Analysis

  • max time kernel
    146s
  • max time network
    201s
  • platform
    windows11_x64
  • resource
    win11
  • submitted
    29-10-2021 04:30

General

  • Target

    run_848a9.exe

  • Size

    1.7MB

  • MD5

    67c86865ba800ab9f761356d4cc5c08c

  • SHA1

    1f3dcc460c3fb02704e69cd8509445a92ac3600d

  • SHA256

    8dbbe3e8657d87e842026b7051a7b0680d3838749773997df91f123034a7566d

  • SHA512

    328c47921cfa939403736e63d0a5f5659dce3a916a44e6d0b0434ae4672bf96530a86cb19c2709a67914381fd8fc1c40b6e12209a35735743a8988a6166b50ff

Malware Config

Signatures

  • suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01

    suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01

  • suricata: ET MALWARE JS/Nemucod.M.gen downloading EXE payload

    suricata: ET MALWARE JS/Nemucod.M.gen downloading EXE payload

  • Blocklisted process makes network request 48 IoCs
  • Creates new service(s) 1 TTPs
  • Downloads MZ/PE file
  • Executes dropped EXE 29 IoCs
  • Loads dropped DLL 64 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 5 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 11 IoCs
  • Drops file in Windows directory 64 IoCs
  • Launches sc.exe

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NSIS installer 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 1 IoCs
  • Modifies data under HKEY_USERS 3 IoCs
  • Modifies registry class 7 IoCs
  • Modifies system certificate store 2 TTPs 21 IoCs
  • Suspicious behavior: EnumeratesProcesses 41 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 24 IoCs
  • Suspicious use of SendNotifyMessage 17 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\run_848a9.exe
    "C:\Users\Admin\AppData\Local\Temp\run_848a9.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3444
    • C:\Users\Admin\AppData\Local\Temp\is-J32KT.tmp\run_848a9.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-J32KT.tmp\run_848a9.tmp" /SL5="$20094,986812,780800,C:\Users\Admin\AppData\Local\Temp\run_848a9.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:1208
      • C:\Users\Admin\AppData\Local\Temp\is-JVBGT.tmp\setup.exe
        "C:\Users\Admin\AppData\Local\Temp\is-JVBGT.tmp\setup.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2488
        • C:\Users\Admin\AppData\Local\Temp\is-D9M3F.tmp\setup.tmp
          "C:\Users\Admin\AppData\Local\Temp\is-D9M3F.tmp\setup.tmp" /SL5="$701FC,921114,831488,C:\Users\Admin\AppData\Local\Temp\is-JVBGT.tmp\setup.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2156
          • C:\Users\Admin\AppData\Local\Temp\is-VC82Q.tmp\setup_0.exe
            "C:\Users\Admin\AppData\Local\Temp\is-VC82Q.tmp\setup_0.exe" /pid=2651945 /cid=2094 /VERYSILENT
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:3100
            • C:\Users\Admin\AppData\Local\Temp\is-CL5T4.tmp\setup_0.tmp
              "C:\Users\Admin\AppData\Local\Temp\is-CL5T4.tmp\setup_0.tmp" /SL5="$102A6,859139,58368,C:\Users\Admin\AppData\Local\Temp\is-VC82Q.tmp\setup_0.exe" /pid=2651945 /cid=2094 /VERYSILENT
              6⤵
              • Executes dropped EXE
              • Drops file in Program Files directory
              • Modifies registry class
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of WriteProcessMemory
              PID:2792
              • C:\Program Files (x86)\TakeMyFile\takemyfileapp2.exe
                "C:\Program Files (x86)\TakeMyFile\takemyfileapp2.exe" report 2651945 2094
                7⤵
                • Executes dropped EXE
                • Checks processor information in registry
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                PID:1984
          • C:\Users\Admin\AppData\Local\Temp\is-VC82Q.tmp\setup_1.exe
            "C:\Users\Admin\AppData\Local\Temp\is-VC82Q.tmp\setup_1.exe" /VERYSILENT /id=2094
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:1956
            • C:\Users\Admin\AppData\Local\Temp\is-GKGMC.tmp\setup_1.tmp
              "C:\Users\Admin\AppData\Local\Temp\is-GKGMC.tmp\setup_1.tmp" /SL5="$202A6,140765,56832,C:\Users\Admin\AppData\Local\Temp\is-VC82Q.tmp\setup_1.exe" /VERYSILENT /id=2094
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in Program Files directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of WriteProcessMemory
              PID:2192
              • C:\Users\Admin\AppData\Local\Temp\is-SFH1C.tmp\hostwin.exe
                "C:\Users\Admin\AppData\Local\Temp\is-SFH1C.tmp\hostwin.exe" 2094 64
                7⤵
                • Executes dropped EXE
                • Suspicious behavior: GetForegroundWindowSpam
                PID:2760
          • C:\Users\Admin\AppData\Local\Temp\is-VC82Q.tmp\setup_2.exe
            "C:\Users\Admin\AppData\Local\Temp\is-VC82Q.tmp\setup_2.exe" SID=765 CID=765 SILENT=1 /quiet
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Enumerates connected drives
            • Modifies system certificate store
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of WriteProcessMemory
            PID:4304
            • C:\Windows\SysWOW64\msiexec.exe
              "C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Settings\Settings 1.0.0\install\FD7DF1F\Settings Installation.msi" SID=765 CID=765 SILENT=1 /quiet AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\is-VC82Q.tmp\setup_2.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\is-VC82Q.tmp\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1630507832 SID=765 CID=765 SILENT=1 /quiet " SID="765" CID="765"
              6⤵
                PID:1036
            • C:\Users\Admin\AppData\Local\Temp\is-VC82Q.tmp\setup_3.exe
              "C:\Users\Admin\AppData\Local\Temp\is-VC82Q.tmp\setup_3.exe" /qn CAMPAIGN="2094"
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Enumerates connected drives
              • Modifies system certificate store
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of WriteProcessMemory
              PID:1404
              • C:\Windows\SysWOW64\msiexec.exe
                "C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Johan.msi" /qn CAMPAIGN=2094 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\is-VC82Q.tmp\setup_3.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\is-VC82Q.tmp\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1630507832 /qn CAMPAIGN=""2094"" " CAMPAIGN="2094"
                6⤵
                • Enumerates connected drives
                PID:2256
            • C:\Users\Admin\AppData\Local\Temp\is-VC82Q.tmp\setup_4.exe
              "C:\Users\Admin\AppData\Local\Temp\is-VC82Q.tmp\setup_4.exe" /quiet SILENT=1 AF=751__US
              5⤵
              • Executes dropped EXE
              • Enumerates connected drives
              • Modifies system certificate store
              • Suspicious use of FindShellTrayWindow
              PID:3188
              • C:\Windows\SysWOW64\msiexec.exe
                "C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Weather\Weather 1.0.0\install\FD7DF1F\Weather Installation.msi" /quiet SILENT=1 AF=751__US AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\is-VC82Q.tmp\setup_4.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\is-VC82Q.tmp\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1630507832 /quiet SILENT=1 AF=751__US " AF="751__US" AI_CONTROL_VISUAL_STYLE="16578540;16578540;14988840;12422912"
                6⤵
                  PID:2008
              • C:\Users\Admin\AppData\Local\Temp\is-VC82Q.tmp\setup_5.exe
                "C:\Users\Admin\AppData\Local\Temp\is-VC82Q.tmp\setup_5.exe" --silent --partner=IT201117
                5⤵
                • Executes dropped EXE
                PID:2556
                • C:\Users\Admin\AppData\Local\Temp\7zSCF9D7195\WebCompanionInstaller.exe
                  .\WebCompanionInstaller.exe --partner=IT201117 --version=7.0.2417.4248 --prod --silent --partner=IT201117
                  6⤵
                  • Executes dropped EXE
                  PID:4804
                  • C:\Windows\SysWOW64\sc.exe
                    "sc.exe" Create "WCAssistantService" binPath= "C:\Program Files (x86)\Lavasoft\Web Companion\Application\Lavasoft.WCAssistant.WinService.exe" DisplayName= "WC Assistant" start= auto
                    7⤵
                      PID:3932
                    • C:\Windows\SysWOW64\sc.exe
                      "sc.exe" failure WCAssistantService reset= 30 actions= restart/60000
                      7⤵
                        PID:2644
                      • C:\Windows\SysWOW64\sc.exe
                        "sc.exe" description "WCAssistantService" "Ad-Aware Web Companion Internet security service"
                        7⤵
                          PID:3936
                        • C:\Windows\SysWOW64\cmd.exe
                          "C:\Windows\System32\cmd.exe" /C netsh http add urlacl url=http://+:9007/ user=Everyone
                          7⤵
                            PID:1528
                            • C:\Windows\SysWOW64\netsh.exe
                              netsh http add urlacl url=http://+:9007/ user=Everyone
                              8⤵
                                PID:3916
                            • C:\Program Files (x86)\Lavasoft\Web Companion\Application\WebCompanion.exe
                              "C:\Program Files (x86)\Lavasoft\Web Companion\Application\WebCompanion.exe" --silent --install --geo=
                              7⤵
                                PID:4624
                  • C:\Windows\system32\msiexec.exe
                    C:\Windows\system32\msiexec.exe /V
                    1⤵
                    • Enumerates connected drives
                    • Drops file in Windows directory
                    • Modifies data under HKEY_USERS
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:3140
                    • C:\Windows\syswow64\MsiExec.exe
                      C:\Windows\syswow64\MsiExec.exe -Embedding B82E191FDE3625CB26B7CA8F4BCDB04B C
                      2⤵
                      • Loads dropped DLL
                      PID:4060
                    • C:\Windows\syswow64\MsiExec.exe
                      C:\Windows\syswow64\MsiExec.exe -Embedding 0DCC4B9F26FC5061DBA9EE1DBAD02477
                      2⤵
                      • Blocklisted process makes network request
                      • Loads dropped DLL
                      PID:4540
                    • C:\Users\Admin\AppData\Roaming\Settings\Settings\prerequisites\aipackagechainer.exe
                      "C:\Users\Admin\AppData\Roaming\Settings\Settings\prerequisites\aipackagechainer.exe"
                      2⤵
                      • Executes dropped EXE
                      • Adds Run key to start application
                      • Suspicious use of WriteProcessMemory
                      PID:4748
                      • C:\Users\Admin\AppData\Roaming\Settings\Settings\prerequisites\RequiredApplication_1\Settings%20Installation.exe
                        "C:\Users\Admin\AppData\Roaming\Settings\Settings\prerequisites\RequiredApplication_1\Settings%20Installation.exe" -silent=1 -CID=765 -SID=765 -submn=default
                        3⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Adds Run key to start application
                        • Suspicious use of WriteProcessMemory
                        PID:4128
                        • C:\Users\Admin\AppData\Roaming\Settings\Settings.exe
                          "C:\Users\Admin\AppData\Roaming\Settings\Settings.exe" "--iUSIg"
                          4⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of FindShellTrayWindow
                          PID:3964
                          • C:\Users\Admin\AppData\Roaming\Settings\Settings.exe
                            C:\Users\Admin\AppData\Roaming\Settings\Settings.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Settings\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Settings\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Settings\User Data" --annotation=plat=Win64 --annotation=prod=Settings --annotation=ver=0.0.13 --initial-client-data=0x204,0x208,0x20c,0x1c0,0x210,0x7ffd418bdec0,0x7ffd418bded0,0x7ffd418bdee0
                            5⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            PID:4652
                          • C:\Users\Admin\AppData\Roaming\Settings\Settings.exe
                            "C:\Users\Admin\AppData\Roaming\Settings\Settings.exe" --type=gpu-process --field-trial-handle=1592,17796308506535524952,15450420065756967663,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Settings\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw3964_1312415333" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1608 /prefetch:2
                            5⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Modifies registry class
                            • Suspicious behavior: EnumeratesProcesses
                            PID:3956
                          • C:\Users\Admin\AppData\Roaming\Settings\Settings.exe
                            "C:\Users\Admin\AppData\Roaming\Settings\Settings.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1592,17796308506535524952,15450420065756967663,131072 --lang=en-US --service-sandbox-type=network --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Settings\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw3964_1312415333" --mojo-platform-channel-handle=1932 /prefetch:8
                            5⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Modifies system certificate store
                            • Suspicious behavior: EnumeratesProcesses
                            PID:4420
                          • C:\Users\Admin\AppData\Roaming\Settings\Settings.exe
                            "C:\Users\Admin\AppData\Roaming\Settings\Settings.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1592,17796308506535524952,15450420065756967663,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Settings\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw3964_1312415333" --mojo-platform-channel-handle=2200 /prefetch:8
                            5⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Suspicious behavior: EnumeratesProcesses
                            PID:1572
                          • C:\Users\Admin\AppData\Roaming\Settings\Settings.exe
                            "C:\Users\Admin\AppData\Roaming\Settings\Settings.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Settings\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1592,17796308506535524952,15450420065756967663,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Settings\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw3964_1312415333" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --mojo-platform-channel-handle=2524 /prefetch:1
                            5⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Suspicious behavior: EnumeratesProcesses
                            PID:2924
                          • C:\Users\Admin\AppData\Roaming\Settings\Settings.exe
                            "C:\Users\Admin\AppData\Roaming\Settings\Settings.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Settings\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1592,17796308506535524952,15450420065756967663,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Settings\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw3964_1312415333" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --mojo-platform-channel-handle=2548 /prefetch:1
                            5⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Suspicious behavior: EnumeratesProcesses
                            PID:1312
                          • C:\Users\Admin\AppData\Roaming\Settings\Settings.exe
                            "C:\Users\Admin\AppData\Roaming\Settings\Settings.exe" --type=gpu-process --field-trial-handle=1592,17796308506535524952,15450420065756967663,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Settings\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw3964_1312415333" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3220 /prefetch:2
                            5⤵
                            • Executes dropped EXE
                            • Modifies registry class
                            • Suspicious behavior: EnumeratesProcesses
                            PID:4876
                          • C:\Users\Admin\AppData\Roaming\Settings\Settings.exe
                            "C:\Users\Admin\AppData\Roaming\Settings\Settings.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1592,17796308506535524952,15450420065756967663,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Settings\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw3964_1312415333" --mojo-platform-channel-handle=3692 /prefetch:8
                            5⤵
                            • Executes dropped EXE
                            • Suspicious behavior: EnumeratesProcesses
                            PID:1752
                          • C:\Users\Admin\AppData\Roaming\Settings\Settings.exe
                            "C:\Users\Admin\AppData\Roaming\Settings\Settings.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1592,17796308506535524952,15450420065756967663,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Settings\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw3964_1312415333" --mojo-platform-channel-handle=3344 /prefetch:8
                            5⤵
                            • Executes dropped EXE
                            • Suspicious behavior: EnumeratesProcesses
                            PID:2224
                          • C:\Users\Admin\AppData\Roaming\Settings\Settings.exe
                            "C:\Users\Admin\AppData\Roaming\Settings\Settings.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1592,17796308506535524952,15450420065756967663,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Settings\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw3964_1312415333" --mojo-platform-channel-handle=480 /prefetch:8
                            5⤵
                            • Executes dropped EXE
                            PID:4576
                          • C:\Users\Admin\AppData\Roaming\Settings\Settings.exe
                            "C:\Users\Admin\AppData\Roaming\Settings\Settings.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1592,17796308506535524952,15450420065756967663,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Settings\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw3964_1312415333" --mojo-platform-channel-handle=3416 /prefetch:8
                            5⤵
                              PID:2992
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -NonInteractive -NoLogo -ExecutionPolicy AllSigned -Command "C:\Users\Admin\AppData\Local\Temp\AI_513E.ps1 -paths 'C:\Users\Admin\AppData\Roaming\Settings\Settings\prerequisites\file_deleter.ps1','C:\Users\Admin\AppData\Roaming\Settings\Settings\prerequisites\aipackagechainer.exe','C:\Users\Admin\AppData\Roaming\Settings\Settings\prerequisites' -retry_count 10"
                          3⤵
                          • Blocklisted process makes network request
                          • Suspicious behavior: EnumeratesProcesses
                          PID:2216
                      • C:\Windows\syswow64\MsiExec.exe
                        C:\Windows\syswow64\MsiExec.exe -Embedding 86F98F20D378E1D260AD1C2BF221B86E C
                        2⤵
                        • Loads dropped DLL
                        • Suspicious behavior: EnumeratesProcesses
                        PID:1672
                      • C:\Windows\syswow64\MsiExec.exe
                        C:\Windows\syswow64\MsiExec.exe -Embedding FDA5BC5647A22BAEB5F04DA101676EB0
                        2⤵
                        • Blocklisted process makes network request
                        • Loads dropped DLL
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of WriteProcessMemory
                        PID:2016
                        • C:\Windows\SysWOW64\taskkill.exe
                          "C:\Windows\SysWOW64\taskkill.exe" /im AdvancedWindowsManager* /f
                          3⤵
                          • Kills process with taskkill
                          PID:4148
                      • C:\Windows\syswow64\MsiExec.exe
                        C:\Windows\syswow64\MsiExec.exe -Embedding DF8DB035C406B8A0C05626B3C0FD1609 E Global\MSI0000
                        2⤵
                        • Loads dropped DLL
                        PID:700
                      • C:\Windows\syswow64\MsiExec.exe
                        C:\Windows\syswow64\MsiExec.exe -Embedding 0D851DBEC87F804A199F66F789971620 C
                        2⤵
                          PID:2160
                        • C:\Windows\syswow64\MsiExec.exe
                          C:\Windows\syswow64\MsiExec.exe -Embedding D57CCF0D549F53E88E67FD1778AED11B
                          2⤵
                          • Blocklisted process makes network request
                          PID:1864
                        • C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\aipackagechainer.exe
                          "C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\aipackagechainer.exe"
                          2⤵
                          • Executes dropped EXE
                          • Adds Run key to start application
                          PID:4988
                          • C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\RequiredApplication_1\Weather_Installation.exe
                            "C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\RequiredApplication_1\Weather_Installation.exe" -silent=1 -AF=751__US -BF=default -uncf=default
                            3⤵
                            • Executes dropped EXE
                            PID:1376
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                        1⤵
                        • Drops file in Windows directory
                        PID:2808
                      • C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe
                        "C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mca
                        1⤵
                        • Modifies registry class
                        • Suspicious use of SetWindowsHookEx
                        PID:888
                      • C:\Windows\System32\RuntimeBroker.exe
                        C:\Windows\System32\RuntimeBroker.exe -Embedding
                        1⤵
                          PID:2956
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                          1⤵
                          • Drops file in Windows directory
                          PID:2984
                        • C:\Windows\system32\taskmgr.exe
                          "C:\Windows\system32\taskmgr.exe" /0
                          1⤵
                          • Checks SCSI registry key(s)
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of FindShellTrayWindow
                          • Suspicious use of SendNotifyMessage
                          PID:1764
                        • C:\Windows\System32\rundll32.exe
                          C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                          1⤵
                            PID:1456
                          • C:\Program Files (x86)\Lavasoft\Web Companion\Application\Lavasoft.WCAssistant.WinService.exe
                            "C:\Program Files (x86)\Lavasoft\Web Companion\Application\Lavasoft.WCAssistant.WinService.exe"
                            1⤵
                              PID:404

                            Network

                            MITRE ATT&CK Matrix ATT&CK v6

                            Persistence

                            New Service

                            1
                            T1050

                            Registry Run Keys / Startup Folder

                            1
                            T1060

                            Privilege Escalation

                            New Service

                            1
                            T1050

                            Defense Evasion

                            Modify Registry

                            2
                            T1112

                            Install Root Certificate

                            1
                            T1130

                            Credential Access

                            Credentials in Files

                            1
                            T1081

                            Discovery

                            Query Registry

                            4
                            T1012

                            Peripheral Device Discovery

                            2
                            T1120

                            System Information Discovery

                            4
                            T1082

                            Collection

                            Data from Local System

                            1
                            T1005

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Program Files (x86)\TakeMyFile\takemyfileapp2.exe
                              MD5

                              96f0ec1dd262f03d9c4dc71ca0c4abb3

                              SHA1

                              b25222639d324fe07ad6dc9cc240046bf036af85

                              SHA256

                              0555fd26a051d4576f81a6384807430dc290f997eca72e4ab6f058c79101d64b

                              SHA512

                              e9a42f045073f34b3dbab630edb1a6befee1d07d4ef0c584fcd384aca297ec9d2b66595d0ad9264338f3cf6d5fde715bac799651a8a99ecc5d369a1ddcae6899

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751
                              MD5

                              54e9306f95f32e50ccd58af19753d929

                              SHA1

                              eab9457321f34d4dcf7d4a0ac83edc9131bf7c57

                              SHA256

                              45f94dceb18a8f738a26da09ce4558995a4fe02b971882e8116fc9b59813bb72

                              SHA512

                              8711a4d866f21cdf4d4e6131ec4cfaf6821d0d22b90946be8b5a09ab868af0270a89bc326f03b858f0361a83c11a1531b894dfd1945e4812ba429a7558791f4f

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\357F04AD41BCF5FE18FCB69F60C6680F_1C9188608785142B616358BAE9B73F2D
                              MD5

                              8d720eea5e516cad40ecd8a2d212e08b

                              SHA1

                              5d3ab3b2c52d471cb769782d642944cbd9e94a97

                              SHA256

                              fe4307756718e7f4555c29d3abff96d01b12c7b254c397527dc62d3ba8d825ed

                              SHA512

                              047a4bea5dc18fdf13b477ac7fa78e7d6b953f4d958ddb3a8fe1a9d939682b33b4433fd37f4e194cc7a88f1af61dd362a25fc16d5169c6ecfb9bda3933e568ba

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\644B8874112055B5E195ECB0E8F243A4
                              MD5

                              a4c3ff630c91e854a58c0aba97555f7b

                              SHA1

                              b3d4537dd4a29bd6c5570d839051a484c749dff7

                              SHA256

                              66ca045c3102126cc7dc60d65ce281fab903e99156fb3846b69747e71743cc7f

                              SHA512

                              5b4c8bac2f5339cb6af55f66ecef24d3af4c78c8b81585a49dc5fb080baaa079a62976e763059b5b8d6b9d30f3b7bd2e96f75262038baeb173902b22c9ed0e2d

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\75CA58072B9926F763A91F0CC2798706_93E4B2BA79A897B3100CCB27F2D3BF4F
                              MD5

                              15db79133013f8a3676af10f250ad06a

                              SHA1

                              53454fb12c6781b8c95a6072a75971433180510b

                              SHA256

                              c57ce646e8e2f4e52265a73e8b279d14e9bdeada8e17537966c7a3ad81a6bbe1

                              SHA512

                              6e3764e55d39456dc596315a07a2e7b8feab2b41738dee9dd516a02cbdd95432c7019edbaa609cc1bd8ae720add0a9c83d493ab2428a47edc2996c82394ca65a

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9CB4373A4252DE8D2212929836304EC5_1AB74AA2E3A56E1B8AD8D3FEC287554E
                              MD5

                              f3eff9264ac38c152c8c65f7a3b92f57

                              SHA1

                              b89df29b8336c11d884a548fcb6d35c5cc2dff77

                              SHA256

                              0581869ececc28e9aeb4973ce389d0e331286361c552e49146909f6761071b6b

                              SHA512

                              b422b7aa4843ffbb71658c3fafa118fc523e204cf4d807b5329084d8cbc3e30f9472476109ec46ff74bc970e83df255e870bcf726bf4f91dbca7d64605f021e2

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62
                              MD5

                              d3b4a7a010339c0a27044e0f898a16b5

                              SHA1

                              eb64718c1c201c50b6d07877c8a286b274b5b8e4

                              SHA256

                              311010080becf1578e842aae708435af4abddc3bbb5a5ed69d7823db4c1e420d

                              SHA512

                              ce96337e4e89275f700f951501638304ac523b96ab549e7c5218c09c15b6a8051eeab14a051bb34140c82932c37a20d659cece3a3b6cf4af8462a1c6b805d291

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894
                              MD5

                              52bbbd3a8be1b451bf24ea2204a95b58

                              SHA1

                              23cd624677119a1dead9c3782dddd340c7fbd260

                              SHA256

                              98d435304a8a1079a98b92f848e604a70f5e936a3751ee593a60919f74b5abba

                              SHA512

                              6a9a35169724eeb2f3949545b85de01f2b5d5351a2161633976cf589252bf031b4f18f9a7244563ae23602f8c9a09e8f7f015b901e6e9f976845dbc9e6f20369

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
                              MD5

                              fc0e6b4655baa316a9d601a3847c609b

                              SHA1

                              36d585b40862c39f459e044fe43d6472c2da169c

                              SHA256

                              22e087f7285540b9d47e009ef251d78db5f4b08984febcefe810bec0bc4f311a

                              SHA512

                              7271acd620418aba5f03cc01eda971139401b93889f25b112c4dd9e62dce19574b38185ff884596494073e1d701fdd7bc34fd0f9d39267008ad8913d3c7bc9ce

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\357F04AD41BCF5FE18FCB69F60C6680F_1C9188608785142B616358BAE9B73F2D
                              MD5

                              c4021c56b1b6677c078db5773c816344

                              SHA1

                              7940fc50953afd4b12a870706ee258c52fb34bfe

                              SHA256

                              7b7b816f3243c249e6948377f10ddfa5cc44195fbec2311acdd3906e2f4474c1

                              SHA512

                              21d8da91283238daaf951badb8f109233c9ef7ba3a8b01f23ddb405210c83264b875374bb7b7d2a76e277ba969d31b9771bb7bed755bfce91ac3c10b2e57c4b8

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\644B8874112055B5E195ECB0E8F243A4
                              MD5

                              57a8468134431562a5b1a8bc6b91b1fa

                              SHA1

                              43c3a0f70efafa386bc5cb255aa67e8e983dfb4f

                              SHA256

                              6eacc34c131d4d4deba15d7cece30dc3ed90b2c845ec0406b80d66a8a9c0e9e9

                              SHA512

                              b0edbbffd89bfb3a7f6e66a5b9889fcc521a2cd9574312166449707d7ebefeaa95ea3aae6df0ff4e8625692016f76c8209eb7c18553a6a3b7747983880d11410

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\75CA58072B9926F763A91F0CC2798706_93E4B2BA79A897B3100CCB27F2D3BF4F
                              MD5

                              e640a07f53cfc6ef4d173f9cff81f91a

                              SHA1

                              40d8088c0d7b4343546f63c2d37d8dcdbf6f076c

                              SHA256

                              15f02743df0235f8fa7a67c4669508a5dc6086cef0afb4b283dbfee264fde7be

                              SHA512

                              9760f7c15e4799817fcfab3b3e829827836c5e6fbdacc11c99c4936154ed891375cb43f665dd5ec83f2d4389fa3c133b200c6ebe6c8b54e31f30a2fe7ec0bc67

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9CB4373A4252DE8D2212929836304EC5_1AB74AA2E3A56E1B8AD8D3FEC287554E
                              MD5

                              8cb6f53571c7dd4d312a38e61c9c62b4

                              SHA1

                              f436177b79033a66bc24eeccfe0218ec0531c186

                              SHA256

                              dfd7fdfc836e478ce47faca7fabf8e806875e372094cd8b19c083159213d4f39

                              SHA512

                              2858f93cd693c059d9f78450ce89fc8d221890db54ddd87a718bc0ba145f8a05ecb45f6acef80717dbe1cea8183400e6e9165631b7b46823d13418672592c56c

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62
                              MD5

                              cb90ba2821fdd2f3811a1b0b7ac8acfc

                              SHA1

                              9e69c43071cf2e8a6473093cffc58d466246ed34

                              SHA256

                              dd904813f871fb284f8b45595c9071513e2dc32378e35323ccdf0f23529b1bb8

                              SHA512

                              e202bbb6791d99b2c55a7f8a2d2f9db6a3b1d76471df8f635eb8f58c079ba9f83cd3a24a653cea1023f1c85a142ed68405a163f36b8ce6db630566ee2996e4fc

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894
                              MD5

                              4dc2b0363f2c2342fc0372d6506bf34f

                              SHA1

                              2d0104f4ef92b246f3db3a7b77a632840818bdaa

                              SHA256

                              ce51227c3c150ffda3d68ff127c73503c521da5bc84e3867f7b1e3bdec8fcde3

                              SHA512

                              8ce34a20a543f1c287974bfb6b48004287fdd91fd31090a54533891f4771d635848c017c8ea6d28c5196fdc7451162ee6e0956229dbee342ff93798bc8a5191a

                            • C:\Users\Admin\AppData\Local\Temp\MSIE4C9.tmp
                              MD5

                              07ce413b1af6342187514871dc112c74

                              SHA1

                              8008f8bfeae99918b6323a3d1270dea63b3a8394

                              SHA256

                              0ba7e90fe2a0005e1e0dad53e2678916650c3b95ff9b666b802d128276c8ec46

                              SHA512

                              27df52bfcbc2d0ce3756a2526e632b5610d7047259b31aeeff12652de3e046bcd239e39c222a323654f475f1f913679b4fdd858303e0e105f7a300b6f6ed0fe5

                            • C:\Users\Admin\AppData\Local\Temp\MSIE4C9.tmp
                              MD5

                              07ce413b1af6342187514871dc112c74

                              SHA1

                              8008f8bfeae99918b6323a3d1270dea63b3a8394

                              SHA256

                              0ba7e90fe2a0005e1e0dad53e2678916650c3b95ff9b666b802d128276c8ec46

                              SHA512

                              27df52bfcbc2d0ce3756a2526e632b5610d7047259b31aeeff12652de3e046bcd239e39c222a323654f475f1f913679b4fdd858303e0e105f7a300b6f6ed0fe5

                            • C:\Users\Admin\AppData\Local\Temp\MSIE557.tmp
                              MD5

                              e6a708c70a8cfd78b7c0383615545158

                              SHA1

                              b9274d9bf4750f557d34ddfd802113f5dd1df91c

                              SHA256

                              e124c00f974e0c09200676e7ce2147c3822b4cd4764dcc970e832bd93d869d0c

                              SHA512

                              2d0162f268f357a29c8bc35f855678e8e47e8a70825130e73e40a7dca1e9a3d8844b66616bfaa156b16fa4162bcf6991f659b3a6e8ee3caf841c87ec16189ff8

                            • C:\Users\Admin\AppData\Local\Temp\MSIE557.tmp
                              MD5

                              e6a708c70a8cfd78b7c0383615545158

                              SHA1

                              b9274d9bf4750f557d34ddfd802113f5dd1df91c

                              SHA256

                              e124c00f974e0c09200676e7ce2147c3822b4cd4764dcc970e832bd93d869d0c

                              SHA512

                              2d0162f268f357a29c8bc35f855678e8e47e8a70825130e73e40a7dca1e9a3d8844b66616bfaa156b16fa4162bcf6991f659b3a6e8ee3caf841c87ec16189ff8

                            • C:\Users\Admin\AppData\Local\Temp\is-CL5T4.tmp\setup_0.tmp
                              MD5

                              1afbd25db5c9a90fe05309f7c4fbcf09

                              SHA1

                              baf330b5c249ca925b4ea19a52fe8b2c27e547fa

                              SHA256

                              3bb0ee5569fe5453c6b3fa25aa517b925d4f8d1f7ba3475e58fa09c46290658c

                              SHA512

                              3a448f06862c6d163fd58b68b836d866ae513e04a69774abf5a0c5b7df74f5b9ee37240083760185618c5068bf93e7fd812e76b3e530639111fb1d74f4d28419

                            • C:\Users\Admin\AppData\Local\Temp\is-CL5T4.tmp\setup_0.tmp
                              MD5

                              1afbd25db5c9a90fe05309f7c4fbcf09

                              SHA1

                              baf330b5c249ca925b4ea19a52fe8b2c27e547fa

                              SHA256

                              3bb0ee5569fe5453c6b3fa25aa517b925d4f8d1f7ba3475e58fa09c46290658c

                              SHA512

                              3a448f06862c6d163fd58b68b836d866ae513e04a69774abf5a0c5b7df74f5b9ee37240083760185618c5068bf93e7fd812e76b3e530639111fb1d74f4d28419

                            • C:\Users\Admin\AppData\Local\Temp\is-D9M3F.tmp\setup.tmp
                              MD5

                              38e9177040663abdf7cb42d237b03d9d

                              SHA1

                              0b95b3694406d9d86aa3e4953f42d471977ff03d

                              SHA256

                              2a322dbda4ac86aed04ab99f9f2c277c2f84b6046e234c3ae55ceec53883b594

                              SHA512

                              78db4c72b2e10d665775e7f306d926060c95ba47610e809e0a21006280f9f0280fa572168b9c9ee00e2121090db9a20dc524677d961fea4292c41c44ba3cb30f

                            • C:\Users\Admin\AppData\Local\Temp\is-GKGMC.tmp\setup_1.tmp
                              MD5

                              9303156631ee2436db23827e27337be4

                              SHA1

                              018e0d5b6ccf7000e36af30cebeb8adc5667e5fa

                              SHA256

                              bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4

                              SHA512

                              9fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f

                            • C:\Users\Admin\AppData\Local\Temp\is-GKGMC.tmp\setup_1.tmp
                              MD5

                              9303156631ee2436db23827e27337be4

                              SHA1

                              018e0d5b6ccf7000e36af30cebeb8adc5667e5fa

                              SHA256

                              bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4

                              SHA512

                              9fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f

                            • C:\Users\Admin\AppData\Local\Temp\is-J32KT.tmp\run_848a9.tmp
                              MD5

                              172be78472394107d27ae2337ad8bf58

                              SHA1

                              530b852a568698a51fb11e137f8c5da54c21a29c

                              SHA256

                              b45d8b87c446af32aaead1b658bb10b22ba951cba63d432f665cd8c0150a576b

                              SHA512

                              903f4f3846627e03593163e89c2cd06c43a76cccbadd7eb345fd851433d290cc95737255f12d961106b43bc0a3012ea577fca0246dd7ead4665786654f122a22

                            • C:\Users\Admin\AppData\Local\Temp\is-J32KT.tmp\run_848a9.tmp
                              MD5

                              172be78472394107d27ae2337ad8bf58

                              SHA1

                              530b852a568698a51fb11e137f8c5da54c21a29c

                              SHA256

                              b45d8b87c446af32aaead1b658bb10b22ba951cba63d432f665cd8c0150a576b

                              SHA512

                              903f4f3846627e03593163e89c2cd06c43a76cccbadd7eb345fd851433d290cc95737255f12d961106b43bc0a3012ea577fca0246dd7ead4665786654f122a22

                            • C:\Users\Admin\AppData\Local\Temp\is-JVBGT.tmp\setup.exe
                              MD5

                              af5770a146da7de3837f95f622c150e5

                              SHA1

                              83edfc1970dcec10ac1a3fad0281486b8fc23810

                              SHA256

                              864a35c54d0d9aa563d4e300bd003c83502f45df8736c2f6bbb0edf74870a2e7

                              SHA512

                              15f40a0d8af86b809768ff6ee87633be59ab06d2db2b6281c30bd2e81a9b10fefb9f9737e9a770e9b084997086c45e6d3d9a2ce70ec29b0b94eab04157a2d936

                            • C:\Users\Admin\AppData\Local\Temp\is-JVBGT.tmp\setup.exe
                              MD5

                              af5770a146da7de3837f95f622c150e5

                              SHA1

                              83edfc1970dcec10ac1a3fad0281486b8fc23810

                              SHA256

                              864a35c54d0d9aa563d4e300bd003c83502f45df8736c2f6bbb0edf74870a2e7

                              SHA512

                              15f40a0d8af86b809768ff6ee87633be59ab06d2db2b6281c30bd2e81a9b10fefb9f9737e9a770e9b084997086c45e6d3d9a2ce70ec29b0b94eab04157a2d936

                            • C:\Users\Admin\AppData\Local\Temp\is-SFH1C.tmp\hostwin.exe
                              MD5

                              b3bb91ad96f2d4c041861ce59ba6ac73

                              SHA1

                              e18c6fd6a0d0d5c124c9ef6972a76c47c28c80a3

                              SHA256

                              0581160998be30f79bd9a0925a01b0ebc4cb94265dfa7f8da1e2839bf0f1e426

                              SHA512

                              e3a8426d202a8aad79aad5d75549753cf70b9c2c0fa4c9468f03d089eca8e529b56cd8fa16b7be3a4cfc019d43ff458b9dc8a1cae44b6ed75e27f21489a2cbdd

                            • C:\Users\Admin\AppData\Local\Temp\is-SFH1C.tmp\hostwin.exe
                              MD5

                              b3bb91ad96f2d4c041861ce59ba6ac73

                              SHA1

                              e18c6fd6a0d0d5c124c9ef6972a76c47c28c80a3

                              SHA256

                              0581160998be30f79bd9a0925a01b0ebc4cb94265dfa7f8da1e2839bf0f1e426

                              SHA512

                              e3a8426d202a8aad79aad5d75549753cf70b9c2c0fa4c9468f03d089eca8e529b56cd8fa16b7be3a4cfc019d43ff458b9dc8a1cae44b6ed75e27f21489a2cbdd

                            • C:\Users\Admin\AppData\Local\Temp\is-SFH1C.tmp\idp.dll
                              MD5

                              b37377d34c8262a90ff95a9a92b65ed8

                              SHA1

                              faeef415bd0bc2a08cf9fe1e987007bf28e7218d

                              SHA256

                              e5a0ad2e37dde043a0dd4ad7634961ff3f0d70e87d2db49761eb4c1f468bb02f

                              SHA512

                              69d8da5b45d9b4b996d32328d3402fa37a3d710564d47c474bf9e15c1e45bc15b2858dbab446e6baec0c099d99007ff1099e9c4e66cfd1597f28c420bb50fdcc

                            • C:\Users\Admin\AppData\Local\Temp\is-VC82Q.tmp\idp.dll
                              MD5

                              55c310c0319260d798757557ab3bf636

                              SHA1

                              0892eb7ed31d8bb20a56c6835990749011a2d8de

                              SHA256

                              54e7e0ad32a22b775131a6288f083ed3286a9a436941377fc20f85dd9ad983ed

                              SHA512

                              e0082109737097658677d7963cbf28d412dca3fa8f5812c2567e53849336ce45ebae2c0430df74bfe16c0f3eebb46961bc1a10f32ca7947692a900162128ae57

                            • C:\Users\Admin\AppData\Local\Temp\is-VC82Q.tmp\setup_0.exe
                              MD5

                              2c9cd007de9f99579da31ce28481ede0

                              SHA1

                              72b8f13007747ca6231f7da558fec3fa1b996b98

                              SHA256

                              3b87f07a3ed4782c8fcebe44ae6b036d717aa127db34995c24f2d9f1c7dce44d

                              SHA512

                              f3c7c1b47839d628b94701f12165113cb3e300cf46e2b213267159465713bbae26be70c48be652365a5bebf9559e9ec46310914a983ddf9b86a9708b5441d447

                            • C:\Users\Admin\AppData\Local\Temp\is-VC82Q.tmp\setup_0.exe
                              MD5

                              2c9cd007de9f99579da31ce28481ede0

                              SHA1

                              72b8f13007747ca6231f7da558fec3fa1b996b98

                              SHA256

                              3b87f07a3ed4782c8fcebe44ae6b036d717aa127db34995c24f2d9f1c7dce44d

                              SHA512

                              f3c7c1b47839d628b94701f12165113cb3e300cf46e2b213267159465713bbae26be70c48be652365a5bebf9559e9ec46310914a983ddf9b86a9708b5441d447

                            • C:\Users\Admin\AppData\Local\Temp\is-VC82Q.tmp\setup_1.exe
                              MD5

                              5dd257000cde6a086046cadff128eba9

                              SHA1

                              cbef6958c188daa91e66607443a0421b36b35f19

                              SHA256

                              f8f138e3290ccbaa58efe016d661eb19cb8731ff89a5df2af5015a22becdb0dd

                              SHA512

                              7a1139f109ea5d47e312b850ec904c762028b5cc35254ac2dd9f2fe1bf74b70f0c5dbaaced48b63b0485116db99a1c23acf62ae96e0f07bcfcd018f10abc939c

                            • C:\Users\Admin\AppData\Local\Temp\is-VC82Q.tmp\setup_1.exe
                              MD5

                              5dd257000cde6a086046cadff128eba9

                              SHA1

                              cbef6958c188daa91e66607443a0421b36b35f19

                              SHA256

                              f8f138e3290ccbaa58efe016d661eb19cb8731ff89a5df2af5015a22becdb0dd

                              SHA512

                              7a1139f109ea5d47e312b850ec904c762028b5cc35254ac2dd9f2fe1bf74b70f0c5dbaaced48b63b0485116db99a1c23acf62ae96e0f07bcfcd018f10abc939c

                            • C:\Users\Admin\AppData\Local\Temp\is-VC82Q.tmp\setup_2.exe
                              MD5

                              4089790fa14889f8990d9a1e31e8a041

                              SHA1

                              b44f3012ade8d942166fbf2d4833a40c934cd7e7

                              SHA256

                              6c33bfeb38fdf3dc27297f92c66ae750f7260a955e155582ccd725af23aec880

                              SHA512

                              90026d9fd1e6f55decc8c8792c16122563def33dc4dac3f0db7c9b297bdc26e059fcb5f732deb752bca98c366c1ba1fbf0c5f3e74331616122c52db1d9a7f796

                            • C:\Users\Admin\AppData\Local\Temp\is-VC82Q.tmp\setup_2.exe
                              MD5

                              4089790fa14889f8990d9a1e31e8a041

                              SHA1

                              b44f3012ade8d942166fbf2d4833a40c934cd7e7

                              SHA256

                              6c33bfeb38fdf3dc27297f92c66ae750f7260a955e155582ccd725af23aec880

                              SHA512

                              90026d9fd1e6f55decc8c8792c16122563def33dc4dac3f0db7c9b297bdc26e059fcb5f732deb752bca98c366c1ba1fbf0c5f3e74331616122c52db1d9a7f796

                            • C:\Users\Admin\AppData\Local\Temp\is-VC82Q.tmp\setup_3.exe
                              MD5

                              78b13010746f790292949e6bd53321da

                              SHA1

                              fdc327892bd4d3f41b0a5210dbdd54e381ff3ae3

                              SHA256

                              b945185dc04126878956ebc6246cb62391edba6e64d954f3f33ce767e74238e7

                              SHA512

                              2422e5c7e354e6b6fb9f539cb56c6a6bc9ca9dcd0eeda80209975819504f59ce09e49c5e5586d6a646e6c16dd4fba87422d1dbd7d590c49f67a2fda2489dca9c

                            • C:\Users\Admin\AppData\Roaming\Settings\Settings 1.0.0\install\FD7DF1F\Settings Installation.msi
                              MD5

                              acadfc9d99be20d8c9f710f0df886ae1

                              SHA1

                              998fd9d3d172c3ab7498d74fcfff748792013edd

                              SHA256

                              186dff721282a6eacb1f69010cd8f1e95332eb5e572c155faee7d1a45a91fdb7

                              SHA512

                              d996222f5c1e0dab0916ecfb797fd863c9e64b258e9c1f9f112f60bbd43b6af558d14eb856865f2d042c3464b2258c4cf8cdd43257329c8ac2ca930df12cb073

                            • C:\Users\Admin\AppData\Roaming\Settings\Settings 1.0.0\install\decoder.dll
                              MD5

                              62326d3ef35667b1533673d2bb1d342c

                              SHA1

                              8100ce90b7cbddd7ef2fd77c544ebf12ebd5ec33

                              SHA256

                              a087b791ff8ff9e05e339600199aa389a4554050acc7af7fa36dbe208be7382e

                              SHA512

                              7321feae8ee8d0653d7bd935e3d2e6f658e6798b2a7a8f44976c58509028e79284582132cb999c7c3124a7e94960d9c5d5fc8edefaeda06275ab725730d0d9b5

                            • C:\Users\Admin\AppData\Roaming\Settings\Settings\prerequisites\RequiredApplication_1\Settings%20Installation.exe
                              MD5

                              96e2ab9849c69367fa6643514045b291

                              SHA1

                              4de21a728d4d1d2961ae065f2e96be6b268de409

                              SHA256

                              5d596c1c19bb7712dcb8e2a43811849b1e9879bab81de86c9eb3b445f0d65cc3

                              SHA512

                              4327bdfaaf8043303fede40e68f5381a9a33546db1f17e8504fb663cff729aac22d61d332b5d552dbad01d7cbc66072edf7d2b215fa704da0c9f41b706fd8c4a

                            • C:\Users\Admin\AppData\Roaming\Settings\Settings\prerequisites\aipackagechainer.exe
                              MD5

                              fc8c4b0f7d641f4211f047c0a1b27a2c

                              SHA1

                              fc5ac7e9e7fe0df52a7f3c8a7a41e9c9612c4690

                              SHA256

                              58ddfce3ee3b2ac7dce6aeed19a686d4108897ab7b7fff6e91d63b35648226d4

                              SHA512

                              6f4154d4c02f0792961e52a2770e4f32eada5de247a5ada95536a78c52ba3462973304d1a6435c6da8fbe8b8264df7cf295c62642848c0d944e31d69138d23a1

                            • C:\Users\Admin\AppData\Roaming\Settings\Settings\prerequisites\aipackagechainer.ini
                              MD5

                              928f96a3198f48c845808c3e90c1455a

                              SHA1

                              969e77a29fcb210930c4e7e3e5140511d0a107cb

                              SHA256

                              f5f75d9fd7e0ccf7180c916cae73f6e51bb89465231186bca284823d755ddea7

                              SHA512

                              144304ba9750308bb974772733ffb39025dfb20f25d598e535222cc9bd4b897519c529b41d1ecb66233a566dd0016f470b8c74ff34edc67e1e37552e26dca00a

                            • C:\Windows\Installer\MSIE9BA.tmp
                              MD5

                              842cc23e74711a7b6955e6876c0641ce

                              SHA1

                              3c7f32c373e03d76e9f5d76d2dfdcb6508c7af56

                              SHA256

                              7e434d53739356b7f74c5143b98138c6b67b38c2dbd772a28e8dde70e8be8644

                              SHA512

                              dd8323f657786fae516b400fe6b0569b8d4d16ccb4b396648b427e875d9e5b1eb7a874338d386f0940dc370de6fecf9893efd28149745bc9fd3f67a792ec824d

                            • C:\Windows\Installer\MSIE9BA.tmp
                              MD5

                              842cc23e74711a7b6955e6876c0641ce

                              SHA1

                              3c7f32c373e03d76e9f5d76d2dfdcb6508c7af56

                              SHA256

                              7e434d53739356b7f74c5143b98138c6b67b38c2dbd772a28e8dde70e8be8644

                              SHA512

                              dd8323f657786fae516b400fe6b0569b8d4d16ccb4b396648b427e875d9e5b1eb7a874338d386f0940dc370de6fecf9893efd28149745bc9fd3f67a792ec824d

                            • C:\Windows\Installer\MSIECF7.tmp
                              MD5

                              07ce413b1af6342187514871dc112c74

                              SHA1

                              8008f8bfeae99918b6323a3d1270dea63b3a8394

                              SHA256

                              0ba7e90fe2a0005e1e0dad53e2678916650c3b95ff9b666b802d128276c8ec46

                              SHA512

                              27df52bfcbc2d0ce3756a2526e632b5610d7047259b31aeeff12652de3e046bcd239e39c222a323654f475f1f913679b4fdd858303e0e105f7a300b6f6ed0fe5

                            • C:\Windows\Installer\MSIECF7.tmp
                              MD5

                              07ce413b1af6342187514871dc112c74

                              SHA1

                              8008f8bfeae99918b6323a3d1270dea63b3a8394

                              SHA256

                              0ba7e90fe2a0005e1e0dad53e2678916650c3b95ff9b666b802d128276c8ec46

                              SHA512

                              27df52bfcbc2d0ce3756a2526e632b5610d7047259b31aeeff12652de3e046bcd239e39c222a323654f475f1f913679b4fdd858303e0e105f7a300b6f6ed0fe5

                            • C:\Windows\Installer\MSIED46.tmp
                              MD5

                              07ce413b1af6342187514871dc112c74

                              SHA1

                              8008f8bfeae99918b6323a3d1270dea63b3a8394

                              SHA256

                              0ba7e90fe2a0005e1e0dad53e2678916650c3b95ff9b666b802d128276c8ec46

                              SHA512

                              27df52bfcbc2d0ce3756a2526e632b5610d7047259b31aeeff12652de3e046bcd239e39c222a323654f475f1f913679b4fdd858303e0e105f7a300b6f6ed0fe5

                            • C:\Windows\Installer\MSIED46.tmp
                              MD5

                              07ce413b1af6342187514871dc112c74

                              SHA1

                              8008f8bfeae99918b6323a3d1270dea63b3a8394

                              SHA256

                              0ba7e90fe2a0005e1e0dad53e2678916650c3b95ff9b666b802d128276c8ec46

                              SHA512

                              27df52bfcbc2d0ce3756a2526e632b5610d7047259b31aeeff12652de3e046bcd239e39c222a323654f475f1f913679b4fdd858303e0e105f7a300b6f6ed0fe5

                            • C:\Windows\Installer\MSIED76.tmp
                              MD5

                              07ce413b1af6342187514871dc112c74

                              SHA1

                              8008f8bfeae99918b6323a3d1270dea63b3a8394

                              SHA256

                              0ba7e90fe2a0005e1e0dad53e2678916650c3b95ff9b666b802d128276c8ec46

                              SHA512

                              27df52bfcbc2d0ce3756a2526e632b5610d7047259b31aeeff12652de3e046bcd239e39c222a323654f475f1f913679b4fdd858303e0e105f7a300b6f6ed0fe5

                            • C:\Windows\Installer\MSIED76.tmp
                              MD5

                              07ce413b1af6342187514871dc112c74

                              SHA1

                              8008f8bfeae99918b6323a3d1270dea63b3a8394

                              SHA256

                              0ba7e90fe2a0005e1e0dad53e2678916650c3b95ff9b666b802d128276c8ec46

                              SHA512

                              27df52bfcbc2d0ce3756a2526e632b5610d7047259b31aeeff12652de3e046bcd239e39c222a323654f475f1f913679b4fdd858303e0e105f7a300b6f6ed0fe5

                            • C:\Windows\Installer\MSIEDA6.tmp
                              MD5

                              e6a708c70a8cfd78b7c0383615545158

                              SHA1

                              b9274d9bf4750f557d34ddfd802113f5dd1df91c

                              SHA256

                              e124c00f974e0c09200676e7ce2147c3822b4cd4764dcc970e832bd93d869d0c

                              SHA512

                              2d0162f268f357a29c8bc35f855678e8e47e8a70825130e73e40a7dca1e9a3d8844b66616bfaa156b16fa4162bcf6991f659b3a6e8ee3caf841c87ec16189ff8

                            • C:\Windows\Installer\MSIEDA6.tmp
                              MD5

                              e6a708c70a8cfd78b7c0383615545158

                              SHA1

                              b9274d9bf4750f557d34ddfd802113f5dd1df91c

                              SHA256

                              e124c00f974e0c09200676e7ce2147c3822b4cd4764dcc970e832bd93d869d0c

                              SHA512

                              2d0162f268f357a29c8bc35f855678e8e47e8a70825130e73e40a7dca1e9a3d8844b66616bfaa156b16fa4162bcf6991f659b3a6e8ee3caf841c87ec16189ff8

                            • C:\Windows\Installer\MSIEDC6.tmp
                              MD5

                              f32ac1d425e8b7c320d6be9a968585ab

                              SHA1

                              3b0bd3122226f2ac9f11664d9fc13d699b6dcfa0

                              SHA256

                              96f8d286f86055dcb3a15e0f3a2de092b0441ec36455c14caaad4c1f5a227894

                              SHA512

                              d8d9d996e279b7500306614448d61d5c3ac9c2efc28ac71d1daa09951f342d2cf773f0a7b51cb847f4d91dd34018e4a2d7977c0f6f2859795d4f0df7ac894b27

                            • C:\Windows\Installer\MSIEDC6.tmp
                              MD5

                              f32ac1d425e8b7c320d6be9a968585ab

                              SHA1

                              3b0bd3122226f2ac9f11664d9fc13d699b6dcfa0

                              SHA256

                              96f8d286f86055dcb3a15e0f3a2de092b0441ec36455c14caaad4c1f5a227894

                              SHA512

                              d8d9d996e279b7500306614448d61d5c3ac9c2efc28ac71d1daa09951f342d2cf773f0a7b51cb847f4d91dd34018e4a2d7977c0f6f2859795d4f0df7ac894b27

                            • C:\Windows\Installer\MSIEF2E.tmp
                              MD5

                              f32ac1d425e8b7c320d6be9a968585ab

                              SHA1

                              3b0bd3122226f2ac9f11664d9fc13d699b6dcfa0

                              SHA256

                              96f8d286f86055dcb3a15e0f3a2de092b0441ec36455c14caaad4c1f5a227894

                              SHA512

                              d8d9d996e279b7500306614448d61d5c3ac9c2efc28ac71d1daa09951f342d2cf773f0a7b51cb847f4d91dd34018e4a2d7977c0f6f2859795d4f0df7ac894b27

                            • C:\Windows\Installer\MSIEF2E.tmp
                              MD5

                              f32ac1d425e8b7c320d6be9a968585ab

                              SHA1

                              3b0bd3122226f2ac9f11664d9fc13d699b6dcfa0

                              SHA256

                              96f8d286f86055dcb3a15e0f3a2de092b0441ec36455c14caaad4c1f5a227894

                              SHA512

                              d8d9d996e279b7500306614448d61d5c3ac9c2efc28ac71d1daa09951f342d2cf773f0a7b51cb847f4d91dd34018e4a2d7977c0f6f2859795d4f0df7ac894b27

                            • C:\Windows\Installer\MSIEF3F.tmp
                              MD5

                              07ce413b1af6342187514871dc112c74

                              SHA1

                              8008f8bfeae99918b6323a3d1270dea63b3a8394

                              SHA256

                              0ba7e90fe2a0005e1e0dad53e2678916650c3b95ff9b666b802d128276c8ec46

                              SHA512

                              27df52bfcbc2d0ce3756a2526e632b5610d7047259b31aeeff12652de3e046bcd239e39c222a323654f475f1f913679b4fdd858303e0e105f7a300b6f6ed0fe5

                            • C:\Windows\Installer\MSIEF3F.tmp
                              MD5

                              07ce413b1af6342187514871dc112c74

                              SHA1

                              8008f8bfeae99918b6323a3d1270dea63b3a8394

                              SHA256

                              0ba7e90fe2a0005e1e0dad53e2678916650c3b95ff9b666b802d128276c8ec46

                              SHA512

                              27df52bfcbc2d0ce3756a2526e632b5610d7047259b31aeeff12652de3e046bcd239e39c222a323654f475f1f913679b4fdd858303e0e105f7a300b6f6ed0fe5

                            • C:\Windows\Installer\MSIEFBD.tmp
                              MD5

                              f32ac1d425e8b7c320d6be9a968585ab

                              SHA1

                              3b0bd3122226f2ac9f11664d9fc13d699b6dcfa0

                              SHA256

                              96f8d286f86055dcb3a15e0f3a2de092b0441ec36455c14caaad4c1f5a227894

                              SHA512

                              d8d9d996e279b7500306614448d61d5c3ac9c2efc28ac71d1daa09951f342d2cf773f0a7b51cb847f4d91dd34018e4a2d7977c0f6f2859795d4f0df7ac894b27

                            • C:\Windows\Installer\MSIEFBD.tmp
                              MD5

                              f32ac1d425e8b7c320d6be9a968585ab

                              SHA1

                              3b0bd3122226f2ac9f11664d9fc13d699b6dcfa0

                              SHA256

                              96f8d286f86055dcb3a15e0f3a2de092b0441ec36455c14caaad4c1f5a227894

                              SHA512

                              d8d9d996e279b7500306614448d61d5c3ac9c2efc28ac71d1daa09951f342d2cf773f0a7b51cb847f4d91dd34018e4a2d7977c0f6f2859795d4f0df7ac894b27

                            • C:\Windows\Installer\MSIF359.tmp
                              MD5

                              f32ac1d425e8b7c320d6be9a968585ab

                              SHA1

                              3b0bd3122226f2ac9f11664d9fc13d699b6dcfa0

                              SHA256

                              96f8d286f86055dcb3a15e0f3a2de092b0441ec36455c14caaad4c1f5a227894

                              SHA512

                              d8d9d996e279b7500306614448d61d5c3ac9c2efc28ac71d1daa09951f342d2cf773f0a7b51cb847f4d91dd34018e4a2d7977c0f6f2859795d4f0df7ac894b27

                            • C:\Windows\Installer\MSIF359.tmp
                              MD5

                              f32ac1d425e8b7c320d6be9a968585ab

                              SHA1

                              3b0bd3122226f2ac9f11664d9fc13d699b6dcfa0

                              SHA256

                              96f8d286f86055dcb3a15e0f3a2de092b0441ec36455c14caaad4c1f5a227894

                              SHA512

                              d8d9d996e279b7500306614448d61d5c3ac9c2efc28ac71d1daa09951f342d2cf773f0a7b51cb847f4d91dd34018e4a2d7977c0f6f2859795d4f0df7ac894b27

                            • memory/404-349-0x0000000001730000-0x0000000001732000-memory.dmp
                              Filesize

                              8KB

                            • memory/700-259-0x0000000000000000-mapping.dmp
                            • memory/700-260-0x00000000031E0000-0x00000000031E1000-memory.dmp
                              Filesize

                              4KB

                            • memory/700-261-0x00000000031E0000-0x00000000031E1000-memory.dmp
                              Filesize

                              4KB

                            • memory/888-268-0x000002375E0B0000-0x000002375E0B2000-memory.dmp
                              Filesize

                              8KB

                            • memory/888-269-0x000002375E0B0000-0x000002375E0B2000-memory.dmp
                              Filesize

                              8KB

                            • memory/888-272-0x000002375E0B0000-0x000002375E0B2000-memory.dmp
                              Filesize

                              8KB

                            • memory/1036-201-0x0000000000000000-mapping.dmp
                            • memory/1036-202-0x0000000003530000-0x0000000003531000-memory.dmp
                              Filesize

                              4KB

                            • memory/1036-203-0x0000000003530000-0x0000000003531000-memory.dmp
                              Filesize

                              4KB

                            • memory/1208-149-0x0000000000000000-mapping.dmp
                            • memory/1208-151-0x00000000027C0000-0x00000000027C1000-memory.dmp
                              Filesize

                              4KB

                            • memory/1312-307-0x00000182A7F20000-0x00000182A7F22000-memory.dmp
                              Filesize

                              8KB

                            • memory/1312-305-0x00000182A7F20000-0x00000182A7F22000-memory.dmp
                              Filesize

                              8KB

                            • memory/1312-302-0x00000182A7F20000-0x00000182A7F22000-memory.dmp
                              Filesize

                              8KB

                            • memory/1312-299-0x0000000000000000-mapping.dmp
                            • memory/1312-303-0x00000182A7F20000-0x00000182A7F22000-memory.dmp
                              Filesize

                              8KB

                            • memory/1376-332-0x0000000000000000-mapping.dmp
                            • memory/1404-246-0x0000000000000000-mapping.dmp
                            • memory/1528-345-0x0000000000000000-mapping.dmp
                            • memory/1572-294-0x00000203968D0000-0x00000203968D2000-memory.dmp
                              Filesize

                              8KB

                            • memory/1572-295-0x00000203968D0000-0x00000203968D2000-memory.dmp
                              Filesize

                              8KB

                            • memory/1572-293-0x0000000000000000-mapping.dmp
                            • memory/1672-249-0x0000000000000000-mapping.dmp
                            • memory/1672-251-0x0000000002CD0000-0x0000000002CD1000-memory.dmp
                              Filesize

                              4KB

                            • memory/1672-250-0x0000000002CD0000-0x0000000002CD1000-memory.dmp
                              Filesize

                              4KB

                            • memory/1752-325-0x0000000000000000-mapping.dmp
                            • memory/1864-322-0x0000000000000000-mapping.dmp
                            • memory/1956-182-0x0000000000400000-0x0000000000414000-memory.dmp
                              Filesize

                              80KB

                            • memory/1956-174-0x0000000000000000-mapping.dmp
                            • memory/1984-181-0x0000000002790000-0x0000000002791000-memory.dmp
                              Filesize

                              4KB

                            • memory/1984-172-0x0000000000000000-mapping.dmp
                            • memory/2008-319-0x0000000000000000-mapping.dmp
                            • memory/2016-257-0x00000000029F0000-0x00000000029F1000-memory.dmp
                              Filesize

                              4KB

                            • memory/2016-256-0x00000000029F0000-0x00000000029F1000-memory.dmp
                              Filesize

                              4KB

                            • memory/2016-255-0x0000000000000000-mapping.dmp
                            • memory/2156-161-0x00000000027A0000-0x00000000027A1000-memory.dmp
                              Filesize

                              4KB

                            • memory/2156-158-0x0000000000000000-mapping.dmp
                            • memory/2160-316-0x0000000000000000-mapping.dmp
                            • memory/2160-317-0x0000000002F80000-0x0000000002F81000-memory.dmp
                              Filesize

                              4KB

                            • memory/2192-178-0x0000000000000000-mapping.dmp
                            • memory/2192-183-0x0000000000700000-0x0000000000701000-memory.dmp
                              Filesize

                              4KB

                            • memory/2216-266-0x0000000004910000-0x0000000004911000-memory.dmp
                              Filesize

                              4KB

                            • memory/2216-315-0x0000000004910000-0x0000000004911000-memory.dmp
                              Filesize

                              4KB

                            • memory/2216-314-0x0000000006BF5000-0x0000000006BF7000-memory.dmp
                              Filesize

                              8KB

                            • memory/2216-286-0x00000000082E0000-0x00000000082E1000-memory.dmp
                              Filesize

                              4KB

                            • memory/2216-282-0x0000000007BC0000-0x0000000007BC1000-memory.dmp
                              Filesize

                              4KB

                            • memory/2216-281-0x00000000081E0000-0x00000000081E1000-memory.dmp
                              Filesize

                              4KB

                            • memory/2216-280-0x0000000007E80000-0x0000000007E81000-memory.dmp
                              Filesize

                              4KB

                            • memory/2216-265-0x0000000000000000-mapping.dmp
                            • memory/2216-279-0x0000000007A40000-0x0000000007A41000-memory.dmp
                              Filesize

                              4KB

                            • memory/2216-267-0x0000000004910000-0x0000000004911000-memory.dmp
                              Filesize

                              4KB

                            • memory/2216-278-0x00000000079D0000-0x00000000079D1000-memory.dmp
                              Filesize

                              4KB

                            • memory/2216-276-0x0000000006BF0000-0x0000000006BF1000-memory.dmp
                              Filesize

                              4KB

                            • memory/2216-270-0x0000000004A30000-0x0000000004A31000-memory.dmp
                              Filesize

                              4KB

                            • memory/2216-271-0x0000000007230000-0x0000000007231000-memory.dmp
                              Filesize

                              4KB

                            • memory/2216-277-0x0000000006BF2000-0x0000000006BF3000-memory.dmp
                              Filesize

                              4KB

                            • memory/2216-273-0x0000000007050000-0x0000000007051000-memory.dmp
                              Filesize

                              4KB

                            • memory/2216-274-0x00000000071B0000-0x00000000071B1000-memory.dmp
                              Filesize

                              4KB

                            • memory/2216-275-0x0000000007BF0000-0x0000000007BF1000-memory.dmp
                              Filesize

                              4KB

                            • memory/2224-328-0x0000000000000000-mapping.dmp
                            • memory/2256-252-0x0000000000000000-mapping.dmp
                            • memory/2256-254-0x0000000003440000-0x0000000003441000-memory.dmp
                              Filesize

                              4KB

                            • memory/2256-253-0x0000000003440000-0x0000000003441000-memory.dmp
                              Filesize

                              4KB

                            • memory/2488-160-0x0000000000400000-0x00000000004D8000-memory.dmp
                              Filesize

                              864KB

                            • memory/2488-153-0x0000000000000000-mapping.dmp
                            • memory/2556-333-0x0000000000000000-mapping.dmp
                            • memory/2644-343-0x0000000000000000-mapping.dmp
                            • memory/2760-185-0x0000000000000000-mapping.dmp
                            • memory/2792-171-0x00000000022F0000-0x00000000022F1000-memory.dmp
                              Filesize

                              4KB

                            • memory/2792-167-0x0000000000000000-mapping.dmp
                            • memory/2924-298-0x0000000000000000-mapping.dmp
                            • memory/2924-306-0x000001AF26B60000-0x000001AF26B62000-memory.dmp
                              Filesize

                              8KB

                            • memory/2924-300-0x000001AF26B60000-0x000001AF26B62000-memory.dmp
                              Filesize

                              8KB

                            • memory/2924-301-0x000001AF26B60000-0x000001AF26B62000-memory.dmp
                              Filesize

                              8KB

                            • memory/2924-304-0x000001AF26B60000-0x000001AF26B62000-memory.dmp
                              Filesize

                              8KB

                            • memory/2992-339-0x0000000000000000-mapping.dmp
                            • memory/3100-170-0x0000000000400000-0x0000000000415000-memory.dmp
                              Filesize

                              84KB

                            • memory/3100-163-0x0000000000000000-mapping.dmp
                            • memory/3140-192-0x0000029A3F0E0000-0x0000029A3F0E2000-memory.dmp
                              Filesize

                              8KB

                            • memory/3140-193-0x0000029A3F0E0000-0x0000029A3F0E2000-memory.dmp
                              Filesize

                              8KB

                            • memory/3188-313-0x0000000000000000-mapping.dmp
                            • memory/3444-148-0x0000000000400000-0x00000000004CC000-memory.dmp
                              Filesize

                              816KB

                            • memory/3916-346-0x0000000000000000-mapping.dmp
                            • memory/3932-342-0x0000000000000000-mapping.dmp
                            • memory/3936-344-0x0000000000000000-mapping.dmp
                            • memory/3956-296-0x00000282C31E0000-0x00000282C31E2000-memory.dmp
                              Filesize

                              8KB

                            • memory/3956-297-0x00000282C31E0000-0x00000282C31E2000-memory.dmp
                              Filesize

                              8KB

                            • memory/3956-287-0x0000000000000000-mapping.dmp
                            • memory/3956-289-0x00000282C31E0000-0x00000282C31E2000-memory.dmp
                              Filesize

                              8KB

                            • memory/3956-290-0x00000282C31E0000-0x00000282C31E2000-memory.dmp
                              Filesize

                              8KB

                            • memory/3964-264-0x000001FB0E4E0000-0x000001FB0E4E2000-memory.dmp
                              Filesize

                              8KB

                            • memory/3964-263-0x000001FB0E4E0000-0x000001FB0E4E2000-memory.dmp
                              Filesize

                              8KB

                            • memory/3964-262-0x0000000000000000-mapping.dmp
                            • memory/4060-194-0x0000000000000000-mapping.dmp
                            • memory/4060-196-0x00000000026E0000-0x00000000026E1000-memory.dmp
                              Filesize

                              4KB

                            • memory/4060-195-0x00000000026E0000-0x00000000026E1000-memory.dmp
                              Filesize

                              4KB

                            • memory/4128-248-0x0000000000000000-mapping.dmp
                            • memory/4148-258-0x0000000000000000-mapping.dmp
                            • memory/4304-188-0x0000000000000000-mapping.dmp
                            • memory/4420-288-0x0000000000000000-mapping.dmp
                            • memory/4420-291-0x00000260899A0000-0x00000260899A2000-memory.dmp
                              Filesize

                              8KB

                            • memory/4420-292-0x00000260899A0000-0x00000260899A2000-memory.dmp
                              Filesize

                              8KB

                            • memory/4540-211-0x00000000033F0000-0x00000000033F1000-memory.dmp
                              Filesize

                              4KB

                            • memory/4540-209-0x0000000000000000-mapping.dmp
                            • memory/4540-210-0x00000000033F0000-0x00000000033F1000-memory.dmp
                              Filesize

                              4KB

                            • memory/4576-336-0x0000000000000000-mapping.dmp
                            • memory/4624-347-0x0000000000000000-mapping.dmp
                            • memory/4624-348-0x0000000001550000-0x0000000001551000-memory.dmp
                              Filesize

                              4KB

                            • memory/4652-283-0x0000000000000000-mapping.dmp
                            • memory/4652-284-0x000002548EC10000-0x000002548EC12000-memory.dmp
                              Filesize

                              8KB

                            • memory/4652-285-0x000002548EC10000-0x000002548EC12000-memory.dmp
                              Filesize

                              8KB

                            • memory/4748-242-0x0000000000000000-mapping.dmp
                            • memory/4804-334-0x0000000000000000-mapping.dmp
                            • memory/4804-335-0x00000000012F0000-0x00000000012F1000-memory.dmp
                              Filesize

                              4KB

                            • memory/4876-312-0x000001AD99650000-0x000001AD99652000-memory.dmp
                              Filesize

                              8KB

                            • memory/4876-309-0x000001AD99650000-0x000001AD99652000-memory.dmp
                              Filesize

                              8KB

                            • memory/4876-308-0x0000000000000000-mapping.dmp
                            • memory/4876-310-0x000001AD99650000-0x000001AD99652000-memory.dmp
                              Filesize

                              8KB

                            • memory/4876-311-0x000001AD99650000-0x000001AD99652000-memory.dmp
                              Filesize

                              8KB

                            • memory/4988-331-0x0000000000000000-mapping.dmp