f983a9655a387d67c752bd59b0d16fd6fc2396b4b4ca67

                  SHA512

                  0d7cb060e4a9482d4862ff47c9d6f52a060c4fb4e3b8388769fa2974ccf081af6bea7b1d4325c03d128bc4de6e0525d6e9bf3a42564391f2acd980435a0dd87e

                • C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exe
                  MD5

                  d10f74d86cd350732657f542df533f82

                  SHA1

                  c54074f8f162a780819175e7169c43f6706ad46c

                  SHA256

                  c9963a3f8abf6fedc8f983a9655a387d67c752bd59b0d16fd6fc2396b4b4ca67

                  SHA512

                  0d7cb060e4a9482d4862ff47c9d6f52a060c4fb4e3b8388769fa2974ccf081af6bea7b1d4325c03d128bc4de6e0525d6e9bf3a42564391f2acd980435a0dd87e

                • C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exe
                  MD5

                  d10f74d86cd350732657f542df533f82

                  SHA1

                  c54074f8f162a780819175e7169c43f6706ad46c

                  SHA256

                  c9963a3f8abf6fedc8f983a9655a387d67c752bd59b0d16fd6fc2396b4b4ca67

                  SHA512

                  0d7cb060e4a9482d4862ff47c9d6f52a060c4fb4e3b8388769fa2974ccf081af6bea7b1d4325c03d128bc4de6e0525d6e9bf3a42564391f2acd980435a0dd87e

                • C:\Program Files (x86)\MaskVPN\driver\win764\uninstall.bat
                  MD5

                  9133a44bfd841b8849bddead9957c2c3

                  SHA1

                  3c1d92aa3f6247a2e7ceeaf0b811cf584ae87591

                  SHA256

                  b8109f63a788470925ea267f1b6032bba281b1ac3afdf0c56412cb753df58392

                  SHA512

                  d7f5f99325b9c77939735df3a61097a24613f85e7acc2d84875f78f60b0b70e3504f34d9fff222c593e1daadd9db71080a23b588fe7009ce93b5a4cbe9785545

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\5080DC7A65DB6A5960ECD874088F3328_79CFD3DF2894C4BFDA2ADFD6675FA18B
                  MD5

                  20cbe3994454ddebfecd6f0f02fbd74f

                  SHA1

                  4a1a3098f26d8a2612f3a36f61b90851cc146448

                  SHA256

                  48832b7fcfce38ff31655d4aaac5053db153aaf714a7b630b24edbb5bdf2b99a

                  SHA512

                  01a8cf39d64bb4fd101a9075e93a3039c7ca8209f6fc49739f0b87d0e9a64b0daadb8debcffb9b0d167eb6248c8beba28256952f9c4fe40f903036fc51235304

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7D11549FC90445E1CE90F96A21958A17_FB353789C9BBDA933068CD2920BDF3B7
                  MD5

                  f27e89b296e1caf0d902861319b5dcc2

                  SHA1

                  8cd0e261906d8657c7e4f409f7ff113fad1741ed

                  SHA256

                  d12b8cdeb612f96802f3e9f8767d3e21686ff3d311fafee1f70cce45e374aa74

                  SHA512

                  526276c2c2a49f3cc4f8e15a8eb7a893c8a4c9a76851e31e4d584d14c9e12870b2f0f92a4a5cdc0399ea2c7e8d6ec677a3b044ffc532158a0dcd56d6446b5bda

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_2DBE917624E9880FE0C7C5570D56E691
                  MD5

                  41c0b6c83b5de34e8c323db13ead1ff3

                  SHA1

                  993272ed8a03fdb454f5c5395756694638fb0ef1

                  SHA256

                  94552520fdafb3919531e9473d007149d33ec1530521548d1df1f785d952a085

                  SHA512

                  40111f7536fba8cee240377e967ee1b368f818635ff6267866b29d02e7d0bd3ff47dcdafaf2c9e5f102a0ecc1bf4c575b5a93d0caf4ece3c799ed7ac21b2da52

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\5080DC7A65DB6A5960ECD874088F3328_79CFD3DF2894C4BFDA2ADFD6675FA18B
                  MD5

                  36a7ef0c8c75d7560d8509c3fda19fce

                  SHA1

                  811676c522122fd9c0df344743e827ab6718ee92

                  SHA256

                  f9042723cce92ef28423bf0decd1b3a242a4192bc60f5f38e021660bbc56cf04

                  SHA512

                  9bc02d3bdc84e634f94a555bf630d2a6e153df63e1984ca45ab793425211ebb8f51bf8e887b810f89cdc1e6f82dd7d50c2b2381c81ec9c6e160fc8e2df2c5eeb

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7D11549FC90445E1CE90F96A21958A17_FB353789C9BBDA933068CD2920BDF3B7
                  MD5

                  12e8fccc7bb9c901cd1c055a58aca476

                  SHA1

                  828f5b96e2ec2e838339ccc1f6fcfa9a13139485

                  SHA256

                  1e727a94966e8bb72456bf3aabafbcd9300f28587974a74351ed181ce361db43

                  SHA512

                  437a02ecea67055eca3fecef586ca77487fdf2fb3d95d52c15d6326e0960e3fda9a7e104bdacaf142ed7f4c3be037503c90b023bcee0252fd0316844d93b52e3

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_2DBE917624E9880FE0C7C5570D56E691
                  MD5

                  aa7bcd7819ca3caa7a024ed768a97f03

                  SHA1

                  ea7ebcd4b36b50286ba4b0544b731025dc17ca36

                  SHA256

                  34d51074e1fd8207d45e9f9f650e27c9a247ff042fd55d0a91f835aa9bbc06d3

                  SHA512

                  3ff248faa8a28fc0f2d13fab8f1e59d7ed0b9a13cca8935c79a856166088182a11a09e0997384212e50e2e270da1151beeca52745f10a2f41e1e2de30bb01653

                • C:\Users\Admin\AppData\Local\Temp\8ANBeA0Y\ngJ4KYIqXAm.exe
                  MD5

                  5a6718a7802387e91aa23cb9719b6a5a

                  SHA1

                  256c557989f7c713f9d703ea7d9e15060666b457

                  SHA256

                  78404403db083baea41b1286d701431e7e1650de97a2516de7783c6308325e3b

                  SHA512

                  f970bb5b5ae4a5c937d8bc272eefd74fa1afde8f1009431c187eaae4e56a9685a1d204a8aa63245f99ae957485dfe0a07e809bce4adbc29e8a80a70bc649e00d

                • C:\Users\Admin\AppData\Local\Temp\8ANBeA0Y\ngJ4KYIqXAm.exe
                  MD5

                  5a6718a7802387e91aa23cb9719b6a5a

                  SHA1

                  256c557989f7c713f9d703ea7d9e15060666b457

                  SHA256

                  78404403db083baea41b1286d701431e7e1650de97a2516de7783c6308325e3b

                  SHA512

                  f970bb5b5ae4a5c937d8bc272eefd74fa1afde8f1009431c187eaae4e56a9685a1d204a8aa63245f99ae957485dfe0a07e809bce4adbc29e8a80a70bc649e00d

                • C:\Users\Admin\AppData\Local\Temp\8ANBeA0Y\ngJ4KYIqXAm.exe
                  MD5

                  5a6718a7802387e91aa23cb9719b6a5a

                  SHA1

                  256c557989f7c713f9d703ea7d9e15060666b457

                  SHA256

                  78404403db083baea41b1286d701431e7e1650de97a2516de7783c6308325e3b

                  SHA512

                  f970bb5b5ae4a5c937d8bc272eefd74fa1afde8f1009431c187eaae4e56a9685a1d204a8aa63245f99ae957485dfe0a07e809bce4adbc29e8a80a70bc649e00d

                • C:\Users\Admin\AppData\Local\Temp\DzEW2X23\vpn.exe
                  MD5

                  0807ecaf85e796a906f78fb111d32f5b

                  SHA1

                  b5addda84301438f75ebfced0ebd679350c21d74

                  SHA256

                  8312b6f6d8a90f22a929f119c948aae726b7d995978b12d316a0b8a131fae082

                  SHA512

                  afb5e89937744c366b2de06417cd6407c11a9b23b7e55c6e24c7b152846ae0436f7971b02bff0d55b8d6a0c97a42d2f7a4f61b4be81010734c2dc8f946871173

                • C:\Users\Admin\AppData\Local\Temp\DzEW2X23\vpn.exe
                  MD5

                  0807ecaf85e796a906f78fb111d32f5b

                  SHA1

                  b5addda84301438f75ebfced0ebd679350c21d74

                  SHA256

                  8312b6f6d8a90f22a929f119c948aae726b7d995978b12d316a0b8a131fae082

                  SHA512

                  afb5e89937744c366b2de06417cd6407c11a9b23b7e55c6e24c7b152846ae0436f7971b02bff0d55b8d6a0c97a42d2f7a4f61b4be81010734c2dc8f946871173

                • C:\Users\Admin\AppData\Local\Temp\MSIC967.tmp
                  MD5

                  07ce413b1af6342187514871dc112c74

                  SHA1

                  8008f8bfeae99918b6323a3d1270dea63b3a8394

                  SHA256

                  0ba7e90fe2a0005e1e0dad53e2678916650c3b95ff9b666b802d128276c8ec46

                  SHA512

                  27df52bfcbc2d0ce3756a2526e632b5610d7047259b31aeeff12652de3e046bcd239e39c222a323654f475f1f913679b4fdd858303e0e105f7a300b6f6ed0fe5

                • C:\Users\Admin\AppData\Local\Temp\MSICDDD.tmp
                  MD5

                  e6a708c70a8cfd78b7c0383615545158

                  SHA1

                  b9274d9bf4750f557d34ddfd802113f5dd1df91c

                  SHA256

                  e124c00f974e0c09200676e7ce2147c3822b4cd4764dcc970e832bd93d869d0c

                  SHA512

                  2d0162f268f357a29c8bc35f855678e8e47e8a70825130e73e40a7dca1e9a3d8844b66616bfaa156b16fa4162bcf6991f659b3a6e8ee3caf841c87ec16189ff8

                • C:\Users\Admin\AppData\Local\Temp\Zembra.exe
                  MD5

                  0dcce39047700778b4e36188b6eea28e

                  SHA1

                  1b323820dfd9da3d1da039c79a8514e69fb31698

                  SHA256

                  f477238d3021193a2ba26c4be732dfe949976f7d02a55662dcc21a46f6d87845

                  SHA512

                  e971094ee925baf465f0e29a481c11fb176aed9e6605e8b25f0003f033ac1d124490e94a7e343ab1fd1a0601aec446d47592c22608297a2d5e7df8a1a13b788c

                • C:\Users\Admin\AppData\Local\Temp\Zembra.exe
                  MD5

                  0dcce39047700778b4e36188b6eea28e

                  SHA1

                  1b323820dfd9da3d1da039c79a8514e69fb31698

                  SHA256

                  f477238d3021193a2ba26c4be732dfe949976f7d02a55662dcc21a46f6d87845

                  SHA512

                  e971094ee925baf465f0e29a481c11fb176aed9e6605e8b25f0003f033ac1d124490e94a7e343ab1fd1a0601aec446d47592c22608297a2d5e7df8a1a13b788c

                • C:\Users\Admin\AppData\Local\Temp\bX0OvowK\NGwzB2r9aN5.exe
                  MD5

                  9d06a0509951399f7ccc94a8952f041d

                  SHA1

                  933f524ca176564706f8062bfbc631e321a4bbe4

                  SHA256

                  8e1501f1418f652681acdecf629ac0c27a1fb87ddb939a5fa5dba53a7635b7f6

                  SHA512

                  64d919b896c9e79012a778709bf5563f1cb0a6ecfbbaa11030b8cc68ac46404e5c2cd4cbeec5c6170f49fcd5acb60d5d323700b4376a5c0357e4a826c79d2787

                • C:\Users\Admin\AppData\Local\Temp\bX0OvowK\NGwzB2r9aN5.exe
                  MD5

                  9d06a0509951399f7ccc94a8952f041d

                  SHA1

                  933f524ca176564706f8062bfbc631e321a4bbe4

                  SHA256

                  8e1501f1418f652681acdecf629ac0c27a1fb87ddb939a5fa5dba53a7635b7f6

                  SHA512

                  64d919b896c9e79012a778709bf5563f1cb0a6ecfbbaa11030b8cc68ac46404e5c2cd4cbeec5c6170f49fcd5acb60d5d323700b4376a5c0357e4a826c79d2787

                • C:\Users\Admin\AppData\Local\Temp\bd5Wf0Eo\2GOf1N6oz4c.exe
                  MD5

                  8a8dd210f5f5b843ae36ea2fc867544b

                  SHA1

                  d41dbcd2607bdab024c39fa40dae27f902ac617c

                  SHA256

                  e8e91432351015834414e2fa69062a385ed6eb17b75d2ab7b1eb6235a846daa2

                  SHA512

                  1b62fe1615a3b30e90afc979776aa871f369a392f53e24d06144df983ed300bff6711d5270d3f66c153b644e1f6cfed79d798cfef012f43b0031cb98240849c8

                • C:\Users\Admin\AppData\Local\Temp\bd5Wf0Eo\2GOf1N6oz4c.exe
                  MD5

                  8a8dd210f5f5b843ae36ea2fc867544b

                  SHA1

                  d41dbcd2607bdab024c39fa40dae27f902ac617c

                  SHA256

                  e8e91432351015834414e2fa69062a385ed6eb17b75d2ab7b1eb6235a846daa2

                  SHA512

                  1b62fe1615a3b30e90afc979776aa871f369a392f53e24d06144df983ed300bff6711d5270d3f66c153b644e1f6cfed79d798cfef012f43b0031cb98240849c8

                • C:\Users\Admin\AppData\Local\Temp\is-9IDKL.tmp\Software-update-patc_579570356.tmp
                  MD5

                  4caf2ca22417bb2cd44c0d0daf5fdd8b

                  SHA1

                  bdb2b86d9c033785c9b1db5618986030b2852ffd

                  SHA256

                  a1c11ed2d5bb2399e27a35e04114a5e244e4ae251c905160ffa1fefe1530d7b4

                  SHA512

                  ff99d66ae326d6f63243e7e732bf69417ca4732686095cffb59f80d53b4bb44a9ea74900f04d64f3bfa047ec1e962ed81ce78d9ebbe009ddd58097e7ce3913da

                • C:\Users\Admin\AppData\Local\Temp\is-9IDKL.tmp\Software-update-patc_579570356.tmp
                  MD5

                  4caf2ca22417bb2cd44c0d0daf5fdd8b

                  SHA1

                  bdb2b86d9c033785c9b1db5618986030b2852ffd

                  SHA256

                  a1c11ed2d5bb2399e27a35e04114a5e244e4ae251c905160ffa1fefe1530d7b4

                  SHA512

                  ff99d66ae326d6f63243e7e732bf69417ca4732686095cffb59f80d53b4bb44a9ea74900f04d64f3bfa047ec1e962ed81ce78d9ebbe009ddd58097e7ce3913da

                • C:\Users\Admin\AppData\Local\Temp\is-RT934.tmp\vpn.tmp
                  MD5

                  fc5b1316942d73298689c0f20af3884e

                  SHA1

                  23eff41dcf3c984c40bc5bd32f5c04409eb56b8e

                  SHA256

                  09e29eab6e2546295d26147cdf1b39e5d9beab723b431fb8a7a1ff8632731fba

                  SHA512

                  33d839cd3d2e286ccfcc1efa3b06b3ad1d9a641fdd6685fd4998a80067ec314c985791703e97c9669d0ead868bbf090e39c8dfa5fdce407fb4e7ea6a93221ac6

                • C:\Users\Admin\AppData\Local\Temp\is-RT934.tmp\vpn.tmp
                  MD5

                  fc5b1316942d73298689c0f20af3884e

                  SHA1

                  23eff41dcf3c984c40bc5bd32f5c04409eb56b8e

                  SHA256

                  09e29eab6e2546295d26147cdf1b39e5d9beab723b431fb8a7a1ff8632731fba

                  SHA512

                  33d839cd3d2e286ccfcc1efa3b06b3ad1d9a641fdd6685fd4998a80067ec314c985791703e97c9669d0ead868bbf090e39c8dfa5fdce407fb4e7ea6a93221ac6

                • C:\Users\Admin\AppData\Local\Temp\{78791155-f4c0-7949-9db8-422019ffc35a}\oemvista.inf
                  MD5

                  87868193626dc756d10885f46d76f42e

                  SHA1

                  94a5ce8ed7633ed77531b6cb14ceb1927c5cae1f

                  SHA256

                  b5728e42ea12c67577cb9188b472005ee74399b6ac976e7f72b48409baee3b41

                  SHA512

                  79751330bed5c16d66baf3e5212be0950f312ffd5b80b78be66eaea3cc7115f8a9472d2a43b5ce702aa044f3b45fd572775ff86572150df91cc27866f88f8277

                • C:\Users\Admin\AppData\Local\Temp\{78791~1\tap0901.cat
                  MD5

                  c757503bc0c5a6679e07fe15b93324d6

                  SHA1

                  6a81aa87e4b07c7fea176c8adf1b27ddcdd44573

                  SHA256

                  91ebea8ad199e97832cf91ea77328ed7ff49a1b5c06ddaacb0e420097a9b079e

                  SHA512

                  efd1507bc7aa0cd335b0e82cddde5f75c4d1e35490608d32f24a2bed0d0fbcac88919728e3b3312665bd1e60d3f13a325bdcef4acfddab0f8c2d9f4fb2454d99

                • C:\Users\Admin\AppData\Local\Temp\{78791~1\tap0901.sys
                  MD5

                  d765f43cbea72d14c04af3d2b9c8e54b

                  SHA1

                  daebe266073616e5fc931c319470fcf42a06867a

                  SHA256

                  89c5ca1440df186497ce158eb71c0c6bf570a75b6bc1880eac7c87a0250201c0

                  SHA512

                  ff83225ed348aa8558fb3055ceb43863bad5cf775e410ed8acda7316b56cd5c9360e63ed71abbc8929f7dcf51fd9a948b16d58242a7a2b16108e696c11d548b2

                • C:\Users\Admin\AppData\Roaming\Weather\Weather 1.0.0\install\FD7DF1F\Weather Installation.msi
                  MD5

                  44ac52139ab84870ea0135708e289f02

                  SHA1

                  073ba81873e535f060f63c3a2f99757ac3f95c95

                  SHA256

                  a83d25bdf1eec6b19eb5320d0ee4922299ce7d9a83a4341c2c4d86231fc3b53a

                  SHA512

                  c85a1297c3defa60e9b003413369e02b0775273e4936c36c6d21db89fff02b05b55027214a2b2c8023cb37654a6ec12ef0b33f714a9e10e229ad43aa17890767

                • C:\Windows\Installer\MSIDF8E.tmp
                  MD5

                  07ce413b1af6342187514871dc112c74

                  SHA1

                  8008f8bfeae99918b6323a3d1270dea63b3a8394

                  SHA256

                  0ba7e90fe2a0005e1e0dad53e2678916650c3b95ff9b666b802d128276c8ec46

                  SHA512

                  27df52bfcbc2d0ce3756a2526e632b5610d7047259b31aeeff12652de3e046bcd239e39c222a323654f475f1f913679b4fdd858303e0e105f7a300b6f6ed0fe5

                • C:\Windows\Installer\MSIE174.tmp
                  MD5

                  07ce413b1af6342187514871dc112c74

                  SHA1

                  8008f8bfeae99918b6323a3d1270dea63b3a8394

                  SHA256

                  0ba7e90fe2a0005e1e0dad53e2678916650c3b95ff9b666b802d128276c8ec46

                  SHA512

                  27df52bfcbc2d0ce3756a2526e632b5610d7047259b31aeeff12652de3e046bcd239e39c222a323654f475f1f913679b4fdd858303e0e105f7a300b6f6ed0fe5

                • C:\Windows\Installer\MSIE28E.tmp
                  MD5

                  07ce413b1af6342187514871dc112c74

                  SHA1

                  8008f8bfeae99918b6323a3d1270dea63b3a8394

                  SHA256

                  0ba7e90fe2a0005e1e0dad53e2678916650c3b95ff9b666b802d128276c8ec46

                  SHA512

                  27df52bfcbc2d0ce3756a2526e632b5610d7047259b31aeeff12652de3e046bcd239e39c222a323654f475f1f913679b4fdd858303e0e105f7a300b6f6ed0fe5

                • C:\Windows\Installer\MSIE3C7.tmp
                  MD5

                  e6a708c70a8cfd78b7c0383615545158

                  SHA1

                  b9274d9bf4750f557d34ddfd802113f5dd1df91c

                  SHA256

                  e124c00f974e0c09200676e7ce2147c3822b4cd4764dcc970e832bd93d869d0c

                  SHA512

                  2d0162f268f357a29c8bc35f855678e8e47e8a70825130e73e40a7dca1e9a3d8844b66616bfaa156b16fa4162bcf6991f659b3a6e8ee3caf841c87ec16189ff8

                • C:\Windows\Installer\MSIE4F1.tmp
                  MD5

                  f32ac1d425e8b7c320d6be9a968585ab

                  SHA1

                  3b0bd3122226f2ac9f11664d9fc13d699b6dcfa0

                  SHA256

                  96f8d286f86055dcb3a15e0f3a2de092b0441ec36455c14caaad4c1f5a227894

                  SHA512

                  d8d9d996e279b7500306614448d61d5c3ac9c2efc28ac71d1daa09951f342d2cf773f0a7b51cb847f4d91dd34018e4a2d7977c0f6f2859795d4f0df7ac894b27

                • C:\Windows\Installer\MSIE65A.tmp
                  MD5

                  842cc23e74711a7b6955e6876c0641ce

                  SHA1

                  3c7f32c373e03d76e9f5d76d2dfdcb6508c7af56

                  SHA256

                  7e434d53739356b7f74c5143b98138c6b67b38c2dbd772a28e8dde70e8be8644

                  SHA512

                  dd8323f657786fae516b400fe6b0569b8d4d16ccb4b396648b427e875d9e5b1eb7a874338d386f0940dc370de6fecf9893efd28149745bc9fd3f67a792ec824d

                • C:\Windows\Installer\MSIED02.tmp
                  MD5

                  f32ac1d425e8b7c320d6be9a968585ab

                  SHA1

                  3b0bd3122226f2ac9f11664d9fc13d699b6dcfa0

                  SHA256

                  96f8d286f86055dcb3a15e0f3a2de092b0441ec36455c14caaad4c1f5a227894

                  SHA512

                  d8d9d996e279b7500306614448d61d5c3ac9c2efc28ac71d1daa09951f342d2cf773f0a7b51cb847f4d91dd34018e4a2d7977c0f6f2859795d4f0df7ac894b27

                • C:\Windows\Installer\MSIEE3B.tmp
                  MD5

                  07ce413b1af6342187514871dc112c74

                  SHA1

                  8008f8bfeae99918b6323a3d1270dea63b3a8394

                  SHA256

                  0ba7e90fe2a0005e1e0dad53e2678916650c3b95ff9b666b802d128276c8ec46

                  SHA512

                  27df52bfcbc2d0ce3756a2526e632b5610d7047259b31aeeff12652de3e046bcd239e39c222a323654f475f1f913679b4fdd858303e0e105f7a300b6f6ed0fe5

                • \??\c:\PROGRA~2\maskvpn\driver\win764\tap0901.sys
                  MD5

                  d765f43cbea72d14c04af3d2b9c8e54b

                  SHA1

                  daebe266073616e5fc931c319470fcf42a06867a

                  SHA256

                  89c5ca1440df186497ce158eb71c0c6bf570a75b6bc1880eac7c87a0250201c0

                  SHA512

                  ff83225ed348aa8558fb3055ceb43863bad5cf775e410ed8acda7316b56cd5c9360e63ed71abbc8929f7dcf51fd9a948b16d58242a7a2b16108e696c11d548b2

                • \??\c:\program files (x86)\maskvpn\driver\win764\tap0901.cat
                  MD5

                  c757503bc0c5a6679e07fe15b93324d6

                  SHA1

                  6a81aa87e4b07c7fea176c8adf1b27ddcdd44573

                  SHA256

                  91ebea8ad199e97832cf91ea77328ed7ff49a1b5c06ddaacb0e420097a9b079e

                  SHA512

                  efd1507bc7aa0cd335b0e82cddde5f75c4d1e35490608d32f24a2bed0d0fbcac88919728e3b3312665bd1e60d3f13a325bdcef4acfddab0f8c2d9f4fb2454d99

                • \Users\Admin\AppData\Local\Temp\MSIC967.tmp
                  MD5

                  07ce413b1af6342187514871dc112c74

                  SHA1

                  8008f8bfeae99918b6323a3d1270dea63b3a8394

                  SHA256

                  0ba7e90fe2a0005e1e0dad53e2678916650c3b95ff9b666b802d128276c8ec46

                  SHA512

                  27df52bfcbc2d0ce3756a2526e632b5610d7047259b31aeeff12652de3e046bcd239e39c222a323654f475f1f913679b4fdd858303e0e105f7a300b6f6ed0fe5

                • \Users\Admin\AppData\Local\Temp\MSICDDD.tmp
                  MD5

                  e6a708c70a8cfd78b7c0383615545158

                  SHA1

                  b9274d9bf4750f557d34ddfd802113f5dd1df91c

                  SHA256

                  e124c00f974e0c09200676e7ce2147c3822b4cd4764dcc970e832bd93d869d0c

                  SHA512

                  2d0162f268f357a29c8bc35f855678e8e47e8a70825130e73e40a7dca1e9a3d8844b66616bfaa156b16fa4162bcf6991f659b3a6e8ee3caf841c87ec16189ff8

                • \Users\Admin\AppData\Local\Temp\is-IIPRH.tmp\ApiTool.dll
                  MD5

                  b5e330f90e1bab5e5ee8ccb04e679687

                  SHA1

                  3360a68276a528e4b651c9019b6159315c3acca8

                  SHA256

                  2900d536923740fe530891f481e35e37262db5283a4b98047fe5335eacaf3441

                  SHA512

                  41ab8f239cfff8e5ddcff95cdf2ae11499d57b2ebe8f0786757a200047fd022bfd6975be95e9cfcc17c405e631f069b9951591cf74faf3e6a548191e63a8439c

                • \Users\Admin\AppData\Local\Temp\is-IIPRH.tmp\ApiTool.dll
                  MD5

                  b5e330f90e1bab5e5ee8ccb04e679687

                  SHA1

                  3360a68276a528e4b651c9019b6159315c3acca8

                  SHA256

                  2900d536923740fe530891f481e35e37262db5283a4b98047fe5335eacaf3441

                  SHA512

                  41ab8f239cfff8e5ddcff95cdf2ae11499d57b2ebe8f0786757a200047fd022bfd6975be95e9cfcc17c405e631f069b9951591cf74faf3e6a548191e63a8439c

                • \Users\Admin\AppData\Local\Temp\is-IIPRH.tmp\InnoCallback.dll
                  MD5

                  1c55ae5ef9980e3b1028447da6105c75

                  SHA1

                  f85218e10e6aa23b2f5a3ed512895b437e41b45c

                  SHA256

                  6afa2d104be6efe3d9a2ab96dbb75db31565dad64dd0b791e402ecc25529809f

                  SHA512

                  1ec4d52f49747b29cfd83e1a75fc6ae4101add68ada0b9add5770c10be6dffb004bb47d0854d50871ed8d77acf67d4e0445e97f0548a95c182e83b94ddf2eb6b

                • \Users\Admin\AppData\Local\Temp\is-IIPRH.tmp\InnoCallback.dll
                  MD5

                  1c55ae5ef9980e3b1028447da6105c75

                  SHA1

                  f85218e10e6aa23b2f5a3ed512895b437e41b45c

                  SHA256

                  6afa2d104be6efe3d9a2ab96dbb75db31565dad64dd0b791e402ecc25529809f

                  SHA512

                  1ec4d52f49747b29cfd83e1a75fc6ae4101add68ada0b9add5770c10be6dffb004bb47d0854d50871ed8d77acf67d4e0445e97f0548a95c182e83b94ddf2eb6b

                • \Users\Admin\AppData\Local\Temp\is-IIPRH.tmp\botva2.dll
                  MD5

                  ef899fa243c07b7b82b3a45f6ec36771

                  SHA1

                  4a86313cc8766dcad1c2b00c2b8f9bbe0cf8bbbe

                  SHA256

                  da7d0368712ee419952eb2640a65a7f24e39fb7872442ed4d2ee847ec4cfde77

                  SHA512

                  3f98b5ad9adfad2111ebd1d8cbab9ae423d624d1668cc64c0bfcdbfedf30c1ce3ea6bc6bcf70f7dd1b01172a4349e7c84fb75d395ee5af73866574c1d734c6e8

                • \Users\Admin\AppData\Local\Temp\is-IIPRH.tmp\botva2.dll
                  MD5

                  ef899fa243c07b7b82b3a45f6ec36771

                  SHA1

                  4a86313cc8766dcad1c2b00c2b8f9bbe0cf8bbbe

                  SHA256

                  da7d0368712ee419952eb2640a65a7f24e39fb7872442ed4d2ee847ec4cfde77

                  SHA512

                  3f98b5ad9adfad2111ebd1d8cbab9ae423d624d1668cc64c0bfcdbfedf30c1ce3ea6bc6bcf70f7dd1b01172a4349e7c84fb75d395ee5af73866574c1d734c6e8

                • \Users\Admin\AppData\Local\Temp\is-IIPRH.tmp\libMaskVPN.dll
                  MD5

                  3d88c579199498b224033b6b66638fb8

                  SHA1

                  6f6303288e2206efbf18e4716095059fada96fc4

                  SHA256

                  5bccb86319fc90210d065648937725b14b43fa0c96f9da56d9984e027adebbc3

                  SHA512

                  9740c521ed38643201ed4c2574628454723b9213f12e193c11477e64a2c03daa58d2a48e70df1a7e9654c50a80049f3cf213fd01f2b74e585c3a86027db19ec9

                • \Users\Admin\AppData\Local\Temp\is-IIPRH.tmp\libMaskVPN.dll
                  MD5

                  3d88c579199498b224033b6b66638fb8

                  SHA1

                  6f6303288e2206efbf18e4716095059fada96fc4

                  SHA256

                  5bccb86319fc90210d065648937725b14b43fa0c96f9da56d9984e027adebbc3

                  SHA512

                  9740c521ed38643201ed4c2574628454723b9213f12e193c11477e64a2c03daa58d2a48e70df1a7e9654c50a80049f3cf213fd01f2b74e585c3a86027db19ec9

                • \Users\Admin\AppData\Local\Temp\is-S10SK.tmp\_isetup\_iscrypt.dll
                  MD5

                  a69559718ab506675e907fe49deb71e9

                  SHA1

                  bc8f404ffdb1960b50c12ff9413c893b56f2e36f

                  SHA256

                  2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

                  SHA512

                  e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

                • \Users\Admin\AppData\Roaming\Weather\Weather 1.0.0\install\decoder.dll
                  MD5

                  62326d3ef35667b1533673d2bb1d342c

                  SHA1

                  8100ce90b7cbddd7ef2fd77c544ebf12ebd5ec33

                  SHA256

                  a087b791ff8ff9e05e339600199aa389a4554050acc7af7fa36dbe208be7382e

                  SHA512

                  7321feae8ee8d0653d7bd935e3d2e6f658e6798b2a7a8f44976c58509028e79284582132cb999c7c3124a7e94960d9c5d5fc8edefaeda06275ab725730d0d9b5

                • \Windows\Installer\MSIDF8E.tmp
                  MD5

                  07ce413b1af6342187514871dc112c74

                  SHA1

                  8008f8bfeae99918b6323a3d1270dea63b3a8394

                  SHA256

                  0ba7e90fe2a0005e1e0dad53e2678916650c3b95ff9b666b802d128276c8ec46

                  SHA512

                  27df52bfcbc2d0ce3756a2526e632b5610d7047259b31aeeff12652de3e046bcd239e39c222a323654f475f1f913679b4fdd858303e0e105f7a300b6f6ed0fe5

                • \Windows\Installer\MSIE174.tmp
                  MD5

                  07ce413b1af6342187514871dc112c74

                  SHA1

                  8008f8bfeae99918b6323a3d1270dea63b3a8394

                  SHA256

                  0ba7e90fe2a0005e1e0dad53e2678916650c3b95ff9b666b802d128276c8ec46

                  SHA512

                  27df52bfcbc2d0ce3756a2526e632b5610d7047259b31aeeff12652de3e046bcd239e39c222a323654f475f1f913679b4fdd858303e0e105f7a300b6f6ed0fe5

                • \Windows\Installer\MSIE28E.tmp
                  MD5

                  07ce413b1af6342187514871dc112c74

                  SHA1

                  8008f8bfeae99918b6323a3d1270dea63b3a8394

                  SHA256

                  0ba7e90fe2a0005e1e0dad53e2678916650c3b95ff9b666b802d128276c8ec46

                  SHA512

                  27df52bfcbc2d0ce3756a2526e632b5610d7047259b31aeeff12652de3e046bcd239e39c222a323654f475f1f913679b4fdd858303e0e105f7a300b6f6ed0fe5

                • \Windows\Installer\MSIE3C7.tmp
                  MD5

                  e6a708c70a8cfd78b7c0383615545158

                  SHA1

                  b9274d9bf4750f557d34ddfd802113f5dd1df91c

                  SHA256

                  e124c00f974e0c09200676e7ce2147c3822b4cd4764dcc970e832bd93d869d0c

                  SHA512

                  2d0162f268f357a29c8bc35f855678e8e47e8a70825130e73e40a7dca1e9a3d8844b66616bfaa156b16fa4162bcf6991f659b3a6e8ee3caf841c87ec16189ff8

                • \Windows\Installer\MSIE4F1.tmp
                  MD5

                  f32ac1d425e8b7c320d6be9a968585ab

                  SHA1

                  3b0bd3122226f2ac9f11664d9fc13d699b6dcfa0

                  SHA256

                  96f8d286f86055dcb3a15e0f3a2de092b0441ec36455c14caaad4c1f5a227894

                  SHA512

                  d8d9d996e279b7500306614448d61d5c3ac9c2efc28ac71d1daa09951f342d2cf773f0a7b51cb847f4d91dd34018e4a2d7977c0f6f2859795d4f0df7ac894b27

                • \Windows\Installer\MSIE65A.tmp
                  MD5

                  842cc23e74711a7b6955e6876c0641ce

                  SHA1

                  3c7f32c373e03d76e9f5d76d2dfdcb6508c7af56

                  SHA256

                  7e434d53739356b7f74c5143b98138c6b67b38c2dbd772a28e8dde70e8be8644

                  SHA512

                  dd8323f657786fae516b400fe6b0569b8d4d16ccb4b396648b427e875d9e5b1eb7a874338d386f0940dc370de6fecf9893efd28149745bc9fd3f67a792ec824d

                • \Windows\Installer\MSIED02.tmp
                  MD5

                  f32ac1d425e8b7c320d6be9a968585ab

                  SHA1

                  3b0bd3122226f2ac9f11664d9fc13d699b6dcfa0

                  SHA256

                  96f8d286f86055dcb3a15e0f3a2de092b0441ec36455c14caaad4c1f5a227894

                  SHA512

                  d8d9d996e279b7500306614448d61d5c3ac9c2efc28ac71d1daa09951f342d2cf773f0a7b51cb847f4d91dd34018e4a2d7977c0f6f2859795d4f0df7ac894b27

                • \Windows\Installer\MSIEE3B.tmp
                  MD5

                  07ce413b1af6342187514871dc112c74

                  SHA1

                  8008f8bfeae99918b6323a3d1270dea63b3a8394

                  SHA256

                  0ba7e90fe2a0005e1e0dad53e2678916650c3b95ff9b666b802d128276c8ec46

                  SHA512

                  27df52bfcbc2d0ce3756a2526e632b5610d7047259b31aeeff12652de3e046bcd239e39c222a323654f475f1f913679b4fdd858303e0e105f7a300b6f6ed0fe5

                • memory/364-131-0x0000000000400000-0x000000000044C000-memory.dmp
                  Filesize

                  304KB

                • memory/364-144-0x0000000000400000-0x000000000044C000-memory.dmp
                  Filesize

                  304KB

                • memory/364-132-0x0000000000414F3A-mapping.dmp
                • memory/512-145-0x0000000000400000-0x000000000044C000-memory.dmp
                  Filesize

                  304KB

                • memory/512-137-0x0000000000000000-mapping.dmp
                • memory/772-187-0x0000000000000000-mapping.dmp
                • memory/1016-117-0x0000000000400000-0x000000000047C000-memory.dmp
                  Filesize

                  496KB

                • memory/1236-127-0x0000000001E30000-0x0000000001E31000-memory.dmp
                  Filesize

                  4KB

                • memory/1236-126-0x0000000000400000-0x0000000001860000-memory.dmp
                  Filesize

                  20.4MB

                • memory/1236-125-0x0000000000400000-0x0000000001860000-memory.dmp
                  Filesize

                  20.4MB

                • memory/1236-123-0x0000000000000000-mapping.dmp
                • memory/1352-128-0x0000000000000000-mapping.dmp
                • memory/1436-340-0x0000000000000000-mapping.dmp
                • memory/1448-147-0x0000000000000000-mapping.dmp
                • memory/1452-360-0x0000000000000000-mapping.dmp
                • memory/1932-155-0x000002B67DC00000-0x000002B67DC02000-memory.dmp
                  Filesize

                  8KB

                • memory/1932-154-0x000002B67DC00000-0x000002B67DC02000-memory.dmp
                  Filesize

                  8KB

                • memory/2108-266-0x0000000033D30000-0x0000000033EF6000-memory.dmp
                  Filesize

                  1.8MB

                • memory/2108-263-0x00000000001F0000-0x00000000001F1000-memory.dmp
                  Filesize

                  4KB

                • memory/2108-271-0x00000000345D0000-0x0000000034628000-memory.dmp
                  Filesize

                  352KB

                • memory/2108-269-0x0000000034470000-0x00000000345C8000-memory.dmp
                  Filesize

                  1.3MB

                • memory/2108-268-0x00000000001E0000-0x00000000001E1000-memory.dmp
                  Filesize

                  4KB

                • memory/2108-264-0x0000000000400000-0x00000000015D7000-memory.dmp
                  Filesize

                  17.8MB

                • memory/2108-194-0x0000000000000000-mapping.dmp
                • memory/2224-267-0x0000000000000000-mapping.dmp
                • memory/2304-336-0x0000000000000000-mapping.dmp
                • memory/2676-241-0x0000000004A70000-0x0000000004A71000-memory.dmp
                  Filesize

                  4KB

                • memory/2676-252-0x0000000004A20000-0x0000000004A21000-memory.dmp
                  Filesize

                  4KB

                • memory/2676-239-0x0000000004AA0000-0x0000000004AA1000-memory.dmp
                  Filesize

                  4KB

                • memory/2676-253-0x0000000004A10000-0x0000000004A11000-memory.dmp
                  Filesize

                  4KB

                • memory/2676-238-0x0000000004A90000-0x0000000004A91000-memory.dmp
                  Filesize

                  4KB

                • memory/2676-240-0x0000000004A80000-0x0000000004A81000-memory.dmp
                  Filesize

                  4KB

                • memory/2676-156-0x0000000000000000-mapping.dmp
                • memory/2676-237-0x0000000004A30000-0x0000000004A31000-memory.dmp
                  Filesize

                  4KB

                • memory/2676-236-0x00000000049F0000-0x00000000049F1000-memory.dmp
                  Filesize

                  4KB

                • memory/2676-254-0x0000000004A00000-0x0000000004A01000-memory.dmp
                  Filesize

                  4KB

                • memory/2676-243-0x0000000004A60000-0x0000000004A61000-memory.dmp
                  Filesize

                  4KB

                • memory/2676-220-0x00000000773E0000-0x000000007756E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2676-250-0x00000000049E0000-0x00000000049E1000-memory.dmp
                  Filesize

                  4KB

                • memory/2676-244-0x0000000000400000-0x00000000009A4000-memory.dmp
                  Filesize

                  5.6MB

                • memory/2676-235-0x0000000004A50000-0x0000000004A51000-memory.dmp
                  Filesize

                  4KB

                • memory/2676-242-0x0000000004A40000-0x0000000004A41000-memory.dmp
                  Filesize

                  4KB

                • memory/2808-185-0x0000000002970000-0x0000000002971000-memory.dmp
                  Filesize

                  4KB

                • memory/2808-184-0x0000000002970000-0x0000000002971000-memory.dmp
                  Filesize

                  4KB

                • memory/2808-183-0x0000000000000000-mapping.dmp
                • memory/2840-142-0x0000000000000000-mapping.dmp
                • memory/2840-167-0x0000000007360000-0x0000000007375000-memory.dmp
                  Filesize

                  84KB

                • memory/2840-173-0x0000000008EA0000-0x0000000008EA4000-memory.dmp
                  Filesize

                  16KB

                • memory/2840-176-0x0000000008EA0000-0x0000000008EA4000-memory.dmp
                  Filesize

                  16KB

                • memory/2840-172-0x0000000008EA0000-0x0000000008EA4000-memory.dmp
                  Filesize

                  16KB

                • memory/2840-234-0x0000000007050000-0x0000000007051000-memory.dmp
                  Filesize

                  4KB

                • memory/2840-232-0x00000000071B0000-0x00000000071B1000-memory.dmp
                  Filesize

                  4KB

                • memory/2840-171-0x0000000008EA0000-0x0000000008EA4000-memory.dmp
                  Filesize

                  16KB

                • memory/2840-169-0x0000000008EA0000-0x0000000008EA4000-memory.dmp
                  Filesize

                  16KB

                • memory/2840-163-0x00000000071C0000-0x00000000071CF000-memory.dmp
                  Filesize

                  60KB

                • memory/2840-174-0x0000000008EA0000-0x0000000008EA4000-memory.dmp
                  Filesize

                  16KB

                • memory/2840-179-0x0000000008EA0000-0x0000000008EA4000-memory.dmp
                  Filesize

                  16KB

                • memory/2840-175-0x0000000008EA0000-0x0000000008EA4000-memory.dmp
                  Filesize

                  16KB

                • memory/2840-146-0x00000000006A0000-0x00000000006A1000-memory.dmp
                  Filesize

                  4KB

                • memory/2840-153-0x0000000006B10000-0x0000000006DF0000-memory.dmp
                  Filesize

                  2.9MB

                • memory/2844-197-0x0000000002BA0000-0x0000000002BA1000-memory.dmp
                  Filesize

                  4KB

                • memory/2844-196-0x0000000002BA0000-0x0000000002BA1000-memory.dmp
                  Filesize

                  4KB

                • memory/2844-195-0x0000000000000000-mapping.dmp
                • memory/2972-164-0x0000000000000000-mapping.dmp
                • memory/2972-170-0x0000000002560000-0x0000000002561000-memory.dmp
                  Filesize

                  4KB

                • memory/2972-168-0x0000000002560000-0x0000000002561000-memory.dmp
                  Filesize

                  4KB

                • memory/3180-118-0x0000000000000000-mapping.dmp
                • memory/3180-122-0x00000000005E0000-0x000000000068E000-memory.dmp
                  Filesize

                  696KB

                • memory/3224-355-0x0000000000000000-mapping.dmp
                • memory/3740-134-0x0000000000000000-mapping.dmp
                • memory/3792-310-0x0000000000000000-mapping.dmp
                • memory/4100-295-0x0000000000000000-mapping.dmp
                • memory/4100-296-0x000001A6579E0000-0x000001A6579E2000-memory.dmp
                  Filesize

                  8KB

                • memory/4100-297-0x000001A6579E0000-0x000001A6579E2000-memory.dmp
                  Filesize

                  8KB

                • memory/4200-202-0x0000000000000000-mapping.dmp
                • memory/4204-300-0x0000000004380000-0x0000000004381000-memory.dmp
                  Filesize

                  4KB

                • memory/4204-302-0x0000000004830000-0x0000000004831000-memory.dmp
                  Filesize

                  4KB

                • memory/4204-261-0x0000000000000000-mapping.dmp
                • memory/4204-332-0x0000000004824000-0x0000000004826000-memory.dmp
                  Filesize

                  8KB

                • memory/4204-305-0x0000000004822000-0x0000000004823000-memory.dmp
                  Filesize

                  4KB

                • memory/4204-299-0x0000000000000000-mapping.dmp
                • memory/4204-301-0x0000000004380000-0x0000000004381000-memory.dmp
                  Filesize

                  4KB

                • memory/4204-304-0x0000000004820000-0x0000000004821000-memory.dmp
                  Filesize

                  4KB

                • memory/4204-331-0x0000000004823000-0x0000000004824000-memory.dmp
                  Filesize

                  4KB

                • memory/4272-307-0x0000000000000000-mapping.dmp
                • memory/4288-208-0x0000000000000000-mapping.dmp
                • memory/4312-260-0x0000000000000000-mapping.dmp
                • memory/4340-339-0x0000000000000000-mapping.dmp
                • memory/4340-213-0x0000000000000000-mapping.dmp
                • memory/4396-281-0x0000000000000000-mapping.dmp
                • memory/4416-217-0x0000000000000000-mapping.dmp
                • memory/4548-223-0x0000000000000000-mapping.dmp
                • memory/4596-274-0x0000000000390000-0x0000000000391000-memory.dmp
                  Filesize

                  4KB

                • memory/4596-280-0x0000000004D90000-0x0000000004D97000-memory.dmp
                  Filesize

                  28KB

                • memory/4596-284-0x0000000005A30000-0x0000000005A6E000-memory.dmp
                  Filesize

                  248KB

                • memory/4596-273-0x0000000000000000-mapping.dmp
                • memory/4596-276-0x00000000052B0000-0x00000000052B1000-memory.dmp
                  Filesize

                  4KB

                • memory/4596-277-0x0000000004CB0000-0x0000000004CB1000-memory.dmp
                  Filesize

                  4KB

                • memory/4596-278-0x0000000004C10000-0x0000000004CA2000-memory.dmp
                  Filesize

                  584KB

                • memory/4596-283-0x0000000005A90000-0x0000000005A91000-memory.dmp
                  Filesize

                  4KB

                • memory/4596-279-0x0000000004D50000-0x0000000004D51000-memory.dmp
                  Filesize

                  4KB

                • memory/4652-231-0x0000000000000000-mapping.dmp
                • memory/4724-333-0x0000000000000000-mapping.dmp
                • memory/4844-350-0x0000000000000000-mapping.dmp
                • memory/4848-249-0x0000000000120000-0x0000000000121000-memory.dmp
                  Filesize

                  4KB

                • memory/4848-247-0x0000000000400000-0x00000000015D7000-memory.dmp
                  Filesize

                  17.8MB

                • memory/4848-246-0x0000000000140000-0x0000000000141000-memory.dmp
                  Filesize

                  4KB

                • memory/4848-233-0x0000000000000000-mapping.dmp
                • memory/4900-285-0x0000000000400000-0x0000000000422000-memory.dmp
                  Filesize

                  136KB

                • memory/4900-292-0x0000000005280000-0x0000000005281000-memory.dmp
                  Filesize

                  4KB

                • memory/4900-291-0x0000000005350000-0x0000000005351000-memory.dmp
                  Filesize

                  4KB

                • memory/4900-293-0x00000000052C0000-0x00000000052C1000-memory.dmp
                  Filesize

                  4KB

                • memory/4900-294-0x00000000051B0000-0x00000000057B6000-memory.dmp
                  Filesize

                  6.0MB

                • memory/4900-286-0x000000000041B23E-mapping.dmp
                • memory/4900-298-0x0000000006020000-0x0000000006021000-memory.dmp
                  Filesize

                  4KB

                • memory/4900-290-0x0000000005220000-0x0000000005221000-memory.dmp
                  Filesize

                  4KB

                • memory/4900-289-0x00000000057C0000-0x00000000057C1000-memory.dmp
                  Filesize

                  4KB

                • memory/4928-282-0x0000000000000000-mapping.dmp
                • memory/5088-345-0x0000000000000000-mapping.dmp
                • memory/5096-251-0x0000000000000000-mapping.dmp
                • memory/5096-255-0x0000000001820000-0x0000000001821000-memory.dmp
                  Filesize

                  4KB

                • memory/5096-256-0x0000000001830000-0x0000000001831000-memory.dmp
                  Filesize

                  4KB

                • memory/5096-257-0x0000000000400000-0x00000000015D7000-memory.dmp
                  Filesize

                  17.8MB

                • memory/5096-259-0x00000000017E0000-0x000000000192A000-memory.dmp
                  Filesize

                  1.3MB

                • memory/5240-363-0x0000000000000000-mapping.dmp